Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.541865] ==================================================================
[   18.541919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.541970] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.542296] 
[   18.542368] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.542467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.542535] Hardware name: linux,dummy-virt (DT)
[   18.542570] Call trace:
[   18.542612]  show_stack+0x20/0x38 (C)
[   18.542664]  dump_stack_lvl+0x8c/0xd0
[   18.542715]  print_report+0x118/0x5d0
[   18.542762]  kasan_report+0xdc/0x128
[   18.542826]  kasan_check_range+0x100/0x1a8
[   18.542881]  __kasan_check_write+0x20/0x30
[   18.542935]  kasan_atomics_helper+0xf20/0x4858
[   18.542983]  kasan_atomics+0x198/0x2e0
[   18.543030]  kunit_try_run_case+0x170/0x3f0
[   18.543117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.543172]  kthread+0x328/0x630
[   18.543224]  ret_from_fork+0x10/0x20
[   18.543273] 
[   18.543293] Allocated by task 266:
[   18.543336]  kasan_save_stack+0x3c/0x68
[   18.543378]  kasan_save_track+0x20/0x40
[   18.543422]  kasan_save_alloc_info+0x40/0x58
[   18.543475]  __kasan_kmalloc+0xd4/0xd8
[   18.543513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.543555]  kasan_atomics+0xb8/0x2e0
[   18.543592]  kunit_try_run_case+0x170/0x3f0
[   18.543632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.543684]  kthread+0x328/0x630
[   18.543726]  ret_from_fork+0x10/0x20
[   18.543771] 
[   18.543791] The buggy address belongs to the object at fff00000c58cd100
[   18.543791]  which belongs to the cache kmalloc-64 of size 64
[   18.543853] The buggy address is located 0 bytes to the right of
[   18.543853]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.543928] 
[   18.543965] The buggy address belongs to the physical page:
[   18.543998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.544060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.544110] page_type: f5(slab)
[   18.544149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.544212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.544257] page dumped because: kasan: bad access detected
[   18.544291] 
[   18.544310] Memory state around the buggy address:
[   18.544343]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.544388]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.544809] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.544877]                                      ^
[   18.544921]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.544966]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.545007] ==================================================================
[   18.477978] ==================================================================
[   18.478030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   18.478088] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.478140] 
[   18.478180] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.478283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.478320] Hardware name: linux,dummy-virt (DT)
[   18.478358] Call trace:
[   18.478382]  show_stack+0x20/0x38 (C)
[   18.478651]  dump_stack_lvl+0x8c/0xd0
[   18.478764]  print_report+0x118/0x5d0
[   18.478816]  kasan_report+0xdc/0x128
[   18.478865]  __asan_report_load4_noabort+0x20/0x30
[   18.478937]  kasan_atomics_helper+0x3dbc/0x4858
[   18.478988]  kasan_atomics+0x198/0x2e0
[   18.479155]  kunit_try_run_case+0x170/0x3f0
[   18.479228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.479293]  kthread+0x328/0x630
[   18.479346]  ret_from_fork+0x10/0x20
[   18.479403] 
[   18.479430] Allocated by task 266:
[   18.479477]  kasan_save_stack+0x3c/0x68
[   18.480868] The buggy address is located 0 bytes to the right of
[   18.480868]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.485664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.486799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.487365]  __kasan_kmalloc+0xd4/0xd8
[   18.487424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.487467]  kasan_atomics+0xb8/0x2e0
[   18.487506]  kunit_try_run_case+0x170/0x3f0
[   18.487771] The buggy address is located 0 bytes to the right of
[   18.487771]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.489174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.492588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.493309] 
[   18.493699]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.493795]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.493849] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.493917]                                      ^
[   18.493952]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.493998]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.494312] ==================================================================
[   18.675295] ==================================================================
[   18.675352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.675403] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.675455] 
[   18.675488] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.675570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.675599] Hardware name: linux,dummy-virt (DT)
[   18.675629] Call trace:
[   18.675655]  show_stack+0x20/0x38 (C)
[   18.675701]  dump_stack_lvl+0x8c/0xd0
[   18.675750]  print_report+0x118/0x5d0
[   18.675797]  kasan_report+0xdc/0x128
[   18.675856]  kasan_check_range+0x100/0x1a8
[   18.675905]  __kasan_check_write+0x20/0x30
[   18.675951]  kasan_atomics_helper+0x14e4/0x4858
[   18.676002]  kasan_atomics+0x198/0x2e0
[   18.676046]  kunit_try_run_case+0x170/0x3f0
[   18.676094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.676148]  kthread+0x328/0x630
[   18.676899]  ret_from_fork+0x10/0x20
[   18.677000] 
[   18.677044] Allocated by task 266:
[   18.677100]  kasan_save_stack+0x3c/0x68
[   18.677478]  kasan_save_track+0x20/0x40
[   18.677920]  kasan_save_alloc_info+0x40/0x58
[   18.678004]  __kasan_kmalloc+0xd4/0xd8
[   18.678248]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.678471]  kasan_atomics+0xb8/0x2e0
[   18.678541]  kunit_try_run_case+0x170/0x3f0
[   18.678613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.678659]  kthread+0x328/0x630
[   18.679321]  ret_from_fork+0x10/0x20
[   18.679386] 
[   18.679718] The buggy address belongs to the object at fff00000c58cd100
[   18.679718]  which belongs to the cache kmalloc-64 of size 64
[   18.679845] The buggy address is located 0 bytes to the right of
[   18.679845]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.680371] 
[   18.680661] The buggy address belongs to the physical page:
[   18.680907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.681518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.682148] page_type: f5(slab)
[   18.682226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.682524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.683113] page dumped because: kasan: bad access detected
[   18.683425] 
[   18.683473] Memory state around the buggy address:
[   18.683641]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.683910]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.684133] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.684189]                                      ^
[   18.684242]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.684289]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.684720] ==================================================================
[   18.535550] ==================================================================
[   18.535712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.535772] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.535839] 
[   18.535933] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.536024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.536071] Hardware name: linux,dummy-virt (DT)
[   18.536135] Call trace:
[   18.536193]  show_stack+0x20/0x38 (C)
[   18.536291]  dump_stack_lvl+0x8c/0xd0
[   18.536347]  print_report+0x118/0x5d0
[   18.536422]  kasan_report+0xdc/0x128
[   18.536504]  kasan_check_range+0x100/0x1a8
[   18.536627]  __kasan_check_write+0x20/0x30
[   18.536676]  kasan_atomics_helper+0xeb8/0x4858
[   18.536725]  kasan_atomics+0x198/0x2e0
[   18.536772]  kunit_try_run_case+0x170/0x3f0
[   18.536820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.537159]  kthread+0x328/0x630
[   18.537256]  ret_from_fork+0x10/0x20
[   18.537364] 
[   18.537422] Allocated by task 266:
[   18.537485]  kasan_save_stack+0x3c/0x68
[   18.537779]  kasan_save_track+0x20/0x40
[   18.537926]  kasan_save_alloc_info+0x40/0x58
[   18.538092]  __kasan_kmalloc+0xd4/0xd8
[   18.538176]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.538338]  kasan_atomics+0xb8/0x2e0
[   18.538408]  kunit_try_run_case+0x170/0x3f0
[   18.538502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.538548]  kthread+0x328/0x630
[   18.538583]  ret_from_fork+0x10/0x20
[   18.538908] 
[   18.539027] The buggy address belongs to the object at fff00000c58cd100
[   18.539027]  which belongs to the cache kmalloc-64 of size 64
[   18.539119] The buggy address is located 0 bytes to the right of
[   18.539119]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.539331] 
[   18.539470] The buggy address belongs to the physical page:
[   18.539525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.539582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.539980] page_type: f5(slab)
[   18.540090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.540160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.540225] page dumped because: kasan: bad access detected
[   18.540261] 
[   18.540281] Memory state around the buggy address:
[   18.540325]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.540371]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.540417] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.540458]                                      ^
[   18.540739]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.540990]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.541077] ==================================================================
[   18.552870] ==================================================================
[   18.552938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.552999] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.553052] 
[   18.553084] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.553167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.553216] Hardware name: linux,dummy-virt (DT)
[   18.553250] Call trace:
[   18.553273]  show_stack+0x20/0x38 (C)
[   18.553331]  dump_stack_lvl+0x8c/0xd0
[   18.553379]  print_report+0x118/0x5d0
[   18.553427]  kasan_report+0xdc/0x128
[   18.553473]  kasan_check_range+0x100/0x1a8
[   18.553532]  __kasan_check_write+0x20/0x30
[   18.553579]  kasan_atomics_helper+0xff0/0x4858
[   18.553628]  kasan_atomics+0x198/0x2e0
[   18.553674]  kunit_try_run_case+0x170/0x3f0
[   18.553722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.553777]  kthread+0x328/0x630
[   18.553818]  ret_from_fork+0x10/0x20
[   18.553866] 
[   18.553888] Allocated by task 266:
[   18.553916]  kasan_save_stack+0x3c/0x68
[   18.553958]  kasan_save_track+0x20/0x40
[   18.553996]  kasan_save_alloc_info+0x40/0x58
[   18.554037]  __kasan_kmalloc+0xd4/0xd8
[   18.554075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.554116]  kasan_atomics+0xb8/0x2e0
[   18.554154]  kunit_try_run_case+0x170/0x3f0
[   18.555381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.555488]  kthread+0x328/0x630
[   18.555824]  ret_from_fork+0x10/0x20
[   18.555886] 
[   18.555911] The buggy address belongs to the object at fff00000c58cd100
[   18.555911]  which belongs to the cache kmalloc-64 of size 64
[   18.556262] The buggy address is located 0 bytes to the right of
[   18.556262]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.556630] 
[   18.556928] The buggy address belongs to the physical page:
[   18.557004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.557142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.557600] page_type: f5(slab)
[   18.557673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.557780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.557827] page dumped because: kasan: bad access detected
[   18.557885] 
[   18.558151] Memory state around the buggy address:
[   18.558342]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.558522]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.558692] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.558742]                                      ^
[   18.559140]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.559531]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.559671] ==================================================================
[   18.602083] ==================================================================
[   18.602144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.602391] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.602494] 
[   18.602529] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.602765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.602813] Hardware name: linux,dummy-virt (DT)
[   18.602848] Call trace:
[   18.602877]  show_stack+0x20/0x38 (C)
[   18.603036]  dump_stack_lvl+0x8c/0xd0
[   18.603088]  print_report+0x118/0x5d0
[   18.603154]  kasan_report+0xdc/0x128
[   18.603215]  kasan_check_range+0x100/0x1a8
[   18.603474]  __kasan_check_write+0x20/0x30
[   18.603590]  kasan_atomics_helper+0x11f8/0x4858
[   18.603815]  kasan_atomics+0x198/0x2e0
[   18.603876]  kunit_try_run_case+0x170/0x3f0
[   18.603928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.604153]  kthread+0x328/0x630
[   18.604254]  ret_from_fork+0x10/0x20
[   18.604731] 
[   18.604800] Allocated by task 266:
[   18.605332]  kasan_save_stack+0x3c/0x68
[   18.605403]  kasan_save_track+0x20/0x40
[   18.605483]  kasan_save_alloc_info+0x40/0x58
[   18.605731]  __kasan_kmalloc+0xd4/0xd8
[   18.606186]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.606394]  kasan_atomics+0xb8/0x2e0
[   18.606597]  kunit_try_run_case+0x170/0x3f0
[   18.606662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.606730]  kthread+0x328/0x630
[   18.606854]  ret_from_fork+0x10/0x20
[   18.606898] 
[   18.606920] The buggy address belongs to the object at fff00000c58cd100
[   18.606920]  which belongs to the cache kmalloc-64 of size 64
[   18.607007] The buggy address is located 0 bytes to the right of
[   18.607007]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.607323] 
[   18.607512] The buggy address belongs to the physical page:
[   18.607734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.607814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.607865] page_type: f5(slab)
[   18.608146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.608250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.608405] page dumped because: kasan: bad access detected
[   18.608618] 
[   18.608642] Memory state around the buggy address:
[   18.608751]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.609218]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.609321] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.609569]                                      ^
[   18.609724]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.610325]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.610653] ==================================================================
[   18.738733] ==================================================================
[   18.738828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.738889] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.738943] 
[   18.739276] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.739380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.739595] Hardware name: linux,dummy-virt (DT)
[   18.739840] Call trace:
[   18.739929]  show_stack+0x20/0x38 (C)
[   18.740184]  dump_stack_lvl+0x8c/0xd0
[   18.740498]  print_report+0x118/0x5d0
[   18.740590]  kasan_report+0xdc/0x128
[   18.740742]  kasan_check_range+0x100/0x1a8
[   18.740821]  __kasan_check_write+0x20/0x30
[   18.740881]  kasan_atomics_helper+0x16d0/0x4858
[   18.740940]  kasan_atomics+0x198/0x2e0
[   18.741177]  kunit_try_run_case+0x170/0x3f0
[   18.741815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.741897]  kthread+0x328/0x630
[   18.742081]  ret_from_fork+0x10/0x20
[   18.742711] 
[   18.742751] Allocated by task 266:
[   18.742899]  kasan_save_stack+0x3c/0x68
[   18.742985]  kasan_save_track+0x20/0x40
[   18.743075]  kasan_save_alloc_info+0x40/0x58
[   18.743438]  __kasan_kmalloc+0xd4/0xd8
[   18.743606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.743853]  kasan_atomics+0xb8/0x2e0
[   18.744124]  kunit_try_run_case+0x170/0x3f0
[   18.744212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.744667]  kthread+0x328/0x630
[   18.744912]  ret_from_fork+0x10/0x20
[   18.744990] 
[   18.745059] The buggy address belongs to the object at fff00000c58cd100
[   18.745059]  which belongs to the cache kmalloc-64 of size 64
[   18.745274] The buggy address is located 0 bytes to the right of
[   18.745274]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.745618] 
[   18.745800] The buggy address belongs to the physical page:
[   18.745868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.746302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.746370] page_type: f5(slab)
[   18.746949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.747011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.747074] page dumped because: kasan: bad access detected
[   18.747148] 
[   18.747169] Memory state around the buggy address:
[   18.747217]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.747274]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.747320] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.747373]                                      ^
[   18.747415]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.747466]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.747532] ==================================================================
[   18.652340] ==================================================================
[   18.652402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.654463] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.654555] 
[   18.654609] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.654789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.654819] Hardware name: linux,dummy-virt (DT)
[   18.654897] Call trace:
[   18.655429]  show_stack+0x20/0x38 (C)
[   18.655525]  dump_stack_lvl+0x8c/0xd0
[   18.655788]  print_report+0x118/0x5d0
[   18.655846]  kasan_report+0xdc/0x128
[   18.656354]  kasan_check_range+0x100/0x1a8
[   18.656760]  __kasan_check_write+0x20/0x30
[   18.656921]  kasan_atomics_helper+0x1414/0x4858
[   18.657035]  kasan_atomics+0x198/0x2e0
[   18.657121]  kunit_try_run_case+0x170/0x3f0
[   18.657561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.657882]  kthread+0x328/0x630
[   18.658108]  ret_from_fork+0x10/0x20
[   18.658301] 
[   18.658427] Allocated by task 266:
[   18.658475]  kasan_save_stack+0x3c/0x68
[   18.658942]  kasan_save_track+0x20/0x40
[   18.659030]  kasan_save_alloc_info+0x40/0x58
[   18.659311]  __kasan_kmalloc+0xd4/0xd8
[   18.659491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.659642]  kasan_atomics+0xb8/0x2e0
[   18.659693]  kunit_try_run_case+0x170/0x3f0
[   18.659917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.660082]  kthread+0x328/0x630
[   18.660217]  ret_from_fork+0x10/0x20
[   18.660263] 
[   18.660286] The buggy address belongs to the object at fff00000c58cd100
[   18.660286]  which belongs to the cache kmalloc-64 of size 64
[   18.660350] The buggy address is located 0 bytes to the right of
[   18.660350]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.661010] 
[   18.661093] The buggy address belongs to the physical page:
[   18.661305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.661740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.661931] page_type: f5(slab)
[   18.662008] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.662244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.662767] page dumped because: kasan: bad access detected
[   18.662814] 
[   18.662835] Memory state around the buggy address:
[   18.662896]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.663146]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.663312] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.663368]                                      ^
[   18.663404]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.663450]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.663817] ==================================================================
[   18.760791] ==================================================================
[   18.761135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.761414] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.761482] 
[   18.761518] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.761609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.761636] Hardware name: linux,dummy-virt (DT)
[   18.761669] Call trace:
[   18.761992]  show_stack+0x20/0x38 (C)
[   18.762064]  dump_stack_lvl+0x8c/0xd0
[   18.762420]  print_report+0x118/0x5d0
[   18.762577]  kasan_report+0xdc/0x128
[   18.762651]  kasan_check_range+0x100/0x1a8
[   18.762703]  __kasan_check_write+0x20/0x30
[   18.763047]  kasan_atomics_helper+0x175c/0x4858
[   18.763115]  kasan_atomics+0x198/0x2e0
[   18.763333]  kunit_try_run_case+0x170/0x3f0
[   18.763522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.763593]  kthread+0x328/0x630
[   18.763637]  ret_from_fork+0x10/0x20
[   18.763691] 
[   18.763813] Allocated by task 266:
[   18.763852]  kasan_save_stack+0x3c/0x68
[   18.763896]  kasan_save_track+0x20/0x40
[   18.763953]  kasan_save_alloc_info+0x40/0x58
[   18.764307]  __kasan_kmalloc+0xd4/0xd8
[   18.764584]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.764804]  kasan_atomics+0xb8/0x2e0
[   18.764894]  kunit_try_run_case+0x170/0x3f0
[   18.765010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.765072]  kthread+0x328/0x630
[   18.765110]  ret_from_fork+0x10/0x20
[   18.765330] 
[   18.765407] The buggy address belongs to the object at fff00000c58cd100
[   18.765407]  which belongs to the cache kmalloc-64 of size 64
[   18.765742] The buggy address is located 0 bytes to the right of
[   18.765742]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.766058] 
[   18.766084] The buggy address belongs to the physical page:
[   18.766145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.766357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.766591] page_type: f5(slab)
[   18.766655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.766863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.767110] page dumped because: kasan: bad access detected
[   18.767521] 
[   18.767872] Memory state around the buggy address:
[   18.768017]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.768070]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.768452] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.768630]                                      ^
[   18.768674]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.768798]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.768999] ==================================================================
[   18.451230] ==================================================================
[   18.451312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.451389] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.451443] 
[   18.451474] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.451658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.451690] Hardware name: linux,dummy-virt (DT)
[   18.451723] Call trace:
[   18.451746]  show_stack+0x20/0x38 (C)
[   18.451837]  dump_stack_lvl+0x8c/0xd0
[   18.451915]  print_report+0x118/0x5d0
[   18.451990]  kasan_report+0xdc/0x128
[   18.452055]  kasan_check_range+0x100/0x1a8
[   18.452122]  __kasan_check_write+0x20/0x30
[   18.452225]  kasan_atomics_helper+0x99c/0x4858
[   18.452316]  kasan_atomics+0x198/0x2e0
[   18.452393]  kunit_try_run_case+0x170/0x3f0
[   18.452450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452505]  kthread+0x328/0x630
[   18.452546]  ret_from_fork+0x10/0x20
[   18.452595] 
[   18.452624] Allocated by task 266:
[   18.452652]  kasan_save_stack+0x3c/0x68
[   18.452832]  kasan_save_track+0x20/0x40
[   18.452874]  kasan_save_alloc_info+0x40/0x58
[   18.452917]  __kasan_kmalloc+0xd4/0xd8
[   18.452956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.452996]  kasan_atomics+0xb8/0x2e0
[   18.453034]  kunit_try_run_case+0x170/0x3f0
[   18.453074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.453168]  kthread+0x328/0x630
[   18.453236]  ret_from_fork+0x10/0x20
[   18.453351] 
[   18.453390] The buggy address belongs to the object at fff00000c58cd100
[   18.453390]  which belongs to the cache kmalloc-64 of size 64
[   18.453494] The buggy address is located 0 bytes to the right of
[   18.453494]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.453645] 
[   18.453669] The buggy address belongs to the physical page:
[   18.453700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.453784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.453971] page_type: f5(slab)
[   18.454012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.454071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.454159] page dumped because: kasan: bad access detected
[   18.454230] 
[   18.454338] Memory state around the buggy address:
[   18.454384]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.454438]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.454525] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.454642]                                      ^
[   18.454686]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.454732]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.454782] ==================================================================
[   18.623538] ==================================================================
[   18.623624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.623676] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.624177] 
[   18.624260] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.624468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.624497] Hardware name: linux,dummy-virt (DT)
[   18.624987] Call trace:
[   18.625237]  show_stack+0x20/0x38 (C)
[   18.625633]  dump_stack_lvl+0x8c/0xd0
[   18.625763]  print_report+0x118/0x5d0
[   18.625877]  kasan_report+0xdc/0x128
[   18.626187]  kasan_check_range+0x100/0x1a8
[   18.626410]  __kasan_check_write+0x20/0x30
[   18.626575]  kasan_atomics_helper+0x12d8/0x4858
[   18.626644]  kasan_atomics+0x198/0x2e0
[   18.626694]  kunit_try_run_case+0x170/0x3f0
[   18.627017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.627563]  kthread+0x328/0x630
[   18.627650]  ret_from_fork+0x10/0x20
[   18.627826] 
[   18.627873] Allocated by task 266:
[   18.627905]  kasan_save_stack+0x3c/0x68
[   18.627979]  kasan_save_track+0x20/0x40
[   18.628226]  kasan_save_alloc_info+0x40/0x58
[   18.628438]  __kasan_kmalloc+0xd4/0xd8
[   18.628749]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.629076]  kasan_atomics+0xb8/0x2e0
[   18.629259]  kunit_try_run_case+0x170/0x3f0
[   18.629511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.629779]  kthread+0x328/0x630
[   18.629823]  ret_from_fork+0x10/0x20
[   18.629980] 
[   18.630183] The buggy address belongs to the object at fff00000c58cd100
[   18.630183]  which belongs to the cache kmalloc-64 of size 64
[   18.630443] The buggy address is located 0 bytes to the right of
[   18.630443]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.630515] 
[   18.630641] The buggy address belongs to the physical page:
[   18.630688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.630774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.630841] page_type: f5(slab)
[   18.630888] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.630943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.630996] page dumped because: kasan: bad access detected
[   18.631049] 
[   18.631076] Memory state around the buggy address:
[   18.631110]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.631164]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.631248] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.631620]                                      ^
[   18.631774]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.631999]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.632492] ==================================================================
[   18.440771] ==================================================================
[   18.440824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.440887] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.440985] 
[   18.441076] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.441236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.441284] Hardware name: linux,dummy-virt (DT)
[   18.441318] Call trace:
[   18.441359]  show_stack+0x20/0x38 (C)
[   18.441420]  dump_stack_lvl+0x8c/0xd0
[   18.441504]  print_report+0x118/0x5d0
[   18.441559]  kasan_report+0xdc/0x128
[   18.441615]  __asan_report_load4_noabort+0x20/0x30
[   18.441670]  kasan_atomics_helper+0x42d8/0x4858
[   18.441720]  kasan_atomics+0x198/0x2e0
[   18.441939]  kunit_try_run_case+0x170/0x3f0
[   18.441992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.442126]  kthread+0x328/0x630
[   18.442211]  ret_from_fork+0x10/0x20
[   18.442314] 
[   18.442351] Allocated by task 266:
[   18.442407]  kasan_save_stack+0x3c/0x68
[   18.442452]  kasan_save_track+0x20/0x40
[   18.442636]  kasan_save_alloc_info+0x40/0x58
[   18.442686]  __kasan_kmalloc+0xd4/0xd8
[   18.442735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.442784]  kasan_atomics+0xb8/0x2e0
[   18.442830]  kunit_try_run_case+0x170/0x3f0
[   18.442875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.442931]  kthread+0x328/0x630
[   18.442967]  ret_from_fork+0x10/0x20
[   18.443003] 
[   18.443165] The buggy address belongs to the object at fff00000c58cd100
[   18.443165]  which belongs to the cache kmalloc-64 of size 64
[   18.443318] The buggy address is located 0 bytes to the right of
[   18.443318]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.443647] page_type: f5(slab)
[   18.443703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.444042]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.444996] 
[   18.445027] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.445131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.445456] Hardware name: linux,dummy-virt (DT)
[   18.445500] Call trace:
[   18.446013]  show_stack+0x20/0x38 (C)
[   18.446295]  dump_stack_lvl+0x8c/0xd0
[   18.447334]  print_report+0x118/0x5d0
[   18.447393]  kasan_report+0xdc/0x128
[   18.447623]  kasan_check_range+0x100/0x1a8
[   18.447821]  __kasan_check_write+0x20/0x30
[   18.447881]  kasan_atomics_helper+0x934/0x4858
[   18.447960]  kasan_atomics+0x198/0x2e0
[   18.448059]  kunit_try_run_case+0x170/0x3f0
[   18.448126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.448226]  kthread+0x328/0x630
[   18.448315]  ret_from_fork+0x10/0x20
[   18.448431] 
[   18.448465] Allocated by task 266:
[   18.448494]  kasan_save_stack+0x3c/0x68
[   18.448548]  kasan_save_track+0x20/0x40
[   18.448587]  kasan_save_alloc_info+0x40/0x58
[   18.448630]  __kasan_kmalloc+0xd4/0xd8
[   18.448668]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.448753]  kasan_atomics+0xb8/0x2e0
[   18.448789]  kunit_try_run_case+0x170/0x3f0
[   18.448829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.448876]  kthread+0x328/0x630
[   18.448909]  ret_from_fork+0x10/0x20
[   18.448984] 
[   18.449033] The buggy address belongs to the object at fff00000c58cd100
[   18.449033]  which belongs to the cache kmalloc-64 of size 64
[   18.449172] The buggy address is located 0 bytes to the right of
[   18.449172]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.449290] 
[   18.449338] The buggy address belongs to the physical page:
[   18.449371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.449447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.449521] page_type: f5(slab)
[   18.449559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.449632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.449709] page dumped because: kasan: bad access detected
[   18.449840] 
[   18.449900] Memory state around the buggy address:
[   18.449967]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.450027]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.450072] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.450247]                                      ^
[   18.450285]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.450342]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.450436] ==================================================================
[   18.531007] ==================================================================
[   18.531076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.531126] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.531183] 
[   18.531356] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.531561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.531595] Hardware name: linux,dummy-virt (DT)
[   18.531634] Call trace:
[   18.531668]  show_stack+0x20/0x38 (C)
[   18.531721]  dump_stack_lvl+0x8c/0xd0
[   18.531777]  print_report+0x118/0x5d0
[   18.531833]  kasan_report+0xdc/0x128
[   18.531889]  __asan_report_store8_noabort+0x20/0x30
[   18.531951]  kasan_atomics_helper+0x3e5c/0x4858
[   18.532030]  kasan_atomics+0x198/0x2e0
[   18.532086]  kunit_try_run_case+0x170/0x3f0
[   18.532136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.532213]  kthread+0x328/0x630
[   18.532256]  ret_from_fork+0x10/0x20
[   18.532304] 
[   18.532325] Allocated by task 266:
[   18.532353]  kasan_save_stack+0x3c/0x68
[   18.532594]  kasan_save_track+0x20/0x40
[   18.532661]  kasan_save_alloc_info+0x40/0x58
[   18.532733]  __kasan_kmalloc+0xd4/0xd8
[   18.532788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.533127]  kasan_atomics+0xb8/0x2e0
[   18.533185]  kunit_try_run_case+0x170/0x3f0
[   18.533335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.533418]  kthread+0x328/0x630
[   18.533476]  ret_from_fork+0x10/0x20
[   18.533602] 
[   18.533653] The buggy address belongs to the object at fff00000c58cd100
[   18.533653]  which belongs to the cache kmalloc-64 of size 64
[   18.533792] The buggy address is located 0 bytes to the right of
[   18.533792]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.533892] 
[   18.533924] The buggy address belongs to the physical page:
[   18.533958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.534014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.534064] page_type: f5(slab)
[   18.534104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.534192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.534250] page dumped because: kasan: bad access detected
[   18.534442] 
[   18.534490] Memory state around the buggy address:
[   18.534528]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.534586]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.534633] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.534674]                                      ^
[   18.534717]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534760]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534805] ==================================================================
[   18.776984] ==================================================================
[   18.777257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.777328] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.777381] 
[   18.777595] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.777693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.777750] Hardware name: linux,dummy-virt (DT)
[   18.777863] Call trace:
[   18.777918]  show_stack+0x20/0x38 (C)
[   18.777969]  dump_stack_lvl+0x8c/0xd0
[   18.778192]  print_report+0x118/0x5d0
[   18.778276]  kasan_report+0xdc/0x128
[   18.778326]  kasan_check_range+0x100/0x1a8
[   18.778817]  __kasan_check_write+0x20/0x30
[   18.778940]  kasan_atomics_helper+0x17ec/0x4858
[   18.778997]  kasan_atomics+0x198/0x2e0
[   18.779044]  kunit_try_run_case+0x170/0x3f0
[   18.779264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.779470]  kthread+0x328/0x630
[   18.779778]  ret_from_fork+0x10/0x20
[   18.779850] 
[   18.779976] Allocated by task 266:
[   18.780023]  kasan_save_stack+0x3c/0x68
[   18.780078]  kasan_save_track+0x20/0x40
[   18.780126]  kasan_save_alloc_info+0x40/0x58
[   18.780519]  __kasan_kmalloc+0xd4/0xd8
[   18.780810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.781015]  kasan_atomics+0xb8/0x2e0
[   18.781159]  kunit_try_run_case+0x170/0x3f0
[   18.781313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.781393]  kthread+0x328/0x630
[   18.781427]  ret_from_fork+0x10/0x20
[   18.781493] 
[   18.781515] The buggy address belongs to the object at fff00000c58cd100
[   18.781515]  which belongs to the cache kmalloc-64 of size 64
[   18.781591] The buggy address is located 0 bytes to the right of
[   18.781591]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.781844] 
[   18.781901] The buggy address belongs to the physical page:
[   18.782077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.782603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.782910] page_type: f5(slab)
[   18.783046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.783270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.783329] page dumped because: kasan: bad access detected
[   18.783522] 
[   18.783619] Memory state around the buggy address:
[   18.783802]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.784295]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.784731] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.784810]                                      ^
[   18.784872]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.784919]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.784962] ==================================================================
[   18.560188] ==================================================================
[   18.560515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.560729] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.560957] 
[   18.561017] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.561382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.561491] Hardware name: linux,dummy-virt (DT)
[   18.561525] Call trace:
[   18.561868]  show_stack+0x20/0x38 (C)
[   18.562372]  dump_stack_lvl+0x8c/0xd0
[   18.562880]  print_report+0x118/0x5d0
[   18.563002]  kasan_report+0xdc/0x128
[   18.563090]  kasan_check_range+0x100/0x1a8
[   18.563256]  __kasan_check_write+0x20/0x30
[   18.563308]  kasan_atomics_helper+0x1058/0x4858
[   18.563688]  kasan_atomics+0x198/0x2e0
[   18.563784]  kunit_try_run_case+0x170/0x3f0
[   18.563979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.564394]  kthread+0x328/0x630
[   18.564932]  ret_from_fork+0x10/0x20
[   18.565091] 
[   18.565135] Allocated by task 266:
[   18.565217]  kasan_save_stack+0x3c/0x68
[   18.565271]  kasan_save_track+0x20/0x40
[   18.565316]  kasan_save_alloc_info+0x40/0x58
[   18.565358]  __kasan_kmalloc+0xd4/0xd8
[   18.565396]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.565438]  kasan_atomics+0xb8/0x2e0
[   18.565476]  kunit_try_run_case+0x170/0x3f0
[   18.565559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.565605]  kthread+0x328/0x630
[   18.565656]  ret_from_fork+0x10/0x20
[   18.565696] 
[   18.565717] The buggy address belongs to the object at fff00000c58cd100
[   18.565717]  which belongs to the cache kmalloc-64 of size 64
[   18.565780] The buggy address is located 0 bytes to the right of
[   18.565780]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.565849] 
[   18.565889] The buggy address belongs to the physical page:
[   18.565922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.565987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.566036] page_type: f5(slab)
[   18.566085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.566140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.566184] page dumped because: kasan: bad access detected
[   18.566232] 
[   18.566266] Memory state around the buggy address:
[   18.566300]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.566345]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.566397] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.566439]                                      ^
[   18.566474]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.566528]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.566592] ==================================================================
[   18.567953] ==================================================================
[   18.568473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.568561] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.568615] 
[   18.568648] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.568731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.568761] Hardware name: linux,dummy-virt (DT)
[   18.569550] Call trace:
[   18.569752]  show_stack+0x20/0x38 (C)
[   18.570014]  dump_stack_lvl+0x8c/0xd0
[   18.570551]  print_report+0x118/0x5d0
[   18.570702]  kasan_report+0xdc/0x128
[   18.570791]  kasan_check_range+0x100/0x1a8
[   18.570957]  __kasan_check_write+0x20/0x30
[   18.571019]  kasan_atomics_helper+0x10c0/0x4858
[   18.571362]  kasan_atomics+0x198/0x2e0
[   18.571664]  kunit_try_run_case+0x170/0x3f0
[   18.571842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.572272]  kthread+0x328/0x630
[   18.572691]  ret_from_fork+0x10/0x20
[   18.572829] 
[   18.572867] Allocated by task 266:
[   18.572915]  kasan_save_stack+0x3c/0x68
[   18.573060]  kasan_save_track+0x20/0x40
[   18.573101]  kasan_save_alloc_info+0x40/0x58
[   18.573142]  __kasan_kmalloc+0xd4/0xd8
[   18.573186]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.573238]  kasan_atomics+0xb8/0x2e0
[   18.573277]  kunit_try_run_case+0x170/0x3f0
[   18.573319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.573800]  kthread+0x328/0x630
[   18.574025]  ret_from_fork+0x10/0x20
[   18.574119] 
[   18.574455] The buggy address belongs to the object at fff00000c58cd100
[   18.574455]  which belongs to the cache kmalloc-64 of size 64
[   18.574874] The buggy address is located 0 bytes to the right of
[   18.574874]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.575283] 
[   18.575336] The buggy address belongs to the physical page:
[   18.575525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.575887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.576320] page_type: f5(slab)
[   18.576585] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.576687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.576740] page dumped because: kasan: bad access detected
[   18.576776] 
[   18.577123] Memory state around the buggy address:
[   18.577379]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.577552]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.577690] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.577755]                                      ^
[   18.578147]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.578387]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.578569] ==================================================================
[   18.749210] ==================================================================
[   18.749265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.749317] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.749747] 
[   18.749799] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.749931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.749980] Hardware name: linux,dummy-virt (DT)
[   18.750014] Call trace:
[   18.750237]  show_stack+0x20/0x38 (C)
[   18.750426]  dump_stack_lvl+0x8c/0xd0
[   18.750520]  print_report+0x118/0x5d0
[   18.750609]  kasan_report+0xdc/0x128
[   18.750820]  __asan_report_load8_noabort+0x20/0x30
[   18.751029]  kasan_atomics_helper+0x3e10/0x4858
[   18.751082]  kasan_atomics+0x198/0x2e0
[   18.751131]  kunit_try_run_case+0x170/0x3f0
[   18.751688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.751882]  kthread+0x328/0x630
[   18.751980]  ret_from_fork+0x10/0x20
[   18.752032] 
[   18.752052] Allocated by task 266:
[   18.752083]  kasan_save_stack+0x3c/0x68
[   18.752125]  kasan_save_track+0x20/0x40
[   18.752471]  kasan_save_alloc_info+0x40/0x58
[   18.752805]  __kasan_kmalloc+0xd4/0xd8
[   18.753053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.753131]  kasan_atomics+0xb8/0x2e0
[   18.753269]  kunit_try_run_case+0x170/0x3f0
[   18.753339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.753384]  kthread+0x328/0x630
[   18.753550]  ret_from_fork+0x10/0x20
[   18.753692] 
[   18.753828] The buggy address belongs to the object at fff00000c58cd100
[   18.753828]  which belongs to the cache kmalloc-64 of size 64
[   18.754313] The buggy address is located 0 bytes to the right of
[   18.754313]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.754700] 
[   18.754761] The buggy address belongs to the physical page:
[   18.754831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.754924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.755712] page_type: f5(slab)
[   18.756221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.756534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.756801] page dumped because: kasan: bad access detected
[   18.756965] 
[   18.756989] Memory state around the buggy address:
[   18.757510]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.757728]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.757781] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.757823]                                      ^
[   18.758006]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.758668]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.758738] ==================================================================
[   18.474565] ==================================================================
[   18.474706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   18.474759] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.474820] 
[   18.474852] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.475056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.475095] Hardware name: linux,dummy-virt (DT)
[   18.475126] Call trace:
[   18.475149]  show_stack+0x20/0x38 (C)
[   18.475221]  dump_stack_lvl+0x8c/0xd0
[   18.475270]  print_report+0x118/0x5d0
[   18.475324]  kasan_report+0xdc/0x128
[   18.475371]  kasan_check_range+0x100/0x1a8
[   18.475422]  __kasan_check_write+0x20/0x30
[   18.475473]  kasan_atomics_helper+0xb70/0x4858
[   18.475534]  kasan_atomics+0x198/0x2e0
[   18.475582]  kunit_try_run_case+0x170/0x3f0
[   18.475628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.475683]  kthread+0x328/0x630
[   18.475725]  ret_from_fork+0x10/0x20
[   18.475772] 
[   18.475791] Allocated by task 266:
[   18.475821]  kasan_save_stack+0x3c/0x68
[   18.475865]  kasan_save_track+0x20/0x40
[   18.475910]  kasan_save_alloc_info+0x40/0x58
[   18.475963]  __kasan_kmalloc+0xd4/0xd8
[   18.476008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.476050]  kasan_atomics+0xb8/0x2e0
[   18.476088]  kunit_try_run_case+0x170/0x3f0
[   18.476128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.476173]  kthread+0x328/0x630
[   18.476216]  ret_from_fork+0x10/0x20
[   18.476254] 
[   18.476274] The buggy address belongs to the object at fff00000c58cd100
[   18.476274]  which belongs to the cache kmalloc-64 of size 64
[   18.476335] The buggy address is located 0 bytes to the right of
[   18.476335]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.476704] 
[   18.476756] The buggy address belongs to the physical page:
[   18.476801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.476877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.476996] page_type: f5(slab)
[   18.477060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.477138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.477223] page dumped because: kasan: bad access detected
[   18.477270] 
[   18.477309] Memory state around the buggy address:
[   18.477342]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.477409]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.477453] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.477494]                                      ^
[   18.477529]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.477574]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.477738] ==================================================================
[   18.715263] ==================================================================
[   18.715314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.715360] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.715846] 
[   18.716091] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.716920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.716974] Hardware name: linux,dummy-virt (DT)
[   18.717026] Call trace:
[   18.717072]  show_stack+0x20/0x38 (C)
[   18.717378]  dump_stack_lvl+0x8c/0xd0
[   18.717802]  print_report+0x118/0x5d0
[   18.718228]  kasan_report+0xdc/0x128
[   18.718348]  kasan_check_range+0x100/0x1a8
[   18.718530]  __kasan_check_write+0x20/0x30
[   18.718634]  kasan_atomics_helper+0x1644/0x4858
[   18.718684]  kasan_atomics+0x198/0x2e0
[   18.718904]  kunit_try_run_case+0x170/0x3f0
[   18.719154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.719585]  kthread+0x328/0x630
[   18.719927]  ret_from_fork+0x10/0x20
[   18.720298] 
[   18.720565] Allocated by task 266:
[   18.720621]  kasan_save_stack+0x3c/0x68
[   18.720792]  kasan_save_track+0x20/0x40
[   18.720839]  kasan_save_alloc_info+0x40/0x58
[   18.720917]  __kasan_kmalloc+0xd4/0xd8
[   18.720969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.721982]  kasan_atomics+0xb8/0x2e0
[   18.722306]  kunit_try_run_case+0x170/0x3f0
[   18.722385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.723142]  kthread+0x328/0x630
[   18.723512]  ret_from_fork+0x10/0x20
[   18.723829] 
[   18.723867] The buggy address belongs to the object at fff00000c58cd100
[   18.723867]  which belongs to the cache kmalloc-64 of size 64
[   18.723973] The buggy address is located 0 bytes to the right of
[   18.723973]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.724224] 
[   18.724285] The buggy address belongs to the physical page:
[   18.724321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.724945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.725123] page_type: f5(slab)
[   18.725218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.725797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.725977] page dumped because: kasan: bad access detected
[   18.726019] 
[   18.726065] Memory state around the buggy address:
[   18.726297]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.726562]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.726628] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.726875]                                      ^
[   18.727204]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.727283]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.727920] ==================================================================
[   18.644930] ==================================================================
[   18.644985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.645036] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.645089] 
[   18.645120] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.645219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.645858] Hardware name: linux,dummy-virt (DT)
[   18.646011] Call trace:
[   18.646039]  show_stack+0x20/0x38 (C)
[   18.646221]  dump_stack_lvl+0x8c/0xd0
[   18.646282]  print_report+0x118/0x5d0
[   18.646518]  kasan_report+0xdc/0x128
[   18.646689]  __asan_report_load8_noabort+0x20/0x30
[   18.647018]  kasan_atomics_helper+0x3f04/0x4858
[   18.647158]  kasan_atomics+0x198/0x2e0
[   18.647242]  kunit_try_run_case+0x170/0x3f0
[   18.647384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.647458]  kthread+0x328/0x630
[   18.647521]  ret_from_fork+0x10/0x20
[   18.647570] 
[   18.647591] Allocated by task 266:
[   18.647622]  kasan_save_stack+0x3c/0x68
[   18.647931]  kasan_save_track+0x20/0x40
[   18.647997]  kasan_save_alloc_info+0x40/0x58
[   18.648042]  __kasan_kmalloc+0xd4/0xd8
[   18.648080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.648485]  kasan_atomics+0xb8/0x2e0
[   18.648565]  kunit_try_run_case+0x170/0x3f0
[   18.648703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.648753]  kthread+0x328/0x630
[   18.648787]  ret_from_fork+0x10/0x20
[   18.648826] 
[   18.648848] The buggy address belongs to the object at fff00000c58cd100
[   18.648848]  which belongs to the cache kmalloc-64 of size 64
[   18.649261] The buggy address is located 0 bytes to the right of
[   18.649261]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.649580] 
[   18.649849] The buggy address belongs to the physical page:
[   18.650055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.650130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.650193] page_type: f5(slab)
[   18.650251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.650374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.650430] page dumped because: kasan: bad access detected
[   18.650479] 
[   18.650512] Memory state around the buggy address:
[   18.650567]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.650625]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.650673] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.650716]                                      ^
[   18.650752]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.650805]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.650846] ==================================================================
[   18.665020] ==================================================================
[   18.665078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.665382] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.665460] 
[   18.665594] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.665683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.665984] Hardware name: linux,dummy-virt (DT)
[   18.666128] Call trace:
[   18.666187]  show_stack+0x20/0x38 (C)
[   18.666386]  dump_stack_lvl+0x8c/0xd0
[   18.666642]  print_report+0x118/0x5d0
[   18.666703]  kasan_report+0xdc/0x128
[   18.667118]  kasan_check_range+0x100/0x1a8
[   18.667191]  __kasan_check_write+0x20/0x30
[   18.667276]  kasan_atomics_helper+0x147c/0x4858
[   18.667328]  kasan_atomics+0x198/0x2e0
[   18.667374]  kunit_try_run_case+0x170/0x3f0
[   18.667626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.667698]  kthread+0x328/0x630
[   18.667938]  ret_from_fork+0x10/0x20
[   18.668379] 
[   18.668431] Allocated by task 266:
[   18.668564]  kasan_save_stack+0x3c/0x68
[   18.668641]  kasan_save_track+0x20/0x40
[   18.668878]  kasan_save_alloc_info+0x40/0x58
[   18.668943]  __kasan_kmalloc+0xd4/0xd8
[   18.669308]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.669375]  kasan_atomics+0xb8/0x2e0
[   18.669724]  kunit_try_run_case+0x170/0x3f0
[   18.669799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.669997]  kthread+0x328/0x630
[   18.670074]  ret_from_fork+0x10/0x20
[   18.670167] 
[   18.670190] The buggy address belongs to the object at fff00000c58cd100
[   18.670190]  which belongs to the cache kmalloc-64 of size 64
[   18.670486] The buggy address is located 0 bytes to the right of
[   18.670486]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.670878] 
[   18.671098] The buggy address belongs to the physical page:
[   18.671240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.671605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.671854] page_type: f5(slab)
[   18.671935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.672189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.672368] page dumped because: kasan: bad access detected
[   18.672604] 
[   18.672660] Memory state around the buggy address:
[   18.672964]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.673294]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.673374] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.673717]                                      ^
[   18.673772]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674219]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674286] ==================================================================
[   18.514496] ==================================================================
[   18.515332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.515457] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.515550] 
[   18.516141] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.516287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.516335] Hardware name: linux,dummy-virt (DT)
[   18.516377] Call trace:
[   18.516422]  show_stack+0x20/0x38 (C)
[   18.516499]  dump_stack_lvl+0x8c/0xd0
[   18.516560]  print_report+0x118/0x5d0
[   18.516608]  kasan_report+0xdc/0x128
[   18.516656]  kasan_check_range+0x100/0x1a8
[   18.516705]  __kasan_check_read+0x20/0x30
[   18.516750]  kasan_atomics_helper+0xdd4/0x4858
[   18.516799]  kasan_atomics+0x198/0x2e0
[   18.517013]  kunit_try_run_case+0x170/0x3f0
[   18.517142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.517248]  kthread+0x328/0x630
[   18.517516]  ret_from_fork+0x10/0x20
[   18.517622] 
[   18.517673] Allocated by task 266:
[   18.517791]  kasan_save_stack+0x3c/0x68
[   18.517859]  kasan_save_track+0x20/0x40
[   18.517967]  kasan_save_alloc_info+0x40/0x58
[   18.518032]  __kasan_kmalloc+0xd4/0xd8
[   18.518094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.518137]  kasan_atomics+0xb8/0x2e0
[   18.518175]  kunit_try_run_case+0x170/0x3f0
[   18.518232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.518278]  kthread+0x328/0x630
[   18.518322]  ret_from_fork+0x10/0x20
[   18.518362] 
[   18.518384] The buggy address belongs to the object at fff00000c58cd100
[   18.518384]  which belongs to the cache kmalloc-64 of size 64
[   18.518444] The buggy address is located 0 bytes to the right of
[   18.518444]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.518511] 
[   18.518543] The buggy address belongs to the physical page:
[   18.518585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.518641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.518690] page_type: f5(slab)
[   18.518729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.518783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.518825] page dumped because: kasan: bad access detected
[   18.518860] 
[   18.518889] Memory state around the buggy address:
[   18.518932]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.518978]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.519032] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.519071]                                      ^
[   18.519107]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.519160]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.519210] ==================================================================
[   18.525341] ==================================================================
[   18.525514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.525590] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.525643] 
[   18.525895] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.526047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.526115] Hardware name: linux,dummy-virt (DT)
[   18.526148] Call trace:
[   18.526188]  show_stack+0x20/0x38 (C)
[   18.526469]  dump_stack_lvl+0x8c/0xd0
[   18.526585]  print_report+0x118/0x5d0
[   18.526696]  kasan_report+0xdc/0x128
[   18.526751]  kasan_check_range+0x100/0x1a8
[   18.526802]  __kasan_check_write+0x20/0x30
[   18.526857]  kasan_atomics_helper+0xe44/0x4858
[   18.526945]  kasan_atomics+0x198/0x2e0
[   18.526992]  kunit_try_run_case+0x170/0x3f0
[   18.527039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.527105]  kthread+0x328/0x630
[   18.527297]  ret_from_fork+0x10/0x20
[   18.527352] 
[   18.527486] Allocated by task 266:
[   18.527575]  kasan_save_stack+0x3c/0x68
[   18.527774]  kasan_save_track+0x20/0x40
[   18.527940]  kasan_save_alloc_info+0x40/0x58
[   18.528039]  __kasan_kmalloc+0xd4/0xd8
[   18.528086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.528145]  kasan_atomics+0xb8/0x2e0
[   18.528187]  kunit_try_run_case+0x170/0x3f0
[   18.528247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.528335]  kthread+0x328/0x630
[   18.528452]  ret_from_fork+0x10/0x20
[   18.528518] 
[   18.528557] The buggy address belongs to the object at fff00000c58cd100
[   18.528557]  which belongs to the cache kmalloc-64 of size 64
[   18.528667] The buggy address is located 0 bytes to the right of
[   18.528667]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.528744] 
[   18.528765] The buggy address belongs to the physical page:
[   18.528826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.528881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.529265] page_type: f5(slab)
[   18.529313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.529390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.529485] page dumped because: kasan: bad access detected
[   18.529754] 
[   18.529863] Memory state around the buggy address:
[   18.529901]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.529948]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.529996] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.530065]                                      ^
[   18.530106]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.530175]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.530230] ==================================================================
[   18.634392] ==================================================================
[   18.634809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.634880] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.634934] 
[   18.634968] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.635134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.635173] Hardware name: linux,dummy-virt (DT)
[   18.635219] Call trace:
[   18.635243]  show_stack+0x20/0x38 (C)
[   18.635709]  dump_stack_lvl+0x8c/0xd0
[   18.635769]  print_report+0x118/0x5d0
[   18.636156]  kasan_report+0xdc/0x128
[   18.636509]  kasan_check_range+0x100/0x1a8
[   18.636645]  __kasan_check_write+0x20/0x30
[   18.636805]  kasan_atomics_helper+0x1384/0x4858
[   18.637017]  kasan_atomics+0x198/0x2e0
[   18.637228]  kunit_try_run_case+0x170/0x3f0
[   18.637434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.637518]  kthread+0x328/0x630
[   18.637590]  ret_from_fork+0x10/0x20
[   18.637950] 
[   18.638001] Allocated by task 266:
[   18.638351]  kasan_save_stack+0x3c/0x68
[   18.638418]  kasan_save_track+0x20/0x40
[   18.638760]  kasan_save_alloc_info+0x40/0x58
[   18.638950]  __kasan_kmalloc+0xd4/0xd8
[   18.639016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.639167]  kasan_atomics+0xb8/0x2e0
[   18.639228]  kunit_try_run_case+0x170/0x3f0
[   18.639296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.639576]  kthread+0x328/0x630
[   18.639890]  ret_from_fork+0x10/0x20
[   18.640484] 
[   18.640538] The buggy address belongs to the object at fff00000c58cd100
[   18.640538]  which belongs to the cache kmalloc-64 of size 64
[   18.640663] The buggy address is located 0 bytes to the right of
[   18.640663]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.640734] 
[   18.641024] The buggy address belongs to the physical page:
[   18.641094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.641530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.641730] page_type: f5(slab)
[   18.641774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.642138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.642543] page dumped because: kasan: bad access detected
[   18.642587] 
[   18.642758] Memory state around the buggy address:
[   18.642927]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.643140]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.643192] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.643304]                                      ^
[   18.643343]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.643486]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.643563] ==================================================================
[   18.709511] ==================================================================
[   18.709566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.709619] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.709674] 
[   18.709903] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.710096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.710128] Hardware name: linux,dummy-virt (DT)
[   18.710457] Call trace:
[   18.710544]  show_stack+0x20/0x38 (C)
[   18.710809]  dump_stack_lvl+0x8c/0xd0
[   18.710883]  print_report+0x118/0x5d0
[   18.711130]  kasan_report+0xdc/0x128
[   18.711567]  __asan_report_load8_noabort+0x20/0x30
[   18.711861]  kasan_atomics_helper+0x3db0/0x4858
[   18.712061]  kasan_atomics+0x198/0x2e0
[   18.712479]  kunit_try_run_case+0x170/0x3f0
[   18.712630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.712708]  kthread+0x328/0x630
[   18.712753]  ret_from_fork+0x10/0x20
[   18.712809] 
[   18.712829] Allocated by task 266:
[   18.713072]  kasan_save_stack+0x3c/0x68
[   18.713214]  kasan_save_track+0x20/0x40
[   18.713384]  kasan_save_alloc_info+0x40/0x58
[   18.713598]  __kasan_kmalloc+0xd4/0xd8
[   18.713644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.713686]  kasan_atomics+0xb8/0x2e0
[   18.713723]  kunit_try_run_case+0x170/0x3f0
[   18.713765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.713931]  kthread+0x328/0x630
[   18.714002]  ret_from_fork+0x10/0x20
[   18.714065] 
[   18.714095] The buggy address belongs to the object at fff00000c58cd100
[   18.714095]  which belongs to the cache kmalloc-64 of size 64
[   18.714159] The buggy address is located 0 bytes to the right of
[   18.714159]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.714246] 
[   18.714268] The buggy address belongs to the physical page:
[   18.714318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.714384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.714435] page_type: f5(slab)
[   18.714479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.714548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.714601] page dumped because: kasan: bad access detected
[   18.714651] 
[   18.714670] Memory state around the buggy address:
[   18.714713]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.714759]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.714806] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.714856]                                      ^
[   18.714900]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.714958]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.715008] ==================================================================
[   18.612979] ==================================================================
[   18.613408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.613470] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.613524] 
[   18.613558] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.613963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.614009] Hardware name: linux,dummy-virt (DT)
[   18.614043] Call trace:
[   18.614075]  show_stack+0x20/0x38 (C)
[   18.614129]  dump_stack_lvl+0x8c/0xd0
[   18.614178]  print_report+0x118/0x5d0
[   18.614244]  kasan_report+0xdc/0x128
[   18.614289]  kasan_check_range+0x100/0x1a8
[   18.614353]  __kasan_check_write+0x20/0x30
[   18.614400]  kasan_atomics_helper+0x126c/0x4858
[   18.614458]  kasan_atomics+0x198/0x2e0
[   18.614505]  kunit_try_run_case+0x170/0x3f0
[   18.614558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.614611]  kthread+0x328/0x630
[   18.614654]  ret_from_fork+0x10/0x20
[   18.614700] 
[   18.614720] Allocated by task 266:
[   18.614750]  kasan_save_stack+0x3c/0x68
[   18.614791]  kasan_save_track+0x20/0x40
[   18.614831]  kasan_save_alloc_info+0x40/0x58
[   18.614873]  __kasan_kmalloc+0xd4/0xd8
[   18.614911]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.614952]  kasan_atomics+0xb8/0x2e0
[   18.614988]  kunit_try_run_case+0x170/0x3f0
[   18.615028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.615081]  kthread+0x328/0x630
[   18.615115]  ret_from_fork+0x10/0x20
[   18.615152] 
[   18.615173] The buggy address belongs to the object at fff00000c58cd100
[   18.615173]  which belongs to the cache kmalloc-64 of size 64
[   18.615766] The buggy address is located 0 bytes to the right of
[   18.615766]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.615854] 
[   18.616120] The buggy address belongs to the physical page:
[   18.616303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.616371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.616423] page_type: f5(slab)
[   18.616614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.617232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.617285] page dumped because: kasan: bad access detected
[   18.617658] 
[   18.619149] Memory state around the buggy address:
[   18.619916]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.620344]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.620773] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.620971]                                      ^
[   18.621225]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.621322]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.621765] ==================================================================
[   18.495354] ==================================================================
[   18.495515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   18.495576] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.495628] 
[   18.495753] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.496082]  dump_stack_lvl+0x8c/0xd0
[   18.496787]  kasan_atomics+0x198/0x2e0
[   18.497499] 
[   18.497571] Allocated by task 266:
[   18.497629]  kasan_save_stack+0x3c/0x68
[   18.497812]  kasan_save_alloc_info+0x40/0x58
[   18.498012]  kunit_try_run_case+0x170/0x3f0
[   18.498052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.498286]  kthread+0x328/0x630
[   18.498875]  ret_from_fork+0x10/0x20
[   18.498975] 
[   18.499015] The buggy address belongs to the object at fff00000c58cd100
[   18.499015]  which belongs to the cache kmalloc-64 of size 64
[   18.499121] The buggy address is located 0 bytes to the right of
[   18.499121]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.499191] 
[   18.499225] The buggy address belongs to the physical page:
[   18.499258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.499330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.499402] page_type: f5(slab)
[   18.499457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.499511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.499565] page dumped because: kasan: bad access detected
[   18.499608] 
[   18.499628] Memory state around the buggy address:
[   18.499660]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.499706]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.499750] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.499792]                                      ^
[   18.499843]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.499898]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.499940] ==================================================================
[   18.509512] ==================================================================
[   18.509698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.509845] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.509995] 
[   18.510033] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.510143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.510173] Hardware name: linux,dummy-virt (DT)
[   18.510222] Call trace:
[   18.510245]  show_stack+0x20/0x38 (C)
[   18.510297]  dump_stack_lvl+0x8c/0xd0
[   18.510454]  print_report+0x118/0x5d0
[   18.510605]  kasan_report+0xdc/0x128
[   18.510699]  __asan_report_load4_noabort+0x20/0x30
[   18.510768]  kasan_atomics_helper+0x3e04/0x4858
[   18.511020]  kasan_atomics+0x198/0x2e0
[   18.511213]  kunit_try_run_case+0x170/0x3f0
[   18.511277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.511349]  kthread+0x328/0x630
[   18.511393]  ret_from_fork+0x10/0x20
[   18.511451] 
[   18.511479] Allocated by task 266:
[   18.511515]  kasan_save_stack+0x3c/0x68
[   18.511568]  kasan_save_track+0x20/0x40
[   18.511610]  kasan_save_alloc_info+0x40/0x58
[   18.511658]  __kasan_kmalloc+0xd4/0xd8
[   18.511703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.511751]  kasan_atomics+0xb8/0x2e0
[   18.511790]  kunit_try_run_case+0x170/0x3f0
[   18.511830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.512116]  kthread+0x328/0x630
[   18.512234]  ret_from_fork+0x10/0x20
[   18.512302] 
[   18.512351] The buggy address belongs to the object at fff00000c58cd100
[   18.512351]  which belongs to the cache kmalloc-64 of size 64
[   18.512693] The buggy address is located 0 bytes to the right of
[   18.512693]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.512827] 
[   18.512900] The buggy address belongs to the physical page:
[   18.512971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.513029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.513211] page_type: f5(slab)
[   18.513254] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.513409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.513482] page dumped because: kasan: bad access detected
[   18.513527] 
[   18.513546] Memory state around the buggy address:
[   18.513590]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.513639]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.513685] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.513734]                                      ^
[   18.513778]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.513824]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.513865] ==================================================================
[   18.594160] ==================================================================
[   18.594335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.594422] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.594566] 
[   18.594635] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.594723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.594752] Hardware name: linux,dummy-virt (DT)
[   18.594851] Call trace:
[   18.594879]  show_stack+0x20/0x38 (C)
[   18.594929]  dump_stack_lvl+0x8c/0xd0
[   18.595004]  print_report+0x118/0x5d0
[   18.595237]  kasan_report+0xdc/0x128
[   18.595421]  kasan_check_range+0x100/0x1a8
[   18.595618]  __kasan_check_write+0x20/0x30
[   18.595961]  kasan_atomics_helper+0x1190/0x4858
[   18.596056]  kasan_atomics+0x198/0x2e0
[   18.596269]  kunit_try_run_case+0x170/0x3f0
[   18.596431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.596620]  kthread+0x328/0x630
[   18.596668]  ret_from_fork+0x10/0x20
[   18.596736] 
[   18.596757] Allocated by task 266:
[   18.597085]  kasan_save_stack+0x3c/0x68
[   18.597157]  kasan_save_track+0x20/0x40
[   18.597454]  kasan_save_alloc_info+0x40/0x58
[   18.597663]  __kasan_kmalloc+0xd4/0xd8
[   18.597775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.597936]  kasan_atomics+0xb8/0x2e0
[   18.598020]  kunit_try_run_case+0x170/0x3f0
[   18.598178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.598686]  kthread+0x328/0x630
[   18.598908]  ret_from_fork+0x10/0x20
[   18.599042] 
[   18.599076] The buggy address belongs to the object at fff00000c58cd100
[   18.599076]  which belongs to the cache kmalloc-64 of size 64
[   18.599152] The buggy address is located 0 bytes to the right of
[   18.599152]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.599235] 
[   18.599267] The buggy address belongs to the physical page:
[   18.599310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.599391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.599444] page_type: f5(slab)
[   18.599482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.599542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.599597] page dumped because: kasan: bad access detected
[   18.599664] 
[   18.599684] Memory state around the buggy address:
[   18.599719]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.599764]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.599809] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.599851]                                      ^
[   18.599912]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.599955]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.600005] ==================================================================
[   18.699028] ==================================================================
[   18.699365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.699483] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.699543] 
[   18.699575] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.699836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.699928] Hardware name: linux,dummy-virt (DT)
[   18.699964] Call trace:
[   18.700261]  show_stack+0x20/0x38 (C)
[   18.700505]  dump_stack_lvl+0x8c/0xd0
[   18.700667]  print_report+0x118/0x5d0
[   18.700920]  kasan_report+0xdc/0x128
[   18.701222]  kasan_check_range+0x100/0x1a8
[   18.701303]  __kasan_check_write+0x20/0x30
[   18.701634]  kasan_atomics_helper+0x15b4/0x4858
[   18.701804]  kasan_atomics+0x198/0x2e0
[   18.701965]  kunit_try_run_case+0x170/0x3f0
[   18.702041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.702330]  kthread+0x328/0x630
[   18.702515]  ret_from_fork+0x10/0x20
[   18.702617] 
[   18.702800] Allocated by task 266:
[   18.702937]  kasan_save_stack+0x3c/0x68
[   18.703103]  kasan_save_track+0x20/0x40
[   18.703253]  kasan_save_alloc_info+0x40/0x58
[   18.703340]  __kasan_kmalloc+0xd4/0xd8
[   18.703416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.703680]  kasan_atomics+0xb8/0x2e0
[   18.704156]  kunit_try_run_case+0x170/0x3f0
[   18.704363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.704589]  kthread+0x328/0x630
[   18.704647]  ret_from_fork+0x10/0x20
[   18.704791] 
[   18.704856] The buggy address belongs to the object at fff00000c58cd100
[   18.704856]  which belongs to the cache kmalloc-64 of size 64
[   18.705056] The buggy address is located 0 bytes to the right of
[   18.705056]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.705160] 
[   18.705236] The buggy address belongs to the physical page:
[   18.705270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.705327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.705378] page_type: f5(slab)
[   18.705860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.706117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.706224] page dumped because: kasan: bad access detected
[   18.706425] 
[   18.706575] Memory state around the buggy address:
[   18.706818]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.706981]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.707359] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.707610]                                      ^
[   18.707843]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.707939]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.707990] ==================================================================
[   18.545438] ==================================================================
[   18.545511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.545562] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.545623] 
[   18.545660] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.545750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.545779] Hardware name: linux,dummy-virt (DT)
[   18.545812] Call trace:
[   18.545842]  show_stack+0x20/0x38 (C)
[   18.545896]  dump_stack_lvl+0x8c/0xd0
[   18.545951]  print_report+0x118/0x5d0
[   18.546025]  kasan_report+0xdc/0x128
[   18.546366]  kasan_check_range+0x100/0x1a8
[   18.546458]  __kasan_check_write+0x20/0x30
[   18.546558]  kasan_atomics_helper+0xf88/0x4858
[   18.546624]  kasan_atomics+0x198/0x2e0
[   18.546680]  kunit_try_run_case+0x170/0x3f0
[   18.546729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.546783]  kthread+0x328/0x630
[   18.546927]  ret_from_fork+0x10/0x20
[   18.546977] 
[   18.546999] Allocated by task 266:
[   18.547133]  kasan_save_stack+0x3c/0x68
[   18.547187]  kasan_save_track+0x20/0x40
[   18.547341]  kasan_save_alloc_info+0x40/0x58
[   18.547385]  __kasan_kmalloc+0xd4/0xd8
[   18.547431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.547473]  kasan_atomics+0xb8/0x2e0
[   18.547520]  kunit_try_run_case+0x170/0x3f0
[   18.547717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.548140]  kthread+0x328/0x630
[   18.548573]  ret_from_fork+0x10/0x20
[   18.549953] 
[   18.549985] The buggy address belongs to the object at fff00000c58cd100
[   18.549985]  which belongs to the cache kmalloc-64 of size 64
[   18.550273] The buggy address is located 0 bytes to the right of
[   18.550273]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.550389] 
[   18.550436] The buggy address belongs to the physical page:
[   18.550492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.550565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.550634] page_type: f5(slab)
[   18.550672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.550939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.551035] page dumped because: kasan: bad access detected
[   18.551095] 
[   18.551164] Memory state around the buggy address:
[   18.551310]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.551469]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.551708] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.551757]                                      ^
[   18.551898]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.551988]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.552056] ==================================================================
[   18.770415] ==================================================================
[   18.770590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.770646] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.770697] 
[   18.770730] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.770812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.770840] Hardware name: linux,dummy-virt (DT)
[   18.770873] Call trace:
[   18.770896]  show_stack+0x20/0x38 (C)
[   18.770947]  dump_stack_lvl+0x8c/0xd0
[   18.770993]  print_report+0x118/0x5d0
[   18.771043]  kasan_report+0xdc/0x128
[   18.771091]  __asan_report_load8_noabort+0x20/0x30
[   18.771163]  kasan_atomics_helper+0x3e20/0x4858
[   18.771227]  kasan_atomics+0x198/0x2e0
[   18.771283]  kunit_try_run_case+0x170/0x3f0
[   18.771333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.771395]  kthread+0x328/0x630
[   18.771447]  ret_from_fork+0x10/0x20
[   18.771499] 
[   18.771518] Allocated by task 266:
[   18.771546]  kasan_save_stack+0x3c/0x68
[   18.771589]  kasan_save_track+0x20/0x40
[   18.771636]  kasan_save_alloc_info+0x40/0x58
[   18.771689]  __kasan_kmalloc+0xd4/0xd8
[   18.771735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.771781]  kasan_atomics+0xb8/0x2e0
[   18.771821]  kunit_try_run_case+0x170/0x3f0
[   18.771859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.771905]  kthread+0x328/0x630
[   18.771938]  ret_from_fork+0x10/0x20
[   18.771977] 
[   18.772003] The buggy address belongs to the object at fff00000c58cd100
[   18.772003]  which belongs to the cache kmalloc-64 of size 64
[   18.772063] The buggy address is located 0 bytes to the right of
[   18.772063]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.772138] 
[   18.772159] The buggy address belongs to the physical page:
[   18.772193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.772918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.772990] page_type: f5(slab)
[   18.773032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.773404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.773637] page dumped because: kasan: bad access detected
[   18.773929] 
[   18.773955] Memory state around the buggy address:
[   18.773993]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.774379]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.774745] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.774810]                                      ^
[   18.774848]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.775116]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.775306] ==================================================================
[   18.519449] ==================================================================
[   18.519496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.519878] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.519946] 
[   18.519995] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.520133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.520180] Hardware name: linux,dummy-virt (DT)
[   18.520316] Call trace:
[   18.520375]  show_stack+0x20/0x38 (C)
[   18.520439]  dump_stack_lvl+0x8c/0xd0
[   18.520517]  print_report+0x118/0x5d0
[   18.520636]  kasan_report+0xdc/0x128
[   18.520712]  __asan_report_load8_noabort+0x20/0x30
[   18.520788]  kasan_atomics_helper+0x3f58/0x4858
[   18.520871]  kasan_atomics+0x198/0x2e0
[   18.520945]  kunit_try_run_case+0x170/0x3f0
[   18.521005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.521072]  kthread+0x328/0x630
[   18.521138]  ret_from_fork+0x10/0x20
[   18.521241] 
[   18.521261] Allocated by task 266:
[   18.521292]  kasan_save_stack+0x3c/0x68
[   18.521343]  kasan_save_track+0x20/0x40
[   18.521384]  kasan_save_alloc_info+0x40/0x58
[   18.521425]  __kasan_kmalloc+0xd4/0xd8
[   18.521511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.521555]  kasan_atomics+0xb8/0x2e0
[   18.521696]  kunit_try_run_case+0x170/0x3f0
[   18.521767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.521842]  kthread+0x328/0x630
[   18.521937]  ret_from_fork+0x10/0x20
[   18.522006] 
[   18.522119] The buggy address belongs to the object at fff00000c58cd100
[   18.522119]  which belongs to the cache kmalloc-64 of size 64
[   18.522223] The buggy address is located 0 bytes to the right of
[   18.522223]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.522598] 
[   18.522670] The buggy address belongs to the physical page:
[   18.522779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.522856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.522939] page_type: f5(slab)
[   18.522979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.523032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.523380] page dumped because: kasan: bad access detected
[   18.523437] 
[   18.523508] Memory state around the buggy address:
[   18.523815]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.523916]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.524028] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.524118]                                      ^
[   18.524187]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524298]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524347] ==================================================================
[   18.455016] ==================================================================
[   18.455065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   18.455335] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.455408] 
[   18.455441] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.455523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.455568] Hardware name: linux,dummy-virt (DT)
[   18.455616] Call trace:
[   18.455645]  show_stack+0x20/0x38 (C)
[   18.455696]  dump_stack_lvl+0x8c/0xd0
[   18.455800]  print_report+0x118/0x5d0
[   18.455884]  kasan_report+0xdc/0x128
[   18.455940]  kasan_check_range+0x100/0x1a8
[   18.455989]  __kasan_check_write+0x20/0x30
[   18.456075]  kasan_atomics_helper+0xa04/0x4858
[   18.456123]  kasan_atomics+0x198/0x2e0
[   18.456182]  kunit_try_run_case+0x170/0x3f0
[   18.456437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.456665]  kthread+0x328/0x630
[   18.456731]  ret_from_fork+0x10/0x20
[   18.456860] 
[   18.456912] Allocated by task 266:
[   18.456961]  kasan_save_stack+0x3c/0x68
[   18.457015]  kasan_save_track+0x20/0x40
[   18.457144]  kasan_save_alloc_info+0x40/0x58
[   18.457211]  __kasan_kmalloc+0xd4/0xd8
[   18.457329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.457378]  kasan_atomics+0xb8/0x2e0
[   18.457415]  kunit_try_run_case+0x170/0x3f0
[   18.457455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.457502]  kthread+0x328/0x630
[   18.457545]  ret_from_fork+0x10/0x20
[   18.457582] 
[   18.457604] The buggy address belongs to the object at fff00000c58cd100
[   18.457604]  which belongs to the cache kmalloc-64 of size 64
[   18.457667] The buggy address is located 0 bytes to the right of
[   18.457667]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.458075] 
[   18.458113] The buggy address belongs to the physical page:
[   18.458230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.458355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.458430] page_type: f5(slab)
[   18.458503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.458626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.458703] page dumped because: kasan: bad access detected
[   18.458769] 
[   18.458867] Memory state around the buggy address:
[   18.458916]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.458962]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.459008] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.459048]                                      ^
[   18.459092]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.459138]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.459186] ==================================================================
[   18.505620] ==================================================================
[   18.505865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.505974] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.506038] 
[   18.506086] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.506171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.506226] Hardware name: linux,dummy-virt (DT)
[   18.506260] Call trace:
[   18.506290]  show_stack+0x20/0x38 (C)
[   18.506341]  dump_stack_lvl+0x8c/0xd0
[   18.506409]  print_report+0x118/0x5d0
[   18.506456]  kasan_report+0xdc/0x128
[   18.506504]  kasan_check_range+0x100/0x1a8
[   18.506566]  __kasan_check_write+0x20/0x30
[   18.506613]  kasan_atomics_helper+0xd3c/0x4858
[   18.506783]  kasan_atomics+0x198/0x2e0
[   18.506830]  kunit_try_run_case+0x170/0x3f0
[   18.506878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.507076]  kthread+0x328/0x630
[   18.507152]  ret_from_fork+0x10/0x20
[   18.507220] 
[   18.507272] Allocated by task 266:
[   18.507310]  kasan_save_stack+0x3c/0x68
[   18.507365]  kasan_save_track+0x20/0x40
[   18.507405]  kasan_save_alloc_info+0x40/0x58
[   18.507455]  __kasan_kmalloc+0xd4/0xd8
[   18.507557]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.507703]  kasan_atomics+0xb8/0x2e0
[   18.507789]  kunit_try_run_case+0x170/0x3f0
[   18.507854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.507909]  kthread+0x328/0x630
[   18.507964]  ret_from_fork+0x10/0x20
[   18.508004] 
[   18.508036] The buggy address belongs to the object at fff00000c58cd100
[   18.508036]  which belongs to the cache kmalloc-64 of size 64
[   18.508115] The buggy address is located 0 bytes to the right of
[   18.508115]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.508208] 
[   18.508231] The buggy address belongs to the physical page:
[   18.508265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.508409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.508460] page_type: f5(slab)
[   18.508498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.508704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.508768] page dumped because: kasan: bad access detected
[   18.508821] 
[   18.508861] Memory state around the buggy address:
[   18.508905]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.508958]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.509004] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.509054]                                      ^
[   18.509098]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.509145]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.509186] ==================================================================
[   18.686769] ==================================================================
[   18.686831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.687032] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.687094] 
[   18.687275] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.687373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.688358] Hardware name: linux,dummy-virt (DT)
[   18.688416] Call trace:
[   18.689338]  show_stack+0x20/0x38 (C)
[   18.689671]  dump_stack_lvl+0x8c/0xd0
[   18.689863]  print_report+0x118/0x5d0
[   18.690095]  kasan_report+0xdc/0x128
[   18.690154]  kasan_check_range+0x100/0x1a8
[   18.690386]  __kasan_check_write+0x20/0x30
[   18.690624]  kasan_atomics_helper+0x154c/0x4858
[   18.690717]  kasan_atomics+0x198/0x2e0
[   18.690793]  kunit_try_run_case+0x170/0x3f0
[   18.691157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.691342]  kthread+0x328/0x630
[   18.691410]  ret_from_fork+0x10/0x20
[   18.691723] 
[   18.691809] Allocated by task 266:
[   18.692158]  kasan_save_stack+0x3c/0x68
[   18.692419]  kasan_save_track+0x20/0x40
[   18.692539]  kasan_save_alloc_info+0x40/0x58
[   18.692593]  __kasan_kmalloc+0xd4/0xd8
[   18.692796]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.692844]  kasan_atomics+0xb8/0x2e0
[   18.693037]  kunit_try_run_case+0x170/0x3f0
[   18.693398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.693490]  kthread+0x328/0x630
[   18.693659]  ret_from_fork+0x10/0x20
[   18.694014] 
[   18.694108] The buggy address belongs to the object at fff00000c58cd100
[   18.694108]  which belongs to the cache kmalloc-64 of size 64
[   18.694526] The buggy address is located 0 bytes to the right of
[   18.694526]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.694860] 
[   18.695097] The buggy address belongs to the physical page:
[   18.695162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.695383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.695566] page_type: f5(slab)
[   18.695622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.695779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.695836] page dumped because: kasan: bad access detected
[   18.695880] 
[   18.695909] Memory state around the buggy address:
[   18.695957]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.696015]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.696061] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.696112]                                      ^
[   18.696146]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.696250]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.696886] ==================================================================
[   18.729323] ==================================================================
[   18.729390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.729672] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.729746] 
[   18.729780] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.729873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.729901] Hardware name: linux,dummy-virt (DT)
[   18.730257] Call trace:
[   18.730298]  show_stack+0x20/0x38 (C)
[   18.730608]  dump_stack_lvl+0x8c/0xd0
[   18.730680]  print_report+0x118/0x5d0
[   18.730881]  kasan_report+0xdc/0x128
[   18.731148]  __asan_report_load8_noabort+0x20/0x30
[   18.731236]  kasan_atomics_helper+0x3df4/0x4858
[   18.731289]  kasan_atomics+0x198/0x2e0
[   18.731335]  kunit_try_run_case+0x170/0x3f0
[   18.731694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.731960]  kthread+0x328/0x630
[   18.732029]  ret_from_fork+0x10/0x20
[   18.732083] 
[   18.732110] Allocated by task 266:
[   18.732315]  kasan_save_stack+0x3c/0x68
[   18.732564]  kasan_save_track+0x20/0x40
[   18.732865]  kasan_save_alloc_info+0x40/0x58
[   18.733047]  __kasan_kmalloc+0xd4/0xd8
[   18.733138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.733320]  kasan_atomics+0xb8/0x2e0
[   18.733382]  kunit_try_run_case+0x170/0x3f0
[   18.733430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.733484]  kthread+0x328/0x630
[   18.734330]  ret_from_fork+0x10/0x20
[   18.734409] 
[   18.734434] The buggy address belongs to the object at fff00000c58cd100
[   18.734434]  which belongs to the cache kmalloc-64 of size 64
[   18.734689] The buggy address is located 0 bytes to the right of
[   18.734689]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.734977] 
[   18.735022] The buggy address belongs to the physical page:
[   18.735282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.735492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.735752] page_type: f5(slab)
[   18.735800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.736001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.736061] page dumped because: kasan: bad access detected
[   18.736097] 
[   18.736117] Memory state around the buggy address:
[   18.736181]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.736245]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.736306] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.736356]                                      ^
[   18.736410]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.736457]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.736507] ==================================================================
[   18.579976] ==================================================================
[   18.580402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.580485] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.580638] 
[   18.580691] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.580850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.580951] Hardware name: linux,dummy-virt (DT)
[   18.580984] Call trace:
[   18.581021]  show_stack+0x20/0x38 (C)
[   18.581420]  dump_stack_lvl+0x8c/0xd0
[   18.581768]  print_report+0x118/0x5d0
[   18.581909]  kasan_report+0xdc/0x128
[   18.582005]  kasan_check_range+0x100/0x1a8
[   18.582142]  __kasan_check_write+0x20/0x30
[   18.582275]  kasan_atomics_helper+0x1128/0x4858
[   18.582402]  kasan_atomics+0x198/0x2e0
[   18.582462]  kunit_try_run_case+0x170/0x3f0
[   18.582685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.583538]  kthread+0x328/0x630
[   18.583752]  ret_from_fork+0x10/0x20
[   18.584314] 
[   18.584610] Allocated by task 266:
[   18.584671]  kasan_save_stack+0x3c/0x68
[   18.584833]  kasan_save_track+0x20/0x40
[   18.584876]  kasan_save_alloc_info+0x40/0x58
[   18.584939]  __kasan_kmalloc+0xd4/0xd8
[   18.585337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.585813]  kasan_atomics+0xb8/0x2e0
[   18.585897]  kunit_try_run_case+0x170/0x3f0
[   18.585979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.586090]  kthread+0x328/0x630
[   18.586128]  ret_from_fork+0x10/0x20
[   18.586353] 
[   18.586608] The buggy address belongs to the object at fff00000c58cd100
[   18.586608]  which belongs to the cache kmalloc-64 of size 64
[   18.586727] The buggy address is located 0 bytes to the right of
[   18.586727]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.586929] 
[   18.586993] The buggy address belongs to the physical page:
[   18.587263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.587575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.587928] page_type: f5(slab)
[   18.588389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.588801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.588897] page dumped because: kasan: bad access detected
[   18.589111] 
[   18.589342] Memory state around the buggy address:
[   18.589599]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.589739]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.589948] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.590011]                                      ^
[   18.590081]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.590355]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.590523] ==================================================================
[   18.500165] ==================================================================
[   18.500229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.500553] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.500613] 
[   18.500845] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.500966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.501298] Hardware name: linux,dummy-virt (DT)
[   18.501362] Call trace:
[   18.501401]  show_stack+0x20/0x38 (C)
[   18.501500]  dump_stack_lvl+0x8c/0xd0
[   18.501564]  print_report+0x118/0x5d0
[   18.501656]  kasan_report+0xdc/0x128
[   18.501756]  __asan_report_load4_noabort+0x20/0x30
[   18.501849]  kasan_atomics_helper+0x3dd8/0x4858
[   18.501923]  kasan_atomics+0x198/0x2e0
[   18.501970]  kunit_try_run_case+0x170/0x3f0
[   18.502033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.502102]  kthread+0x328/0x630
[   18.502144]  ret_from_fork+0x10/0x20
[   18.502194] 
[   18.502232] Allocated by task 266:
[   18.502263]  kasan_save_stack+0x3c/0x68
[   18.502434]  kasan_save_track+0x20/0x40
[   18.502598]  kasan_save_alloc_info+0x40/0x58
[   18.502678]  __kasan_kmalloc+0xd4/0xd8
[   18.502733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.503055]  kasan_atomics+0xb8/0x2e0
[   18.503112]  kunit_try_run_case+0x170/0x3f0
[   18.503228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.503336]  kthread+0x328/0x630
[   18.503390]  ret_from_fork+0x10/0x20
[   18.503459] 
[   18.503522] The buggy address belongs to the object at fff00000c58cd100
[   18.503522]  which belongs to the cache kmalloc-64 of size 64
[   18.503654] The buggy address is located 0 bytes to the right of
[   18.503654]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.503738] 
[   18.503794] The buggy address belongs to the physical page:
[   18.503851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.503931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.504022] page_type: f5(slab)
[   18.504098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.504152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.504194] page dumped because: kasan: bad access detected
[   18.504238] 
[   18.504257] Memory state around the buggy address:
[   18.504291]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.504335]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.504542] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.504608]                                      ^
[   18.504677]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.504742]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.504838] ==================================================================
[   18.460160] ==================================================================
[   18.460482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.460598] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.460661] 
[   18.460733] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.460838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.460920] Hardware name: linux,dummy-virt (DT)
[   18.460992] Call trace:
[   18.461061]  show_stack+0x20/0x38 (C)
[   18.461130]  dump_stack_lvl+0x8c/0xd0
[   18.461216]  print_report+0x118/0x5d0
[   18.461263]  kasan_report+0xdc/0x128
[   18.461423]  kasan_check_range+0x100/0x1a8
[   18.461474]  __kasan_check_write+0x20/0x30
[   18.461527]  kasan_atomics_helper+0xa6c/0x4858
[   18.461705]  kasan_atomics+0x198/0x2e0
[   18.461801]  kunit_try_run_case+0x170/0x3f0
[   18.461851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.461939]  kthread+0x328/0x630
[   18.462160]  ret_from_fork+0x10/0x20
[   18.462300] 
[   18.462370] Allocated by task 266:
[   18.462450]  kasan_save_stack+0x3c/0x68
[   18.462516]  kasan_save_track+0x20/0x40
[   18.462571]  kasan_save_alloc_info+0x40/0x58
[   18.462638]  __kasan_kmalloc+0xd4/0xd8
[   18.462704]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.462804]  kasan_atomics+0xb8/0x2e0
[   18.462845]  kunit_try_run_case+0x170/0x3f0
[   18.462901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.462947]  kthread+0x328/0x630
[   18.462992]  ret_from_fork+0x10/0x20
[   18.463031] 
[   18.463051] The buggy address belongs to the object at fff00000c58cd100
[   18.463051]  which belongs to the cache kmalloc-64 of size 64
[   18.463113] The buggy address is located 0 bytes to the right of
[   18.463113]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.463182] 
[   18.463214] The buggy address belongs to the physical page:
[   18.463248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.463314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.463362] page_type: f5(slab)
[   18.463431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.463493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.463538] page dumped because: kasan: bad access detected
[   18.463570] 
[   18.463589] Memory state around the buggy address:
[   18.463622]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.463666]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.463723] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.463779]                                      ^
[   18.463823]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.463869]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.463925] ==================================================================
[   18.465371] ==================================================================
[   18.465427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   18.465613] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.465791] 
[   18.465848] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.465950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.465986] Hardware name: linux,dummy-virt (DT)
[   18.466018] Call trace:
[   18.466043]  show_stack+0x20/0x38 (C)
[   18.466092]  dump_stack_lvl+0x8c/0xd0
[   18.466140]  print_report+0x118/0x5d0
[   18.466356]  kasan_report+0xdc/0x128
[   18.466433]  kasan_check_range+0x100/0x1a8
[   18.466492]  __kasan_check_write+0x20/0x30
[   18.466539]  kasan_atomics_helper+0xad4/0x4858
[   18.466596]  kasan_atomics+0x198/0x2e0
[   18.466642]  kunit_try_run_case+0x170/0x3f0
[   18.466688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.466742]  kthread+0x328/0x630
[   18.466783]  ret_from_fork+0x10/0x20
[   18.466952] 
[   18.467012] Allocated by task 266:
[   18.467046]  kasan_save_stack+0x3c/0x68
[   18.467091]  kasan_save_track+0x20/0x40
[   18.467138]  kasan_save_alloc_info+0x40/0x58
[   18.467180]  __kasan_kmalloc+0xd4/0xd8
[   18.467234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.467280]  kasan_atomics+0xb8/0x2e0
[   18.467327]  kunit_try_run_case+0x170/0x3f0
[   18.467370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.467425]  kthread+0x328/0x630
[   18.467462]  ret_from_fork+0x10/0x20
[   18.467498] 
[   18.467528] The buggy address belongs to the object at fff00000c58cd100
[   18.467528]  which belongs to the cache kmalloc-64 of size 64
[   18.467862] The buggy address is located 0 bytes to the right of
[   18.467862]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.467979] 
[   18.468003] The buggy address belongs to the physical page:
[   18.468042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.468105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.468195] page_type: f5(slab)
[   18.468281] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.468335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.468378] page dumped because: kasan: bad access detected
[   18.468521] 
[   18.468541] Memory state around the buggy address:
[   18.468576]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.468793]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.468847] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.468934]                                      ^
[   18.469016]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.469084]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.469192] ==================================================================
[   18.469753] ==================================================================
[   18.469805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   18.469872] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266
[   18.469924] 
[   18.469954] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.470179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.470236] Hardware name: linux,dummy-virt (DT)
[   18.470299] Call trace:
[   18.470350]  show_stack+0x20/0x38 (C)
[   18.470404]  dump_stack_lvl+0x8c/0xd0
[   18.470489]  print_report+0x118/0x5d0
[   18.470544]  kasan_report+0xdc/0x128
[   18.470599]  __asan_report_load4_noabort+0x20/0x30
[   18.470680]  kasan_atomics_helper+0x3dcc/0x4858
[   18.470735]  kasan_atomics+0x198/0x2e0
[   18.470783]  kunit_try_run_case+0x170/0x3f0
[   18.470832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.470968]  kthread+0x328/0x630
[   18.471013]  ret_from_fork+0x10/0x20
[   18.471156] 
[   18.471293] Allocated by task 266:
[   18.471330]  kasan_save_stack+0x3c/0x68
[   18.471374]  kasan_save_track+0x20/0x40
[   18.471623]  kasan_save_alloc_info+0x40/0x58
[   18.471730]  __kasan_kmalloc+0xd4/0xd8
[   18.471774]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.471831]  kasan_atomics+0xb8/0x2e0
[   18.471877]  kunit_try_run_case+0x170/0x3f0
[   18.471924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.471969]  kthread+0x328/0x630
[   18.472008]  ret_from_fork+0x10/0x20
[   18.472108] 
[   18.472145] The buggy address belongs to the object at fff00000c58cd100
[   18.472145]  which belongs to the cache kmalloc-64 of size 64
[   18.472374] The buggy address is located 0 bytes to the right of
[   18.472374]  allocated 48-byte region [fff00000c58cd100, fff00000c58cd130)
[   18.472471] 
[   18.472494] The buggy address belongs to the physical page:
[   18.472526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd
[   18.472582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.472710] page_type: f5(slab)
[   18.472840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.472966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.473040] page dumped because: kasan: bad access detected
[   18.473140] 
[   18.473159] Memory state around the buggy address:
[   18.473412]  fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.473585]  fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.473645] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.473712]                                      ^
[   18.473749]  fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473795]  fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473836] ==================================================================

[   19.418197] ==================================================================
[   19.418251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.418390] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.418449] 
[   19.418481] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.418720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.418878] Hardware name: linux,dummy-virt (DT)
[   19.418915] Call trace:
[   19.418941]  show_stack+0x20/0x38 (C)
[   19.419080]  dump_stack_lvl+0x8c/0xd0
[   19.419141]  print_report+0x118/0x5d0
[   19.419266]  kasan_report+0xdc/0x128
[   19.419318]  kasan_check_range+0x100/0x1a8
[   19.419447]  __kasan_check_write+0x20/0x30
[   19.419537]  kasan_atomics_helper+0xff0/0x4858
[   19.419680]  kasan_atomics+0x198/0x2e0
[   19.419778]  kunit_try_run_case+0x170/0x3f0
[   19.419852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.419907]  kthread+0x328/0x630
[   19.419948]  ret_from_fork+0x10/0x20
[   19.420199] 
[   19.420226] Allocated by task 266:
[   19.420308]  kasan_save_stack+0x3c/0x68
[   19.420387]  kasan_save_track+0x20/0x40
[   19.420452]  kasan_save_alloc_info+0x40/0x58
[   19.420686]  __kasan_kmalloc+0xd4/0xd8
[   19.420897]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.421012]  kasan_atomics+0xb8/0x2e0
[   19.421127]  kunit_try_run_case+0x170/0x3f0
[   19.421193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.421260]  kthread+0x328/0x630
[   19.421296]  ret_from_fork+0x10/0x20
[   19.421334] 
[   19.421356] The buggy address belongs to the object at fff00000c5aee400
[   19.421356]  which belongs to the cache kmalloc-64 of size 64
[   19.421471] The buggy address is located 0 bytes to the right of
[   19.421471]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.421541] 
[   19.421572] The buggy address belongs to the physical page:
[   19.421615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.421684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.421750] page_type: f5(slab)
[   19.421790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.421845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.421889] page dumped because: kasan: bad access detected
[   19.421933] 
[   19.421954] Memory state around the buggy address:
[   19.422017]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.422064]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.422119] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.422160]                                      ^
[   19.422489]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.422803]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.422941] ==================================================================
[   19.460526] ==================================================================
[   19.460578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.460626] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.460679] 
[   19.460709] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.460791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.460820] Hardware name: linux,dummy-virt (DT)
[   19.460853] Call trace:
[   19.460876]  show_stack+0x20/0x38 (C)
[   19.460924]  dump_stack_lvl+0x8c/0xd0
[   19.460969]  print_report+0x118/0x5d0
[   19.461017]  kasan_report+0xdc/0x128
[   19.461062]  kasan_check_range+0x100/0x1a8
[   19.461111]  __kasan_check_write+0x20/0x30
[   19.461156]  kasan_atomics_helper+0x1384/0x4858
[   19.461489]  kasan_atomics+0x198/0x2e0
[   19.461589]  kunit_try_run_case+0x170/0x3f0
[   19.461655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.461710]  kthread+0x328/0x630
[   19.461754]  ret_from_fork+0x10/0x20
[   19.461838] 
[   19.461923] Allocated by task 266:
[   19.461972]  kasan_save_stack+0x3c/0x68
[   19.462089]  kasan_save_track+0x20/0x40
[   19.462155]  kasan_save_alloc_info+0x40/0x58
[   19.462242]  __kasan_kmalloc+0xd4/0xd8
[   19.462342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.462428]  kasan_atomics+0xb8/0x2e0
[   19.462485]  kunit_try_run_case+0x170/0x3f0
[   19.462524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.462570]  kthread+0x328/0x630
[   19.462663]  ret_from_fork+0x10/0x20
[   19.462717] 
[   19.462740] The buggy address belongs to the object at fff00000c5aee400
[   19.462740]  which belongs to the cache kmalloc-64 of size 64
[   19.462801] The buggy address is located 0 bytes to the right of
[   19.462801]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.463015] 
[   19.463037] The buggy address belongs to the physical page:
[   19.463212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.463286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.463341] page_type: f5(slab)
[   19.463487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.463587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.463710] page dumped because: kasan: bad access detected
[   19.464037] 
[   19.464113] Memory state around the buggy address:
[   19.464289]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464428]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464477] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.464518]                                      ^
[   19.465221]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.465388]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.465477] ==================================================================
[   19.518457] ==================================================================
[   19.518517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.518821] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.519025] 
[   19.519075] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.519207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.519285] Hardware name: linux,dummy-virt (DT)
[   19.519321] Call trace:
[   19.519347]  show_stack+0x20/0x38 (C)
[   19.519417]  dump_stack_lvl+0x8c/0xd0
[   19.519562]  print_report+0x118/0x5d0
[   19.519639]  kasan_report+0xdc/0x128
[   19.519775]  kasan_check_range+0x100/0x1a8
[   19.519839]  __kasan_check_write+0x20/0x30
[   19.519951]  kasan_atomics_helper+0x16d0/0x4858
[   19.520009]  kasan_atomics+0x198/0x2e0
[   19.520158]  kunit_try_run_case+0x170/0x3f0
[   19.520230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520355]  kthread+0x328/0x630
[   19.520435]  ret_from_fork+0x10/0x20
[   19.520568] 
[   19.520619] Allocated by task 266:
[   19.520863]  kasan_save_stack+0x3c/0x68
[   19.520954]  kasan_save_track+0x20/0x40
[   19.521020]  kasan_save_alloc_info+0x40/0x58
[   19.521131]  __kasan_kmalloc+0xd4/0xd8
[   19.521219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.521320]  kasan_atomics+0xb8/0x2e0
[   19.521390]  kunit_try_run_case+0x170/0x3f0
[   19.521488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.521561]  kthread+0x328/0x630
[   19.521609]  ret_from_fork+0x10/0x20
[   19.521776] 
[   19.521800] The buggy address belongs to the object at fff00000c5aee400
[   19.521800]  which belongs to the cache kmalloc-64 of size 64
[   19.521907] The buggy address is located 0 bytes to the right of
[   19.521907]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.522050] 
[   19.522089] The buggy address belongs to the physical page:
[   19.522165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.522266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.522317] page_type: f5(slab)
[   19.522358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.522415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.522458] page dumped because: kasan: bad access detected
[   19.522493] 
[   19.522514] Memory state around the buggy address:
[   19.522550]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.522618]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.522675] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.522733]                                      ^
[   19.522778]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522836]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522898] ==================================================================
[   19.412015] ==================================================================
[   19.412114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.412166] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.412233] 
[   19.412265] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.412360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.412388] Hardware name: linux,dummy-virt (DT)
[   19.412534] Call trace:
[   19.412571]  show_stack+0x20/0x38 (C)
[   19.412640]  dump_stack_lvl+0x8c/0xd0
[   19.412738]  print_report+0x118/0x5d0
[   19.412808]  kasan_report+0xdc/0x128
[   19.412862]  kasan_check_range+0x100/0x1a8
[   19.412961]  __kasan_check_write+0x20/0x30
[   19.413026]  kasan_atomics_helper+0xf88/0x4858
[   19.413092]  kasan_atomics+0x198/0x2e0
[   19.413303]  kunit_try_run_case+0x170/0x3f0
[   19.413835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413899]  kthread+0x328/0x630
[   19.413950]  ret_from_fork+0x10/0x20
[   19.414005] 
[   19.414033] Allocated by task 266:
[   19.414062]  kasan_save_stack+0x3c/0x68
[   19.414106]  kasan_save_track+0x20/0x40
[   19.414145]  kasan_save_alloc_info+0x40/0x58
[   19.414196]  __kasan_kmalloc+0xd4/0xd8
[   19.414236]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.414277]  kasan_atomics+0xb8/0x2e0
[   19.414315]  kunit_try_run_case+0x170/0x3f0
[   19.414556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.414799]  kthread+0x328/0x630
[   19.414843]  ret_from_fork+0x10/0x20
[   19.414890] 
[   19.415023] The buggy address belongs to the object at fff00000c5aee400
[   19.415023]  which belongs to the cache kmalloc-64 of size 64
[   19.415105] The buggy address is located 0 bytes to the right of
[   19.415105]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.415294] 
[   19.415423] The buggy address belongs to the physical page:
[   19.415507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.415655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.415733] page_type: f5(slab)
[   19.415994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.416081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.416195] page dumped because: kasan: bad access detected
[   19.416250] 
[   19.416302] Memory state around the buggy address:
[   19.416463]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.416583]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.416725] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.416871]                                      ^
[   19.416968]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417020]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417105] ==================================================================
[   19.389624] ==================================================================
[   19.389706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.389773] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.389856] 
[   19.389905] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.390014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.390053] Hardware name: linux,dummy-virt (DT)
[   19.390091] Call trace:
[   19.390220]  show_stack+0x20/0x38 (C)
[   19.390284]  dump_stack_lvl+0x8c/0xd0
[   19.390340]  print_report+0x118/0x5d0
[   19.390473]  kasan_report+0xdc/0x128
[   19.390520]  kasan_check_range+0x100/0x1a8
[   19.390576]  __kasan_check_write+0x20/0x30
[   19.390631]  kasan_atomics_helper+0xe44/0x4858
[   19.390681]  kasan_atomics+0x198/0x2e0
[   19.390755]  kunit_try_run_case+0x170/0x3f0
[   19.390822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390885]  kthread+0x328/0x630
[   19.390938]  ret_from_fork+0x10/0x20
[   19.390991] 
[   19.391019] Allocated by task 266:
[   19.391067]  kasan_save_stack+0x3c/0x68
[   19.391110]  kasan_save_track+0x20/0x40
[   19.391150]  kasan_save_alloc_info+0x40/0x58
[   19.391216]  __kasan_kmalloc+0xd4/0xd8
[   19.391256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.391298]  kasan_atomics+0xb8/0x2e0
[   19.391336]  kunit_try_run_case+0x170/0x3f0
[   19.391500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.391622]  kthread+0x328/0x630
[   19.391695]  ret_from_fork+0x10/0x20
[   19.391744] 
[   19.391779] The buggy address belongs to the object at fff00000c5aee400
[   19.391779]  which belongs to the cache kmalloc-64 of size 64
[   19.391841] The buggy address is located 0 bytes to the right of
[   19.391841]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.391919] 
[   19.391949] The buggy address belongs to the physical page:
[   19.392001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.392055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.392105] page_type: f5(slab)
[   19.392382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.392456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.392652] page dumped because: kasan: bad access detected
[   19.392706] 
[   19.392824] Memory state around the buggy address:
[   19.392879]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.392951]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.393196] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.393310]                                      ^
[   19.393377]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.393522]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.393621] ==================================================================
[   19.482784] ==================================================================
[   19.482954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.483008] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.483061] 
[   19.483136] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.483244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.483483] Hardware name: linux,dummy-virt (DT)
[   19.483539] Call trace:
[   19.483604]  show_stack+0x20/0x38 (C)
[   19.483673]  dump_stack_lvl+0x8c/0xd0
[   19.483906]  print_report+0x118/0x5d0
[   19.484047]  kasan_report+0xdc/0x128
[   19.484123]  kasan_check_range+0x100/0x1a8
[   19.484210]  __kasan_check_write+0x20/0x30
[   19.484258]  kasan_atomics_helper+0x14e4/0x4858
[   19.484618]  kasan_atomics+0x198/0x2e0
[   19.484775]  kunit_try_run_case+0x170/0x3f0
[   19.484862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.485201]  kthread+0x328/0x630
[   19.485287]  ret_from_fork+0x10/0x20
[   19.485442] 
[   19.485526] Allocated by task 266:
[   19.485588]  kasan_save_stack+0x3c/0x68
[   19.485742]  kasan_save_track+0x20/0x40
[   19.485824]  kasan_save_alloc_info+0x40/0x58
[   19.485892]  __kasan_kmalloc+0xd4/0xd8
[   19.485930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.486221]  kasan_atomics+0xb8/0x2e0
[   19.486329]  kunit_try_run_case+0x170/0x3f0
[   19.486407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.486631]  kthread+0x328/0x630
[   19.486931]  ret_from_fork+0x10/0x20
[   19.487165] 
[   19.487224] The buggy address belongs to the object at fff00000c5aee400
[   19.487224]  which belongs to the cache kmalloc-64 of size 64
[   19.487488] The buggy address is located 0 bytes to the right of
[   19.487488]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.487758] 
[   19.487800] The buggy address belongs to the physical page:
[   19.487834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.487890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.488117] page_type: f5(slab)
[   19.488335] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.488409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.488654] page dumped because: kasan: bad access detected
[   19.488849] 
[   19.488934] Memory state around the buggy address:
[   19.488994]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.489041]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.489333] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.489440]                                      ^
[   19.489504]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.489714]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.489787] ==================================================================
[   19.506883] ==================================================================
[   19.506948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.506997] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.507051] 
[   19.507081] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.507163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.507204] Hardware name: linux,dummy-virt (DT)
[   19.507238] Call trace:
[   19.507262]  show_stack+0x20/0x38 (C)
[   19.507310]  dump_stack_lvl+0x8c/0xd0
[   19.507357]  print_report+0x118/0x5d0
[   19.507676]  kasan_report+0xdc/0x128
[   19.507883]  kasan_check_range+0x100/0x1a8
[   19.507940]  __kasan_check_write+0x20/0x30
[   19.507986]  kasan_atomics_helper+0x1644/0x4858
[   19.508349]  kasan_atomics+0x198/0x2e0
[   19.508433]  kunit_try_run_case+0x170/0x3f0
[   19.508725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.508814]  kthread+0x328/0x630
[   19.508989]  ret_from_fork+0x10/0x20
[   19.509074] 
[   19.509124] Allocated by task 266:
[   19.509155]  kasan_save_stack+0x3c/0x68
[   19.509473]  kasan_save_track+0x20/0x40
[   19.509567]  kasan_save_alloc_info+0x40/0x58
[   19.509838]  __kasan_kmalloc+0xd4/0xd8
[   19.509915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.510061]  kasan_atomics+0xb8/0x2e0
[   19.510138]  kunit_try_run_case+0x170/0x3f0
[   19.510219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.510634]  kthread+0x328/0x630
[   19.510713]  ret_from_fork+0x10/0x20
[   19.510780] 
[   19.510867] The buggy address belongs to the object at fff00000c5aee400
[   19.510867]  which belongs to the cache kmalloc-64 of size 64
[   19.510932] The buggy address is located 0 bytes to the right of
[   19.510932]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.511034] 
[   19.511264] The buggy address belongs to the physical page:
[   19.511935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.512033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.512214] page_type: f5(slab)
[   19.512384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.512456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.512504] page dumped because: kasan: bad access detected
[   19.512546] 
[   19.512568] Memory state around the buggy address:
[   19.512603]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.512650]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.512785] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.512854]                                      ^
[   19.512985]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.513069]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.513353] ==================================================================
[   19.513783] ==================================================================
[   19.513836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.513885] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.513963] 
[   19.514008] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.514237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.514284] Hardware name: linux,dummy-virt (DT)
[   19.514384] Call trace:
[   19.514410]  show_stack+0x20/0x38 (C)
[   19.514463]  dump_stack_lvl+0x8c/0xd0
[   19.514517]  print_report+0x118/0x5d0
[   19.514596]  kasan_report+0xdc/0x128
[   19.514646]  __asan_report_load8_noabort+0x20/0x30
[   19.514709]  kasan_atomics_helper+0x3df4/0x4858
[   19.514779]  kasan_atomics+0x198/0x2e0
[   19.514827]  kunit_try_run_case+0x170/0x3f0
[   19.514876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.514931]  kthread+0x328/0x630
[   19.514972]  ret_from_fork+0x10/0x20
[   19.515031] 
[   19.515059] Allocated by task 266:
[   19.515096]  kasan_save_stack+0x3c/0x68
[   19.515139]  kasan_save_track+0x20/0x40
[   19.515208]  kasan_save_alloc_info+0x40/0x58
[   19.515251]  __kasan_kmalloc+0xd4/0xd8
[   19.515289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.515330]  kasan_atomics+0xb8/0x2e0
[   19.515366]  kunit_try_run_case+0x170/0x3f0
[   19.515706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.515944]  kthread+0x328/0x630
[   19.516036]  ret_from_fork+0x10/0x20
[   19.516074] 
[   19.516104] The buggy address belongs to the object at fff00000c5aee400
[   19.516104]  which belongs to the cache kmalloc-64 of size 64
[   19.516167] The buggy address is located 0 bytes to the right of
[   19.516167]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.516323] 
[   19.516394] The buggy address belongs to the physical page:
[   19.516526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.516601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.516667] page_type: f5(slab)
[   19.516885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.517027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.517124] page dumped because: kasan: bad access detected
[   19.517240] 
[   19.517261] Memory state around the buggy address:
[   19.517296]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.517379]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.517447] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.517613]                                      ^
[   19.517775]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517831]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517899] ==================================================================
[   19.473402] ==================================================================
[   19.473481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.473537] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.473591] 
[   19.473629] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.473713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.473875] Hardware name: linux,dummy-virt (DT)
[   19.473917] Call trace:
[   19.473944]  show_stack+0x20/0x38 (C)
[   19.474106]  dump_stack_lvl+0x8c/0xd0
[   19.474153]  print_report+0x118/0x5d0
[   19.474332]  kasan_report+0xdc/0x128
[   19.474387]  kasan_check_range+0x100/0x1a8
[   19.474438]  __kasan_check_write+0x20/0x30
[   19.474492]  kasan_atomics_helper+0x1414/0x4858
[   19.474542]  kasan_atomics+0x198/0x2e0
[   19.474655]  kunit_try_run_case+0x170/0x3f0
[   19.474713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.474768]  kthread+0x328/0x630
[   19.474811]  ret_from_fork+0x10/0x20
[   19.474857] 
[   19.474877] Allocated by task 266:
[   19.474907]  kasan_save_stack+0x3c/0x68
[   19.474948]  kasan_save_track+0x20/0x40
[   19.474993]  kasan_save_alloc_info+0x40/0x58
[   19.475034]  __kasan_kmalloc+0xd4/0xd8
[   19.475073]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.475118]  kasan_atomics+0xb8/0x2e0
[   19.475158]  kunit_try_run_case+0x170/0x3f0
[   19.475215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.475262]  kthread+0x328/0x630
[   19.475304]  ret_from_fork+0x10/0x20
[   19.475342] 
[   19.475364] The buggy address belongs to the object at fff00000c5aee400
[   19.475364]  which belongs to the cache kmalloc-64 of size 64
[   19.475425] The buggy address is located 0 bytes to the right of
[   19.475425]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.475493] 
[   19.475514] The buggy address belongs to the physical page:
[   19.475548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.475608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.475658] page_type: f5(slab)
[   19.475698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.475752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.475821] page dumped because: kasan: bad access detected
[   19.475965] 
[   19.475987] Memory state around the buggy address:
[   19.476020]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.476120]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.476262] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.476324]                                      ^
[   19.476358]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.476413]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.476455] ==================================================================
[   19.383554] ==================================================================
[   19.383833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.383896] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.383979] 
[   19.384050] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.384162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.384228] Hardware name: linux,dummy-virt (DT)
[   19.384312] Call trace:
[   19.384343]  show_stack+0x20/0x38 (C)
[   19.384392]  dump_stack_lvl+0x8c/0xd0
[   19.384442]  print_report+0x118/0x5d0
[   19.384490]  kasan_report+0xdc/0x128
[   19.384536]  __asan_report_load8_noabort+0x20/0x30
[   19.384932]  kasan_atomics_helper+0x3f58/0x4858
[   19.385043]  kasan_atomics+0x198/0x2e0
[   19.385140]  kunit_try_run_case+0x170/0x3f0
[   19.385337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.385470]  kthread+0x328/0x630
[   19.385588]  ret_from_fork+0x10/0x20
[   19.385712] 
[   19.385748] Allocated by task 266:
[   19.385834]  kasan_save_stack+0x3c/0x68
[   19.385910]  kasan_save_track+0x20/0x40
[   19.385971]  kasan_save_alloc_info+0x40/0x58
[   19.386049]  __kasan_kmalloc+0xd4/0xd8
[   19.386116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.386188]  kasan_atomics+0xb8/0x2e0
[   19.386252]  kunit_try_run_case+0x170/0x3f0
[   19.386328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.386432]  kthread+0x328/0x630
[   19.386478]  ret_from_fork+0x10/0x20
[   19.386514] 
[   19.387104] The buggy address belongs to the object at fff00000c5aee400
[   19.387104]  which belongs to the cache kmalloc-64 of size 64
[   19.387220] The buggy address is located 0 bytes to the right of
[   19.387220]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.387422] 
[   19.387648] The buggy address belongs to the physical page:
[   19.387785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.387887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.387969] page_type: f5(slab)
[   19.388010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.388064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.388107] page dumped because: kasan: bad access detected
[   19.388139] 
[   19.388158] Memory state around the buggy address:
[   19.388203]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.388398]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.388476] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.388611]                                      ^
[   19.388648]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.388708]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.388798] ==================================================================
[   19.496407] ==================================================================
[   19.496459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.496699] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.496779] 
[   19.496829] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.496916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.496945] Hardware name: linux,dummy-virt (DT)
[   19.497067] Call trace:
[   19.497103]  show_stack+0x20/0x38 (C)
[   19.497154]  dump_stack_lvl+0x8c/0xd0
[   19.497406]  print_report+0x118/0x5d0
[   19.497474]  kasan_report+0xdc/0x128
[   19.497607]  kasan_check_range+0x100/0x1a8
[   19.497661]  __kasan_check_write+0x20/0x30
[   19.497726]  kasan_atomics_helper+0x15b4/0x4858
[   19.497785]  kasan_atomics+0x198/0x2e0
[   19.497830]  kunit_try_run_case+0x170/0x3f0
[   19.498046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.498138]  kthread+0x328/0x630
[   19.498245]  ret_from_fork+0x10/0x20
[   19.498385] 
[   19.498424] Allocated by task 266:
[   19.498461]  kasan_save_stack+0x3c/0x68
[   19.498505]  kasan_save_track+0x20/0x40
[   19.498551]  kasan_save_alloc_info+0x40/0x58
[   19.498659]  __kasan_kmalloc+0xd4/0xd8
[   19.498714]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.498758]  kasan_atomics+0xb8/0x2e0
[   19.498794]  kunit_try_run_case+0x170/0x3f0
[   19.498833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.498880]  kthread+0x328/0x630
[   19.498913]  ret_from_fork+0x10/0x20
[   19.498951] 
[   19.498972] The buggy address belongs to the object at fff00000c5aee400
[   19.498972]  which belongs to the cache kmalloc-64 of size 64
[   19.499033] The buggy address is located 0 bytes to the right of
[   19.499033]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.499105] 
[   19.499127] The buggy address belongs to the physical page:
[   19.499161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.499225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.499275] page_type: f5(slab)
[   19.499315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.499368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.499412] page dumped because: kasan: bad access detected
[   19.499446] 
[   19.499467] Memory state around the buggy address:
[   19.499515]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499561]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499607] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.499648]                                      ^
[   19.499681]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499725]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499767] ==================================================================
[   19.400776] ==================================================================
[   19.400859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.400921] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.400973] 
[   19.401083] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.401403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.401477] Hardware name: linux,dummy-virt (DT)
[   19.401512] Call trace:
[   19.401537]  show_stack+0x20/0x38 (C)
[   19.401641]  dump_stack_lvl+0x8c/0xd0
[   19.401693]  print_report+0x118/0x5d0
[   19.401759]  kasan_report+0xdc/0x128
[   19.401863]  kasan_check_range+0x100/0x1a8
[   19.401917]  __kasan_check_write+0x20/0x30
[   19.401964]  kasan_atomics_helper+0xeb8/0x4858
[   19.402024]  kasan_atomics+0x198/0x2e0
[   19.402231]  kunit_try_run_case+0x170/0x3f0
[   19.402310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402373]  kthread+0x328/0x630
[   19.402552]  ret_from_fork+0x10/0x20
[   19.402627] 
[   19.402656] Allocated by task 266:
[   19.402693]  kasan_save_stack+0x3c/0x68
[   19.402782]  kasan_save_track+0x20/0x40
[   19.402826]  kasan_save_alloc_info+0x40/0x58
[   19.402869]  __kasan_kmalloc+0xd4/0xd8
[   19.402922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.402971]  kasan_atomics+0xb8/0x2e0
[   19.403010]  kunit_try_run_case+0x170/0x3f0
[   19.403050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.403096]  kthread+0x328/0x630
[   19.403131]  ret_from_fork+0x10/0x20
[   19.403167] 
[   19.403197] The buggy address belongs to the object at fff00000c5aee400
[   19.403197]  which belongs to the cache kmalloc-64 of size 64
[   19.403260] The buggy address is located 0 bytes to the right of
[   19.403260]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.403338] 
[   19.403360] The buggy address belongs to the physical page:
[   19.403729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.403810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.403953] page_type: f5(slab)
[   19.404021] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.404156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.404214] page dumped because: kasan: bad access detected
[   19.404250] 
[   19.404293] Memory state around the buggy address:
[   19.404333]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404380]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404426] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.404468]                                      ^
[   19.404701]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404778]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404910] ==================================================================
[   19.536631] ==================================================================
[   19.536691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.536740] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.536793] 
[   19.537024] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.537209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.537245] Hardware name: linux,dummy-virt (DT)
[   19.537279] Call trace:
[   19.537315]  show_stack+0x20/0x38 (C)
[   19.537376]  dump_stack_lvl+0x8c/0xd0
[   19.537592]  print_report+0x118/0x5d0
[   19.537691]  kasan_report+0xdc/0x128
[   19.537814]  __asan_report_load8_noabort+0x20/0x30
[   19.537872]  kasan_atomics_helper+0x3e20/0x4858
[   19.538065]  kasan_atomics+0x198/0x2e0
[   19.538230]  kunit_try_run_case+0x170/0x3f0
[   19.538325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.538398]  kthread+0x328/0x630
[   19.538604]  ret_from_fork+0x10/0x20
[   19.538696] 
[   19.538785] Allocated by task 266:
[   19.538824]  kasan_save_stack+0x3c/0x68
[   19.538878]  kasan_save_track+0x20/0x40
[   19.538923]  kasan_save_alloc_info+0x40/0x58
[   19.538974]  __kasan_kmalloc+0xd4/0xd8
[   19.539011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.539104]  kasan_atomics+0xb8/0x2e0
[   19.539150]  kunit_try_run_case+0x170/0x3f0
[   19.539202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.539424]  kthread+0x328/0x630
[   19.539620]  ret_from_fork+0x10/0x20
[   19.539700] 
[   19.539803] The buggy address belongs to the object at fff00000c5aee400
[   19.539803]  which belongs to the cache kmalloc-64 of size 64
[   19.539885] The buggy address is located 0 bytes to the right of
[   19.539885]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.540197] 
[   19.540321] The buggy address belongs to the physical page:
[   19.540380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.540457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.540516] page_type: f5(slab)
[   19.540735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.540908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.541004] page dumped because: kasan: bad access detected
[   19.541138] 
[   19.541199] Memory state around the buggy address:
[   19.541282]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.541484]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.541620] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.541697]                                      ^
[   19.541859]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.541911]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.541952] ==================================================================
[   19.444884] ==================================================================
[   19.444937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.444986] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.445038] 
[   19.445070] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.445153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.445194] Hardware name: linux,dummy-virt (DT)
[   19.445227] Call trace:
[   19.445252]  show_stack+0x20/0x38 (C)
[   19.445301]  dump_stack_lvl+0x8c/0xd0
[   19.445349]  print_report+0x118/0x5d0
[   19.445395]  kasan_report+0xdc/0x128
[   19.445442]  kasan_check_range+0x100/0x1a8
[   19.445491]  __kasan_check_write+0x20/0x30
[   19.445537]  kasan_atomics_helper+0x1190/0x4858
[   19.445585]  kasan_atomics+0x198/0x2e0
[   19.445631]  kunit_try_run_case+0x170/0x3f0
[   19.445680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.445734]  kthread+0x328/0x630
[   19.445775]  ret_from_fork+0x10/0x20
[   19.445823] 
[   19.445843] Allocated by task 266:
[   19.445871]  kasan_save_stack+0x3c/0x68
[   19.445913]  kasan_save_track+0x20/0x40
[   19.445951]  kasan_save_alloc_info+0x40/0x58
[   19.446004]  __kasan_kmalloc+0xd4/0xd8
[   19.446041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.446424]  kasan_atomics+0xb8/0x2e0
[   19.446464]  kunit_try_run_case+0x170/0x3f0
[   19.446505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.446550]  kthread+0x328/0x630
[   19.446584]  ret_from_fork+0x10/0x20
[   19.446621] 
[   19.446645] The buggy address belongs to the object at fff00000c5aee400
[   19.446645]  which belongs to the cache kmalloc-64 of size 64
[   19.446707] The buggy address is located 0 bytes to the right of
[   19.446707]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.446855] 
[   19.446895] The buggy address belongs to the physical page:
[   19.446929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.446983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.447033] page_type: f5(slab)
[   19.447072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.447127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.447171] page dumped because: kasan: bad access detected
[   19.447216] 
[   19.447237] Memory state around the buggy address:
[   19.447270]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.447317]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.447363] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.447476]                                      ^
[   19.447553]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.447739]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.447838] ==================================================================
[   19.430321] ==================================================================
[   19.430395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.430451] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.430659] 
[   19.430819] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.430927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.430964] Hardware name: linux,dummy-virt (DT)
[   19.431013] Call trace:
[   19.431160]  show_stack+0x20/0x38 (C)
[   19.431255]  dump_stack_lvl+0x8c/0xd0
[   19.431390]  print_report+0x118/0x5d0
[   19.431448]  kasan_report+0xdc/0x128
[   19.431503]  kasan_check_range+0x100/0x1a8
[   19.431630]  __kasan_check_write+0x20/0x30
[   19.431705]  kasan_atomics_helper+0x10c0/0x4858
[   19.431770]  kasan_atomics+0x198/0x2e0
[   19.431825]  kunit_try_run_case+0x170/0x3f0
[   19.432051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.432242]  kthread+0x328/0x630
[   19.432321]  ret_from_fork+0x10/0x20
[   19.432464] 
[   19.432487] Allocated by task 266:
[   19.432518]  kasan_save_stack+0x3c/0x68
[   19.432561]  kasan_save_track+0x20/0x40
[   19.432602]  kasan_save_alloc_info+0x40/0x58
[   19.432933]  __kasan_kmalloc+0xd4/0xd8
[   19.433000]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.433076]  kasan_atomics+0xb8/0x2e0
[   19.433334]  kunit_try_run_case+0x170/0x3f0
[   19.433385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.433518]  kthread+0x328/0x630
[   19.433580]  ret_from_fork+0x10/0x20
[   19.433796] 
[   19.433837] The buggy address belongs to the object at fff00000c5aee400
[   19.433837]  which belongs to the cache kmalloc-64 of size 64
[   19.433903] The buggy address is located 0 bytes to the right of
[   19.433903]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.434028] 
[   19.434076] The buggy address belongs to the physical page:
[   19.434773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.434840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.434893] page_type: f5(slab)
[   19.434941] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.434997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.435050] page dumped because: kasan: bad access detected
[   19.435093] 
[   19.435122] Memory state around the buggy address:
[   19.435157]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.435783]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.435993] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.436078]                                      ^
[   19.436123]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436168]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436219] ==================================================================
[   19.394125] ==================================================================
[   19.394272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.394325] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.394378] 
[   19.394451] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.394551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.394588] Hardware name: linux,dummy-virt (DT)
[   19.394676] Call trace:
[   19.394700]  show_stack+0x20/0x38 (C)
[   19.394757]  dump_stack_lvl+0x8c/0xd0
[   19.394812]  print_report+0x118/0x5d0
[   19.395027]  kasan_report+0xdc/0x128
[   19.395165]  __asan_report_store8_noabort+0x20/0x30
[   19.395235]  kasan_atomics_helper+0x3e5c/0x4858
[   19.395290]  kasan_atomics+0x198/0x2e0
[   19.395343]  kunit_try_run_case+0x170/0x3f0
[   19.395574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.395770]  kthread+0x328/0x630
[   19.395838]  ret_from_fork+0x10/0x20
[   19.395893] 
[   19.395951] Allocated by task 266:
[   19.395993]  kasan_save_stack+0x3c/0x68
[   19.396039]  kasan_save_track+0x20/0x40
[   19.396175]  kasan_save_alloc_info+0x40/0x58
[   19.396239]  __kasan_kmalloc+0xd4/0xd8
[   19.396287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.396337]  kasan_atomics+0xb8/0x2e0
[   19.396877]  kunit_try_run_case+0x170/0x3f0
[   19.397094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.397239]  kthread+0x328/0x630
[   19.397325]  ret_from_fork+0x10/0x20
[   19.397528] 
[   19.397568] The buggy address belongs to the object at fff00000c5aee400
[   19.397568]  which belongs to the cache kmalloc-64 of size 64
[   19.397631] The buggy address is located 0 bytes to the right of
[   19.397631]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.397933] 
[   19.398029] The buggy address belongs to the physical page:
[   19.398086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.398191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.398462] page_type: f5(slab)
[   19.398536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.398616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.398664] page dumped because: kasan: bad access detected
[   19.398698] 
[   19.398901] Memory state around the buggy address:
[   19.398992]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.399058]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.399104] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.399167]                                      ^
[   19.399216]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.399279]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.399321] ==================================================================
[   19.280283] ==================================================================
[   19.281867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.281940] Read of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.282218] 
[   19.282472] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.282568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.282937] Hardware name: linux,dummy-virt (DT)
[   19.283203] Call trace:
[   19.283237]  show_stack+0x20/0x38 (C)
[   19.283291]  dump_stack_lvl+0x8c/0xd0
[   19.283555]  print_report+0x118/0x5d0
[   19.283660]  kasan_report+0xdc/0x128
[   19.284136]  __asan_report_load4_noabort+0x20/0x30
[   19.284231]  kasan_atomics_helper+0x42d8/0x4858
[   19.284282]  kasan_atomics+0x198/0x2e0
[   19.285076]  __kasan_kmalloc+0xd4/0xd8
[   19.285115]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.285157]  kasan_atomics+0xb8/0x2e0
[   19.285493] The buggy address is located 0 bytes to the right of
[   19.285493]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.285641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.285766] page_type: f5(slab)
[   19.285812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.285868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.286092]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.286187]                                      ^
[   19.286859] ==================================================================
[   19.453789] ==================================================================
[   19.453841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.453891] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.453967] 
[   19.454003] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.454086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.454115] Hardware name: linux,dummy-virt (DT)
[   19.454149] Call trace:
[   19.454172]  show_stack+0x20/0x38 (C)
[   19.454240]  dump_stack_lvl+0x8c/0xd0
[   19.454286]  print_report+0x118/0x5d0
[   19.454345]  kasan_report+0xdc/0x128
[   19.454391]  kasan_check_range+0x100/0x1a8
[   19.454440]  __kasan_check_write+0x20/0x30
[   19.454486]  kasan_atomics_helper+0x126c/0x4858
[   19.454535]  kasan_atomics+0x198/0x2e0
[   19.454582]  kunit_try_run_case+0x170/0x3f0
[   19.454628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.454691]  kthread+0x328/0x630
[   19.454743]  ret_from_fork+0x10/0x20
[   19.454791] 
[   19.454820] Allocated by task 266:
[   19.454858]  kasan_save_stack+0x3c/0x68
[   19.454900]  kasan_save_track+0x20/0x40
[   19.454940]  kasan_save_alloc_info+0x40/0x58
[   19.454981]  __kasan_kmalloc+0xd4/0xd8
[   19.455020]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.455059]  kasan_atomics+0xb8/0x2e0
[   19.455098]  kunit_try_run_case+0x170/0x3f0
[   19.455136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455191]  kthread+0x328/0x630
[   19.455225]  ret_from_fork+0x10/0x20
[   19.455263] 
[   19.455285] The buggy address belongs to the object at fff00000c5aee400
[   19.455285]  which belongs to the cache kmalloc-64 of size 64
[   19.455345] The buggy address is located 0 bytes to the right of
[   19.455345]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.455414] 
[   19.455436] The buggy address belongs to the physical page:
[   19.455472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.455527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.455588] page_type: f5(slab)
[   19.455627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.455681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.455725] page dumped because: kasan: bad access detected
[   19.455759] 
[   19.455780] Memory state around the buggy address:
[   19.455813]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.455859]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.455905] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.455947]                                      ^
[   19.455979]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.456069]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.456145] ==================================================================
[   19.476747] ==================================================================
[   19.476921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.477585] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.477646] 
[   19.477772] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.478147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.478228] Hardware name: linux,dummy-virt (DT)
[   19.478264] Call trace:
[   19.478289]  show_stack+0x20/0x38 (C)
[   19.478348]  dump_stack_lvl+0x8c/0xd0
[   19.478464]  print_report+0x118/0x5d0
[   19.478530]  kasan_report+0xdc/0x128
[   19.478602]  kasan_check_range+0x100/0x1a8
[   19.478658]  __kasan_check_write+0x20/0x30
[   19.478959]  kasan_atomics_helper+0x147c/0x4858
[   19.479032]  kasan_atomics+0x198/0x2e0
[   19.479077]  kunit_try_run_case+0x170/0x3f0
[   19.479366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.479459]  kthread+0x328/0x630
[   19.479532]  ret_from_fork+0x10/0x20
[   19.479680] 
[   19.479714] Allocated by task 266:
[   19.479743]  kasan_save_stack+0x3c/0x68
[   19.479787]  kasan_save_track+0x20/0x40
[   19.479826]  kasan_save_alloc_info+0x40/0x58
[   19.479972]  __kasan_kmalloc+0xd4/0xd8
[   19.480067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.480218]  kasan_atomics+0xb8/0x2e0
[   19.480277]  kunit_try_run_case+0x170/0x3f0
[   19.480359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.480614]  kthread+0x328/0x630
[   19.480896]  ret_from_fork+0x10/0x20
[   19.481106] 
[   19.481140] The buggy address belongs to the object at fff00000c5aee400
[   19.481140]  which belongs to the cache kmalloc-64 of size 64
[   19.481231] The buggy address is located 0 bytes to the right of
[   19.481231]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.481318] 
[   19.481340] The buggy address belongs to the physical page:
[   19.481374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.481437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.481496] page_type: f5(slab)
[   19.481537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.481591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.481636] page dumped because: kasan: bad access detected
[   19.481679] 
[   19.481708] Memory state around the buggy address:
[   19.481747]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.481803]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.481858] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.481898]                                      ^
[   19.481940]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.482005]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.482076] ==================================================================
[   19.499852] ==================================================================
[   19.499894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.499939] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.499990] 
[   19.500020] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.500102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.500139] Hardware name: linux,dummy-virt (DT)
[   19.500173] Call trace:
[   19.500815]  show_stack+0x20/0x38 (C)
[   19.500874]  dump_stack_lvl+0x8c/0xd0
[   19.501023]  print_report+0x118/0x5d0
[   19.501459]  kasan_report+0xdc/0x128
[   19.501536]  __asan_report_load8_noabort+0x20/0x30
[   19.501784]  kasan_atomics_helper+0x3db0/0x4858
[   19.501978]  kasan_atomics+0x198/0x2e0
[   19.502068]  kunit_try_run_case+0x170/0x3f0
[   19.502148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.502319]  kthread+0x328/0x630
[   19.502395]  ret_from_fork+0x10/0x20
[   19.502651] 
[   19.502680] Allocated by task 266:
[   19.502713]  kasan_save_stack+0x3c/0x68
[   19.502756]  kasan_save_track+0x20/0x40
[   19.502837]  kasan_save_alloc_info+0x40/0x58
[   19.502967]  __kasan_kmalloc+0xd4/0xd8
[   19.503059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.503133]  kasan_atomics+0xb8/0x2e0
[   19.503352]  kunit_try_run_case+0x170/0x3f0
[   19.503594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.503731]  kthread+0x328/0x630
[   19.503799]  ret_from_fork+0x10/0x20
[   19.503943] 
[   19.504004] The buggy address belongs to the object at fff00000c5aee400
[   19.504004]  which belongs to the cache kmalloc-64 of size 64
[   19.504084] The buggy address is located 0 bytes to the right of
[   19.504084]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.504325] 
[   19.504390] The buggy address belongs to the physical page:
[   19.504482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.504603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.504677] page_type: f5(slab)
[   19.504753] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.505060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.505161] page dumped because: kasan: bad access detected
[   19.505234] 
[   19.505334] Memory state around the buggy address:
[   19.505411]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.505485]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.505532] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.505841]                                      ^
[   19.506037]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506118]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506389] ==================================================================
[   19.523081] ==================================================================
[   19.523137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.523475] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.523790] 
[   19.523919] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.524019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.524193] Hardware name: linux,dummy-virt (DT)
[   19.524260] Call trace:
[   19.524354]  show_stack+0x20/0x38 (C)
[   19.524437]  dump_stack_lvl+0x8c/0xd0
[   19.524494]  print_report+0x118/0x5d0
[   19.524542]  kasan_report+0xdc/0x128
[   19.524590]  __asan_report_load8_noabort+0x20/0x30
[   19.524641]  kasan_atomics_helper+0x3e10/0x4858
[   19.524692]  kasan_atomics+0x198/0x2e0
[   19.524738]  kunit_try_run_case+0x170/0x3f0
[   19.524956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525081]  kthread+0x328/0x630
[   19.525405]  ret_from_fork+0x10/0x20
[   19.525511] 
[   19.525632] Allocated by task 266:
[   19.525712]  kasan_save_stack+0x3c/0x68
[   19.525818]  kasan_save_track+0x20/0x40
[   19.525888]  kasan_save_alloc_info+0x40/0x58
[   19.525940]  __kasan_kmalloc+0xd4/0xd8
[   19.525986]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.526299]  kasan_atomics+0xb8/0x2e0
[   19.526398]  kunit_try_run_case+0x170/0x3f0
[   19.526484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.526558]  kthread+0x328/0x630
[   19.526767]  ret_from_fork+0x10/0x20
[   19.526895] 
[   19.526935] The buggy address belongs to the object at fff00000c5aee400
[   19.526935]  which belongs to the cache kmalloc-64 of size 64
[   19.527018] The buggy address is located 0 bytes to the right of
[   19.527018]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.527158] 
[   19.527214] The buggy address belongs to the physical page:
[   19.527310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.527422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.527478] page_type: f5(slab)
[   19.527516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.527882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.528044] page dumped because: kasan: bad access detected
[   19.528102] 
[   19.528189] Memory state around the buggy address:
[   19.528389]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.528559]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.528653] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.528703]                                      ^
[   19.528740]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528946]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.529116] ==================================================================
[   19.448639] ==================================================================
[   19.448724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.448773] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.448825] 
[   19.448854] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.449121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.449163] Hardware name: linux,dummy-virt (DT)
[   19.449351] Call trace:
[   19.449395]  show_stack+0x20/0x38 (C)
[   19.449445]  dump_stack_lvl+0x8c/0xd0
[   19.449490]  print_report+0x118/0x5d0
[   19.449538]  kasan_report+0xdc/0x128
[   19.449584]  kasan_check_range+0x100/0x1a8
[   19.449634]  __kasan_check_write+0x20/0x30
[   19.449688]  kasan_atomics_helper+0x11f8/0x4858
[   19.449741]  kasan_atomics+0x198/0x2e0
[   19.449795]  kunit_try_run_case+0x170/0x3f0
[   19.449843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449897]  kthread+0x328/0x630
[   19.449949]  ret_from_fork+0x10/0x20
[   19.450010] 
[   19.450030] Allocated by task 266:
[   19.450060]  kasan_save_stack+0x3c/0x68
[   19.450101]  kasan_save_track+0x20/0x40
[   19.450153]  kasan_save_alloc_info+0x40/0x58
[   19.450595]  __kasan_kmalloc+0xd4/0xd8
[   19.450726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.450774]  kasan_atomics+0xb8/0x2e0
[   19.450814]  kunit_try_run_case+0x170/0x3f0
[   19.450862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.450947]  kthread+0x328/0x630
[   19.450982]  ret_from_fork+0x10/0x20
[   19.451352] 
[   19.452066] The buggy address belongs to the object at fff00000c5aee400
[   19.452066]  which belongs to the cache kmalloc-64 of size 64
[   19.452140] The buggy address is located 0 bytes to the right of
[   19.452140]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.452220] 
[   19.452242] The buggy address belongs to the physical page:
[   19.452276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.452331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.452380] page_type: f5(slab)
[   19.452420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.452474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.452518] page dumped because: kasan: bad access detected
[   19.452552] 
[   19.452573] Memory state around the buggy address:
[   19.452608]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.452654]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.452701] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.452742]                                      ^
[   19.452775]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452821]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452860] ==================================================================
[   19.456560] ==================================================================
[   19.456615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.456712] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.456795] 
[   19.456842] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.456929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.456986] Hardware name: linux,dummy-virt (DT)
[   19.457020] Call trace:
[   19.457135]  show_stack+0x20/0x38 (C)
[   19.457199]  dump_stack_lvl+0x8c/0xd0
[   19.457245]  print_report+0x118/0x5d0
[   19.457293]  kasan_report+0xdc/0x128
[   19.457339]  kasan_check_range+0x100/0x1a8
[   19.457388]  __kasan_check_write+0x20/0x30
[   19.457433]  kasan_atomics_helper+0x12d8/0x4858
[   19.457483]  kasan_atomics+0x198/0x2e0
[   19.457529]  kunit_try_run_case+0x170/0x3f0
[   19.457576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457631]  kthread+0x328/0x630
[   19.457674]  ret_from_fork+0x10/0x20
[   19.457720] 
[   19.457740] Allocated by task 266:
[   19.457769]  kasan_save_stack+0x3c/0x68
[   19.457810]  kasan_save_track+0x20/0x40
[   19.457849]  kasan_save_alloc_info+0x40/0x58
[   19.457890]  __kasan_kmalloc+0xd4/0xd8
[   19.457944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.457992]  kasan_atomics+0xb8/0x2e0
[   19.458046]  kunit_try_run_case+0x170/0x3f0
[   19.458086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.458133]  kthread+0x328/0x630
[   19.458206]  ret_from_fork+0x10/0x20
[   19.458263] 
[   19.458292] The buggy address belongs to the object at fff00000c5aee400
[   19.458292]  which belongs to the cache kmalloc-64 of size 64
[   19.458444] The buggy address is located 0 bytes to the right of
[   19.458444]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.458513] 
[   19.458578] The buggy address belongs to the physical page:
[   19.458614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.458841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.458922] page_type: f5(slab)
[   19.458980] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.459034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.459078] page dumped because: kasan: bad access detected
[   19.459112] 
[   19.459148] Memory state around the buggy address:
[   19.459227]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.459292]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.459414] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.459541]                                      ^
[   19.459632]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459773]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459813] ==================================================================
[   19.306828] ==================================================================
[   19.306947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.307022] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.307085] 
[   19.307124] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.307373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.307540] Hardware name: linux,dummy-virt (DT)
[   19.307644] Call trace:
[   19.307671]  show_stack+0x20/0x38 (C)
[   19.307722]  dump_stack_lvl+0x8c/0xd0
[   19.308040]  print_report+0x118/0x5d0
[   19.308217]  kasan_report+0xdc/0x128
[   19.308294]  kasan_check_range+0x100/0x1a8
[   19.308427]  __kasan_check_write+0x20/0x30
[   19.308503]  kasan_atomics_helper+0xa6c/0x4858
[   19.308635]  kasan_atomics+0x198/0x2e0
[   19.308720]  kunit_try_run_case+0x170/0x3f0
[   19.308776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.309011]  kthread+0x328/0x630
[   19.309075]  ret_from_fork+0x10/0x20
[   19.309341] 
[   19.309410] Allocated by task 266:
[   19.309467]  kasan_save_stack+0x3c/0x68
[   19.309615]  kasan_save_track+0x20/0x40
[   19.309673]  kasan_save_alloc_info+0x40/0x58
[   19.309750]  __kasan_kmalloc+0xd4/0xd8
[   19.310028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.310214]  kasan_atomics+0xb8/0x2e0
[   19.310280]  kunit_try_run_case+0x170/0x3f0
[   19.310357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.310478]  kthread+0x328/0x630
[   19.310526]  ret_from_fork+0x10/0x20
[   19.310570] 
[   19.310713] The buggy address belongs to the object at fff00000c5aee400
[   19.310713]  which belongs to the cache kmalloc-64 of size 64
[   19.310798] The buggy address is located 0 bytes to the right of
[   19.310798]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.310882] 
[   19.310905] The buggy address belongs to the physical page:
[   19.310944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.311009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.311058] page_type: f5(slab)
[   19.311114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.311257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.311639] page dumped because: kasan: bad access detected
[   19.311775] 
[   19.311895] Memory state around the buggy address:
[   19.311961]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.312010]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.312069] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.312369]                                      ^
[   19.312436]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.312563]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.312640] ==================================================================
[   19.423450] ==================================================================
[   19.423503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.423554] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.423839] 
[   19.423904] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.424075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.424143] Hardware name: linux,dummy-virt (DT)
[   19.424523] Call trace:
[   19.424571]  show_stack+0x20/0x38 (C)
[   19.424662]  dump_stack_lvl+0x8c/0xd0
[   19.424868]  print_report+0x118/0x5d0
[   19.424919]  kasan_report+0xdc/0x128
[   19.424967]  kasan_check_range+0x100/0x1a8
[   19.425148]  __kasan_check_write+0x20/0x30
[   19.425219]  kasan_atomics_helper+0x1058/0x4858
[   19.425281]  kasan_atomics+0x198/0x2e0
[   19.425353]  kunit_try_run_case+0x170/0x3f0
[   19.425493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.425608]  kthread+0x328/0x630
[   19.425880]  ret_from_fork+0x10/0x20
[   19.425969] 
[   19.426017] Allocated by task 266:
[   19.426140]  kasan_save_stack+0x3c/0x68
[   19.426226]  kasan_save_track+0x20/0x40
[   19.426367]  kasan_save_alloc_info+0x40/0x58
[   19.426492]  __kasan_kmalloc+0xd4/0xd8
[   19.426560]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.426768]  kasan_atomics+0xb8/0x2e0
[   19.426873]  kunit_try_run_case+0x170/0x3f0
[   19.427006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427271]  kthread+0x328/0x630
[   19.427350]  ret_from_fork+0x10/0x20
[   19.427493] 
[   19.427534] The buggy address belongs to the object at fff00000c5aee400
[   19.427534]  which belongs to the cache kmalloc-64 of size 64
[   19.427681] The buggy address is located 0 bytes to the right of
[   19.427681]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.427771] 
[   19.427795] The buggy address belongs to the physical page:
[   19.427833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.427888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.427940] page_type: f5(slab)
[   19.428196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.428338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.428412] page dumped because: kasan: bad access detected
[   19.428486] 
[   19.428673] Memory state around the buggy address:
[   19.428858]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.428911]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.429111] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.429195]                                      ^
[   19.429235]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.429306]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.429436] ==================================================================
[   19.529610] ==================================================================
[   19.529663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.529805] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.531527] 
[   19.531706] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.532128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.532228] Hardware name: linux,dummy-virt (DT)
[   19.532291] Call trace:
[   19.532330]  show_stack+0x20/0x38 (C)
[   19.532495]  dump_stack_lvl+0x8c/0xd0
[   19.532590]  print_report+0x118/0x5d0
[   19.532872]  kasan_report+0xdc/0x128
[   19.532997]  kasan_check_range+0x100/0x1a8
[   19.533125]  __kasan_check_write+0x20/0x30
[   19.533216]  kasan_atomics_helper+0x175c/0x4858
[   19.533377]  kasan_atomics+0x198/0x2e0
[   19.533432]  kunit_try_run_case+0x170/0x3f0
[   19.533488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533720]  kthread+0x328/0x630
[   19.533786]  ret_from_fork+0x10/0x20
[   19.533859] 
[   19.533928] Allocated by task 266:
[   19.533976]  kasan_save_stack+0x3c/0x68
[   19.534052]  kasan_save_track+0x20/0x40
[   19.534093]  kasan_save_alloc_info+0x40/0x58
[   19.534135]  __kasan_kmalloc+0xd4/0xd8
[   19.534195]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.534236]  kasan_atomics+0xb8/0x2e0
[   19.534280]  kunit_try_run_case+0x170/0x3f0
[   19.534321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.534367]  kthread+0x328/0x630
[   19.534400]  ret_from_fork+0x10/0x20
[   19.534437] 
[   19.534467] The buggy address belongs to the object at fff00000c5aee400
[   19.534467]  which belongs to the cache kmalloc-64 of size 64
[   19.534530] The buggy address is located 0 bytes to the right of
[   19.534530]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.534600] 
[   19.534661] The buggy address belongs to the physical page:
[   19.534702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.534758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.534808] page_type: f5(slab)
[   19.534856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.534918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.534964] page dumped because: kasan: bad access detected
[   19.535008] 
[   19.535037] Memory state around the buggy address:
[   19.535081]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535127]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535266] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.535702]                                      ^
[   19.535884]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.535968]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536040] ==================================================================
[   19.294010] ==================================================================
[   19.294064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.294115] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.294169] 
[   19.294453] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.294604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.294652] Hardware name: linux,dummy-virt (DT)
[   19.294871] Call trace:
[   19.294904]  show_stack+0x20/0x38 (C)
[   19.294966]  dump_stack_lvl+0x8c/0xd0
[   19.295013]  print_report+0x118/0x5d0
[   19.295059]  kasan_report+0xdc/0x128
[   19.295374]  kasan_check_range+0x100/0x1a8
[   19.295593]  __kasan_check_write+0x20/0x30
[   19.295796]  kasan_atomics_helper+0x99c/0x4858
[   19.295909]  kasan_atomics+0x198/0x2e0
[   19.295986]  kunit_try_run_case+0x170/0x3f0
[   19.296133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.296220]  kthread+0x328/0x630
[   19.296563]  ret_from_fork+0x10/0x20
[   19.296752] 
[   19.296777] Allocated by task 266:
[   19.297038]  kasan_save_stack+0x3c/0x68
[   19.297273]  kasan_save_track+0x20/0x40
[   19.297557]  kasan_save_alloc_info+0x40/0x58
[   19.297671]  __kasan_kmalloc+0xd4/0xd8
[   19.297732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.297862]  kasan_atomics+0xb8/0x2e0
[   19.297919]  kunit_try_run_case+0x170/0x3f0
[   19.297960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.298056]  kthread+0x328/0x630
[   19.298093]  ret_from_fork+0x10/0x20
[   19.298141] 
[   19.298211] The buggy address belongs to the object at fff00000c5aee400
[   19.298211]  which belongs to the cache kmalloc-64 of size 64
[   19.298296] The buggy address is located 0 bytes to the right of
[   19.298296]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.298370] 
[   19.298401] The buggy address belongs to the physical page:
[   19.298442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.298505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.298555] page_type: f5(slab)
[   19.298603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.298662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.298713] page dumped because: kasan: bad access detected
[   19.298757] 
[   19.298779] Memory state around the buggy address:
[   19.298812]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.298858]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.298914] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.298956]                                      ^
[   19.299011]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.299080]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.299122] ==================================================================
[   19.466935] ==================================================================
[   19.466994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.467074] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.467133] 
[   19.467209] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.467301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.467391] Hardware name: linux,dummy-virt (DT)
[   19.467509] Call trace:
[   19.467593]  show_stack+0x20/0x38 (C)
[   19.467771]  dump_stack_lvl+0x8c/0xd0
[   19.467868]  print_report+0x118/0x5d0
[   19.467982]  kasan_report+0xdc/0x128
[   19.468132]  __asan_report_load8_noabort+0x20/0x30
[   19.468224]  kasan_atomics_helper+0x3f04/0x4858
[   19.468276]  kasan_atomics+0x198/0x2e0
[   19.468513]  kunit_try_run_case+0x170/0x3f0
[   19.468563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.468619]  kthread+0x328/0x630
[   19.468871]  ret_from_fork+0x10/0x20
[   19.469029] 
[   19.469159] Allocated by task 266:
[   19.469253]  kasan_save_stack+0x3c/0x68
[   19.469317]  kasan_save_track+0x20/0x40
[   19.469531]  kasan_save_alloc_info+0x40/0x58
[   19.469738]  __kasan_kmalloc+0xd4/0xd8
[   19.469925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.469997]  kasan_atomics+0xb8/0x2e0
[   19.470091]  kunit_try_run_case+0x170/0x3f0
[   19.471705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.471767]  kthread+0x328/0x630
[   19.471828]  ret_from_fork+0x10/0x20
[   19.471866] 
[   19.471897] The buggy address belongs to the object at fff00000c5aee400
[   19.471897]  which belongs to the cache kmalloc-64 of size 64
[   19.471960] The buggy address is located 0 bytes to the right of
[   19.471960]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.472226] 
[   19.472248] The buggy address belongs to the physical page:
[   19.472283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.472339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.472390] page_type: f5(slab)
[   19.472431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.472487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.472532] page dumped because: kasan: bad access detected
[   19.472566] 
[   19.472586] Memory state around the buggy address:
[   19.472621]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.472667]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.472714] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.472756]                                      ^
[   19.472789]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.472834]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.472873] ==================================================================
[   19.313596] ==================================================================
[   19.313651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.313703] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.313757] 
[   19.313846] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.313963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.314262] Hardware name: linux,dummy-virt (DT)
[   19.314440] Call trace:
[   19.314481]  show_stack+0x20/0x38 (C)
[   19.314543]  dump_stack_lvl+0x8c/0xd0
[   19.314655]  print_report+0x118/0x5d0
[   19.314708]  kasan_report+0xdc/0x128
[   19.314771]  kasan_check_range+0x100/0x1a8
[   19.315545]  kthread+0x328/0x630
[   19.315777]  kasan_save_stack+0x3c/0x68
[   19.315828]  kasan_save_track+0x20/0x40
[   19.316282]  kasan_save_alloc_info+0x40/0x58
[   19.316386]  __kasan_kmalloc+0xd4/0xd8
[   19.316462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.316591]  kasan_atomics+0xb8/0x2e0
[   19.316670]  kunit_try_run_case+0x170/0x3f0
[   19.316745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.316793]  kthread+0x328/0x630
[   19.317082]  ret_from_fork+0x10/0x20
[   19.317293] The buggy address is located 0 bytes to the right of
[   19.317293]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.317947]                                      ^
[   19.320251] Hardware name: linux,dummy-virt (DT)
[   19.321885]  kasan_save_alloc_info+0x40/0x58
[   19.323138] 
[   19.323480] page_type: f5(slab)
[   19.324106] page dumped because: kasan: bad access detected
[   19.325307] ==================================================================
[   19.300530] ==================================================================
[   19.300590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   19.300961] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.301068] 
[   19.301104] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.301201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.301324] Hardware name: linux,dummy-virt (DT)
[   19.301369] Call trace:
[   19.301393]  show_stack+0x20/0x38 (C)
[   19.301514]  dump_stack_lvl+0x8c/0xd0
[   19.301566]  print_report+0x118/0x5d0
[   19.301630]  kasan_report+0xdc/0x128
[   19.301911]  kasan_check_range+0x100/0x1a8
[   19.301990]  __kasan_check_write+0x20/0x30
[   19.302046]  kasan_atomics_helper+0xa04/0x4858
[   19.302191]  kasan_atomics+0x198/0x2e0
[   19.302257]  kunit_try_run_case+0x170/0x3f0
[   19.302307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.302487]  kthread+0x328/0x630
[   19.302552]  ret_from_fork+0x10/0x20
[   19.302760] 
[   19.302794] Allocated by task 266:
[   19.302856]  kasan_save_stack+0x3c/0x68
[   19.302921]  kasan_save_track+0x20/0x40
[   19.302964]  kasan_save_alloc_info+0x40/0x58
[   19.303155]  __kasan_kmalloc+0xd4/0xd8
[   19.303220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.303343]  kasan_atomics+0xb8/0x2e0
[   19.303392]  kunit_try_run_case+0x170/0x3f0
[   19.303446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.303557]  kthread+0x328/0x630
[   19.303625]  ret_from_fork+0x10/0x20
[   19.303745] 
[   19.303835] The buggy address belongs to the object at fff00000c5aee400
[   19.303835]  which belongs to the cache kmalloc-64 of size 64
[   19.304044] The buggy address is located 0 bytes to the right of
[   19.304044]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.304258] 
[   19.304315] The buggy address belongs to the physical page:
[   19.304426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.304533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.304890] page_type: f5(slab)
[   19.304962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.305118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.305454] page dumped because: kasan: bad access detected
[   19.305526] 
[   19.305624] Memory state around the buggy address:
[   19.305715]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305790]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305908] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.305975]                                      ^
[   19.306045]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.306138]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.306219] ==================================================================
[   19.405687] ==================================================================
[   19.405751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.405803] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.405855] 
[   19.405887] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.406228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.406395] Hardware name: linux,dummy-virt (DT)
[   19.406441] Call trace:
[   19.406465]  show_stack+0x20/0x38 (C)
[   19.406692]  dump_stack_lvl+0x8c/0xd0
[   19.406756]  print_report+0x118/0x5d0
[   19.406915]  kasan_report+0xdc/0x128
[   19.406993]  kasan_check_range+0x100/0x1a8
[   19.407097]  __kasan_check_write+0x20/0x30
[   19.407162]  kasan_atomics_helper+0xf20/0x4858
[   19.407265]  kasan_atomics+0x198/0x2e0
[   19.407329]  kunit_try_run_case+0x170/0x3f0
[   19.407379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.407580]  kthread+0x328/0x630
[   19.407709]  ret_from_fork+0x10/0x20
[   19.407808] 
[   19.408030] Allocated by task 266:
[   19.408273]  kasan_save_stack+0x3c/0x68
[   19.408410]  kasan_save_track+0x20/0x40
[   19.408464]  kasan_save_alloc_info+0x40/0x58
[   19.408524]  __kasan_kmalloc+0xd4/0xd8
[   19.408621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.408668]  kasan_atomics+0xb8/0x2e0
[   19.408708]  kunit_try_run_case+0x170/0x3f0
[   19.408749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.408896]  kthread+0x328/0x630
[   19.408938]  ret_from_fork+0x10/0x20
[   19.409111] 
[   19.409159] The buggy address belongs to the object at fff00000c5aee400
[   19.409159]  which belongs to the cache kmalloc-64 of size 64
[   19.409295] The buggy address is located 0 bytes to the right of
[   19.409295]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.409547] 
[   19.409617] The buggy address belongs to the physical page:
[   19.409740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.409884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.409958] page_type: f5(slab)
[   19.410022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.410078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.410372] page dumped because: kasan: bad access detected
[   19.410514] 
[   19.410598] Memory state around the buggy address:
[   19.410793]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.410952]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.411019] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.411114]                                      ^
[   19.411190]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.411243]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.411459] ==================================================================
[   19.359890] ==================================================================
[   19.359941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.359991] Read of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.360044] 
[   19.360075] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.360158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.360202] Hardware name: linux,dummy-virt (DT)
[   19.360235] Call trace:
[   19.360258]  show_stack+0x20/0x38 (C)
[   19.360305]  dump_stack_lvl+0x8c/0xd0
[   19.360355]  print_report+0x118/0x5d0
[   19.360402]  kasan_report+0xdc/0x128
[   19.360448]  __asan_report_load4_noabort+0x20/0x30
[   19.360501]  kasan_atomics_helper+0x3dd8/0x4858
[   19.360559]  kasan_atomics+0x198/0x2e0
[   19.360607]  kunit_try_run_case+0x170/0x3f0
[   19.360656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.360710]  kthread+0x328/0x630
[   19.360755]  ret_from_fork+0x10/0x20
[   19.360804] 
[   19.360824] Allocated by task 266:
[   19.360854]  kasan_save_stack+0x3c/0x68
[   19.360896]  kasan_save_track+0x20/0x40
[   19.360935]  kasan_save_alloc_info+0x40/0x58
[   19.360977]  __kasan_kmalloc+0xd4/0xd8
[   19.361014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.361055]  kasan_atomics+0xb8/0x2e0
[   19.361093]  kunit_try_run_case+0x170/0x3f0
[   19.361133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.362283]  kthread+0x328/0x630
[   19.362338]  ret_from_fork+0x10/0x20
[   19.362379] 
[   19.362402] The buggy address belongs to the object at fff00000c5aee400
[   19.362402]  which belongs to the cache kmalloc-64 of size 64
[   19.362485] The buggy address is located 0 bytes to the right of
[   19.362485]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.362556] 
[   19.362578] The buggy address belongs to the physical page:
[   19.365587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.365671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.365724] page_type: f5(slab)
[   19.365764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.365820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.365864] page dumped because: kasan: bad access detected
[   19.365899] 
[   19.365919] Memory state around the buggy address:
[   19.365954]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.366010]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.366057] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.366098]                                      ^
[   19.366316]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.366404]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.367911] ==================================================================
[   19.490370] ==================================================================
[   19.490449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.490516] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.490570] 
[   19.490784] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.490989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.491055] Hardware name: linux,dummy-virt (DT)
[   19.491090] Call trace:
[   19.491115]  show_stack+0x20/0x38 (C)
[   19.491268]  dump_stack_lvl+0x8c/0xd0
[   19.491332]  print_report+0x118/0x5d0
[   19.491390]  kasan_report+0xdc/0x128
[   19.491477]  kasan_check_range+0x100/0x1a8
[   19.491535]  __kasan_check_write+0x20/0x30
[   19.491644]  kasan_atomics_helper+0x154c/0x4858
[   19.491722]  kasan_atomics+0x198/0x2e0
[   19.491782]  kunit_try_run_case+0x170/0x3f0
[   19.491848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.491904]  kthread+0x328/0x630
[   19.491946]  ret_from_fork+0x10/0x20
[   19.491995] 
[   19.492032] Allocated by task 266:
[   19.492077]  kasan_save_stack+0x3c/0x68
[   19.492126]  kasan_save_track+0x20/0x40
[   19.492356]  kasan_save_alloc_info+0x40/0x58
[   19.492474]  __kasan_kmalloc+0xd4/0xd8
[   19.492523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.492698]  kasan_atomics+0xb8/0x2e0
[   19.492865]  kunit_try_run_case+0x170/0x3f0
[   19.493020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493096]  kthread+0x328/0x630
[   19.493326]  ret_from_fork+0x10/0x20
[   19.493379] 
[   19.493401] The buggy address belongs to the object at fff00000c5aee400
[   19.493401]  which belongs to the cache kmalloc-64 of size 64
[   19.493555] The buggy address is located 0 bytes to the right of
[   19.493555]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.493664] 
[   19.493828] The buggy address belongs to the physical page:
[   19.493997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.494228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.494336] page_type: f5(slab)
[   19.494483] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.494561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.494606] page dumped because: kasan: bad access detected
[   19.494641] 
[   19.494669] Memory state around the buggy address:
[   19.495056]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495128]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495200] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.495460]                                      ^
[   19.495529]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495699]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495742] ==================================================================
[   19.369888] ==================================================================
[   19.369942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.370000] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.370055] 
[   19.370089] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.370174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.373251] Hardware name: linux,dummy-virt (DT)
[   19.373286] Call trace:
[   19.373310]  show_stack+0x20/0x38 (C)
[   19.373367]  dump_stack_lvl+0x8c/0xd0
[   19.373414]  print_report+0x118/0x5d0
[   19.373463]  kasan_report+0xdc/0x128
[   19.373509]  kasan_check_range+0x100/0x1a8
[   19.373558]  __kasan_check_write+0x20/0x30
[   19.373605]  kasan_atomics_helper+0xd3c/0x4858
[   19.373654]  kasan_atomics+0x198/0x2e0
[   19.373702]  kunit_try_run_case+0x170/0x3f0
[   19.373752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.373808]  kthread+0x328/0x630
[   19.373936]  ret_from_fork+0x10/0x20
[   19.374011] 
[   19.374042] Allocated by task 266:
[   19.374097]  kasan_save_stack+0x3c/0x68
[   19.374142]  kasan_save_track+0x20/0x40
[   19.374195]  kasan_save_alloc_info+0x40/0x58
[   19.374241]  __kasan_kmalloc+0xd4/0xd8
[   19.374279]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.374321]  kasan_atomics+0xb8/0x2e0
[   19.374360]  kunit_try_run_case+0x170/0x3f0
[   19.374400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.374710]  kthread+0x328/0x630
[   19.374767]  ret_from_fork+0x10/0x20
[   19.374878] 
[   19.374927] The buggy address belongs to the object at fff00000c5aee400
[   19.374927]  which belongs to the cache kmalloc-64 of size 64
[   19.375009] The buggy address is located 0 bytes to the right of
[   19.375009]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.375078] 
[   19.375100] The buggy address belongs to the physical page:
[   19.375135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.375279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.375384] page_type: f5(slab)
[   19.375425] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.375532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.375589] page dumped because: kasan: bad access detected
[   19.375654] 
[   19.375714] Memory state around the buggy address:
[   19.375794]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.375841]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.375887] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.375937]                                      ^
[   19.375972]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.376018]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.376060] ==================================================================
[   19.379599] ==================================================================
[   19.379648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.379695] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.379746] 
[   19.379776] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.379858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.379887] Hardware name: linux,dummy-virt (DT)
[   19.379918] Call trace:
[   19.379942]  show_stack+0x20/0x38 (C)
[   19.379989]  dump_stack_lvl+0x8c/0xd0
[   19.380037]  print_report+0x118/0x5d0
[   19.380084]  kasan_report+0xdc/0x128
[   19.380131]  kasan_check_range+0x100/0x1a8
[   19.380235]  __kasan_check_read+0x20/0x30
[   19.380290]  kasan_atomics_helper+0xdd4/0x4858
[   19.380345]  kasan_atomics+0x198/0x2e0
[   19.380397]  kunit_try_run_case+0x170/0x3f0
[   19.380452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.380524]  kthread+0x328/0x630
[   19.380584]  ret_from_fork+0x10/0x20
[   19.380715] 
[   19.380736] Allocated by task 266:
[   19.380861]  kasan_save_stack+0x3c/0x68
[   19.380920]  kasan_save_track+0x20/0x40
[   19.380974]  kasan_save_alloc_info+0x40/0x58
[   19.381017]  __kasan_kmalloc+0xd4/0xd8
[   19.381055]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.381111]  kasan_atomics+0xb8/0x2e0
[   19.381200]  kunit_try_run_case+0x170/0x3f0
[   19.381247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381300]  kthread+0x328/0x630
[   19.381345]  ret_from_fork+0x10/0x20
[   19.381385] 
[   19.381418] The buggy address belongs to the object at fff00000c5aee400
[   19.381418]  which belongs to the cache kmalloc-64 of size 64
[   19.381480] The buggy address is located 0 bytes to the right of
[   19.381480]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.381553] 
[   19.381574] The buggy address belongs to the physical page:
[   19.381608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.381662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.381711] page_type: f5(slab)
[   19.381961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.382099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.382142] page dumped because: kasan: bad access detected
[   19.382215] 
[   19.382249] Memory state around the buggy address:
[   19.382283]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.382328]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.382382] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.382423]                                      ^
[   19.383379]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.383430]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.383472] ==================================================================
[   19.376600] ==================================================================
[   19.376652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.376708] Read of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.376879] 
[   19.376921] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.377029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377060] Hardware name: linux,dummy-virt (DT)
[   19.377093] Call trace:
[   19.377116]  show_stack+0x20/0x38 (C)
[   19.377171]  dump_stack_lvl+0x8c/0xd0
[   19.377236]  print_report+0x118/0x5d0
[   19.377284]  kasan_report+0xdc/0x128
[   19.377333]  __asan_report_load4_noabort+0x20/0x30
[   19.377402]  kasan_atomics_helper+0x3e04/0x4858
[   19.377458]  kasan_atomics+0x198/0x2e0
[   19.377506]  kunit_try_run_case+0x170/0x3f0
[   19.377555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.377610]  kthread+0x328/0x630
[   19.377654]  ret_from_fork+0x10/0x20
[   19.377703] 
[   19.377722] Allocated by task 266:
[   19.377767]  kasan_save_stack+0x3c/0x68
[   19.377810]  kasan_save_track+0x20/0x40
[   19.377850]  kasan_save_alloc_info+0x40/0x58
[   19.377892]  __kasan_kmalloc+0xd4/0xd8
[   19.377930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.377971]  kasan_atomics+0xb8/0x2e0
[   19.378015]  kunit_try_run_case+0x170/0x3f0
[   19.378055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378101]  kthread+0x328/0x630
[   19.378134]  ret_from_fork+0x10/0x20
[   19.378173] 
[   19.378203] The buggy address belongs to the object at fff00000c5aee400
[   19.378203]  which belongs to the cache kmalloc-64 of size 64
[   19.378264] The buggy address is located 0 bytes to the right of
[   19.378264]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.378333] 
[   19.378354] The buggy address belongs to the physical page:
[   19.378388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.378449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.378499] page_type: f5(slab)
[   19.378537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.378590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.378632] page dumped because: kasan: bad access detected
[   19.378684] 
[   19.378704] Memory state around the buggy address:
[   19.378742]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.378795]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.379097] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.379157]                                      ^
[   19.379227]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379273]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379317] ==================================================================
[   19.438038] ==================================================================
[   19.438199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.438258] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.438318] 
[   19.438566] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.438907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.438958] Hardware name: linux,dummy-virt (DT)
[   19.439001] Call trace:
[   19.439026]  show_stack+0x20/0x38 (C)
[   19.439078]  dump_stack_lvl+0x8c/0xd0
[   19.439124]  print_report+0x118/0x5d0
[   19.439279]  kasan_report+0xdc/0x128
[   19.439331]  kasan_check_range+0x100/0x1a8
[   19.439409]  __kasan_check_write+0x20/0x30
[   19.439573]  kasan_atomics_helper+0x1128/0x4858
[   19.439717]  kasan_atomics+0x198/0x2e0
[   19.439768]  kunit_try_run_case+0x170/0x3f0
[   19.439817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.439872]  kthread+0x328/0x630
[   19.439914]  ret_from_fork+0x10/0x20
[   19.440299] 
[   19.440343] Allocated by task 266:
[   19.440423]  kasan_save_stack+0x3c/0x68
[   19.440744]  kasan_save_track+0x20/0x40
[   19.440836]  kasan_save_alloc_info+0x40/0x58
[   19.440993]  __kasan_kmalloc+0xd4/0xd8
[   19.441061]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.441103]  kasan_atomics+0xb8/0x2e0
[   19.441148]  kunit_try_run_case+0x170/0x3f0
[   19.441490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.441650]  kthread+0x328/0x630
[   19.441874]  ret_from_fork+0x10/0x20
[   19.441950] 
[   19.441972] The buggy address belongs to the object at fff00000c5aee400
[   19.441972]  which belongs to the cache kmalloc-64 of size 64
[   19.442195] The buggy address is located 0 bytes to the right of
[   19.442195]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.442309] 
[   19.442566] The buggy address belongs to the physical page:
[   19.442635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.442720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443200] page_type: f5(slab)
[   19.443252] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443360] page dumped because: kasan: bad access detected
[   19.444027] 
[   19.444062] Memory state around the buggy address:
[   19.444098]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444146]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444203] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.444246]                                      ^
[   19.444282]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444325]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444366] ==================================================================
[   19.543221] ==================================================================
[   19.543295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.543661] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.543820] 
[   19.543889] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.544059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.544173] Hardware name: linux,dummy-virt (DT)
[   19.544217] Call trace:
[   19.544241]  show_stack+0x20/0x38 (C)
[   19.544293]  dump_stack_lvl+0x8c/0xd0
[   19.544678]  print_report+0x118/0x5d0
[   19.544764]  kasan_report+0xdc/0x128
[   19.544976]  kasan_check_range+0x100/0x1a8
[   19.545172]  __kasan_check_write+0x20/0x30
[   19.545556]  kasan_atomics_helper+0x17ec/0x4858
[   19.545879]  kasan_atomics+0x198/0x2e0
[   19.545969]  kunit_try_run_case+0x170/0x3f0
[   19.546140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.546328]  kthread+0x328/0x630
[   19.546378]  ret_from_fork+0x10/0x20
[   19.546458] 
[   19.546504] Allocated by task 266:
[   19.546807]  kasan_save_stack+0x3c/0x68
[   19.546879]  kasan_save_track+0x20/0x40
[   19.547082]  kasan_save_alloc_info+0x40/0x58
[   19.547216]  __kasan_kmalloc+0xd4/0xd8
[   19.547386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.547493]  kasan_atomics+0xb8/0x2e0
[   19.547571]  kunit_try_run_case+0x170/0x3f0
[   19.547630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.547963]  kthread+0x328/0x630
[   19.548048]  ret_from_fork+0x10/0x20
[   19.548253] 
[   19.548279] The buggy address belongs to the object at fff00000c5aee400
[   19.548279]  which belongs to the cache kmalloc-64 of size 64
[   19.548353] The buggy address is located 0 bytes to the right of
[   19.548353]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.548422] 
[   19.548445] The buggy address belongs to the physical page:
[   19.548488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.548544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.548608] page_type: f5(slab)
[   19.548654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.548709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.548754] page dumped because: kasan: bad access detected
[   19.548799] 
[   19.548839] Memory state around the buggy address:
[   19.548873]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548933]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548995] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.549036]                                      ^
[   19.549071]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549117]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549156] ==================================================================
[   19.352353] ==================================================================
[   19.352427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.352490] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266
[   19.352617] 
[   19.352650] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.352741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.352770] Hardware name: linux,dummy-virt (DT)
[   19.352803] Call trace:
[   19.352992]  show_stack+0x20/0x38 (C)
[   19.353057]  dump_stack_lvl+0x8c/0xd0
[   19.353104]  print_report+0x118/0x5d0
[   19.353159]  kasan_report+0xdc/0x128
[   19.353218]  kasan_check_range+0x100/0x1a8
[   19.353269]  __kasan_check_write+0x20/0x30
[   19.353763]  kasan_atomics_helper+0xca0/0x4858
[   19.353839]  kasan_atomics+0x198/0x2e0
[   19.354152]  kunit_try_run_case+0x170/0x3f0
[   19.354498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.355334]  kasan_save_stack+0x3c/0x68
[   19.355411]  kasan_save_track+0x20/0x40
[   19.355563]  kasan_save_alloc_info+0x40/0x58
[   19.355638]  __kasan_kmalloc+0xd4/0xd8
[   19.356171]  kunit_try_run_case+0x170/0x3f0
[   19.356247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.356302]  kthread+0x328/0x630
[   19.356336]  ret_from_fork+0x10/0x20
[   19.356517] 
[   19.356545] The buggy address belongs to the object at fff00000c5aee400
[   19.356545]  which belongs to the cache kmalloc-64 of size 64
[   19.356610] The buggy address is located 0 bytes to the right of
[   19.356610]  allocated 48-byte region [fff00000c5aee400, fff00000c5aee430)
[   19.356856] 
[   19.356903] The buggy address belongs to the physical page:
[   19.357030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee
[   19.357115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.357445] page_type: f5(slab)
[   19.357537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.357679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.357757] page dumped because: kasan: bad access detected
[   19.357808] 
[   19.357829] Memory state around the buggy address:
[   19.357864]  fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.359267]  fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.359335] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.359379]                                      ^
[   19.359425]  fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.359471]  fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.359513] ==================================================================

[   16.178229] ==================================================================
[   16.179150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.180163] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.181037] 
[   16.181384] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.181604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.181624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.181650] Call Trace:
[   16.181714]  <TASK>
[   16.181735]  dump_stack_lvl+0x73/0xb0
[   16.181770]  print_report+0xd1/0x610
[   16.181796]  ? __virt_addr_valid+0x1db/0x2d0
[   16.181823]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.181847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.181872]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.181896]  kasan_report+0x141/0x180
[   16.181919]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.181947]  kasan_check_range+0x10c/0x1c0
[   16.181971]  __kasan_check_write+0x18/0x20
[   16.181993]  kasan_atomics_helper+0x1ce1/0x5450
[   16.182017]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.182041]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.182074]  kasan_atomics+0x1dc/0x310
[   16.182098]  ? __pfx_kasan_atomics+0x10/0x10
[   16.182124]  ? __pfx_read_tsc+0x10/0x10
[   16.182147]  ? ktime_get_ts64+0x86/0x230
[   16.182173]  kunit_try_run_case+0x1a5/0x480
[   16.182200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.182253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.182279]  ? __kthread_parkme+0x82/0x180
[   16.182301]  ? preempt_count_sub+0x50/0x80
[   16.182328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.182381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.182432]  kthread+0x337/0x6f0
[   16.182462]  ? trace_preempt_on+0x20/0xc0
[   16.182487]  ? __pfx_kthread+0x10/0x10
[   16.182509]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.182533]  ? calculate_sigpending+0x7b/0xa0
[   16.182559]  ? __pfx_kthread+0x10/0x10
[   16.182582]  ret_from_fork+0x116/0x1d0
[   16.182602]  ? __pfx_kthread+0x10/0x10
[   16.182625]  ret_from_fork_asm+0x1a/0x30
[   16.182658]  </TASK>
[   16.182669] 
[   16.197745] Allocated by task 283:
[   16.198196]  kasan_save_stack+0x45/0x70
[   16.198813]  kasan_save_track+0x18/0x40
[   16.199323]  kasan_save_alloc_info+0x3b/0x50
[   16.199938]  __kasan_kmalloc+0xb7/0xc0
[   16.200509]  __kmalloc_cache_noprof+0x189/0x420
[   16.201069]  kasan_atomics+0x95/0x310
[   16.201559]  kunit_try_run_case+0x1a5/0x480
[   16.201717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.201891]  kthread+0x337/0x6f0
[   16.202011]  ret_from_fork+0x116/0x1d0
[   16.202142]  ret_from_fork_asm+0x1a/0x30
[   16.202280] 
[   16.202355] The buggy address belongs to the object at ffff8881026d6200
[   16.202355]  which belongs to the cache kmalloc-64 of size 64
[   16.204004] The buggy address is located 0 bytes to the right of
[   16.204004]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.204867] 
[   16.205191] The buggy address belongs to the physical page:
[   16.205948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.206204] flags: 0x200000000000000(node=0|zone=2)
[   16.206373] page_type: f5(slab)
[   16.206935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.207789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.208483] page dumped because: kasan: bad access detected
[   16.208900] 
[   16.208974] Memory state around the buggy address:
[   16.209133]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.209350]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.209930] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.210628]                                      ^
[   16.211151]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.211817]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.212444] ==================================================================
[   16.428508] ==================================================================
[   16.429020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.429582] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.429921] 
[   16.430036] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.430084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.430097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.430120] Call Trace:
[   16.430139]  <TASK>
[   16.430157]  dump_stack_lvl+0x73/0xb0
[   16.430189]  print_report+0xd1/0x610
[   16.430214]  ? __virt_addr_valid+0x1db/0x2d0
[   16.430432]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.430471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.430497]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.430522]  kasan_report+0x141/0x180
[   16.430546]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.430575]  __asan_report_load8_noabort+0x18/0x20
[   16.430603]  kasan_atomics_helper+0x4fa5/0x5450
[   16.430628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.430653]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.430686]  kasan_atomics+0x1dc/0x310
[   16.430711]  ? __pfx_kasan_atomics+0x10/0x10
[   16.430738]  ? __pfx_read_tsc+0x10/0x10
[   16.430761]  ? ktime_get_ts64+0x86/0x230
[   16.430787]  kunit_try_run_case+0x1a5/0x480
[   16.430815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.430840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.430867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.430892]  ? __kthread_parkme+0x82/0x180
[   16.430914]  ? preempt_count_sub+0x50/0x80
[   16.430940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.430965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.430992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.431020]  kthread+0x337/0x6f0
[   16.431042]  ? trace_preempt_on+0x20/0xc0
[   16.431067]  ? __pfx_kthread+0x10/0x10
[   16.431089]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.431112]  ? calculate_sigpending+0x7b/0xa0
[   16.431138]  ? __pfx_kthread+0x10/0x10
[   16.431161]  ret_from_fork+0x116/0x1d0
[   16.431181]  ? __pfx_kthread+0x10/0x10
[   16.431203]  ret_from_fork_asm+0x1a/0x30
[   16.431236]  </TASK>
[   16.431248] 
[   16.440273] Allocated by task 283:
[   16.440446]  kasan_save_stack+0x45/0x70
[   16.441014]  kasan_save_track+0x18/0x40
[   16.441198]  kasan_save_alloc_info+0x3b/0x50
[   16.441487]  __kasan_kmalloc+0xb7/0xc0
[   16.441663]  __kmalloc_cache_noprof+0x189/0x420
[   16.441962]  kasan_atomics+0x95/0x310
[   16.442213]  kunit_try_run_case+0x1a5/0x480
[   16.442403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.442782]  kthread+0x337/0x6f0
[   16.442922]  ret_from_fork+0x116/0x1d0
[   16.443175]  ret_from_fork_asm+0x1a/0x30
[   16.443336] 
[   16.443549] The buggy address belongs to the object at ffff8881026d6200
[   16.443549]  which belongs to the cache kmalloc-64 of size 64
[   16.444139] The buggy address is located 0 bytes to the right of
[   16.444139]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.444890] 
[   16.444987] The buggy address belongs to the physical page:
[   16.445199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.445752] flags: 0x200000000000000(node=0|zone=2)
[   16.445974] page_type: f5(slab)
[   16.446098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.446597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.447034] page dumped because: kasan: bad access detected
[   16.447260] 
[   16.447350] Memory state around the buggy address:
[   16.447779]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448107]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448517] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.448786]                                      ^
[   16.449107]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.449500]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.449848] ==================================================================
[   15.234848] ==================================================================
[   15.235142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.235371] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.236046] 
[   15.236145] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.236194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.236207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.236230] Call Trace:
[   15.236573]  <TASK>
[   15.236597]  dump_stack_lvl+0x73/0xb0
[   15.236629]  print_report+0xd1/0x610
[   15.236654]  ? __virt_addr_valid+0x1db/0x2d0
[   15.236678]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.236717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.236742]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.236766]  kasan_report+0x141/0x180
[   15.236789]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.236818]  __asan_report_store4_noabort+0x1b/0x30
[   15.236845]  kasan_atomics_helper+0x4b3a/0x5450
[   15.236871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.236896]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.236930]  kasan_atomics+0x1dc/0x310
[   15.236954]  ? __pfx_kasan_atomics+0x10/0x10
[   15.236981]  ? __pfx_read_tsc+0x10/0x10
[   15.237003]  ? ktime_get_ts64+0x86/0x230
[   15.237029]  kunit_try_run_case+0x1a5/0x480
[   15.237056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.237082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.237109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.237135]  ? __kthread_parkme+0x82/0x180
[   15.237160]  ? preempt_count_sub+0x50/0x80
[   15.237186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.237213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.237240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.237267]  kthread+0x337/0x6f0
[   15.237288]  ? trace_preempt_on+0x20/0xc0
[   15.237313]  ? __pfx_kthread+0x10/0x10
[   15.237335]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.237358]  ? calculate_sigpending+0x7b/0xa0
[   15.237385]  ? __pfx_kthread+0x10/0x10
[   15.237408]  ret_from_fork+0x116/0x1d0
[   15.237460]  ? __pfx_kthread+0x10/0x10
[   15.237483]  ret_from_fork_asm+0x1a/0x30
[   15.237515]  </TASK>
[   15.237526] 
[   15.245576] Allocated by task 283:
[   15.245912]  kasan_save_stack+0x45/0x70
[   15.246199]  kasan_save_track+0x18/0x40
[   15.246394]  kasan_save_alloc_info+0x3b/0x50
[   15.246712]  __kasan_kmalloc+0xb7/0xc0
[   15.247136]  __kmalloc_cache_noprof+0x189/0x420
[   15.247572]  kasan_atomics+0x95/0x310
[   15.247759]  kunit_try_run_case+0x1a5/0x480
[   15.247964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.248211]  kthread+0x337/0x6f0
[   15.248380]  ret_from_fork+0x116/0x1d0
[   15.248572]  ret_from_fork_asm+0x1a/0x30
[   15.248763] 
[   15.248854] The buggy address belongs to the object at ffff8881026d6200
[   15.248854]  which belongs to the cache kmalloc-64 of size 64
[   15.249193] The buggy address is located 0 bytes to the right of
[   15.249193]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.249555] 
[   15.249627] The buggy address belongs to the physical page:
[   15.249959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.250403] flags: 0x200000000000000(node=0|zone=2)
[   15.250655] page_type: f5(slab)
[   15.250829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.251218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.251741] page dumped because: kasan: bad access detected
[   15.252194] 
[   15.252295] Memory state around the buggy address:
[   15.252649]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.253010]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.253230] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.253503]                                      ^
[   15.253956]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254364]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.255072] ==================================================================
[   15.937481] ==================================================================
[   15.938410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.939073] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.939362] 
[   15.939566] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.939619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.939633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.939864] Call Trace:
[   15.939887]  <TASK>
[   15.939909]  dump_stack_lvl+0x73/0xb0
[   15.939943]  print_report+0xd1/0x610
[   15.939968]  ? __virt_addr_valid+0x1db/0x2d0
[   15.939996]  ? kasan_atomics_helper+0x164f/0x5450
[   15.940020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.940046]  ? kasan_atomics_helper+0x164f/0x5450
[   15.940071]  kasan_report+0x141/0x180
[   15.940096]  ? kasan_atomics_helper+0x164f/0x5450
[   15.940125]  kasan_check_range+0x10c/0x1c0
[   15.940151]  __kasan_check_write+0x18/0x20
[   15.940173]  kasan_atomics_helper+0x164f/0x5450
[   15.940198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.940224]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.940257]  kasan_atomics+0x1dc/0x310
[   15.940360]  ? __pfx_kasan_atomics+0x10/0x10
[   15.940389]  ? __pfx_read_tsc+0x10/0x10
[   15.940424]  ? ktime_get_ts64+0x86/0x230
[   15.940464]  kunit_try_run_case+0x1a5/0x480
[   15.940493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.940519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.940546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.940572]  ? __kthread_parkme+0x82/0x180
[   15.940597]  ? preempt_count_sub+0x50/0x80
[   15.940624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.940651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.940678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.940706]  kthread+0x337/0x6f0
[   15.940727]  ? trace_preempt_on+0x20/0xc0
[   15.940753]  ? __pfx_kthread+0x10/0x10
[   15.940776]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.940800]  ? calculate_sigpending+0x7b/0xa0
[   15.940827]  ? __pfx_kthread+0x10/0x10
[   15.940852]  ret_from_fork+0x116/0x1d0
[   15.940873]  ? __pfx_kthread+0x10/0x10
[   15.940896]  ret_from_fork_asm+0x1a/0x30
[   15.940930]  </TASK>
[   15.940941] 
[   15.950525] Allocated by task 283:
[   15.950819]  kasan_save_stack+0x45/0x70
[   15.951079]  kasan_save_track+0x18/0x40
[   15.951245]  kasan_save_alloc_info+0x3b/0x50
[   15.951562]  __kasan_kmalloc+0xb7/0xc0
[   15.951803]  __kmalloc_cache_noprof+0x189/0x420
[   15.952121]  kasan_atomics+0x95/0x310
[   15.952425]  kunit_try_run_case+0x1a5/0x480
[   15.952620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.952987]  kthread+0x337/0x6f0
[   15.953122]  ret_from_fork+0x116/0x1d0
[   15.953313]  ret_from_fork_asm+0x1a/0x30
[   15.953509] 
[   15.953797] The buggy address belongs to the object at ffff8881026d6200
[   15.953797]  which belongs to the cache kmalloc-64 of size 64
[   15.954305] The buggy address is located 0 bytes to the right of
[   15.954305]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.955062] 
[   15.955165] The buggy address belongs to the physical page:
[   15.955360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.955931] flags: 0x200000000000000(node=0|zone=2)
[   15.956217] page_type: f5(slab)
[   15.956372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.956856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.957244] page dumped because: kasan: bad access detected
[   15.957589] 
[   15.957686] Memory state around the buggy address:
[   15.957880]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.958326]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.959192] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.959520]                                      ^
[   15.959753]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960047]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960349] ==================================================================
[   16.233973] ==================================================================
[   16.234306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.234636] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.234971] 
[   16.235103] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.235188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.235201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.235224] Call Trace:
[   16.235255]  <TASK>
[   16.235275]  dump_stack_lvl+0x73/0xb0
[   16.235305]  print_report+0xd1/0x610
[   16.235330]  ? __virt_addr_valid+0x1db/0x2d0
[   16.235355]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.235378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.235404]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.235427]  kasan_report+0x141/0x180
[   16.235462]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.235491]  kasan_check_range+0x10c/0x1c0
[   16.235517]  __kasan_check_write+0x18/0x20
[   16.235537]  kasan_atomics_helper+0x1e12/0x5450
[   16.235562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.235587]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.235619]  kasan_atomics+0x1dc/0x310
[   16.235644]  ? __pfx_kasan_atomics+0x10/0x10
[   16.235670]  ? __pfx_read_tsc+0x10/0x10
[   16.235692]  ? ktime_get_ts64+0x86/0x230
[   16.235719]  kunit_try_run_case+0x1a5/0x480
[   16.235747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.235772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.235799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.235825]  ? __kthread_parkme+0x82/0x180
[   16.235847]  ? preempt_count_sub+0x50/0x80
[   16.235873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.235909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.235936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.235963]  kthread+0x337/0x6f0
[   16.235984]  ? trace_preempt_on+0x20/0xc0
[   16.236010]  ? __pfx_kthread+0x10/0x10
[   16.236032]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.236077]  ? calculate_sigpending+0x7b/0xa0
[   16.236103]  ? __pfx_kthread+0x10/0x10
[   16.236140]  ret_from_fork+0x116/0x1d0
[   16.236161]  ? __pfx_kthread+0x10/0x10
[   16.236182]  ret_from_fork_asm+0x1a/0x30
[   16.236216]  </TASK>
[   16.236227] 
[   16.244310] Allocated by task 283:
[   16.244538]  kasan_save_stack+0x45/0x70
[   16.244786]  kasan_save_track+0x18/0x40
[   16.244978]  kasan_save_alloc_info+0x3b/0x50
[   16.245196]  __kasan_kmalloc+0xb7/0xc0
[   16.245393]  __kmalloc_cache_noprof+0x189/0x420
[   16.245758]  kasan_atomics+0x95/0x310
[   16.245894]  kunit_try_run_case+0x1a5/0x480
[   16.246041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.246217]  kthread+0x337/0x6f0
[   16.246563]  ret_from_fork+0x116/0x1d0
[   16.246752]  ret_from_fork_asm+0x1a/0x30
[   16.246972] 
[   16.247093] The buggy address belongs to the object at ffff8881026d6200
[   16.247093]  which belongs to the cache kmalloc-64 of size 64
[   16.247791] The buggy address is located 0 bytes to the right of
[   16.247791]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.248264] 
[   16.248347] The buggy address belongs to the physical page:
[   16.248683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.249046] flags: 0x200000000000000(node=0|zone=2)
[   16.249283] page_type: f5(slab)
[   16.249445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.249797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.250151] page dumped because: kasan: bad access detected
[   16.250405] 
[   16.250562] Memory state around the buggy address:
[   16.250789]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.251024]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.251241] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.251599]                                      ^
[   16.251825]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.252143]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.252596] ==================================================================
[   16.325162] ==================================================================
[   16.325849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.326188] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.326442] 
[   16.326570] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.326627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.326640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.326674] Call Trace:
[   16.326692]  <TASK>
[   16.326710]  dump_stack_lvl+0x73/0xb0
[   16.326740]  print_report+0xd1/0x610
[   16.326765]  ? __virt_addr_valid+0x1db/0x2d0
[   16.326790]  ? kasan_atomics_helper+0x2006/0x5450
[   16.326822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.326847]  ? kasan_atomics_helper+0x2006/0x5450
[   16.326881]  kasan_report+0x141/0x180
[   16.326904]  ? kasan_atomics_helper+0x2006/0x5450
[   16.326933]  kasan_check_range+0x10c/0x1c0
[   16.326958]  __kasan_check_write+0x18/0x20
[   16.326979]  kasan_atomics_helper+0x2006/0x5450
[   16.327004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.327029]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.327061]  kasan_atomics+0x1dc/0x310
[   16.327085]  ? __pfx_kasan_atomics+0x10/0x10
[   16.327111]  ? __pfx_read_tsc+0x10/0x10
[   16.327134]  ? ktime_get_ts64+0x86/0x230
[   16.327159]  kunit_try_run_case+0x1a5/0x480
[   16.327187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.327220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.327246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.327272]  ? __kthread_parkme+0x82/0x180
[   16.327305]  ? preempt_count_sub+0x50/0x80
[   16.327330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.327356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.327389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.327417]  kthread+0x337/0x6f0
[   16.327437]  ? trace_preempt_on+0x20/0xc0
[   16.327476]  ? __pfx_kthread+0x10/0x10
[   16.327508]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.327532]  ? calculate_sigpending+0x7b/0xa0
[   16.327558]  ? __pfx_kthread+0x10/0x10
[   16.327580]  ret_from_fork+0x116/0x1d0
[   16.327610]  ? __pfx_kthread+0x10/0x10
[   16.327634]  ret_from_fork_asm+0x1a/0x30
[   16.327667]  </TASK>
[   16.327692] 
[   16.335134] Allocated by task 283:
[   16.335318]  kasan_save_stack+0x45/0x70
[   16.335671]  kasan_save_track+0x18/0x40
[   16.335864]  kasan_save_alloc_info+0x3b/0x50
[   16.336075]  __kasan_kmalloc+0xb7/0xc0
[   16.336257]  __kmalloc_cache_noprof+0x189/0x420
[   16.336430]  kasan_atomics+0x95/0x310
[   16.336646]  kunit_try_run_case+0x1a5/0x480
[   16.336843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.337079]  kthread+0x337/0x6f0
[   16.337230]  ret_from_fork+0x116/0x1d0
[   16.337462]  ret_from_fork_asm+0x1a/0x30
[   16.337623] 
[   16.337741] The buggy address belongs to the object at ffff8881026d6200
[   16.337741]  which belongs to the cache kmalloc-64 of size 64
[   16.338110] The buggy address is located 0 bytes to the right of
[   16.338110]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.338795] 
[   16.338870] The buggy address belongs to the physical page:
[   16.339124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.339483] flags: 0x200000000000000(node=0|zone=2)
[   16.339713] page_type: f5(slab)
[   16.339904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.340230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.340588] page dumped because: kasan: bad access detected
[   16.340811] 
[   16.340925] Memory state around the buggy address:
[   16.341093]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.341308]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.341531] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.341767]                                      ^
[   16.342020]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.342334]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.342968] ==================================================================
[   15.179673] ==================================================================
[   15.179976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.180278] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.180630] 
[   15.180749] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.180796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.180809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.180832] Call Trace:
[   15.180845]  <TASK>
[   15.180862]  dump_stack_lvl+0x73/0xb0
[   15.180908]  print_report+0xd1/0x610
[   15.180933]  ? __virt_addr_valid+0x1db/0x2d0
[   15.180970]  ? kasan_atomics_helper+0x3df/0x5450
[   15.180993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.181017]  ? kasan_atomics_helper+0x3df/0x5450
[   15.181051]  kasan_report+0x141/0x180
[   15.181074]  ? kasan_atomics_helper+0x3df/0x5450
[   15.181111]  kasan_check_range+0x10c/0x1c0
[   15.181136]  __kasan_check_read+0x15/0x20
[   15.181157]  kasan_atomics_helper+0x3df/0x5450
[   15.181191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.181216]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.181249]  kasan_atomics+0x1dc/0x310
[   15.181273]  ? __pfx_kasan_atomics+0x10/0x10
[   15.181301]  ? __pfx_read_tsc+0x10/0x10
[   15.181323]  ? ktime_get_ts64+0x86/0x230
[   15.181348]  kunit_try_run_case+0x1a5/0x480
[   15.181375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.181437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.181480]  ? __kthread_parkme+0x82/0x180
[   15.181503]  ? preempt_count_sub+0x50/0x80
[   15.181530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.181619]  kthread+0x337/0x6f0
[   15.181641]  ? trace_preempt_on+0x20/0xc0
[   15.181665]  ? __pfx_kthread+0x10/0x10
[   15.181687]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.181710]  ? calculate_sigpending+0x7b/0xa0
[   15.181737]  ? __pfx_kthread+0x10/0x10
[   15.181759]  ret_from_fork+0x116/0x1d0
[   15.181780]  ? __pfx_kthread+0x10/0x10
[   15.181801]  ret_from_fork_asm+0x1a/0x30
[   15.181834]  </TASK>
[   15.181844] 
[   15.189123] Allocated by task 283:
[   15.189309]  kasan_save_stack+0x45/0x70
[   15.189543]  kasan_save_track+0x18/0x40
[   15.189742]  kasan_save_alloc_info+0x3b/0x50
[   15.190187]  __kasan_kmalloc+0xb7/0xc0
[   15.190396]  __kmalloc_cache_noprof+0x189/0x420
[   15.190677]  kasan_atomics+0x95/0x310
[   15.190857]  kunit_try_run_case+0x1a5/0x480
[   15.191005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.191197]  kthread+0x337/0x6f0
[   15.191367]  ret_from_fork+0x116/0x1d0
[   15.191615]  ret_from_fork_asm+0x1a/0x30
[   15.191811] 
[   15.191908] The buggy address belongs to the object at ffff8881026d6200
[   15.191908]  which belongs to the cache kmalloc-64 of size 64
[   15.192405] The buggy address is located 0 bytes to the right of
[   15.192405]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.192937] 
[   15.193036] The buggy address belongs to the physical page:
[   15.193270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.193705] flags: 0x200000000000000(node=0|zone=2)
[   15.193888] page_type: f5(slab)
[   15.194011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.194245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.194589] page dumped because: kasan: bad access detected
[   15.194839] 
[   15.194931] Memory state around the buggy address:
[   15.195151]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.195490]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.195706] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.195919]                                      ^
[   15.196107]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.196462]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.196804] ==================================================================
[   15.731711] ==================================================================
[   15.732064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.732416] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.732776] 
[   15.732899] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.732946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.732959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.732993] Call Trace:
[   15.733012]  <TASK>
[   15.733031]  dump_stack_lvl+0x73/0xb0
[   15.733072]  print_report+0xd1/0x610
[   15.733098]  ? __virt_addr_valid+0x1db/0x2d0
[   15.733124]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.733157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.733183]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.733208]  kasan_report+0x141/0x180
[   15.733231]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.733260]  kasan_check_range+0x10c/0x1c0
[   15.733286]  __kasan_check_write+0x18/0x20
[   15.733308]  kasan_atomics_helper+0x12e6/0x5450
[   15.733333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.733358]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.733411]  kasan_atomics+0x1dc/0x310
[   15.733443]  ? __pfx_kasan_atomics+0x10/0x10
[   15.733484]  ? __pfx_read_tsc+0x10/0x10
[   15.733507]  ? ktime_get_ts64+0x86/0x230
[   15.733534]  kunit_try_run_case+0x1a5/0x480
[   15.733562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.733588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.733615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.733641]  ? __kthread_parkme+0x82/0x180
[   15.733664]  ? preempt_count_sub+0x50/0x80
[   15.733690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.733717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.733743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.733771]  kthread+0x337/0x6f0
[   15.733792]  ? trace_preempt_on+0x20/0xc0
[   15.733818]  ? __pfx_kthread+0x10/0x10
[   15.733840]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.733864]  ? calculate_sigpending+0x7b/0xa0
[   15.733891]  ? __pfx_kthread+0x10/0x10
[   15.733914]  ret_from_fork+0x116/0x1d0
[   15.733935]  ? __pfx_kthread+0x10/0x10
[   15.733958]  ret_from_fork_asm+0x1a/0x30
[   15.733990]  </TASK>
[   15.734002] 
[   15.741216] Allocated by task 283:
[   15.741420]  kasan_save_stack+0x45/0x70
[   15.741632]  kasan_save_track+0x18/0x40
[   15.741826]  kasan_save_alloc_info+0x3b/0x50
[   15.741977]  __kasan_kmalloc+0xb7/0xc0
[   15.742112]  __kmalloc_cache_noprof+0x189/0x420
[   15.742336]  kasan_atomics+0x95/0x310
[   15.742578]  kunit_try_run_case+0x1a5/0x480
[   15.742811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743065]  kthread+0x337/0x6f0
[   15.743224]  ret_from_fork+0x116/0x1d0
[   15.743432]  ret_from_fork_asm+0x1a/0x30
[   15.743644] 
[   15.743733] The buggy address belongs to the object at ffff8881026d6200
[   15.743733]  which belongs to the cache kmalloc-64 of size 64
[   15.744211] The buggy address is located 0 bytes to the right of
[   15.744211]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.744622] 
[   15.744700] The buggy address belongs to the physical page:
[   15.744958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.745309] flags: 0x200000000000000(node=0|zone=2)
[   15.745572] page_type: f5(slab)
[   15.745741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.746079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.746417] page dumped because: kasan: bad access detected
[   15.746631] 
[   15.746702] Memory state around the buggy address:
[   15.746859]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.747146]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.747527] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.748268]                                      ^
[   15.750134]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.751974]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.753018] ==================================================================
[   16.343688] ==================================================================
[   16.344051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.344398] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.344796] 
[   16.344890] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.344939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.344952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.344975] Call Trace:
[   16.344994]  <TASK>
[   16.345013]  dump_stack_lvl+0x73/0xb0
[   16.345044]  print_report+0xd1/0x610
[   16.345068]  ? __virt_addr_valid+0x1db/0x2d0
[   16.345092]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.345116]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.345142]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.345165]  kasan_report+0x141/0x180
[   16.345188]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.345216]  __asan_report_load8_noabort+0x18/0x20
[   16.345242]  kasan_atomics_helper+0x4f98/0x5450
[   16.345266]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.345291]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.345323]  kasan_atomics+0x1dc/0x310
[   16.345347]  ? __pfx_kasan_atomics+0x10/0x10
[   16.345373]  ? __pfx_read_tsc+0x10/0x10
[   16.345396]  ? ktime_get_ts64+0x86/0x230
[   16.345431]  kunit_try_run_case+0x1a5/0x480
[   16.345478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.345541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.345567]  ? __kthread_parkme+0x82/0x180
[   16.345599]  ? preempt_count_sub+0x50/0x80
[   16.345624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.345686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.345713]  kthread+0x337/0x6f0
[   16.345734]  ? trace_preempt_on+0x20/0xc0
[   16.345759]  ? __pfx_kthread+0x10/0x10
[   16.345781]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.345804]  ? calculate_sigpending+0x7b/0xa0
[   16.345830]  ? __pfx_kthread+0x10/0x10
[   16.345852]  ret_from_fork+0x116/0x1d0
[   16.345873]  ? __pfx_kthread+0x10/0x10
[   16.345894]  ret_from_fork_asm+0x1a/0x30
[   16.345927]  </TASK>
[   16.345938] 
[   16.353229] Allocated by task 283:
[   16.353420]  kasan_save_stack+0x45/0x70
[   16.353858]  kasan_save_track+0x18/0x40
[   16.354066]  kasan_save_alloc_info+0x3b/0x50
[   16.354281]  __kasan_kmalloc+0xb7/0xc0
[   16.354496]  __kmalloc_cache_noprof+0x189/0x420
[   16.354822]  kasan_atomics+0x95/0x310
[   16.355021]  kunit_try_run_case+0x1a5/0x480
[   16.355174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.355352]  kthread+0x337/0x6f0
[   16.355521]  ret_from_fork+0x116/0x1d0
[   16.355712]  ret_from_fork_asm+0x1a/0x30
[   16.355949] 
[   16.356079] The buggy address belongs to the object at ffff8881026d6200
[   16.356079]  which belongs to the cache kmalloc-64 of size 64
[   16.356940] The buggy address is located 0 bytes to the right of
[   16.356940]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.357426] 
[   16.357514] The buggy address belongs to the physical page:
[   16.357689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.358056] flags: 0x200000000000000(node=0|zone=2)
[   16.358352] page_type: f5(slab)
[   16.358530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.358877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.359222] page dumped because: kasan: bad access detected
[   16.359445] 
[   16.359584] Memory state around the buggy address:
[   16.359800]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.360112]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.360366] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.360905]                                      ^
[   16.361114]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.361332]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.361638] ==================================================================
[   16.304546] ==================================================================
[   16.305336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.306119] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.306569] 
[   16.306770] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.306821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.306844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.306868] Call Trace:
[   16.306889]  <TASK>
[   16.306921]  dump_stack_lvl+0x73/0xb0
[   16.306952]  print_report+0xd1/0x610
[   16.306977]  ? __virt_addr_valid+0x1db/0x2d0
[   16.307002]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.307025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.307051]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.307075]  kasan_report+0x141/0x180
[   16.307097]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.307126]  __asan_report_load8_noabort+0x18/0x20
[   16.307152]  kasan_atomics_helper+0x4f71/0x5450
[   16.307177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.307201]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.307233]  kasan_atomics+0x1dc/0x310
[   16.307259]  ? __pfx_kasan_atomics+0x10/0x10
[   16.307285]  ? __pfx_read_tsc+0x10/0x10
[   16.307308]  ? ktime_get_ts64+0x86/0x230
[   16.307334]  kunit_try_run_case+0x1a5/0x480
[   16.307361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.307386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.307422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.307448]  ? __kthread_parkme+0x82/0x180
[   16.307480]  ? preempt_count_sub+0x50/0x80
[   16.307506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.307532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.307558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.307585]  kthread+0x337/0x6f0
[   16.307605]  ? trace_preempt_on+0x20/0xc0
[   16.307631]  ? __pfx_kthread+0x10/0x10
[   16.307653]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.307676]  ? calculate_sigpending+0x7b/0xa0
[   16.307702]  ? __pfx_kthread+0x10/0x10
[   16.307725]  ret_from_fork+0x116/0x1d0
[   16.307745]  ? __pfx_kthread+0x10/0x10
[   16.307767]  ret_from_fork_asm+0x1a/0x30
[   16.307800]  </TASK>
[   16.307811] 
[   16.316868] Allocated by task 283:
[   16.317016]  kasan_save_stack+0x45/0x70
[   16.317224]  kasan_save_track+0x18/0x40
[   16.317375]  kasan_save_alloc_info+0x3b/0x50
[   16.317693]  __kasan_kmalloc+0xb7/0xc0
[   16.317853]  __kmalloc_cache_noprof+0x189/0x420
[   16.318012]  kasan_atomics+0x95/0x310
[   16.318147]  kunit_try_run_case+0x1a5/0x480
[   16.318382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.318646]  kthread+0x337/0x6f0
[   16.318814]  ret_from_fork+0x116/0x1d0
[   16.318946]  ret_from_fork_asm+0x1a/0x30
[   16.319100] 
[   16.319198] The buggy address belongs to the object at ffff8881026d6200
[   16.319198]  which belongs to the cache kmalloc-64 of size 64
[   16.319932] The buggy address is located 0 bytes to the right of
[   16.319932]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.320433] 
[   16.320541] The buggy address belongs to the physical page:
[   16.320786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.321130] flags: 0x200000000000000(node=0|zone=2)
[   16.321364] page_type: f5(slab)
[   16.321581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.321908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.322220] page dumped because: kasan: bad access detected
[   16.322448] 
[   16.322528] Memory state around the buggy address:
[   16.322748]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.323084]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.323349] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.323814]                                      ^
[   16.324015]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.324230]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.324526] ==================================================================
[   16.272015] ==================================================================
[   16.272290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.272671] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.273166] 
[   16.273290] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.273337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.273350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.273372] Call Trace:
[   16.273392]  <TASK>
[   16.273412]  dump_stack_lvl+0x73/0xb0
[   16.273440]  print_report+0xd1/0x610
[   16.273481]  ? __virt_addr_valid+0x1db/0x2d0
[   16.273506]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.273529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.273556]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.273579]  kasan_report+0x141/0x180
[   16.273603]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.273631]  kasan_check_range+0x10c/0x1c0
[   16.273656]  __kasan_check_write+0x18/0x20
[   16.273678]  kasan_atomics_helper+0x1f43/0x5450
[   16.273703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.273727]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.273760]  kasan_atomics+0x1dc/0x310
[   16.273784]  ? __pfx_kasan_atomics+0x10/0x10
[   16.273810]  ? __pfx_read_tsc+0x10/0x10
[   16.273833]  ? ktime_get_ts64+0x86/0x230
[   16.273858]  kunit_try_run_case+0x1a5/0x480
[   16.273885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.273910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.273936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.273961]  ? __kthread_parkme+0x82/0x180
[   16.273984]  ? preempt_count_sub+0x50/0x80
[   16.274009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.274883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.274918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.274946]  kthread+0x337/0x6f0
[   16.275017]  ? trace_preempt_on+0x20/0xc0
[   16.275069]  ? __pfx_kthread+0x10/0x10
[   16.275119]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.275143]  ? calculate_sigpending+0x7b/0xa0
[   16.275195]  ? __pfx_kthread+0x10/0x10
[   16.275218]  ret_from_fork+0x116/0x1d0
[   16.275238]  ? __pfx_kthread+0x10/0x10
[   16.275261]  ret_from_fork_asm+0x1a/0x30
[   16.275295]  </TASK>
[   16.275308] 
[   16.290239] Allocated by task 283:
[   16.290755]  kasan_save_stack+0x45/0x70
[   16.291302]  kasan_save_track+0x18/0x40
[   16.291852]  kasan_save_alloc_info+0x3b/0x50
[   16.292519]  __kasan_kmalloc+0xb7/0xc0
[   16.292906]  __kmalloc_cache_noprof+0x189/0x420
[   16.293075]  kasan_atomics+0x95/0x310
[   16.293215]  kunit_try_run_case+0x1a5/0x480
[   16.293365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.293561]  kthread+0x337/0x6f0
[   16.293685]  ret_from_fork+0x116/0x1d0
[   16.293822]  ret_from_fork_asm+0x1a/0x30
[   16.293964] 
[   16.294040] The buggy address belongs to the object at ffff8881026d6200
[   16.294040]  which belongs to the cache kmalloc-64 of size 64
[   16.294400] The buggy address is located 0 bytes to the right of
[   16.294400]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.295507] 
[   16.295668] The buggy address belongs to the physical page:
[   16.296209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.297046] flags: 0x200000000000000(node=0|zone=2)
[   16.297534] page_type: f5(slab)
[   16.297847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.298548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.299195] page dumped because: kasan: bad access detected
[   16.299718] 
[   16.299877] Memory state around the buggy address:
[   16.300328]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.300978]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.301694] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.302203]                                      ^
[   16.302360]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.302728]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.303365] ==================================================================
[   15.695254] ==================================================================
[   15.696015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.696459] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.696755] 
[   15.696850] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.696897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.696910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.696934] Call Trace:
[   15.696954]  <TASK>
[   15.696972]  dump_stack_lvl+0x73/0xb0
[   15.697004]  print_report+0xd1/0x610
[   15.697041]  ? __virt_addr_valid+0x1db/0x2d0
[   15.697067]  ? kasan_atomics_helper+0x1217/0x5450
[   15.697092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.697131]  ? kasan_atomics_helper+0x1217/0x5450
[   15.697156]  kasan_report+0x141/0x180
[   15.697180]  ? kasan_atomics_helper+0x1217/0x5450
[   15.697220]  kasan_check_range+0x10c/0x1c0
[   15.697245]  __kasan_check_write+0x18/0x20
[   15.697278]  kasan_atomics_helper+0x1217/0x5450
[   15.697304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.697329]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.697373]  kasan_atomics+0x1dc/0x310
[   15.697421]  ? __pfx_kasan_atomics+0x10/0x10
[   15.697463]  ? __pfx_read_tsc+0x10/0x10
[   15.697487]  ? ktime_get_ts64+0x86/0x230
[   15.697515]  kunit_try_run_case+0x1a5/0x480
[   15.697542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.697576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.697602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.697629]  ? __kthread_parkme+0x82/0x180
[   15.697663]  ? preempt_count_sub+0x50/0x80
[   15.697690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.697717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.697744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.697772]  kthread+0x337/0x6f0
[   15.697793]  ? trace_preempt_on+0x20/0xc0
[   15.697819]  ? __pfx_kthread+0x10/0x10
[   15.697841]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.697865]  ? calculate_sigpending+0x7b/0xa0
[   15.697892]  ? __pfx_kthread+0x10/0x10
[   15.697916]  ret_from_fork+0x116/0x1d0
[   15.697936]  ? __pfx_kthread+0x10/0x10
[   15.697959]  ret_from_fork_asm+0x1a/0x30
[   15.697993]  </TASK>
[   15.698005] 
[   15.705291] Allocated by task 283:
[   15.705526]  kasan_save_stack+0x45/0x70
[   15.705757]  kasan_save_track+0x18/0x40
[   15.705949]  kasan_save_alloc_info+0x3b/0x50
[   15.706190]  __kasan_kmalloc+0xb7/0xc0
[   15.706347]  __kmalloc_cache_noprof+0x189/0x420
[   15.706609]  kasan_atomics+0x95/0x310
[   15.706814]  kunit_try_run_case+0x1a5/0x480
[   15.707025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.707275]  kthread+0x337/0x6f0
[   15.707480]  ret_from_fork+0x116/0x1d0
[   15.707657]  ret_from_fork_asm+0x1a/0x30
[   15.707854] 
[   15.707947] The buggy address belongs to the object at ffff8881026d6200
[   15.707947]  which belongs to the cache kmalloc-64 of size 64
[   15.708315] The buggy address is located 0 bytes to the right of
[   15.708315]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.708717] 
[   15.708836] The buggy address belongs to the physical page:
[   15.709088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.709480] flags: 0x200000000000000(node=0|zone=2)
[   15.709718] page_type: f5(slab)
[   15.709886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.710228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.710562] page dumped because: kasan: bad access detected
[   15.710735] 
[   15.710805] Memory state around the buggy address:
[   15.710989]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.711335]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.711712] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.712027]                                      ^
[   15.712243]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.712589]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.712895] ==================================================================
[   15.640483] ==================================================================
[   15.640859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.641200] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.641556] 
[   15.641698] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.641747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.641760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.641784] Call Trace:
[   15.641804]  <TASK>
[   15.641824]  dump_stack_lvl+0x73/0xb0
[   15.641853]  print_report+0xd1/0x610
[   15.641889]  ? __virt_addr_valid+0x1db/0x2d0
[   15.641915]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.641938]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.641975]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.641999]  kasan_report+0x141/0x180
[   15.642023]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.642061]  __asan_report_load4_noabort+0x18/0x20
[   15.642088]  kasan_atomics_helper+0x4a1c/0x5450
[   15.642113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.642148]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.642181]  kasan_atomics+0x1dc/0x310
[   15.642215]  ? __pfx_kasan_atomics+0x10/0x10
[   15.642241]  ? __pfx_read_tsc+0x10/0x10
[   15.642264]  ? ktime_get_ts64+0x86/0x230
[   15.642300]  kunit_try_run_case+0x1a5/0x480
[   15.642327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.642352]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.642379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.642430]  ? __kthread_parkme+0x82/0x180
[   15.642468]  ? preempt_count_sub+0x50/0x80
[   15.642495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.642523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.642549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.642586]  kthread+0x337/0x6f0
[   15.642608]  ? trace_preempt_on+0x20/0xc0
[   15.642632]  ? __pfx_kthread+0x10/0x10
[   15.642665]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.642688]  ? calculate_sigpending+0x7b/0xa0
[   15.642715]  ? __pfx_kthread+0x10/0x10
[   15.642738]  ret_from_fork+0x116/0x1d0
[   15.642767]  ? __pfx_kthread+0x10/0x10
[   15.642789]  ret_from_fork_asm+0x1a/0x30
[   15.642823]  </TASK>
[   15.642844] 
[   15.650372] Allocated by task 283:
[   15.650537]  kasan_save_stack+0x45/0x70
[   15.650685]  kasan_save_track+0x18/0x40
[   15.650823]  kasan_save_alloc_info+0x3b/0x50
[   15.650998]  __kasan_kmalloc+0xb7/0xc0
[   15.651186]  __kmalloc_cache_noprof+0x189/0x420
[   15.651463]  kasan_atomics+0x95/0x310
[   15.651656]  kunit_try_run_case+0x1a5/0x480
[   15.651863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.652118]  kthread+0x337/0x6f0
[   15.652289]  ret_from_fork+0x116/0x1d0
[   15.652471]  ret_from_fork_asm+0x1a/0x30
[   15.652617] 
[   15.652689] The buggy address belongs to the object at ffff8881026d6200
[   15.652689]  which belongs to the cache kmalloc-64 of size 64
[   15.653188] The buggy address is located 0 bytes to the right of
[   15.653188]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.653785] 
[   15.653887] The buggy address belongs to the physical page:
[   15.654113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.654486] flags: 0x200000000000000(node=0|zone=2)
[   15.654708] page_type: f5(slab)
[   15.654895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.655211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.655571] page dumped because: kasan: bad access detected
[   15.655809] 
[   15.655903] Memory state around the buggy address:
[   15.656121]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.656410]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.656638] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.656999]                                      ^
[   15.657272]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.657640]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.657927] ==================================================================
[   15.838097] ==================================================================
[   15.838954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.839647] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.839910] 
[   15.840029] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.840091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.840105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.840129] Call Trace:
[   15.840149]  <TASK>
[   15.840168]  dump_stack_lvl+0x73/0xb0
[   15.840200]  print_report+0xd1/0x610
[   15.840226]  ? __virt_addr_valid+0x1db/0x2d0
[   15.840252]  ? kasan_atomics_helper+0x1467/0x5450
[   15.840276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.840308]  ? kasan_atomics_helper+0x1467/0x5450
[   15.840332]  kasan_report+0x141/0x180
[   15.840378]  ? kasan_atomics_helper+0x1467/0x5450
[   15.840428]  kasan_check_range+0x10c/0x1c0
[   15.840463]  __kasan_check_write+0x18/0x20
[   15.840485]  kasan_atomics_helper+0x1467/0x5450
[   15.840510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.840535]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.840568]  kasan_atomics+0x1dc/0x310
[   15.840594]  ? __pfx_kasan_atomics+0x10/0x10
[   15.840620]  ? __pfx_read_tsc+0x10/0x10
[   15.840644]  ? ktime_get_ts64+0x86/0x230
[   15.840670]  kunit_try_run_case+0x1a5/0x480
[   15.840698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.840751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.840777]  ? __kthread_parkme+0x82/0x180
[   15.840801]  ? preempt_count_sub+0x50/0x80
[   15.840827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.840881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.840909]  kthread+0x337/0x6f0
[   15.840930]  ? trace_preempt_on+0x20/0xc0
[   15.840956]  ? __pfx_kthread+0x10/0x10
[   15.840979]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.841003]  ? calculate_sigpending+0x7b/0xa0
[   15.841029]  ? __pfx_kthread+0x10/0x10
[   15.841053]  ret_from_fork+0x116/0x1d0
[   15.841074]  ? __pfx_kthread+0x10/0x10
[   15.841097]  ret_from_fork_asm+0x1a/0x30
[   15.841129]  </TASK>
[   15.841141] 
[   15.852848] Allocated by task 283:
[   15.853208]  kasan_save_stack+0x45/0x70
[   15.853615]  kasan_save_track+0x18/0x40
[   15.853997]  kasan_save_alloc_info+0x3b/0x50
[   15.854414]  __kasan_kmalloc+0xb7/0xc0
[   15.854783]  __kmalloc_cache_noprof+0x189/0x420
[   15.855208]  kasan_atomics+0x95/0x310
[   15.855550]  kunit_try_run_case+0x1a5/0x480
[   15.855703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.855882]  kthread+0x337/0x6f0
[   15.856005]  ret_from_fork+0x116/0x1d0
[   15.856140]  ret_from_fork_asm+0x1a/0x30
[   15.856285] 
[   15.856360] The buggy address belongs to the object at ffff8881026d6200
[   15.856360]  which belongs to the cache kmalloc-64 of size 64
[   15.857467] The buggy address is located 0 bytes to the right of
[   15.857467]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.858563] 
[   15.858725] The buggy address belongs to the physical page:
[   15.859217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.859927] flags: 0x200000000000000(node=0|zone=2)
[   15.860390] page_type: f5(slab)
[   15.860735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.861108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.861338] page dumped because: kasan: bad access detected
[   15.861800] 
[   15.861976] Memory state around the buggy address:
[   15.862440]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.863071]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.863674] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.863892]                                      ^
[   15.864048]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864264]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864699] ==================================================================
[   15.362789] ==================================================================
[   15.363270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.363630] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.364061] 
[   15.364155] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.364202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.364215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.364239] Call Trace:
[   15.364252]  <TASK>
[   15.364270]  dump_stack_lvl+0x73/0xb0
[   15.364310]  print_report+0xd1/0x610
[   15.364335]  ? __virt_addr_valid+0x1db/0x2d0
[   15.364360]  ? kasan_atomics_helper+0x860/0x5450
[   15.364383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.364432]  ? kasan_atomics_helper+0x860/0x5450
[   15.364464]  kasan_report+0x141/0x180
[   15.364488]  ? kasan_atomics_helper+0x860/0x5450
[   15.364518]  kasan_check_range+0x10c/0x1c0
[   15.364545]  __kasan_check_write+0x18/0x20
[   15.364567]  kasan_atomics_helper+0x860/0x5450
[   15.364591]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.364650]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.364683]  kasan_atomics+0x1dc/0x310
[   15.364708]  ? __pfx_kasan_atomics+0x10/0x10
[   15.364744]  ? __pfx_read_tsc+0x10/0x10
[   15.364768]  ? ktime_get_ts64+0x86/0x230
[   15.364794]  kunit_try_run_case+0x1a5/0x480
[   15.364832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.364858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.364885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.364911]  ? __kthread_parkme+0x82/0x180
[   15.364934]  ? preempt_count_sub+0x50/0x80
[   15.364960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.364987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.365013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.365040]  kthread+0x337/0x6f0
[   15.365062]  ? trace_preempt_on+0x20/0xc0
[   15.365088]  ? __pfx_kthread+0x10/0x10
[   15.365109]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.365134]  ? calculate_sigpending+0x7b/0xa0
[   15.365161]  ? __pfx_kthread+0x10/0x10
[   15.365184]  ret_from_fork+0x116/0x1d0
[   15.365205]  ? __pfx_kthread+0x10/0x10
[   15.365236]  ret_from_fork_asm+0x1a/0x30
[   15.365268]  </TASK>
[   15.365280] 
[   15.373218] Allocated by task 283:
[   15.373359]  kasan_save_stack+0x45/0x70
[   15.373603]  kasan_save_track+0x18/0x40
[   15.373799]  kasan_save_alloc_info+0x3b/0x50
[   15.374011]  __kasan_kmalloc+0xb7/0xc0
[   15.374201]  __kmalloc_cache_noprof+0x189/0x420
[   15.374433]  kasan_atomics+0x95/0x310
[   15.374627]  kunit_try_run_case+0x1a5/0x480
[   15.374839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.375037]  kthread+0x337/0x6f0
[   15.375159]  ret_from_fork+0x116/0x1d0
[   15.375293]  ret_from_fork_asm+0x1a/0x30
[   15.375436] 
[   15.375533] The buggy address belongs to the object at ffff8881026d6200
[   15.375533]  which belongs to the cache kmalloc-64 of size 64
[   15.376063] The buggy address is located 0 bytes to the right of
[   15.376063]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.376706] 
[   15.376826] The buggy address belongs to the physical page:
[   15.377093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.377373] flags: 0x200000000000000(node=0|zone=2)
[   15.377572] page_type: f5(slab)
[   15.377740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.378112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.378511] page dumped because: kasan: bad access detected
[   15.378705] 
[   15.378776] Memory state around the buggy address:
[   15.378931]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.379146]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.379438] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.379759]                                      ^
[   15.379999]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.380315]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.380663] ==================================================================
[   15.496231] ==================================================================
[   15.497648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.498227] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.498831] 
[   15.499197] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.499252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.499266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.499290] Call Trace:
[   15.499312]  <TASK>
[   15.499332]  dump_stack_lvl+0x73/0xb0
[   15.499505]  print_report+0xd1/0x610
[   15.499532]  ? __virt_addr_valid+0x1db/0x2d0
[   15.499559]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.499583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.499608]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.499632]  kasan_report+0x141/0x180
[   15.499656]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.499685]  __asan_report_load4_noabort+0x18/0x20
[   15.499712]  kasan_atomics_helper+0x4a84/0x5450
[   15.499737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.499761]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.499794]  kasan_atomics+0x1dc/0x310
[   15.499819]  ? __pfx_kasan_atomics+0x10/0x10
[   15.499846]  ? __pfx_read_tsc+0x10/0x10
[   15.499868]  ? ktime_get_ts64+0x86/0x230
[   15.499895]  kunit_try_run_case+0x1a5/0x480
[   15.499923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.499947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.499974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.500001]  ? __kthread_parkme+0x82/0x180
[   15.500025]  ? preempt_count_sub+0x50/0x80
[   15.500052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.500078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.500104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.500132]  kthread+0x337/0x6f0
[   15.500154]  ? trace_preempt_on+0x20/0xc0
[   15.500180]  ? __pfx_kthread+0x10/0x10
[   15.500202]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.500225]  ? calculate_sigpending+0x7b/0xa0
[   15.500251]  ? __pfx_kthread+0x10/0x10
[   15.500274]  ret_from_fork+0x116/0x1d0
[   15.500301]  ? __pfx_kthread+0x10/0x10
[   15.500323]  ret_from_fork_asm+0x1a/0x30
[   15.500356]  </TASK>
[   15.500367] 
[   15.507561] Allocated by task 283:
[   15.507704]  kasan_save_stack+0x45/0x70
[   15.507860]  kasan_save_track+0x18/0x40
[   15.508056]  kasan_save_alloc_info+0x3b/0x50
[   15.508297]  __kasan_kmalloc+0xb7/0xc0
[   15.508538]  __kmalloc_cache_noprof+0x189/0x420
[   15.508768]  kasan_atomics+0x95/0x310
[   15.508962]  kunit_try_run_case+0x1a5/0x480
[   15.509161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.509438]  kthread+0x337/0x6f0
[   15.509619]  ret_from_fork+0x116/0x1d0
[   15.509792]  ret_from_fork_asm+0x1a/0x30
[   15.509996] 
[   15.510092] The buggy address belongs to the object at ffff8881026d6200
[   15.510092]  which belongs to the cache kmalloc-64 of size 64
[   15.510614] The buggy address is located 0 bytes to the right of
[   15.510614]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.511004] 
[   15.511078] The buggy address belongs to the physical page:
[   15.511253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.511662] flags: 0x200000000000000(node=0|zone=2)
[   15.511895] page_type: f5(slab)
[   15.512066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.512440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.512721] page dumped because: kasan: bad access detected
[   15.512899] 
[   15.512972] Memory state around the buggy address:
[   15.513164]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.513553]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.513884] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.514232]                                      ^
[   15.514484]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.514723]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.515055] ==================================================================
[   15.088403] ==================================================================
[   15.088793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.089105] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.089432] 
[   15.089709] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.089761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.089773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.089794] Call Trace:
[   15.089809]  <TASK>
[   15.089822]  dump_stack_lvl+0x73/0xb0
[   15.089852]  print_report+0xd1/0x610
[   15.089874]  ? __virt_addr_valid+0x1db/0x2d0
[   15.089897]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.089919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.089943]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.089966]  kasan_report+0x141/0x180
[   15.089988]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.090015]  __asan_report_store4_noabort+0x1b/0x30
[   15.090041]  kasan_atomics_helper+0x4ba2/0x5450
[   15.090065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.090088]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.090119]  kasan_atomics+0x1dc/0x310
[   15.090143]  ? __pfx_kasan_atomics+0x10/0x10
[   15.090168]  ? __pfx_read_tsc+0x10/0x10
[   15.090189]  ? ktime_get_ts64+0x86/0x230
[   15.090213]  kunit_try_run_case+0x1a5/0x480
[   15.090238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.090287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.090311]  ? __kthread_parkme+0x82/0x180
[   15.090332]  ? preempt_count_sub+0x50/0x80
[   15.090356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.090432]  kthread+0x337/0x6f0
[   15.090465]  ? trace_preempt_on+0x20/0xc0
[   15.090489]  ? __pfx_kthread+0x10/0x10
[   15.090510]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.090642]  ? calculate_sigpending+0x7b/0xa0
[   15.090669]  ? __pfx_kthread+0x10/0x10
[   15.090692]  ret_from_fork+0x116/0x1d0
[   15.090712]  ? __pfx_kthread+0x10/0x10
[   15.090734]  ret_from_fork_asm+0x1a/0x30
[   15.090764]  </TASK>
[   15.090774] 
[   15.098470] Allocated by task 283:
[   15.098735]  kasan_save_stack+0x45/0x70
[   15.098933]  kasan_save_track+0x18/0x40
[   15.099097]  kasan_save_alloc_info+0x3b/0x50
[   15.099310]  __kasan_kmalloc+0xb7/0xc0
[   15.099511]  __kmalloc_cache_noprof+0x189/0x420
[   15.099754]  kasan_atomics+0x95/0x310
[   15.099894]  kunit_try_run_case+0x1a5/0x480
[   15.100042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.100298]  kthread+0x337/0x6f0
[   15.100501]  ret_from_fork+0x116/0x1d0
[   15.100760]  ret_from_fork_asm+0x1a/0x30
[   15.100919] 
[   15.100991] The buggy address belongs to the object at ffff8881026d6200
[   15.100991]  which belongs to the cache kmalloc-64 of size 64
[   15.101344] The buggy address is located 0 bytes to the right of
[   15.101344]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.102059] 
[   15.102161] The buggy address belongs to the physical page:
[   15.102410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.102871] flags: 0x200000000000000(node=0|zone=2)
[   15.103040] page_type: f5(slab)
[   15.103159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.103416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.103853] page dumped because: kasan: bad access detected
[   15.104116] 
[   15.104214] Memory state around the buggy address:
[   15.104480]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.106137]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.106537] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.108221]                                      ^
[   15.108395]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109642]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110497] ==================================================================
[   15.215431] ==================================================================
[   15.215900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.216254] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.216639] 
[   15.216759] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.216803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.216816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.216849] Call Trace:
[   15.216864]  <TASK>
[   15.216880]  dump_stack_lvl+0x73/0xb0
[   15.216919]  print_report+0xd1/0x610
[   15.216942]  ? __virt_addr_valid+0x1db/0x2d0
[   15.216966]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.216989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.217014]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.217038]  kasan_report+0x141/0x180
[   15.217061]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.217089]  kasan_check_range+0x10c/0x1c0
[   15.217116]  __kasan_check_write+0x18/0x20
[   15.217137]  kasan_atomics_helper+0x4a0/0x5450
[   15.217162]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.217188]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.217221]  kasan_atomics+0x1dc/0x310
[   15.217245]  ? __pfx_kasan_atomics+0x10/0x10
[   15.217272]  ? __pfx_read_tsc+0x10/0x10
[   15.217295]  ? ktime_get_ts64+0x86/0x230
[   15.217321]  kunit_try_run_case+0x1a5/0x480
[   15.217346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217372]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.217398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.217443]  ? __kthread_parkme+0x82/0x180
[   15.217473]  ? preempt_count_sub+0x50/0x80
[   15.217498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.217561]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.217589]  kthread+0x337/0x6f0
[   15.217610]  ? trace_preempt_on+0x20/0xc0
[   15.217643]  ? __pfx_kthread+0x10/0x10
[   15.217666]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.217689]  ? calculate_sigpending+0x7b/0xa0
[   15.217726]  ? __pfx_kthread+0x10/0x10
[   15.217749]  ret_from_fork+0x116/0x1d0
[   15.217769]  ? __pfx_kthread+0x10/0x10
[   15.217799]  ret_from_fork_asm+0x1a/0x30
[   15.217832]  </TASK>
[   15.217843] 
[   15.227494] Allocated by task 283:
[   15.227646]  kasan_save_stack+0x45/0x70
[   15.227802]  kasan_save_track+0x18/0x40
[   15.227940]  kasan_save_alloc_info+0x3b/0x50
[   15.228091]  __kasan_kmalloc+0xb7/0xc0
[   15.228226]  __kmalloc_cache_noprof+0x189/0x420
[   15.228391]  kasan_atomics+0x95/0x310
[   15.228547]  kunit_try_run_case+0x1a5/0x480
[   15.228759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.228971]  kthread+0x337/0x6f0
[   15.229093]  ret_from_fork+0x116/0x1d0
[   15.229226]  ret_from_fork_asm+0x1a/0x30
[   15.229366] 
[   15.229439] The buggy address belongs to the object at ffff8881026d6200
[   15.229439]  which belongs to the cache kmalloc-64 of size 64
[   15.229984] The buggy address is located 0 bytes to the right of
[   15.229984]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.230531] 
[   15.230630] The buggy address belongs to the physical page:
[   15.230804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.231043] flags: 0x200000000000000(node=0|zone=2)
[   15.231210] page_type: f5(slab)
[   15.231333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.231634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.231975] page dumped because: kasan: bad access detected
[   15.232180] 
[   15.232250] Memory state around the buggy address:
[   15.232408]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.232632]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.232874] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.233266]                                      ^
[   15.233561]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233876]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.234182] ==================================================================
[   15.197417] ==================================================================
[   15.197780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.198015] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.198510] 
[   15.198618] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.198662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.198675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.198698] Call Trace:
[   15.198712]  <TASK>
[   15.198727]  dump_stack_lvl+0x73/0xb0
[   15.198757]  print_report+0xd1/0x610
[   15.198795]  ? __virt_addr_valid+0x1db/0x2d0
[   15.198820]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.198843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.198881]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.198905]  kasan_report+0x141/0x180
[   15.198928]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.198957]  __asan_report_load4_noabort+0x18/0x20
[   15.198984]  kasan_atomics_helper+0x4b54/0x5450
[   15.199009]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.199034]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.199067]  kasan_atomics+0x1dc/0x310
[   15.199092]  ? __pfx_kasan_atomics+0x10/0x10
[   15.199118]  ? __pfx_read_tsc+0x10/0x10
[   15.199141]  ? ktime_get_ts64+0x86/0x230
[   15.199177]  kunit_try_run_case+0x1a5/0x480
[   15.199205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.199242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.199269]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.199295]  ? __kthread_parkme+0x82/0x180
[   15.199318]  ? preempt_count_sub+0x50/0x80
[   15.199345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.199371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.199398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.199435]  kthread+0x337/0x6f0
[   15.199466]  ? trace_preempt_on+0x20/0xc0
[   15.199490]  ? __pfx_kthread+0x10/0x10
[   15.199513]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.199545]  ? calculate_sigpending+0x7b/0xa0
[   15.199571]  ? __pfx_kthread+0x10/0x10
[   15.199604]  ret_from_fork+0x116/0x1d0
[   15.199625]  ? __pfx_kthread+0x10/0x10
[   15.199648]  ret_from_fork_asm+0x1a/0x30
[   15.199681]  </TASK>
[   15.199693] 
[   15.207292] Allocated by task 283:
[   15.207526]  kasan_save_stack+0x45/0x70
[   15.207839]  kasan_save_track+0x18/0x40
[   15.208066]  kasan_save_alloc_info+0x3b/0x50
[   15.208263]  __kasan_kmalloc+0xb7/0xc0
[   15.208456]  __kmalloc_cache_noprof+0x189/0x420
[   15.208695]  kasan_atomics+0x95/0x310
[   15.208911]  kunit_try_run_case+0x1a5/0x480
[   15.209071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.209255]  kthread+0x337/0x6f0
[   15.209382]  ret_from_fork+0x116/0x1d0
[   15.209532]  ret_from_fork_asm+0x1a/0x30
[   15.209674] 
[   15.209749] The buggy address belongs to the object at ffff8881026d6200
[   15.209749]  which belongs to the cache kmalloc-64 of size 64
[   15.210265] The buggy address is located 0 bytes to the right of
[   15.210265]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.210811] 
[   15.210908] The buggy address belongs to the physical page:
[   15.211139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.211379] flags: 0x200000000000000(node=0|zone=2)
[   15.211551] page_type: f5(slab)
[   15.211670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.212095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.212475] page dumped because: kasan: bad access detected
[   15.212758] 
[   15.212854] Memory state around the buggy address:
[   15.213081]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.213422]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.213768] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.214063]                                      ^
[   15.214219]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214485]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214819] ==================================================================
[   15.677158] ==================================================================
[   15.677511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.677839] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.678191] 
[   15.678299] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.678346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.678358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.678381] Call Trace:
[   15.678419]  <TASK>
[   15.678438]  dump_stack_lvl+0x73/0xb0
[   15.678478]  print_report+0xd1/0x610
[   15.678503]  ? __virt_addr_valid+0x1db/0x2d0
[   15.678528]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.678561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.678587]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.678611]  kasan_report+0x141/0x180
[   15.678645]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.678674]  __asan_report_load4_noabort+0x18/0x20
[   15.678701]  kasan_atomics_helper+0x4a02/0x5450
[   15.678734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.678759]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.678792]  kasan_atomics+0x1dc/0x310
[   15.678827]  ? __pfx_kasan_atomics+0x10/0x10
[   15.678853]  ? __pfx_read_tsc+0x10/0x10
[   15.678876]  ? ktime_get_ts64+0x86/0x230
[   15.678911]  kunit_try_run_case+0x1a5/0x480
[   15.678938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.678973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.679002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.679029]  ? __kthread_parkme+0x82/0x180
[   15.679060]  ? preempt_count_sub+0x50/0x80
[   15.679087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.679114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.679151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.679178]  kthread+0x337/0x6f0
[   15.679208]  ? trace_preempt_on+0x20/0xc0
[   15.679234]  ? __pfx_kthread+0x10/0x10
[   15.679256]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.679290]  ? calculate_sigpending+0x7b/0xa0
[   15.679317]  ? __pfx_kthread+0x10/0x10
[   15.679340]  ret_from_fork+0x116/0x1d0
[   15.679368]  ? __pfx_kthread+0x10/0x10
[   15.679390]  ret_from_fork_asm+0x1a/0x30
[   15.679445]  </TASK>
[   15.679464] 
[   15.686692] Allocated by task 283:
[   15.686876]  kasan_save_stack+0x45/0x70
[   15.687080]  kasan_save_track+0x18/0x40
[   15.687285]  kasan_save_alloc_info+0x3b/0x50
[   15.687531]  __kasan_kmalloc+0xb7/0xc0
[   15.687703]  __kmalloc_cache_noprof+0x189/0x420
[   15.687936]  kasan_atomics+0x95/0x310
[   15.688102]  kunit_try_run_case+0x1a5/0x480
[   15.688324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.688607]  kthread+0x337/0x6f0
[   15.688788]  ret_from_fork+0x116/0x1d0
[   15.688979]  ret_from_fork_asm+0x1a/0x30
[   15.689166] 
[   15.689279] The buggy address belongs to the object at ffff8881026d6200
[   15.689279]  which belongs to the cache kmalloc-64 of size 64
[   15.689780] The buggy address is located 0 bytes to the right of
[   15.689780]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.690148] 
[   15.690221] The buggy address belongs to the physical page:
[   15.690414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.690808] flags: 0x200000000000000(node=0|zone=2)
[   15.691047] page_type: f5(slab)
[   15.691223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.691626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.691899] page dumped because: kasan: bad access detected
[   15.692072] 
[   15.692143] Memory state around the buggy address:
[   15.692303]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.692559]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.692882] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.693228]                                      ^
[   15.693500]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.693862]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694188] ==================================================================
[   15.713900] ==================================================================
[   15.714262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.714677] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.714983] 
[   15.715124] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.715190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.715203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.715237] Call Trace:
[   15.715258]  <TASK>
[   15.715277]  dump_stack_lvl+0x73/0xb0
[   15.715308]  print_report+0xd1/0x610
[   15.715332]  ? __virt_addr_valid+0x1db/0x2d0
[   15.715358]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.715382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.715426]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.715460]  kasan_report+0x141/0x180
[   15.715484]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.715512]  __asan_report_load4_noabort+0x18/0x20
[   15.715540]  kasan_atomics_helper+0x49e8/0x5450
[   15.715566]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.715591]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.715624]  kasan_atomics+0x1dc/0x310
[   15.715649]  ? __pfx_kasan_atomics+0x10/0x10
[   15.715676]  ? __pfx_read_tsc+0x10/0x10
[   15.715699]  ? ktime_get_ts64+0x86/0x230
[   15.715725]  kunit_try_run_case+0x1a5/0x480
[   15.715762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.715788]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.715825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.715852]  ? __kthread_parkme+0x82/0x180
[   15.715876]  ? preempt_count_sub+0x50/0x80
[   15.715902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.715930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.715957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.715984]  kthread+0x337/0x6f0
[   15.716006]  ? trace_preempt_on+0x20/0xc0
[   15.716031]  ? __pfx_kthread+0x10/0x10
[   15.716054]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.716078]  ? calculate_sigpending+0x7b/0xa0
[   15.716104]  ? __pfx_kthread+0x10/0x10
[   15.716127]  ret_from_fork+0x116/0x1d0
[   15.716148]  ? __pfx_kthread+0x10/0x10
[   15.716170]  ret_from_fork_asm+0x1a/0x30
[   15.716204]  </TASK>
[   15.716215] 
[   15.723307] Allocated by task 283:
[   15.723533]  kasan_save_stack+0x45/0x70
[   15.723771]  kasan_save_track+0x18/0x40
[   15.723965]  kasan_save_alloc_info+0x3b/0x50
[   15.724190]  __kasan_kmalloc+0xb7/0xc0
[   15.724355]  __kmalloc_cache_noprof+0x189/0x420
[   15.724625]  kasan_atomics+0x95/0x310
[   15.724822]  kunit_try_run_case+0x1a5/0x480
[   15.725028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.725271]  kthread+0x337/0x6f0
[   15.725469]  ret_from_fork+0x116/0x1d0
[   15.725676]  ret_from_fork_asm+0x1a/0x30
[   15.725866] 
[   15.725967] The buggy address belongs to the object at ffff8881026d6200
[   15.725967]  which belongs to the cache kmalloc-64 of size 64
[   15.726512] The buggy address is located 0 bytes to the right of
[   15.726512]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.726977] 
[   15.727052] The buggy address belongs to the physical page:
[   15.727232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.727509] flags: 0x200000000000000(node=0|zone=2)
[   15.727761] page_type: f5(slab)
[   15.727930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.728266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.728643] page dumped because: kasan: bad access detected
[   15.728844] 
[   15.728914] Memory state around the buggy address:
[   15.729069]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.729285]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.729581] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.729923]                                      ^
[   15.730169]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.730568]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.730927] ==================================================================
[   16.140889] ==================================================================
[   16.141403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.141879] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.142234] 
[   16.142326] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.142373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.142387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.142420] Call Trace:
[   16.142439]  <TASK>
[   16.142475]  dump_stack_lvl+0x73/0xb0
[   16.142508]  print_report+0xd1/0x610
[   16.142532]  ? __virt_addr_valid+0x1db/0x2d0
[   16.142558]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.142581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.142606]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.142630]  kasan_report+0x141/0x180
[   16.142653]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.142681]  kasan_check_range+0x10c/0x1c0
[   16.142706]  __kasan_check_write+0x18/0x20
[   16.142728]  kasan_atomics_helper+0x1c18/0x5450
[   16.142752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.142777]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.142810]  kasan_atomics+0x1dc/0x310
[   16.142833]  ? __pfx_kasan_atomics+0x10/0x10
[   16.142860]  ? __pfx_read_tsc+0x10/0x10
[   16.142884]  ? ktime_get_ts64+0x86/0x230
[   16.142911]  kunit_try_run_case+0x1a5/0x480
[   16.142938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.142963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.142990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.143016]  ? __kthread_parkme+0x82/0x180
[   16.143039]  ? preempt_count_sub+0x50/0x80
[   16.143065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.143092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.143118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.143146]  kthread+0x337/0x6f0
[   16.143166]  ? trace_preempt_on+0x20/0xc0
[   16.143192]  ? __pfx_kthread+0x10/0x10
[   16.143214]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.143238]  ? calculate_sigpending+0x7b/0xa0
[   16.143264]  ? __pfx_kthread+0x10/0x10
[   16.143288]  ret_from_fork+0x116/0x1d0
[   16.143308]  ? __pfx_kthread+0x10/0x10
[   16.143330]  ret_from_fork_asm+0x1a/0x30
[   16.143363]  </TASK>
[   16.143375] 
[   16.150703] Allocated by task 283:
[   16.150887]  kasan_save_stack+0x45/0x70
[   16.151089]  kasan_save_track+0x18/0x40
[   16.151281]  kasan_save_alloc_info+0x3b/0x50
[   16.151522]  __kasan_kmalloc+0xb7/0xc0
[   16.151725]  __kmalloc_cache_noprof+0x189/0x420
[   16.151913]  kasan_atomics+0x95/0x310
[   16.152050]  kunit_try_run_case+0x1a5/0x480
[   16.152200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.152388]  kthread+0x337/0x6f0
[   16.152520]  ret_from_fork+0x116/0x1d0
[   16.152655]  ret_from_fork_asm+0x1a/0x30
[   16.152850] 
[   16.152956] The buggy address belongs to the object at ffff8881026d6200
[   16.152956]  which belongs to the cache kmalloc-64 of size 64
[   16.153477] The buggy address is located 0 bytes to the right of
[   16.153477]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.154019] 
[   16.154096] The buggy address belongs to the physical page:
[   16.154271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.154796] flags: 0x200000000000000(node=0|zone=2)
[   16.155031] page_type: f5(slab)
[   16.155204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.155721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.156006] page dumped because: kasan: bad access detected
[   16.156228] 
[   16.156323] Memory state around the buggy address:
[   16.156544]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.156759]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.156972] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.157294]                                      ^
[   16.157577]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.157896]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.158194] ==================================================================
[   15.983934] ==================================================================
[   15.984255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.984931] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.985301] 
[   15.985419] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.985613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.985629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.985653] Call Trace:
[   15.985672]  <TASK>
[   15.985692]  dump_stack_lvl+0x73/0xb0
[   15.985723]  print_report+0xd1/0x610
[   15.985749]  ? __virt_addr_valid+0x1db/0x2d0
[   15.985773]  ? kasan_atomics_helper+0x177f/0x5450
[   15.985796]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.985823]  ? kasan_atomics_helper+0x177f/0x5450
[   15.985846]  kasan_report+0x141/0x180
[   15.985869]  ? kasan_atomics_helper+0x177f/0x5450
[   15.985898]  kasan_check_range+0x10c/0x1c0
[   15.985923]  __kasan_check_write+0x18/0x20
[   15.985944]  kasan_atomics_helper+0x177f/0x5450
[   15.985968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.985994]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.986026]  kasan_atomics+0x1dc/0x310
[   15.986051]  ? __pfx_kasan_atomics+0x10/0x10
[   15.986077]  ? __pfx_read_tsc+0x10/0x10
[   15.986101]  ? ktime_get_ts64+0x86/0x230
[   15.986127]  kunit_try_run_case+0x1a5/0x480
[   15.986154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.986179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.986207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.986234]  ? __kthread_parkme+0x82/0x180
[   15.986256]  ? preempt_count_sub+0x50/0x80
[   15.986283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.986310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.986337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.986365]  kthread+0x337/0x6f0
[   15.986386]  ? trace_preempt_on+0x20/0xc0
[   15.986426]  ? __pfx_kthread+0x10/0x10
[   15.986459]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.986483]  ? calculate_sigpending+0x7b/0xa0
[   15.986510]  ? __pfx_kthread+0x10/0x10
[   15.986534]  ret_from_fork+0x116/0x1d0
[   15.986555]  ? __pfx_kthread+0x10/0x10
[   15.986577]  ret_from_fork_asm+0x1a/0x30
[   15.986610]  </TASK>
[   15.986622] 
[   15.995942] Allocated by task 283:
[   15.996342]  kasan_save_stack+0x45/0x70
[   15.996575]  kasan_save_track+0x18/0x40
[   15.996756]  kasan_save_alloc_info+0x3b/0x50
[   15.996952]  __kasan_kmalloc+0xb7/0xc0
[   15.997129]  __kmalloc_cache_noprof+0x189/0x420
[   15.997328]  kasan_atomics+0x95/0x310
[   15.997834]  kunit_try_run_case+0x1a5/0x480
[   15.998018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.998365]  kthread+0x337/0x6f0
[   15.998617]  ret_from_fork+0x116/0x1d0
[   15.998870]  ret_from_fork_asm+0x1a/0x30
[   15.999133] 
[   15.999235] The buggy address belongs to the object at ffff8881026d6200
[   15.999235]  which belongs to the cache kmalloc-64 of size 64
[   15.999873] The buggy address is located 0 bytes to the right of
[   15.999873]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.000385] 
[   16.000711] The buggy address belongs to the physical page:
[   16.000925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.001380] flags: 0x200000000000000(node=0|zone=2)
[   16.001714] page_type: f5(slab)
[   16.001955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.002318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.002817] page dumped because: kasan: bad access detected
[   16.003121] 
[   16.003218] Memory state around the buggy address:
[   16.003588]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.003982]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.004343] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.004759]                                      ^
[   16.005026]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.005336]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.005783] ==================================================================
[   15.755219] ==================================================================
[   15.755954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.757196] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.758114] 
[   15.758241] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.758295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.758309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.758334] Call Trace:
[   15.758355]  <TASK>
[   15.758377]  dump_stack_lvl+0x73/0xb0
[   15.758603]  print_report+0xd1/0x610
[   15.758643]  ? __virt_addr_valid+0x1db/0x2d0
[   15.758669]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.758694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.758726]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.758750]  kasan_report+0x141/0x180
[   15.758773]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.758801]  __asan_report_load4_noabort+0x18/0x20
[   15.758828]  kasan_atomics_helper+0x49ce/0x5450
[   15.758853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.758878]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.758911]  kasan_atomics+0x1dc/0x310
[   15.758937]  ? __pfx_kasan_atomics+0x10/0x10
[   15.758963]  ? __pfx_read_tsc+0x10/0x10
[   15.758986]  ? ktime_get_ts64+0x86/0x230
[   15.759013]  kunit_try_run_case+0x1a5/0x480
[   15.759040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.759065]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.759093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.759119]  ? __kthread_parkme+0x82/0x180
[   15.759142]  ? preempt_count_sub+0x50/0x80
[   15.759168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.759194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.759222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.759249]  kthread+0x337/0x6f0
[   15.759270]  ? trace_preempt_on+0x20/0xc0
[   15.759295]  ? __pfx_kthread+0x10/0x10
[   15.759317]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.759340]  ? calculate_sigpending+0x7b/0xa0
[   15.759366]  ? __pfx_kthread+0x10/0x10
[   15.759389]  ret_from_fork+0x116/0x1d0
[   15.759422]  ? __pfx_kthread+0x10/0x10
[   15.759445]  ret_from_fork_asm+0x1a/0x30
[   15.759488]  </TASK>
[   15.759501] 
[   15.771874] Allocated by task 283:
[   15.772026]  kasan_save_stack+0x45/0x70
[   15.772185]  kasan_save_track+0x18/0x40
[   15.772326]  kasan_save_alloc_info+0x3b/0x50
[   15.772506]  __kasan_kmalloc+0xb7/0xc0
[   15.772641]  __kmalloc_cache_noprof+0x189/0x420
[   15.772923]  kasan_atomics+0x95/0x310
[   15.773115]  kunit_try_run_case+0x1a5/0x480
[   15.773326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.773559]  kthread+0x337/0x6f0
[   15.773684]  ret_from_fork+0x116/0x1d0
[   15.773872]  ret_from_fork_asm+0x1a/0x30
[   15.774094] 
[   15.774189] The buggy address belongs to the object at ffff8881026d6200
[   15.774189]  which belongs to the cache kmalloc-64 of size 64
[   15.774890] The buggy address is located 0 bytes to the right of
[   15.774890]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.775379] 
[   15.775530] The buggy address belongs to the physical page:
[   15.775771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.776040] flags: 0x200000000000000(node=0|zone=2)
[   15.776266] page_type: f5(slab)
[   15.776473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.776852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.777212] page dumped because: kasan: bad access detected
[   15.777465] 
[   15.777553] Memory state around the buggy address:
[   15.777743]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.777959]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.778296] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.778691]                                      ^
[   15.778859]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.779117]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.779621] ==================================================================
[   15.471814] ==================================================================
[   15.472253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.472685] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.473003] 
[   15.473126] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.473171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.473193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.473216] Call Trace:
[   15.473234]  <TASK>
[   15.473262]  dump_stack_lvl+0x73/0xb0
[   15.473292]  print_report+0xd1/0x610
[   15.473316]  ? __virt_addr_valid+0x1db/0x2d0
[   15.473349]  ? kasan_atomics_helper+0xc70/0x5450
[   15.473371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.473420]  ? kasan_atomics_helper+0xc70/0x5450
[   15.473445]  kasan_report+0x141/0x180
[   15.473477]  ? kasan_atomics_helper+0xc70/0x5450
[   15.473505]  kasan_check_range+0x10c/0x1c0
[   15.473540]  __kasan_check_write+0x18/0x20
[   15.473561]  kasan_atomics_helper+0xc70/0x5450
[   15.473596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.473621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.473654]  kasan_atomics+0x1dc/0x310
[   15.473678]  ? __pfx_kasan_atomics+0x10/0x10
[   15.473705]  ? __pfx_read_tsc+0x10/0x10
[   15.473736]  ? ktime_get_ts64+0x86/0x230
[   15.473763]  kunit_try_run_case+0x1a5/0x480
[   15.473800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.473852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.473885]  ? __kthread_parkme+0x82/0x180
[   15.473908]  ? preempt_count_sub+0x50/0x80
[   15.473935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.473998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.474027]  kthread+0x337/0x6f0
[   15.474047]  ? trace_preempt_on+0x20/0xc0
[   15.474072]  ? __pfx_kthread+0x10/0x10
[   15.474095]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.474118]  ? calculate_sigpending+0x7b/0xa0
[   15.474144]  ? __pfx_kthread+0x10/0x10
[   15.474167]  ret_from_fork+0x116/0x1d0
[   15.474188]  ? __pfx_kthread+0x10/0x10
[   15.474210]  ret_from_fork_asm+0x1a/0x30
[   15.474243]  </TASK>
[   15.474254] 
[   15.481631] Allocated by task 283:
[   15.481818]  kasan_save_stack+0x45/0x70
[   15.482049]  kasan_save_track+0x18/0x40
[   15.482247]  kasan_save_alloc_info+0x3b/0x50
[   15.482498]  __kasan_kmalloc+0xb7/0xc0
[   15.482673]  __kmalloc_cache_noprof+0x189/0x420
[   15.482892]  kasan_atomics+0x95/0x310
[   15.483088]  kunit_try_run_case+0x1a5/0x480
[   15.483290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.484567]  kthread+0x337/0x6f0
[   15.485637]  ret_from_fork+0x116/0x1d0
[   15.485811]  ret_from_fork_asm+0x1a/0x30
[   15.486849] 
[   15.486937] The buggy address belongs to the object at ffff8881026d6200
[   15.486937]  which belongs to the cache kmalloc-64 of size 64
[   15.487286] The buggy address is located 0 bytes to the right of
[   15.487286]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.487685] 
[   15.487787] The buggy address belongs to the physical page:
[   15.487998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.488235] flags: 0x200000000000000(node=0|zone=2)
[   15.488447] page_type: f5(slab)
[   15.488659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.488996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.490208] page dumped because: kasan: bad access detected
[   15.490420] 
[   15.490509] Memory state around the buggy address:
[   15.490700]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.491041]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.491360] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.491687]                                      ^
[   15.493508]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494641]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494929] ==================================================================
[   15.533983] ==================================================================
[   15.534382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.534780] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.535138] 
[   15.535248] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.535294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.535306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.535328] Call Trace:
[   15.535348]  <TASK>
[   15.535366]  dump_stack_lvl+0x73/0xb0
[   15.535417]  print_report+0xd1/0x610
[   15.535441]  ? __virt_addr_valid+0x1db/0x2d0
[   15.535474]  ? kasan_atomics_helper+0xde0/0x5450
[   15.535496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.535521]  ? kasan_atomics_helper+0xde0/0x5450
[   15.535545]  kasan_report+0x141/0x180
[   15.535568]  ? kasan_atomics_helper+0xde0/0x5450
[   15.535596]  kasan_check_range+0x10c/0x1c0
[   15.535621]  __kasan_check_write+0x18/0x20
[   15.535651]  kasan_atomics_helper+0xde0/0x5450
[   15.535675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.535700]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.535744]  kasan_atomics+0x1dc/0x310
[   15.535768]  ? __pfx_kasan_atomics+0x10/0x10
[   15.535794]  ? __pfx_read_tsc+0x10/0x10
[   15.535817]  ? ktime_get_ts64+0x86/0x230
[   15.535843]  kunit_try_run_case+0x1a5/0x480
[   15.535870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.535895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.535922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.535947]  ? __kthread_parkme+0x82/0x180
[   15.535970]  ? preempt_count_sub+0x50/0x80
[   15.535996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.536049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.536078]  kthread+0x337/0x6f0
[   15.536102]  ? trace_preempt_on+0x20/0xc0
[   15.536127]  ? __pfx_kthread+0x10/0x10
[   15.536149]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.536172]  ? calculate_sigpending+0x7b/0xa0
[   15.536199]  ? __pfx_kthread+0x10/0x10
[   15.536222]  ret_from_fork+0x116/0x1d0
[   15.536242]  ? __pfx_kthread+0x10/0x10
[   15.536263]  ret_from_fork_asm+0x1a/0x30
[   15.536307]  </TASK>
[   15.536320] 
[   15.543377] Allocated by task 283:
[   15.543538]  kasan_save_stack+0x45/0x70
[   15.543685]  kasan_save_track+0x18/0x40
[   15.543891]  kasan_save_alloc_info+0x3b/0x50
[   15.544099]  __kasan_kmalloc+0xb7/0xc0
[   15.544286]  __kmalloc_cache_noprof+0x189/0x420
[   15.544538]  kasan_atomics+0x95/0x310
[   15.544729]  kunit_try_run_case+0x1a5/0x480
[   15.544937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.545137]  kthread+0x337/0x6f0
[   15.545257]  ret_from_fork+0x116/0x1d0
[   15.545480]  ret_from_fork_asm+0x1a/0x30
[   15.545693] 
[   15.545814] The buggy address belongs to the object at ffff8881026d6200
[   15.545814]  which belongs to the cache kmalloc-64 of size 64
[   15.546214] The buggy address is located 0 bytes to the right of
[   15.546214]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.546592] 
[   15.546692] The buggy address belongs to the physical page:
[   15.546961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.547304] flags: 0x200000000000000(node=0|zone=2)
[   15.547568] page_type: f5(slab)
[   15.547733] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.548064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.548310] page dumped because: kasan: bad access detected
[   15.548536] 
[   15.548630] Memory state around the buggy address:
[   15.548866]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.549219]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.549587] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.549885]                                      ^
[   15.550038]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.550349]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.550670] ==================================================================
[   15.658908] ==================================================================
[   15.659273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.659919] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.660274] 
[   15.660437] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.660503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.660526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.660550] Call Trace:
[   15.660572]  <TASK>
[   15.660603]  dump_stack_lvl+0x73/0xb0
[   15.660635]  print_report+0xd1/0x610
[   15.660663]  ? __virt_addr_valid+0x1db/0x2d0
[   15.660690]  ? kasan_atomics_helper+0x1148/0x5450
[   15.660714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.660741]  ? kasan_atomics_helper+0x1148/0x5450
[   15.660765]  kasan_report+0x141/0x180
[   15.660789]  ? kasan_atomics_helper+0x1148/0x5450
[   15.660818]  kasan_check_range+0x10c/0x1c0
[   15.660844]  __kasan_check_write+0x18/0x20
[   15.660875]  kasan_atomics_helper+0x1148/0x5450
[   15.660899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.660924]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.660968]  kasan_atomics+0x1dc/0x310
[   15.660993]  ? __pfx_kasan_atomics+0x10/0x10
[   15.661019]  ? __pfx_read_tsc+0x10/0x10
[   15.661043]  ? ktime_get_ts64+0x86/0x230
[   15.661070]  kunit_try_run_case+0x1a5/0x480
[   15.661097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.661122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.661149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.661176]  ? __kthread_parkme+0x82/0x180
[   15.661199]  ? preempt_count_sub+0x50/0x80
[   15.661235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.661261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.661326]  kthread+0x337/0x6f0
[   15.661347]  ? trace_preempt_on+0x20/0xc0
[   15.661373]  ? __pfx_kthread+0x10/0x10
[   15.661421]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.661445]  ? calculate_sigpending+0x7b/0xa0
[   15.661486]  ? __pfx_kthread+0x10/0x10
[   15.661510]  ret_from_fork+0x116/0x1d0
[   15.661531]  ? __pfx_kthread+0x10/0x10
[   15.661554]  ret_from_fork_asm+0x1a/0x30
[   15.661595]  </TASK>
[   15.661608] 
[   15.668972] Allocated by task 283:
[   15.669152]  kasan_save_stack+0x45/0x70
[   15.669365]  kasan_save_track+0x18/0x40
[   15.669579]  kasan_save_alloc_info+0x3b/0x50
[   15.669791]  __kasan_kmalloc+0xb7/0xc0
[   15.669927]  __kmalloc_cache_noprof+0x189/0x420
[   15.670085]  kasan_atomics+0x95/0x310
[   15.670300]  kunit_try_run_case+0x1a5/0x480
[   15.670546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.670798]  kthread+0x337/0x6f0
[   15.670921]  ret_from_fork+0x116/0x1d0
[   15.671058]  ret_from_fork_asm+0x1a/0x30
[   15.671255] 
[   15.671352] The buggy address belongs to the object at ffff8881026d6200
[   15.671352]  which belongs to the cache kmalloc-64 of size 64
[   15.671936] The buggy address is located 0 bytes to the right of
[   15.671936]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.672343] 
[   15.672442] The buggy address belongs to the physical page:
[   15.672628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.672983] flags: 0x200000000000000(node=0|zone=2)
[   15.673233] page_type: f5(slab)
[   15.673438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.673790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.674123] page dumped because: kasan: bad access detected
[   15.674315] 
[   15.674385] Memory state around the buggy address:
[   15.674628]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.674986]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.675331] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.675589]                                      ^
[   15.675769]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.676117]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.676471] ==================================================================
[   15.551335] ==================================================================
[   15.551817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.552156] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.552479] 
[   15.552611] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.552669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.552683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.552705] Call Trace:
[   15.552723]  <TASK>
[   15.552741]  dump_stack_lvl+0x73/0xb0
[   15.552771]  print_report+0xd1/0x610
[   15.552795]  ? __virt_addr_valid+0x1db/0x2d0
[   15.552821]  ? kasan_atomics_helper+0xe78/0x5450
[   15.552843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.552868]  ? kasan_atomics_helper+0xe78/0x5450
[   15.552891]  kasan_report+0x141/0x180
[   15.552924]  ? kasan_atomics_helper+0xe78/0x5450
[   15.552953]  kasan_check_range+0x10c/0x1c0
[   15.552979]  __kasan_check_write+0x18/0x20
[   15.553012]  kasan_atomics_helper+0xe78/0x5450
[   15.553037]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.553061]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.553094]  kasan_atomics+0x1dc/0x310
[   15.553119]  ? __pfx_kasan_atomics+0x10/0x10
[   15.553145]  ? __pfx_read_tsc+0x10/0x10
[   15.553168]  ? ktime_get_ts64+0x86/0x230
[   15.553193]  kunit_try_run_case+0x1a5/0x480
[   15.553220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.553245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.553272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.553297]  ? __kthread_parkme+0x82/0x180
[   15.553320]  ? preempt_count_sub+0x50/0x80
[   15.553346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.553371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.553424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.553468]  kthread+0x337/0x6f0
[   15.553490]  ? trace_preempt_on+0x20/0xc0
[   15.553515]  ? __pfx_kthread+0x10/0x10
[   15.553537]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.553560]  ? calculate_sigpending+0x7b/0xa0
[   15.553586]  ? __pfx_kthread+0x10/0x10
[   15.553610]  ret_from_fork+0x116/0x1d0
[   15.553630]  ? __pfx_kthread+0x10/0x10
[   15.553653]  ret_from_fork_asm+0x1a/0x30
[   15.553685]  </TASK>
[   15.553697] 
[   15.560940] Allocated by task 283:
[   15.561075]  kasan_save_stack+0x45/0x70
[   15.561222]  kasan_save_track+0x18/0x40
[   15.561358]  kasan_save_alloc_info+0x3b/0x50
[   15.561618]  __kasan_kmalloc+0xb7/0xc0
[   15.561836]  __kmalloc_cache_noprof+0x189/0x420
[   15.562080]  kasan_atomics+0x95/0x310
[   15.562284]  kunit_try_run_case+0x1a5/0x480
[   15.562538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.562810]  kthread+0x337/0x6f0
[   15.562994]  ret_from_fork+0x116/0x1d0
[   15.563166]  ret_from_fork_asm+0x1a/0x30
[   15.563348] 
[   15.563465] The buggy address belongs to the object at ffff8881026d6200
[   15.563465]  which belongs to the cache kmalloc-64 of size 64
[   15.563910] The buggy address is located 0 bytes to the right of
[   15.563910]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.564273] 
[   15.564349] The buggy address belongs to the physical page:
[   15.564623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.564981] flags: 0x200000000000000(node=0|zone=2)
[   15.565213] page_type: f5(slab)
[   15.565380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.565749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.566080] page dumped because: kasan: bad access detected
[   15.566250] 
[   15.566319] Memory state around the buggy address:
[   15.566522]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.566874]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.567222] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.567607]                                      ^
[   15.567856]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568085]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568461] ==================================================================
[   15.865719] ==================================================================
[   15.866597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.867262] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.867926] 
[   15.868127] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.868177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.868190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.868214] Call Trace:
[   15.868234]  <TASK>
[   15.868252]  dump_stack_lvl+0x73/0xb0
[   15.868312]  print_report+0xd1/0x610
[   15.868339]  ? __virt_addr_valid+0x1db/0x2d0
[   15.868365]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.868389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.868435]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.868467]  kasan_report+0x141/0x180
[   15.868491]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.868520]  __asan_report_store8_noabort+0x1b/0x30
[   15.868548]  kasan_atomics_helper+0x50d4/0x5450
[   15.868573]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.868598]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.868631]  kasan_atomics+0x1dc/0x310
[   15.868656]  ? __pfx_kasan_atomics+0x10/0x10
[   15.868684]  ? __pfx_read_tsc+0x10/0x10
[   15.868709]  ? ktime_get_ts64+0x86/0x230
[   15.868735]  kunit_try_run_case+0x1a5/0x480
[   15.868763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.868788]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.868815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.868841]  ? __kthread_parkme+0x82/0x180
[   15.868865]  ? preempt_count_sub+0x50/0x80
[   15.868890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.868917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.868943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.868971]  kthread+0x337/0x6f0
[   15.868992]  ? trace_preempt_on+0x20/0xc0
[   15.869017]  ? __pfx_kthread+0x10/0x10
[   15.869039]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.869062]  ? calculate_sigpending+0x7b/0xa0
[   15.869088]  ? __pfx_kthread+0x10/0x10
[   15.869112]  ret_from_fork+0x116/0x1d0
[   15.869132]  ? __pfx_kthread+0x10/0x10
[   15.869154]  ret_from_fork_asm+0x1a/0x30
[   15.869188]  </TASK>
[   15.869198] 
[   15.879114] Allocated by task 283:
[   15.879512]  kasan_save_stack+0x45/0x70
[   15.879716]  kasan_save_track+0x18/0x40
[   15.879895]  kasan_save_alloc_info+0x3b/0x50
[   15.880093]  __kasan_kmalloc+0xb7/0xc0
[   15.880274]  __kmalloc_cache_noprof+0x189/0x420
[   15.880797]  kasan_atomics+0x95/0x310
[   15.880966]  kunit_try_run_case+0x1a5/0x480
[   15.881358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.881758]  kthread+0x337/0x6f0
[   15.881934]  ret_from_fork+0x116/0x1d0
[   15.882239]  ret_from_fork_asm+0x1a/0x30
[   15.882622] 
[   15.882731] The buggy address belongs to the object at ffff8881026d6200
[   15.882731]  which belongs to the cache kmalloc-64 of size 64
[   15.883479] The buggy address is located 0 bytes to the right of
[   15.883479]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.884153] 
[   15.884250] The buggy address belongs to the physical page:
[   15.884659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.885051] flags: 0x200000000000000(node=0|zone=2)
[   15.885289] page_type: f5(slab)
[   15.885630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.885952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.886342] page dumped because: kasan: bad access detected
[   15.886703] 
[   15.886806] Memory state around the buggy address:
[   15.887182]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.887671]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.888047] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.888433]                                      ^
[   15.888695]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.888999]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889298] ==================================================================
[   15.344666] ==================================================================
[   15.345041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.345419] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.345766] 
[   15.345862] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.345909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.345921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.345945] Call Trace:
[   15.345965]  <TASK>
[   15.345983]  dump_stack_lvl+0x73/0xb0
[   15.346013]  print_report+0xd1/0x610
[   15.346038]  ? __virt_addr_valid+0x1db/0x2d0
[   15.346064]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.346088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.346114]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.346150]  kasan_report+0x141/0x180
[   15.346179]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.346207]  kasan_check_range+0x10c/0x1c0
[   15.346244]  __kasan_check_write+0x18/0x20
[   15.346265]  kasan_atomics_helper+0x7c7/0x5450
[   15.346289]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.346315]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.346347]  kasan_atomics+0x1dc/0x310
[   15.346372]  ? __pfx_kasan_atomics+0x10/0x10
[   15.346419]  ? __pfx_read_tsc+0x10/0x10
[   15.346458]  ? ktime_get_ts64+0x86/0x230
[   15.346484]  kunit_try_run_case+0x1a5/0x480
[   15.346521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.346574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.346600]  ? __kthread_parkme+0x82/0x180
[   15.346633]  ? preempt_count_sub+0x50/0x80
[   15.346659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.346722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.346750]  kthread+0x337/0x6f0
[   15.346770]  ? trace_preempt_on+0x20/0xc0
[   15.346796]  ? __pfx_kthread+0x10/0x10
[   15.346818]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.346842]  ? calculate_sigpending+0x7b/0xa0
[   15.346869]  ? __pfx_kthread+0x10/0x10
[   15.346892]  ret_from_fork+0x116/0x1d0
[   15.346912]  ? __pfx_kthread+0x10/0x10
[   15.346934]  ret_from_fork_asm+0x1a/0x30
[   15.346968]  </TASK>
[   15.346979] 
[   15.354129] Allocated by task 283:
[   15.354330]  kasan_save_stack+0x45/0x70
[   15.354575]  kasan_save_track+0x18/0x40
[   15.354768]  kasan_save_alloc_info+0x3b/0x50
[   15.354978]  __kasan_kmalloc+0xb7/0xc0
[   15.355164]  __kmalloc_cache_noprof+0x189/0x420
[   15.355385]  kasan_atomics+0x95/0x310
[   15.355602]  kunit_try_run_case+0x1a5/0x480
[   15.355815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.356066]  kthread+0x337/0x6f0
[   15.356234]  ret_from_fork+0x116/0x1d0
[   15.356423]  ret_from_fork_asm+0x1a/0x30
[   15.356649] 
[   15.356750] The buggy address belongs to the object at ffff8881026d6200
[   15.356750]  which belongs to the cache kmalloc-64 of size 64
[   15.357161] The buggy address is located 0 bytes to the right of
[   15.357161]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.357634] 
[   15.357746] The buggy address belongs to the physical page:
[   15.358012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.358387] flags: 0x200000000000000(node=0|zone=2)
[   15.358626] page_type: f5(slab)
[   15.358798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.359130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.359494] page dumped because: kasan: bad access detected
[   15.359745] 
[   15.359847] Memory state around the buggy address:
[   15.360055]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.360362]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.360724] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.361027]                                      ^
[   15.361239]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361523]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361887] ==================================================================
[   15.780310] ==================================================================
[   15.781142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.781592] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.781819] 
[   15.781912] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.781962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.781975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.781999] Call Trace:
[   15.782020]  <TASK>
[   15.782039]  dump_stack_lvl+0x73/0xb0
[   15.782071]  print_report+0xd1/0x610
[   15.782097]  ? __virt_addr_valid+0x1db/0x2d0
[   15.782122]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.782145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.782171]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.782196]  kasan_report+0x141/0x180
[   15.782219]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.782249]  kasan_check_range+0x10c/0x1c0
[   15.782275]  __kasan_check_read+0x15/0x20
[   15.782297]  kasan_atomics_helper+0x13b5/0x5450
[   15.782322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.782347]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.782379]  kasan_atomics+0x1dc/0x310
[   15.782433]  ? __pfx_kasan_atomics+0x10/0x10
[   15.782468]  ? __pfx_read_tsc+0x10/0x10
[   15.782491]  ? ktime_get_ts64+0x86/0x230
[   15.782541]  kunit_try_run_case+0x1a5/0x480
[   15.782570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.782595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.782622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.782648]  ? __kthread_parkme+0x82/0x180
[   15.782671]  ? preempt_count_sub+0x50/0x80
[   15.782698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.782743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.782770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.782797]  kthread+0x337/0x6f0
[   15.782818]  ? trace_preempt_on+0x20/0xc0
[   15.782844]  ? __pfx_kthread+0x10/0x10
[   15.782867]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.782891]  ? calculate_sigpending+0x7b/0xa0
[   15.782918]  ? __pfx_kthread+0x10/0x10
[   15.782960]  ret_from_fork+0x116/0x1d0
[   15.782981]  ? __pfx_kthread+0x10/0x10
[   15.783003]  ret_from_fork_asm+0x1a/0x30
[   15.783036]  </TASK>
[   15.783048] 
[   15.796180] Allocated by task 283:
[   15.796332]  kasan_save_stack+0x45/0x70
[   15.796741]  kasan_save_track+0x18/0x40
[   15.797112]  kasan_save_alloc_info+0x3b/0x50
[   15.797542]  __kasan_kmalloc+0xb7/0xc0
[   15.797897]  __kmalloc_cache_noprof+0x189/0x420
[   15.798310]  kasan_atomics+0x95/0x310
[   15.798698]  kunit_try_run_case+0x1a5/0x480
[   15.798946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.799121]  kthread+0x337/0x6f0
[   15.799239]  ret_from_fork+0x116/0x1d0
[   15.799370]  ret_from_fork_asm+0x1a/0x30
[   15.799789] 
[   15.799962] The buggy address belongs to the object at ffff8881026d6200
[   15.799962]  which belongs to the cache kmalloc-64 of size 64
[   15.801092] The buggy address is located 0 bytes to the right of
[   15.801092]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.802194] 
[   15.802306] The buggy address belongs to the physical page:
[   15.802691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.803222] flags: 0x200000000000000(node=0|zone=2)
[   15.803385] page_type: f5(slab)
[   15.803729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.804418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.804945] page dumped because: kasan: bad access detected
[   15.805113] 
[   15.805181] Memory state around the buggy address:
[   15.805333]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.805907]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.806547] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.807156]                                      ^
[   15.807618]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.808265]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.808748] ==================================================================
[   15.961216] ==================================================================
[   15.961904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.962234] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.962648] 
[   15.962758] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.962808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.962822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.962846] Call Trace:
[   15.962866]  <TASK>
[   15.962886]  dump_stack_lvl+0x73/0xb0
[   15.962918]  print_report+0xd1/0x610
[   15.962944]  ? __virt_addr_valid+0x1db/0x2d0
[   15.962970]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.962995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.963021]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.963046]  kasan_report+0x141/0x180
[   15.963070]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.963099]  kasan_check_range+0x10c/0x1c0
[   15.963125]  __kasan_check_write+0x18/0x20
[   15.963147]  kasan_atomics_helper+0x16e7/0x5450
[   15.963173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.963199]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.963232]  kasan_atomics+0x1dc/0x310
[   15.963257]  ? __pfx_kasan_atomics+0x10/0x10
[   15.963284]  ? __pfx_read_tsc+0x10/0x10
[   15.963308]  ? ktime_get_ts64+0x86/0x230
[   15.963335]  kunit_try_run_case+0x1a5/0x480
[   15.963362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.963630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.963662]  ? __kthread_parkme+0x82/0x180
[   15.963687]  ? preempt_count_sub+0x50/0x80
[   15.963714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.963797]  kthread+0x337/0x6f0
[   15.963819]  ? trace_preempt_on+0x20/0xc0
[   15.963846]  ? __pfx_kthread+0x10/0x10
[   15.963869]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.963893]  ? calculate_sigpending+0x7b/0xa0
[   15.963920]  ? __pfx_kthread+0x10/0x10
[   15.963944]  ret_from_fork+0x116/0x1d0
[   15.963965]  ? __pfx_kthread+0x10/0x10
[   15.963989]  ret_from_fork_asm+0x1a/0x30
[   15.964022]  </TASK>
[   15.964035] 
[   15.973398] Allocated by task 283:
[   15.973809]  kasan_save_stack+0x45/0x70
[   15.974123]  kasan_save_track+0x18/0x40
[   15.974352]  kasan_save_alloc_info+0x3b/0x50
[   15.974739]  __kasan_kmalloc+0xb7/0xc0
[   15.974998]  __kmalloc_cache_noprof+0x189/0x420
[   15.975174]  kasan_atomics+0x95/0x310
[   15.975536]  kunit_try_run_case+0x1a5/0x480
[   15.975699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.975984]  kthread+0x337/0x6f0
[   15.976143]  ret_from_fork+0x116/0x1d0
[   15.976319]  ret_from_fork_asm+0x1a/0x30
[   15.976713] 
[   15.976800] The buggy address belongs to the object at ffff8881026d6200
[   15.976800]  which belongs to the cache kmalloc-64 of size 64
[   15.977407] The buggy address is located 0 bytes to the right of
[   15.977407]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.978035] 
[   15.978239] The buggy address belongs to the physical page:
[   15.978427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.978847] flags: 0x200000000000000(node=0|zone=2)
[   15.979074] page_type: f5(slab)
[   15.979229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.979784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.980142] page dumped because: kasan: bad access detected
[   15.980394] 
[   15.980625] Memory state around the buggy address:
[   15.980808]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.981210]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.981607] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.981963]                                      ^
[   15.982255]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.982666]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.983026] ==================================================================
[   15.453853] ==================================================================
[   15.454228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.454654] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.454967] 
[   15.455082] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.455128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.455141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.455164] Call Trace:
[   15.455182]  <TASK>
[   15.455199]  dump_stack_lvl+0x73/0xb0
[   15.455229]  print_report+0xd1/0x610
[   15.455253]  ? __virt_addr_valid+0x1db/0x2d0
[   15.455279]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.455302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.455328]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.455352]  kasan_report+0x141/0x180
[   15.455378]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.455429]  kasan_check_range+0x10c/0x1c0
[   15.455463]  __kasan_check_write+0x18/0x20
[   15.455484]  kasan_atomics_helper+0xb6a/0x5450
[   15.455509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.455533]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.455566]  kasan_atomics+0x1dc/0x310
[   15.455601]  ? __pfx_kasan_atomics+0x10/0x10
[   15.455628]  ? __pfx_read_tsc+0x10/0x10
[   15.455662]  ? ktime_get_ts64+0x86/0x230
[   15.455688]  kunit_try_run_case+0x1a5/0x480
[   15.455715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.455740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.455767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.455794]  ? __kthread_parkme+0x82/0x180
[   15.455816]  ? preempt_count_sub+0x50/0x80
[   15.455843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.455870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.455896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.455924]  kthread+0x337/0x6f0
[   15.455944]  ? trace_preempt_on+0x20/0xc0
[   15.455969]  ? __pfx_kthread+0x10/0x10
[   15.456000]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.456024]  ? calculate_sigpending+0x7b/0xa0
[   15.456050]  ? __pfx_kthread+0x10/0x10
[   15.456084]  ret_from_fork+0x116/0x1d0
[   15.456104]  ? __pfx_kthread+0x10/0x10
[   15.456127]  ret_from_fork_asm+0x1a/0x30
[   15.456160]  </TASK>
[   15.456171] 
[   15.463512] Allocated by task 283:
[   15.463699]  kasan_save_stack+0x45/0x70
[   15.463891]  kasan_save_track+0x18/0x40
[   15.464085]  kasan_save_alloc_info+0x3b/0x50
[   15.464301]  __kasan_kmalloc+0xb7/0xc0
[   15.464514]  __kmalloc_cache_noprof+0x189/0x420
[   15.464735]  kasan_atomics+0x95/0x310
[   15.464929]  kunit_try_run_case+0x1a5/0x480
[   15.465135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465387]  kthread+0x337/0x6f0
[   15.465579]  ret_from_fork+0x116/0x1d0
[   15.465779]  ret_from_fork_asm+0x1a/0x30
[   15.465971] 
[   15.466065] The buggy address belongs to the object at ffff8881026d6200
[   15.466065]  which belongs to the cache kmalloc-64 of size 64
[   15.466591] The buggy address is located 0 bytes to the right of
[   15.466591]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.467115] 
[   15.467226] The buggy address belongs to the physical page:
[   15.467442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.467693] flags: 0x200000000000000(node=0|zone=2)
[   15.467858] page_type: f5(slab)
[   15.467990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.468329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.468713] page dumped because: kasan: bad access detected
[   15.468963] 
[   15.469053] Memory state around the buggy address:
[   15.469276]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.469598]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.469903] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.470117]                                      ^
[   15.470270]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.470554]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.470894] ==================================================================
[   16.213219] ==================================================================
[   16.213516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.214257] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.215004] 
[   16.215200] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.215249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.215285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.215308] Call Trace:
[   16.215329]  <TASK>
[   16.215349]  dump_stack_lvl+0x73/0xb0
[   16.215382]  print_report+0xd1/0x610
[   16.215406]  ? __virt_addr_valid+0x1db/0x2d0
[   16.215441]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.215476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.215501]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.215525]  kasan_report+0x141/0x180
[   16.215549]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.215576]  kasan_check_range+0x10c/0x1c0
[   16.215601]  __kasan_check_write+0x18/0x20
[   16.215623]  kasan_atomics_helper+0x1d7a/0x5450
[   16.215647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.215672]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.215705]  kasan_atomics+0x1dc/0x310
[   16.215729]  ? __pfx_kasan_atomics+0x10/0x10
[   16.215755]  ? __pfx_read_tsc+0x10/0x10
[   16.215778]  ? ktime_get_ts64+0x86/0x230
[   16.215806]  kunit_try_run_case+0x1a5/0x480
[   16.215836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.215862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.215889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.215914]  ? __kthread_parkme+0x82/0x180
[   16.215937]  ? preempt_count_sub+0x50/0x80
[   16.215963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.215989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.216044]  kthread+0x337/0x6f0
[   16.216064]  ? trace_preempt_on+0x20/0xc0
[   16.216089]  ? __pfx_kthread+0x10/0x10
[   16.216111]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.216134]  ? calculate_sigpending+0x7b/0xa0
[   16.216161]  ? __pfx_kthread+0x10/0x10
[   16.216184]  ret_from_fork+0x116/0x1d0
[   16.216203]  ? __pfx_kthread+0x10/0x10
[   16.216225]  ret_from_fork_asm+0x1a/0x30
[   16.216258]  </TASK>
[   16.216269] 
[   16.225337] Allocated by task 283:
[   16.225594]  kasan_save_stack+0x45/0x70
[   16.225802]  kasan_save_track+0x18/0x40
[   16.225940]  kasan_save_alloc_info+0x3b/0x50
[   16.226092]  __kasan_kmalloc+0xb7/0xc0
[   16.226248]  __kmalloc_cache_noprof+0x189/0x420
[   16.226561]  kasan_atomics+0x95/0x310
[   16.226774]  kunit_try_run_case+0x1a5/0x480
[   16.227024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.227303]  kthread+0x337/0x6f0
[   16.227481]  ret_from_fork+0x116/0x1d0
[   16.227695]  ret_from_fork_asm+0x1a/0x30
[   16.227897] 
[   16.228000] The buggy address belongs to the object at ffff8881026d6200
[   16.228000]  which belongs to the cache kmalloc-64 of size 64
[   16.228509] The buggy address is located 0 bytes to the right of
[   16.228509]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.229006] 
[   16.229105] The buggy address belongs to the physical page:
[   16.229379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.229775] flags: 0x200000000000000(node=0|zone=2)
[   16.230033] page_type: f5(slab)
[   16.230211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.230599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.230884] page dumped because: kasan: bad access detected
[   16.231049] 
[   16.231162] Memory state around the buggy address:
[   16.231385]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.231867]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.232189] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.232404]                                      ^
[   16.232666]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233004]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233294] ==================================================================
[   15.809390] ==================================================================
[   15.810779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.811599] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.812226] 
[   15.812433] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.812494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.812507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.812531] Call Trace:
[   15.812552]  <TASK>
[   15.812573]  dump_stack_lvl+0x73/0xb0
[   15.812606]  print_report+0xd1/0x610
[   15.812631]  ? __virt_addr_valid+0x1db/0x2d0
[   15.812658]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.812682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.812707]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.812732]  kasan_report+0x141/0x180
[   15.812755]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.812784]  __asan_report_load8_noabort+0x18/0x20
[   15.812811]  kasan_atomics_helper+0x4eae/0x5450
[   15.812836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.812861]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.812894]  kasan_atomics+0x1dc/0x310
[   15.812919]  ? __pfx_kasan_atomics+0x10/0x10
[   15.812945]  ? __pfx_read_tsc+0x10/0x10
[   15.812969]  ? ktime_get_ts64+0x86/0x230
[   15.812996]  kunit_try_run_case+0x1a5/0x480
[   15.813023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.813075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.813101]  ? __kthread_parkme+0x82/0x180
[   15.813125]  ? preempt_count_sub+0x50/0x80
[   15.813151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.813205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.813232]  kthread+0x337/0x6f0
[   15.813254]  ? trace_preempt_on+0x20/0xc0
[   15.813279]  ? __pfx_kthread+0x10/0x10
[   15.813301]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.813325]  ? calculate_sigpending+0x7b/0xa0
[   15.813352]  ? __pfx_kthread+0x10/0x10
[   15.813375]  ret_from_fork+0x116/0x1d0
[   15.813435]  ? __pfx_kthread+0x10/0x10
[   15.813468]  ret_from_fork_asm+0x1a/0x30
[   15.813502]  </TASK>
[   15.813515] 
[   15.825557] Allocated by task 283:
[   15.825889]  kasan_save_stack+0x45/0x70
[   15.826116]  kasan_save_track+0x18/0x40
[   15.826254]  kasan_save_alloc_info+0x3b/0x50
[   15.826427]  __kasan_kmalloc+0xb7/0xc0
[   15.826811]  __kmalloc_cache_noprof+0x189/0x420
[   15.827255]  kasan_atomics+0x95/0x310
[   15.827648]  kunit_try_run_case+0x1a5/0x480
[   15.828038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.828375]  kthread+0x337/0x6f0
[   15.828740]  ret_from_fork+0x116/0x1d0
[   15.829001]  ret_from_fork_asm+0x1a/0x30
[   15.829324] 
[   15.829422] The buggy address belongs to the object at ffff8881026d6200
[   15.829422]  which belongs to the cache kmalloc-64 of size 64
[   15.830215] The buggy address is located 0 bytes to the right of
[   15.830215]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.830936] 
[   15.831011] The buggy address belongs to the physical page:
[   15.831179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.831460] flags: 0x200000000000000(node=0|zone=2)
[   15.831892] page_type: f5(slab)
[   15.832204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.832905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.833599] page dumped because: kasan: bad access detected
[   15.834120] 
[   15.834296] Memory state around the buggy address:
[   15.834764]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.835159]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.835368] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.836037]                                      ^
[   15.836501]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837097]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837303] ==================================================================
[   16.406367] ==================================================================
[   16.406630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.407513] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.407935] 
[   16.408112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.408215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.408229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.408254] Call Trace:
[   16.408273]  <TASK>
[   16.408297]  dump_stack_lvl+0x73/0xb0
[   16.408329]  print_report+0xd1/0x610
[   16.408355]  ? __virt_addr_valid+0x1db/0x2d0
[   16.408380]  ? kasan_atomics_helper+0x218a/0x5450
[   16.408403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.408441]  ? kasan_atomics_helper+0x218a/0x5450
[   16.408478]  kasan_report+0x141/0x180
[   16.408502]  ? kasan_atomics_helper+0x218a/0x5450
[   16.408530]  kasan_check_range+0x10c/0x1c0
[   16.408556]  __kasan_check_write+0x18/0x20
[   16.408578]  kasan_atomics_helper+0x218a/0x5450
[   16.408603]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.408628]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.408660]  kasan_atomics+0x1dc/0x310
[   16.408685]  ? __pfx_kasan_atomics+0x10/0x10
[   16.408711]  ? __pfx_read_tsc+0x10/0x10
[   16.408734]  ? ktime_get_ts64+0x86/0x230
[   16.408761]  kunit_try_run_case+0x1a5/0x480
[   16.408787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.408812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.408839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.408864]  ? __kthread_parkme+0x82/0x180
[   16.408887]  ? preempt_count_sub+0x50/0x80
[   16.408912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.408938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.408965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.408993]  kthread+0x337/0x6f0
[   16.409013]  ? trace_preempt_on+0x20/0xc0
[   16.409038]  ? __pfx_kthread+0x10/0x10
[   16.409059]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.409083]  ? calculate_sigpending+0x7b/0xa0
[   16.409109]  ? __pfx_kthread+0x10/0x10
[   16.409132]  ret_from_fork+0x116/0x1d0
[   16.409152]  ? __pfx_kthread+0x10/0x10
[   16.409174]  ret_from_fork_asm+0x1a/0x30
[   16.409206]  </TASK>
[   16.409217] 
[   16.418818] Allocated by task 283:
[   16.418996]  kasan_save_stack+0x45/0x70
[   16.419262]  kasan_save_track+0x18/0x40
[   16.419459]  kasan_save_alloc_info+0x3b/0x50
[   16.419792]  __kasan_kmalloc+0xb7/0xc0
[   16.419976]  __kmalloc_cache_noprof+0x189/0x420
[   16.420178]  kasan_atomics+0x95/0x310
[   16.420347]  kunit_try_run_case+0x1a5/0x480
[   16.420751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.421081]  kthread+0x337/0x6f0
[   16.421213]  ret_from_fork+0x116/0x1d0
[   16.421552]  ret_from_fork_asm+0x1a/0x30
[   16.421759] 
[   16.421975] The buggy address belongs to the object at ffff8881026d6200
[   16.421975]  which belongs to the cache kmalloc-64 of size 64
[   16.422616] The buggy address is located 0 bytes to the right of
[   16.422616]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.423112] 
[   16.423203] The buggy address belongs to the physical page:
[   16.423649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.423962] flags: 0x200000000000000(node=0|zone=2)
[   16.424258] page_type: f5(slab)
[   16.424389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.424870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.425222] page dumped because: kasan: bad access detected
[   16.425409] 
[   16.425533] Memory state around the buggy address:
[   16.425872]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.426163]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.426440] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.426929]                                      ^
[   16.427195]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.427491]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.427884] ==================================================================
[   16.032842] ==================================================================
[   16.033117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.033409] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.034251] 
[   16.034371] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.034432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.034446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.034481] Call Trace:
[   16.034502]  <TASK>
[   16.034522]  dump_stack_lvl+0x73/0xb0
[   16.034554]  print_report+0xd1/0x610
[   16.034579]  ? __virt_addr_valid+0x1db/0x2d0
[   16.034695]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.034720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.034746]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.034770]  kasan_report+0x141/0x180
[   16.034794]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.034822]  kasan_check_range+0x10c/0x1c0
[   16.034848]  __kasan_check_write+0x18/0x20
[   16.034869]  kasan_atomics_helper+0x18b1/0x5450
[   16.034893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.034919]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.034952]  kasan_atomics+0x1dc/0x310
[   16.034976]  ? __pfx_kasan_atomics+0x10/0x10
[   16.035003]  ? __pfx_read_tsc+0x10/0x10
[   16.035026]  ? ktime_get_ts64+0x86/0x230
[   16.035052]  kunit_try_run_case+0x1a5/0x480
[   16.035080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.035105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.035132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.035158]  ? __kthread_parkme+0x82/0x180
[   16.035181]  ? preempt_count_sub+0x50/0x80
[   16.035207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.035233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.035260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.035287]  kthread+0x337/0x6f0
[   16.035308]  ? trace_preempt_on+0x20/0xc0
[   16.035333]  ? __pfx_kthread+0x10/0x10
[   16.035355]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.035378]  ? calculate_sigpending+0x7b/0xa0
[   16.035405]  ? __pfx_kthread+0x10/0x10
[   16.035436]  ret_from_fork+0x116/0x1d0
[   16.035469]  ? __pfx_kthread+0x10/0x10
[   16.035491]  ret_from_fork_asm+0x1a/0x30
[   16.035524]  </TASK>
[   16.035536] 
[   16.044928] Allocated by task 283:
[   16.045202]  kasan_save_stack+0x45/0x70
[   16.045484]  kasan_save_track+0x18/0x40
[   16.045656]  kasan_save_alloc_info+0x3b/0x50
[   16.045967]  __kasan_kmalloc+0xb7/0xc0
[   16.046156]  __kmalloc_cache_noprof+0x189/0x420
[   16.046480]  kasan_atomics+0x95/0x310
[   16.046744]  kunit_try_run_case+0x1a5/0x480
[   16.046912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.047160]  kthread+0x337/0x6f0
[   16.047323]  ret_from_fork+0x116/0x1d0
[   16.047733]  ret_from_fork_asm+0x1a/0x30
[   16.047987] 
[   16.048081] The buggy address belongs to the object at ffff8881026d6200
[   16.048081]  which belongs to the cache kmalloc-64 of size 64
[   16.048699] The buggy address is located 0 bytes to the right of
[   16.048699]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.049264] 
[   16.049359] The buggy address belongs to the physical page:
[   16.049796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.050189] flags: 0x200000000000000(node=0|zone=2)
[   16.050420] page_type: f5(slab)
[   16.050763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.051142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.051532] page dumped because: kasan: bad access detected
[   16.051819] 
[   16.051918] Memory state around the buggy address:
[   16.052191]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.052493]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.052925] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.053282]                                      ^
[   16.053517]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.053912]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.054279] ==================================================================
[   15.436060] ==================================================================
[   15.436412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.436791] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.437025] 
[   15.437114] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.437160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.437183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.437206] Call Trace:
[   15.437224]  <TASK>
[   15.437254]  dump_stack_lvl+0x73/0xb0
[   15.437285]  print_report+0xd1/0x610
[   15.437309]  ? __virt_addr_valid+0x1db/0x2d0
[   15.437334]  ? kasan_atomics_helper+0xac7/0x5450
[   15.437357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.437383]  ? kasan_atomics_helper+0xac7/0x5450
[   15.437427]  kasan_report+0x141/0x180
[   15.437459]  ? kasan_atomics_helper+0xac7/0x5450
[   15.437487]  kasan_check_range+0x10c/0x1c0
[   15.437514]  __kasan_check_write+0x18/0x20
[   15.437536]  kasan_atomics_helper+0xac7/0x5450
[   15.437563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.437588]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.437621]  kasan_atomics+0x1dc/0x310
[   15.437645]  ? __pfx_kasan_atomics+0x10/0x10
[   15.437672]  ? __pfx_read_tsc+0x10/0x10
[   15.437704]  ? ktime_get_ts64+0x86/0x230
[   15.437730]  kunit_try_run_case+0x1a5/0x480
[   15.437757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.437794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.437821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.437846]  ? __kthread_parkme+0x82/0x180
[   15.437880]  ? preempt_count_sub+0x50/0x80
[   15.437905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.437931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.437958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.437986]  kthread+0x337/0x6f0
[   15.438006]  ? trace_preempt_on+0x20/0xc0
[   15.438032]  ? __pfx_kthread+0x10/0x10
[   15.438054]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.438077]  ? calculate_sigpending+0x7b/0xa0
[   15.438104]  ? __pfx_kthread+0x10/0x10
[   15.438127]  ret_from_fork+0x116/0x1d0
[   15.438147]  ? __pfx_kthread+0x10/0x10
[   15.438169]  ret_from_fork_asm+0x1a/0x30
[   15.438201]  </TASK>
[   15.438212] 
[   15.445692] Allocated by task 283:
[   15.445912]  kasan_save_stack+0x45/0x70
[   15.446140]  kasan_save_track+0x18/0x40
[   15.446346]  kasan_save_alloc_info+0x3b/0x50
[   15.446543]  __kasan_kmalloc+0xb7/0xc0
[   15.446758]  __kmalloc_cache_noprof+0x189/0x420
[   15.447007]  kasan_atomics+0x95/0x310
[   15.447170]  kunit_try_run_case+0x1a5/0x480
[   15.447415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.447672]  kthread+0x337/0x6f0
[   15.447846]  ret_from_fork+0x116/0x1d0
[   15.447983]  ret_from_fork_asm+0x1a/0x30
[   15.448197] 
[   15.448297] The buggy address belongs to the object at ffff8881026d6200
[   15.448297]  which belongs to the cache kmalloc-64 of size 64
[   15.448819] The buggy address is located 0 bytes to the right of
[   15.448819]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.449307] 
[   15.449381] The buggy address belongs to the physical page:
[   15.449582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.449826] flags: 0x200000000000000(node=0|zone=2)
[   15.450082] page_type: f5(slab)
[   15.450251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.450627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.450956] page dumped because: kasan: bad access detected
[   15.451185] 
[   15.451256] Memory state around the buggy address:
[   15.451436]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.451661]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.451924] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.452269]                                      ^
[   15.452540]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.452897]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.453230] ==================================================================
[   16.123900] ==================================================================
[   16.124250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.124657] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.124944] 
[   16.125059] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.125105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.125119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.125141] Call Trace:
[   16.125160]  <TASK>
[   16.125178]  dump_stack_lvl+0x73/0xb0
[   16.125209]  print_report+0xd1/0x610
[   16.125234]  ? __virt_addr_valid+0x1db/0x2d0
[   16.125259]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.125283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.125307]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.125331]  kasan_report+0x141/0x180
[   16.125354]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.125382]  kasan_check_range+0x10c/0x1c0
[   16.125407]  __kasan_check_write+0x18/0x20
[   16.125429]  kasan_atomics_helper+0x1b22/0x5450
[   16.125479]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.125503]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.125536]  kasan_atomics+0x1dc/0x310
[   16.125561]  ? __pfx_kasan_atomics+0x10/0x10
[   16.125588]  ? __pfx_read_tsc+0x10/0x10
[   16.125624]  ? ktime_get_ts64+0x86/0x230
[   16.125650]  kunit_try_run_case+0x1a5/0x480
[   16.125678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.125703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.125730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.125757]  ? __kthread_parkme+0x82/0x180
[   16.125779]  ? preempt_count_sub+0x50/0x80
[   16.125806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.125832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.125859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.125887]  kthread+0x337/0x6f0
[   16.125907]  ? trace_preempt_on+0x20/0xc0
[   16.125934]  ? __pfx_kthread+0x10/0x10
[   16.125956]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.125980]  ? calculate_sigpending+0x7b/0xa0
[   16.126007]  ? __pfx_kthread+0x10/0x10
[   16.126030]  ret_from_fork+0x116/0x1d0
[   16.126051]  ? __pfx_kthread+0x10/0x10
[   16.126074]  ret_from_fork_asm+0x1a/0x30
[   16.126107]  </TASK>
[   16.126118] 
[   16.133114] Allocated by task 283:
[   16.133300]  kasan_save_stack+0x45/0x70
[   16.133552]  kasan_save_track+0x18/0x40
[   16.133750]  kasan_save_alloc_info+0x3b/0x50
[   16.133969]  __kasan_kmalloc+0xb7/0xc0
[   16.134163]  __kmalloc_cache_noprof+0x189/0x420
[   16.134386]  kasan_atomics+0x95/0x310
[   16.134574]  kunit_try_run_case+0x1a5/0x480
[   16.134722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.134962]  kthread+0x337/0x6f0
[   16.135132]  ret_from_fork+0x116/0x1d0
[   16.135327]  ret_from_fork_asm+0x1a/0x30
[   16.135523] 
[   16.135626] The buggy address belongs to the object at ffff8881026d6200
[   16.135626]  which belongs to the cache kmalloc-64 of size 64
[   16.136050] The buggy address is located 0 bytes to the right of
[   16.136050]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.136592] 
[   16.136684] The buggy address belongs to the physical page:
[   16.136922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.137236] flags: 0x200000000000000(node=0|zone=2)
[   16.137465] page_type: f5(slab)
[   16.137599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.137835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.138061] page dumped because: kasan: bad access detected
[   16.138232] 
[   16.138325] Memory state around the buggy address:
[   16.138555]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.138868]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.139177] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.139496]                                      ^
[   16.139715]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.140065]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.140280] ==================================================================
[   16.383724] ==================================================================
[   16.384301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.384871] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.385305] 
[   16.385521] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.385576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.385590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.385614] Call Trace:
[   16.385634]  <TASK>
[   16.385655]  dump_stack_lvl+0x73/0xb0
[   16.385687]  print_report+0xd1/0x610
[   16.385712]  ? __virt_addr_valid+0x1db/0x2d0
[   16.385738]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.385762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.385787]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.385811]  kasan_report+0x141/0x180
[   16.385834]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.385862]  __asan_report_load8_noabort+0x18/0x20
[   16.385889]  kasan_atomics_helper+0x4fb2/0x5450
[   16.385913]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.385938]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.385971]  kasan_atomics+0x1dc/0x310
[   16.385996]  ? __pfx_kasan_atomics+0x10/0x10
[   16.386021]  ? __pfx_read_tsc+0x10/0x10
[   16.386044]  ? ktime_get_ts64+0x86/0x230
[   16.386071]  kunit_try_run_case+0x1a5/0x480
[   16.386097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.386122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.386149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.386174]  ? __kthread_parkme+0x82/0x180
[   16.386197]  ? preempt_count_sub+0x50/0x80
[   16.386223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.386250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.386275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.386303]  kthread+0x337/0x6f0
[   16.386323]  ? trace_preempt_on+0x20/0xc0
[   16.386348]  ? __pfx_kthread+0x10/0x10
[   16.386371]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.386394]  ? calculate_sigpending+0x7b/0xa0
[   16.386581]  ? __pfx_kthread+0x10/0x10
[   16.386605]  ret_from_fork+0x116/0x1d0
[   16.386626]  ? __pfx_kthread+0x10/0x10
[   16.386649]  ret_from_fork_asm+0x1a/0x30
[   16.386681]  </TASK>
[   16.386692] 
[   16.395968] Allocated by task 283:
[   16.396152]  kasan_save_stack+0x45/0x70
[   16.396352]  kasan_save_track+0x18/0x40
[   16.396899]  kasan_save_alloc_info+0x3b/0x50
[   16.397100]  __kasan_kmalloc+0xb7/0xc0
[   16.397249]  __kmalloc_cache_noprof+0x189/0x420
[   16.397609]  kasan_atomics+0x95/0x310
[   16.397783]  kunit_try_run_case+0x1a5/0x480
[   16.398112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398460]  kthread+0x337/0x6f0
[   16.398601]  ret_from_fork+0x116/0x1d0
[   16.398798]  ret_from_fork_asm+0x1a/0x30
[   16.399117] 
[   16.399317] The buggy address belongs to the object at ffff8881026d6200
[   16.399317]  which belongs to the cache kmalloc-64 of size 64
[   16.399960] The buggy address is located 0 bytes to the right of
[   16.399960]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.400442] 
[   16.400794] The buggy address belongs to the physical page:
[   16.401050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.401468] flags: 0x200000000000000(node=0|zone=2)
[   16.401771] page_type: f5(slab)
[   16.401983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.402379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.402886] page dumped because: kasan: bad access detected
[   16.403182] 
[   16.403269] Memory state around the buggy address:
[   16.403498]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.403938]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.404306] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.404694]                                      ^
[   16.405033]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.405354]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.405796] ==================================================================
[   15.069418] ==================================================================
[   15.070264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.070710] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.070998] 
[   15.071109] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.071155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.071166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.071188] Call Trace:
[   15.071201]  <TASK>
[   15.071215]  dump_stack_lvl+0x73/0xb0
[   15.071245]  print_report+0xd1/0x610
[   15.071269]  ? __virt_addr_valid+0x1db/0x2d0
[   15.071294]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.071317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.071341]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.071363]  kasan_report+0x141/0x180
[   15.071385]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.071412]  __asan_report_load4_noabort+0x18/0x20
[   15.071438]  kasan_atomics_helper+0x4bbc/0x5450
[   15.071493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.071517]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.071554]  kasan_atomics+0x1dc/0x310
[   15.071578]  ? __pfx_kasan_atomics+0x10/0x10
[   15.071603]  ? __pfx_read_tsc+0x10/0x10
[   15.071625]  ? ktime_get_ts64+0x86/0x230
[   15.071650]  kunit_try_run_case+0x1a5/0x480
[   15.071675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071699]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.071723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.071748]  ? __kthread_parkme+0x82/0x180
[   15.071771]  ? preempt_count_sub+0x50/0x80
[   15.071796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.071845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.071872]  kthread+0x337/0x6f0
[   15.071891]  ? trace_preempt_on+0x20/0xc0
[   15.071916]  ? __pfx_kthread+0x10/0x10
[   15.071936]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.071957]  ? calculate_sigpending+0x7b/0xa0
[   15.071983]  ? __pfx_kthread+0x10/0x10
[   15.072005]  ret_from_fork+0x116/0x1d0
[   15.072023]  ? __pfx_kthread+0x10/0x10
[   15.072045]  ret_from_fork_asm+0x1a/0x30
[   15.072077]  </TASK>
[   15.072087] 
[   15.079872] Allocated by task 283:
[   15.080053]  kasan_save_stack+0x45/0x70
[   15.080228]  kasan_save_track+0x18/0x40
[   15.080370]  kasan_save_alloc_info+0x3b/0x50
[   15.080668]  __kasan_kmalloc+0xb7/0xc0
[   15.080861]  __kmalloc_cache_noprof+0x189/0x420
[   15.081079]  kasan_atomics+0x95/0x310
[   15.081265]  kunit_try_run_case+0x1a5/0x480
[   15.081412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081849]  kthread+0x337/0x6f0
[   15.082035]  ret_from_fork+0x116/0x1d0
[   15.082199]  ret_from_fork_asm+0x1a/0x30
[   15.082374] 
[   15.082484] The buggy address belongs to the object at ffff8881026d6200
[   15.082484]  which belongs to the cache kmalloc-64 of size 64
[   15.082988] The buggy address is located 0 bytes to the right of
[   15.082988]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.083397] 
[   15.083533] The buggy address belongs to the physical page:
[   15.083861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.084213] flags: 0x200000000000000(node=0|zone=2)
[   15.084398] page_type: f5(slab)
[   15.084623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.084941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.085281] page dumped because: kasan: bad access detected
[   15.085742] 
[   15.085846] Memory state around the buggy address:
[   15.086074]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.086342]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.086792] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.087077]                                      ^
[   15.087287]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087665]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087957] ==================================================================
[   15.256004] ==================================================================
[   15.256264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.256626] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.257015] 
[   15.257127] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.257199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.257212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.257235] Call Trace:
[   15.257253]  <TASK>
[   15.257270]  dump_stack_lvl+0x73/0xb0
[   15.257300]  print_report+0xd1/0x610
[   15.257326]  ? __virt_addr_valid+0x1db/0x2d0
[   15.257353]  ? kasan_atomics_helper+0x565/0x5450
[   15.257377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.257402]  ? kasan_atomics_helper+0x565/0x5450
[   15.257494]  kasan_report+0x141/0x180
[   15.257518]  ? kasan_atomics_helper+0x565/0x5450
[   15.257557]  kasan_check_range+0x10c/0x1c0
[   15.257585]  __kasan_check_write+0x18/0x20
[   15.257606]  kasan_atomics_helper+0x565/0x5450
[   15.257631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.257656]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.257690]  kasan_atomics+0x1dc/0x310
[   15.257714]  ? __pfx_kasan_atomics+0x10/0x10
[   15.257740]  ? __pfx_read_tsc+0x10/0x10
[   15.257764]  ? ktime_get_ts64+0x86/0x230
[   15.257790]  kunit_try_run_case+0x1a5/0x480
[   15.257816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.257867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.257894]  ? __kthread_parkme+0x82/0x180
[   15.257917]  ? preempt_count_sub+0x50/0x80
[   15.257943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.258023]  kthread+0x337/0x6f0
[   15.258043]  ? trace_preempt_on+0x20/0xc0
[   15.258068]  ? __pfx_kthread+0x10/0x10
[   15.258090]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.258114]  ? calculate_sigpending+0x7b/0xa0
[   15.258140]  ? __pfx_kthread+0x10/0x10
[   15.258163]  ret_from_fork+0x116/0x1d0
[   15.258184]  ? __pfx_kthread+0x10/0x10
[   15.258206]  ret_from_fork_asm+0x1a/0x30
[   15.258239]  </TASK>
[   15.258250] 
[   15.266787] Allocated by task 283:
[   15.267037]  kasan_save_stack+0x45/0x70
[   15.267183]  kasan_save_track+0x18/0x40
[   15.267316]  kasan_save_alloc_info+0x3b/0x50
[   15.267674]  __kasan_kmalloc+0xb7/0xc0
[   15.267956]  __kmalloc_cache_noprof+0x189/0x420
[   15.268184]  kasan_atomics+0x95/0x310
[   15.268563]  kunit_try_run_case+0x1a5/0x480
[   15.268773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.269027]  kthread+0x337/0x6f0
[   15.269195]  ret_from_fork+0x116/0x1d0
[   15.269551]  ret_from_fork_asm+0x1a/0x30
[   15.269755] 
[   15.269856] The buggy address belongs to the object at ffff8881026d6200
[   15.269856]  which belongs to the cache kmalloc-64 of size 64
[   15.270313] The buggy address is located 0 bytes to the right of
[   15.270313]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.270973] 
[   15.271137] The buggy address belongs to the physical page:
[   15.271766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.272345] flags: 0x200000000000000(node=0|zone=2)
[   15.272848] page_type: f5(slab)
[   15.273194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.273608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.273836] page dumped because: kasan: bad access detected
[   15.274005] 
[   15.274074] Memory state around the buggy address:
[   15.274227]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.274620]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.275279] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.275950]                                      ^
[   15.276426]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.277065]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.277705] ==================================================================
[   15.307473] ==================================================================
[   15.308213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.309052] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.309861] 
[   15.310093] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.310139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.310152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.310175] Call Trace:
[   15.310193]  <TASK>
[   15.310211]  dump_stack_lvl+0x73/0xb0
[   15.310253]  print_report+0xd1/0x610
[   15.310278]  ? __virt_addr_valid+0x1db/0x2d0
[   15.310303]  ? kasan_atomics_helper+0x697/0x5450
[   15.310337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.310362]  ? kasan_atomics_helper+0x697/0x5450
[   15.310386]  kasan_report+0x141/0x180
[   15.310416]  ? kasan_atomics_helper+0x697/0x5450
[   15.310474]  kasan_check_range+0x10c/0x1c0
[   15.310500]  __kasan_check_write+0x18/0x20
[   15.310532]  kasan_atomics_helper+0x697/0x5450
[   15.310556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.310581]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.310614]  kasan_atomics+0x1dc/0x310
[   15.310638]  ? __pfx_kasan_atomics+0x10/0x10
[   15.310664]  ? __pfx_read_tsc+0x10/0x10
[   15.310687]  ? ktime_get_ts64+0x86/0x230
[   15.310713]  kunit_try_run_case+0x1a5/0x480
[   15.310740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.310765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.310792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.310818]  ? __kthread_parkme+0x82/0x180
[   15.310841]  ? preempt_count_sub+0x50/0x80
[   15.310867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.310897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.310924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.310953]  kthread+0x337/0x6f0
[   15.310974]  ? trace_preempt_on+0x20/0xc0
[   15.311000]  ? __pfx_kthread+0x10/0x10
[   15.311023]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.311046]  ? calculate_sigpending+0x7b/0xa0
[   15.311073]  ? __pfx_kthread+0x10/0x10
[   15.311097]  ret_from_fork+0x116/0x1d0
[   15.311118]  ? __pfx_kthread+0x10/0x10
[   15.311140]  ret_from_fork_asm+0x1a/0x30
[   15.311174]  </TASK>
[   15.311186] 
[   15.318783] Allocated by task 283:
[   15.318911]  kasan_save_stack+0x45/0x70
[   15.319052]  kasan_save_track+0x18/0x40
[   15.319226]  kasan_save_alloc_info+0x3b/0x50
[   15.319478]  __kasan_kmalloc+0xb7/0xc0
[   15.319691]  __kmalloc_cache_noprof+0x189/0x420
[   15.319950]  kasan_atomics+0x95/0x310
[   15.320142]  kunit_try_run_case+0x1a5/0x480
[   15.320382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.320639]  kthread+0x337/0x6f0
[   15.320771]  ret_from_fork+0x116/0x1d0
[   15.320962]  ret_from_fork_asm+0x1a/0x30
[   15.321162] 
[   15.321262] The buggy address belongs to the object at ffff8881026d6200
[   15.321262]  which belongs to the cache kmalloc-64 of size 64
[   15.321789] The buggy address is located 0 bytes to the right of
[   15.321789]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.322297] 
[   15.322371] The buggy address belongs to the physical page:
[   15.322566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.322800] flags: 0x200000000000000(node=0|zone=2)
[   15.322978] page_type: f5(slab)
[   15.323164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.323525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.323851] page dumped because: kasan: bad access detected
[   15.324055] 
[   15.324168] Memory state around the buggy address:
[   15.324340]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.324586]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.324794] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.325117]                                      ^
[   15.325375]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.325758]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.326086] ==================================================================
[   15.914618] ==================================================================
[   15.915369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.915722] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.916106] 
[   15.916232] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.916286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.916299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.916323] Call Trace:
[   15.916341]  <TASK>
[   15.916360]  dump_stack_lvl+0x73/0xb0
[   15.916391]  print_report+0xd1/0x610
[   15.916417]  ? __virt_addr_valid+0x1db/0x2d0
[   15.916443]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.916477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.916696]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.916723]  kasan_report+0x141/0x180
[   15.916747]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.916776]  kasan_check_range+0x10c/0x1c0
[   15.916801]  __kasan_check_write+0x18/0x20
[   15.916822]  kasan_atomics_helper+0x15b6/0x5450
[   15.916847]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.916872]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.916904]  kasan_atomics+0x1dc/0x310
[   15.916929]  ? __pfx_kasan_atomics+0x10/0x10
[   15.916956]  ? __pfx_read_tsc+0x10/0x10
[   15.916978]  ? ktime_get_ts64+0x86/0x230
[   15.917005]  kunit_try_run_case+0x1a5/0x480
[   15.917032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.917057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.917084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.917109]  ? __kthread_parkme+0x82/0x180
[   15.917132]  ? preempt_count_sub+0x50/0x80
[   15.917158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.917184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.917210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.917237]  kthread+0x337/0x6f0
[   15.917258]  ? trace_preempt_on+0x20/0xc0
[   15.917283]  ? __pfx_kthread+0x10/0x10
[   15.917305]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.917329]  ? calculate_sigpending+0x7b/0xa0
[   15.917356]  ? __pfx_kthread+0x10/0x10
[   15.917378]  ret_from_fork+0x116/0x1d0
[   15.917398]  ? __pfx_kthread+0x10/0x10
[   15.917434]  ret_from_fork_asm+0x1a/0x30
[   15.917477]  </TASK>
[   15.917488] 
[   15.926840] Allocated by task 283:
[   15.927169]  kasan_save_stack+0x45/0x70
[   15.927352]  kasan_save_track+0x18/0x40
[   15.927763]  kasan_save_alloc_info+0x3b/0x50
[   15.927953]  __kasan_kmalloc+0xb7/0xc0
[   15.928250]  __kmalloc_cache_noprof+0x189/0x420
[   15.928541]  kasan_atomics+0x95/0x310
[   15.928789]  kunit_try_run_case+0x1a5/0x480
[   15.929060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.929286]  kthread+0x337/0x6f0
[   15.929443]  ret_from_fork+0x116/0x1d0
[   15.929814]  ret_from_fork_asm+0x1a/0x30
[   15.930014] 
[   15.930104] The buggy address belongs to the object at ffff8881026d6200
[   15.930104]  which belongs to the cache kmalloc-64 of size 64
[   15.930820] The buggy address is located 0 bytes to the right of
[   15.930820]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.931439] 
[   15.931657] The buggy address belongs to the physical page:
[   15.931956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.932267] flags: 0x200000000000000(node=0|zone=2)
[   15.932538] page_type: f5(slab)
[   15.932854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.933246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.933591] page dumped because: kasan: bad access detected
[   15.933936] 
[   15.934037] Memory state around the buggy address:
[   15.934238]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.934754]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935057] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.935446]                                      ^
[   15.935663]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936073]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936437] ==================================================================
[   16.158828] ==================================================================
[   16.159164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.159399] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.159714] 
[   16.159828] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.159879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.159894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.159917] Call Trace:
[   16.159936]  <TASK>
[   16.159956]  dump_stack_lvl+0x73/0xb0
[   16.159985]  print_report+0xd1/0x610
[   16.160009]  ? __virt_addr_valid+0x1db/0x2d0
[   16.160032]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.160054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.160077]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.160099]  kasan_report+0x141/0x180
[   16.160121]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.160147]  __asan_report_load8_noabort+0x18/0x20
[   16.160172]  kasan_atomics_helper+0x4f30/0x5450
[   16.160195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.160217]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.160250]  kasan_atomics+0x1dc/0x310
[   16.160273]  ? __pfx_kasan_atomics+0x10/0x10
[   16.160302]  ? __pfx_read_tsc+0x10/0x10
[   16.160323]  ? ktime_get_ts64+0x86/0x230
[   16.160348]  kunit_try_run_case+0x1a5/0x480
[   16.160373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.160423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.160447]  ? __kthread_parkme+0x82/0x180
[   16.160499]  ? preempt_count_sub+0x50/0x80
[   16.160525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.160593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.160621]  kthread+0x337/0x6f0
[   16.160642]  ? trace_preempt_on+0x20/0xc0
[   16.160668]  ? __pfx_kthread+0x10/0x10
[   16.160690]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.160714]  ? calculate_sigpending+0x7b/0xa0
[   16.160740]  ? __pfx_kthread+0x10/0x10
[   16.160763]  ret_from_fork+0x116/0x1d0
[   16.160784]  ? __pfx_kthread+0x10/0x10
[   16.160808]  ret_from_fork_asm+0x1a/0x30
[   16.160843]  </TASK>
[   16.160856] 
[   16.168238] Allocated by task 283:
[   16.168432]  kasan_save_stack+0x45/0x70
[   16.168645]  kasan_save_track+0x18/0x40
[   16.168838]  kasan_save_alloc_info+0x3b/0x50
[   16.169045]  __kasan_kmalloc+0xb7/0xc0
[   16.169179]  __kmalloc_cache_noprof+0x189/0x420
[   16.169338]  kasan_atomics+0x95/0x310
[   16.169621]  kunit_try_run_case+0x1a5/0x480
[   16.169832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.170088]  kthread+0x337/0x6f0
[   16.170263]  ret_from_fork+0x116/0x1d0
[   16.170437]  ret_from_fork_asm+0x1a/0x30
[   16.170616] 
[   16.170714] The buggy address belongs to the object at ffff8881026d6200
[   16.170714]  which belongs to the cache kmalloc-64 of size 64
[   16.171136] The buggy address is located 0 bytes to the right of
[   16.171136]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.171693] 
[   16.171784] The buggy address belongs to the physical page:
[   16.171963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.172204] flags: 0x200000000000000(node=0|zone=2)
[   16.172374] page_type: f5(slab)
[   16.172703] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.173053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.173411] page dumped because: kasan: bad access detected
[   16.173657] 
[   16.173750] Memory state around the buggy address:
[   16.173958]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.174184]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.174399] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.174729]                                      ^
[   16.174957]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.175284]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.176840] ==================================================================
[   16.253210] ==================================================================
[   16.253714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.254230] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.254539] 
[   16.254732] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.254780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.254793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.254816] Call Trace:
[   16.254836]  <TASK>
[   16.254855]  dump_stack_lvl+0x73/0xb0
[   16.254886]  print_report+0xd1/0x610
[   16.254911]  ? __virt_addr_valid+0x1db/0x2d0
[   16.254936]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.254959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.254985]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.255010]  kasan_report+0x141/0x180
[   16.255035]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.255063]  kasan_check_range+0x10c/0x1c0
[   16.255088]  __kasan_check_write+0x18/0x20
[   16.255109]  kasan_atomics_helper+0x1eaa/0x5450
[   16.255134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.255158]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.255191]  kasan_atomics+0x1dc/0x310
[   16.255215]  ? __pfx_kasan_atomics+0x10/0x10
[   16.255241]  ? __pfx_read_tsc+0x10/0x10
[   16.255263]  ? ktime_get_ts64+0x86/0x230
[   16.255289]  kunit_try_run_case+0x1a5/0x480
[   16.255316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.255341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.255367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.255393]  ? __kthread_parkme+0x82/0x180
[   16.255425]  ? preempt_count_sub+0x50/0x80
[   16.255462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.255489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.255515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.255542]  kthread+0x337/0x6f0
[   16.255563]  ? trace_preempt_on+0x20/0xc0
[   16.255626]  ? __pfx_kthread+0x10/0x10
[   16.255673]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.255721]  ? calculate_sigpending+0x7b/0xa0
[   16.255815]  ? __pfx_kthread+0x10/0x10
[   16.255862]  ret_from_fork+0x116/0x1d0
[   16.255884]  ? __pfx_kthread+0x10/0x10
[   16.255906]  ret_from_fork_asm+0x1a/0x30
[   16.255940]  </TASK>
[   16.255952] 
[   16.263633] Allocated by task 283:
[   16.263884]  kasan_save_stack+0x45/0x70
[   16.264109]  kasan_save_track+0x18/0x40
[   16.264248]  kasan_save_alloc_info+0x3b/0x50
[   16.264399]  __kasan_kmalloc+0xb7/0xc0
[   16.264646]  __kmalloc_cache_noprof+0x189/0x420
[   16.264898]  kasan_atomics+0x95/0x310
[   16.265118]  kunit_try_run_case+0x1a5/0x480
[   16.265331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.265587]  kthread+0x337/0x6f0
[   16.265790]  ret_from_fork+0x116/0x1d0
[   16.265987]  ret_from_fork_asm+0x1a/0x30
[   16.266166] 
[   16.266296] The buggy address belongs to the object at ffff8881026d6200
[   16.266296]  which belongs to the cache kmalloc-64 of size 64
[   16.266772] The buggy address is located 0 bytes to the right of
[   16.266772]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.267332] 
[   16.267473] The buggy address belongs to the physical page:
[   16.267692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.267928] flags: 0x200000000000000(node=0|zone=2)
[   16.268092] page_type: f5(slab)
[   16.268211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.268520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.268742] page dumped because: kasan: bad access detected
[   16.269149] 
[   16.269303] Memory state around the buggy address:
[   16.269586]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.270045]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.270386] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.270618]                                      ^
[   16.270777]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.270993]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.271209] ==================================================================
[   15.622876] ==================================================================
[   15.623232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.623619] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.623948] 
[   15.624067] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.624112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.624135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.624158] Call Trace:
[   15.624177]  <TASK>
[   15.624206]  dump_stack_lvl+0x73/0xb0
[   15.624236]  print_report+0xd1/0x610
[   15.624259]  ? __virt_addr_valid+0x1db/0x2d0
[   15.624297]  ? kasan_atomics_helper+0x1079/0x5450
[   15.624321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.624347]  ? kasan_atomics_helper+0x1079/0x5450
[   15.624381]  kasan_report+0x141/0x180
[   15.624430]  ? kasan_atomics_helper+0x1079/0x5450
[   15.624472]  kasan_check_range+0x10c/0x1c0
[   15.624498]  __kasan_check_write+0x18/0x20
[   15.624519]  kasan_atomics_helper+0x1079/0x5450
[   15.624545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.624570]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.624604]  kasan_atomics+0x1dc/0x310
[   15.624629]  ? __pfx_kasan_atomics+0x10/0x10
[   15.624655]  ? __pfx_read_tsc+0x10/0x10
[   15.624678]  ? ktime_get_ts64+0x86/0x230
[   15.624704]  kunit_try_run_case+0x1a5/0x480
[   15.624731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.624757]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.624783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.624809]  ? __kthread_parkme+0x82/0x180
[   15.624833]  ? preempt_count_sub+0x50/0x80
[   15.624859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.624886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.624914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.624942]  kthread+0x337/0x6f0
[   15.624971]  ? trace_preempt_on+0x20/0xc0
[   15.624997]  ? __pfx_kthread+0x10/0x10
[   15.625019]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.625054]  ? calculate_sigpending+0x7b/0xa0
[   15.625090]  ? __pfx_kthread+0x10/0x10
[   15.625113]  ret_from_fork+0x116/0x1d0
[   15.625134]  ? __pfx_kthread+0x10/0x10
[   15.625167]  ret_from_fork_asm+0x1a/0x30
[   15.625200]  </TASK>
[   15.625211] 
[   15.632295] Allocated by task 283:
[   15.632536]  kasan_save_stack+0x45/0x70
[   15.632763]  kasan_save_track+0x18/0x40
[   15.632958]  kasan_save_alloc_info+0x3b/0x50
[   15.633194]  __kasan_kmalloc+0xb7/0xc0
[   15.633384]  __kmalloc_cache_noprof+0x189/0x420
[   15.633651]  kasan_atomics+0x95/0x310
[   15.633843]  kunit_try_run_case+0x1a5/0x480
[   15.634035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.634299]  kthread+0x337/0x6f0
[   15.634503]  ret_from_fork+0x116/0x1d0
[   15.634693]  ret_from_fork_asm+0x1a/0x30
[   15.634896] 
[   15.635008] The buggy address belongs to the object at ffff8881026d6200
[   15.635008]  which belongs to the cache kmalloc-64 of size 64
[   15.635524] The buggy address is located 0 bytes to the right of
[   15.635524]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.636022] 
[   15.636118] The buggy address belongs to the physical page:
[   15.636359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.636727] flags: 0x200000000000000(node=0|zone=2)
[   15.636968] page_type: f5(slab)
[   15.637092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.637325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.637588] page dumped because: kasan: bad access detected
[   15.637802] 
[   15.637907] Memory state around the buggy address:
[   15.638130]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.638480]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.638797] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.639076]                                      ^
[   15.639232]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.639479]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.639694] ==================================================================
[   15.416898] ==================================================================
[   15.417242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.417744] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.418036] 
[   15.418150] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.418199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.418212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.418236] Call Trace:
[   15.418253]  <TASK>
[   15.418271]  dump_stack_lvl+0x73/0xb0
[   15.418301]  print_report+0xd1/0x610
[   15.418325]  ? __virt_addr_valid+0x1db/0x2d0
[   15.418349]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.418373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.418419]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.418444]  kasan_report+0x141/0x180
[   15.418477]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.418505]  kasan_check_range+0x10c/0x1c0
[   15.418531]  __kasan_check_write+0x18/0x20
[   15.418553]  kasan_atomics_helper+0xa2b/0x5450
[   15.418577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.418603]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.418635]  kasan_atomics+0x1dc/0x310
[   15.418660]  ? __pfx_kasan_atomics+0x10/0x10
[   15.418686]  ? __pfx_read_tsc+0x10/0x10
[   15.418710]  ? ktime_get_ts64+0x86/0x230
[   15.418735]  kunit_try_run_case+0x1a5/0x480
[   15.418761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.418796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.418822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.418859]  ? __kthread_parkme+0x82/0x180
[   15.418885]  ? preempt_count_sub+0x50/0x80
[   15.418911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.418937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.418973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.419000]  kthread+0x337/0x6f0
[   15.419031]  ? trace_preempt_on+0x20/0xc0
[   15.419057]  ? __pfx_kthread+0x10/0x10
[   15.419079]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.419103]  ? calculate_sigpending+0x7b/0xa0
[   15.419138]  ? __pfx_kthread+0x10/0x10
[   15.419162]  ret_from_fork+0x116/0x1d0
[   15.419182]  ? __pfx_kthread+0x10/0x10
[   15.419214]  ret_from_fork_asm+0x1a/0x30
[   15.419247]  </TASK>
[   15.419258] 
[   15.427905] Allocated by task 283:
[   15.428090]  kasan_save_stack+0x45/0x70
[   15.428242]  kasan_save_track+0x18/0x40
[   15.428481]  kasan_save_alloc_info+0x3b/0x50
[   15.428729]  __kasan_kmalloc+0xb7/0xc0
[   15.428946]  __kmalloc_cache_noprof+0x189/0x420
[   15.429163]  kasan_atomics+0x95/0x310
[   15.429315]  kunit_try_run_case+0x1a5/0x480
[   15.429573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.429799]  kthread+0x337/0x6f0
[   15.429975]  ret_from_fork+0x116/0x1d0
[   15.430180]  ret_from_fork_asm+0x1a/0x30
[   15.430325] 
[   15.430417] The buggy address belongs to the object at ffff8881026d6200
[   15.430417]  which belongs to the cache kmalloc-64 of size 64
[   15.430946] The buggy address is located 0 bytes to the right of
[   15.430946]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.431332] 
[   15.431467] The buggy address belongs to the physical page:
[   15.431752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.432107] flags: 0x200000000000000(node=0|zone=2)
[   15.432373] page_type: f5(slab)
[   15.432570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.432882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.433199] page dumped because: kasan: bad access detected
[   15.433465] 
[   15.433561] Memory state around the buggy address:
[   15.433765]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.434051]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.434350] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.434639]                                      ^
[   15.434887]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.435132]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.435474] ==================================================================
[   16.362404] ==================================================================
[   16.363021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.363316] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.363855] 
[   16.363953] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.364035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.364060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.364096] Call Trace:
[   16.364117]  <TASK>
[   16.364136]  dump_stack_lvl+0x73/0xb0
[   16.364167]  print_report+0xd1/0x610
[   16.364192]  ? __virt_addr_valid+0x1db/0x2d0
[   16.364218]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.364241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.364267]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.364295]  kasan_report+0x141/0x180
[   16.364319]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.364348]  kasan_check_range+0x10c/0x1c0
[   16.364403]  __kasan_check_write+0x18/0x20
[   16.364436]  kasan_atomics_helper+0x20c8/0x5450
[   16.364480]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.364505]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.364537]  kasan_atomics+0x1dc/0x310
[   16.364562]  ? __pfx_kasan_atomics+0x10/0x10
[   16.364589]  ? __pfx_read_tsc+0x10/0x10
[   16.364611]  ? ktime_get_ts64+0x86/0x230
[   16.364638]  kunit_try_run_case+0x1a5/0x480
[   16.364665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.364690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.364717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.364742]  ? __kthread_parkme+0x82/0x180
[   16.364764]  ? preempt_count_sub+0x50/0x80
[   16.364790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.364816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.364843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.364871]  kthread+0x337/0x6f0
[   16.364891]  ? trace_preempt_on+0x20/0xc0
[   16.364916]  ? __pfx_kthread+0x10/0x10
[   16.364938]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.364961]  ? calculate_sigpending+0x7b/0xa0
[   16.364988]  ? __pfx_kthread+0x10/0x10
[   16.365010]  ret_from_fork+0x116/0x1d0
[   16.365061]  ? __pfx_kthread+0x10/0x10
[   16.365083]  ret_from_fork_asm+0x1a/0x30
[   16.365116]  </TASK>
[   16.365137] 
[   16.372983] Allocated by task 283:
[   16.373144]  kasan_save_stack+0x45/0x70
[   16.373387]  kasan_save_track+0x18/0x40
[   16.373599]  kasan_save_alloc_info+0x3b/0x50
[   16.373754]  __kasan_kmalloc+0xb7/0xc0
[   16.373890]  __kmalloc_cache_noprof+0x189/0x420
[   16.374069]  kasan_atomics+0x95/0x310
[   16.374291]  kunit_try_run_case+0x1a5/0x480
[   16.374520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.374782]  kthread+0x337/0x6f0
[   16.375085]  ret_from_fork+0x116/0x1d0
[   16.375306]  ret_from_fork_asm+0x1a/0x30
[   16.375808] 
[   16.375949] The buggy address belongs to the object at ffff8881026d6200
[   16.375949]  which belongs to the cache kmalloc-64 of size 64
[   16.377231] The buggy address is located 0 bytes to the right of
[   16.377231]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.377823] 
[   16.377926] The buggy address belongs to the physical page:
[   16.378148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.378731] flags: 0x200000000000000(node=0|zone=2)
[   16.378933] page_type: f5(slab)
[   16.379111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.379639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.379928] page dumped because: kasan: bad access detected
[   16.380172] 
[   16.380249] Memory state around the buggy address:
[   16.380701]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.381050]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.381303] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.381798]                                      ^
[   16.382103]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.382353]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.382845] ==================================================================
[   15.111688] ==================================================================
[   15.112816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.113090] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.113317] 
[   15.113403] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.113735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.113952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.113979] Call Trace:
[   15.113993]  <TASK>
[   15.114022]  dump_stack_lvl+0x73/0xb0
[   15.114054]  print_report+0xd1/0x610
[   15.114078]  ? __virt_addr_valid+0x1db/0x2d0
[   15.114101]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.114123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.114147]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.114170]  kasan_report+0x141/0x180
[   15.114192]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.114218]  __asan_report_load4_noabort+0x18/0x20
[   15.114244]  kasan_atomics_helper+0x4b88/0x5450
[   15.114267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.114290]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.114322]  kasan_atomics+0x1dc/0x310
[   15.114345]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114369]  ? __pfx_read_tsc+0x10/0x10
[   15.114391]  ? ktime_get_ts64+0x86/0x230
[   15.114431]  kunit_try_run_case+0x1a5/0x480
[   15.114469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.114518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.114542]  ? __kthread_parkme+0x82/0x180
[   15.114593]  ? preempt_count_sub+0x50/0x80
[   15.114618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.114669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.114695]  kthread+0x337/0x6f0
[   15.114715]  ? trace_preempt_on+0x20/0xc0
[   15.114738]  ? __pfx_kthread+0x10/0x10
[   15.114760]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.114782]  ? calculate_sigpending+0x7b/0xa0
[   15.114806]  ? __pfx_kthread+0x10/0x10
[   15.114828]  ret_from_fork+0x116/0x1d0
[   15.114848]  ? __pfx_kthread+0x10/0x10
[   15.114869]  ret_from_fork_asm+0x1a/0x30
[   15.114900]  </TASK>
[   15.114910] 
[   15.132707] Allocated by task 283:
[   15.133077]  kasan_save_stack+0x45/0x70
[   15.133702]  kasan_save_track+0x18/0x40
[   15.134103]  kasan_save_alloc_info+0x3b/0x50
[   15.134305]  __kasan_kmalloc+0xb7/0xc0
[   15.134462]  __kmalloc_cache_noprof+0x189/0x420
[   15.134928]  kasan_atomics+0x95/0x310
[   15.135397]  kunit_try_run_case+0x1a5/0x480
[   15.135826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.136320]  kthread+0x337/0x6f0
[   15.136716]  ret_from_fork+0x116/0x1d0
[   15.137082]  ret_from_fork_asm+0x1a/0x30
[   15.137465] 
[   15.137667] The buggy address belongs to the object at ffff8881026d6200
[   15.137667]  which belongs to the cache kmalloc-64 of size 64
[   15.138583] The buggy address is located 0 bytes to the right of
[   15.138583]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.139165] 
[   15.139242] The buggy address belongs to the physical page:
[   15.139431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.140277] flags: 0x200000000000000(node=0|zone=2)
[   15.140809] page_type: f5(slab)
[   15.141165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.141974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.142741] page dumped because: kasan: bad access detected
[   15.143156] 
[   15.143234] Memory state around the buggy address:
[   15.143701]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.144394]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.144981] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.145514]                                      ^
[   15.145720]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146388]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147149] ==================================================================
[   15.569056] ==================================================================
[   15.569305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.569883] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.570264] 
[   15.570380] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.570446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.570468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.570492] Call Trace:
[   15.570511]  <TASK>
[   15.570529]  dump_stack_lvl+0x73/0xb0
[   15.570561]  print_report+0xd1/0x610
[   15.570585]  ? __virt_addr_valid+0x1db/0x2d0
[   15.570611]  ? kasan_atomics_helper+0xf10/0x5450
[   15.570634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.570659]  ? kasan_atomics_helper+0xf10/0x5450
[   15.570683]  kasan_report+0x141/0x180
[   15.570716]  ? kasan_atomics_helper+0xf10/0x5450
[   15.570745]  kasan_check_range+0x10c/0x1c0
[   15.570770]  __kasan_check_write+0x18/0x20
[   15.570802]  kasan_atomics_helper+0xf10/0x5450
[   15.570827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.570852]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.570894]  kasan_atomics+0x1dc/0x310
[   15.570918]  ? __pfx_kasan_atomics+0x10/0x10
[   15.570955]  ? __pfx_read_tsc+0x10/0x10
[   15.570978]  ? ktime_get_ts64+0x86/0x230
[   15.571003]  kunit_try_run_case+0x1a5/0x480
[   15.571030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.571064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.571091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.571127]  ? __kthread_parkme+0x82/0x180
[   15.571150]  ? preempt_count_sub+0x50/0x80
[   15.571177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.571203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.571230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.571257]  kthread+0x337/0x6f0
[   15.571278]  ? trace_preempt_on+0x20/0xc0
[   15.571304]  ? __pfx_kthread+0x10/0x10
[   15.571326]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.571349]  ? calculate_sigpending+0x7b/0xa0
[   15.571375]  ? __pfx_kthread+0x10/0x10
[   15.571416]  ret_from_fork+0x116/0x1d0
[   15.571437]  ? __pfx_kthread+0x10/0x10
[   15.571467]  ret_from_fork_asm+0x1a/0x30
[   15.571509]  </TASK>
[   15.571520] 
[   15.578997] Allocated by task 283:
[   15.579178]  kasan_save_stack+0x45/0x70
[   15.579324]  kasan_save_track+0x18/0x40
[   15.579490]  kasan_save_alloc_info+0x3b/0x50
[   15.579663]  __kasan_kmalloc+0xb7/0xc0
[   15.579875]  __kmalloc_cache_noprof+0x189/0x420
[   15.580099]  kasan_atomics+0x95/0x310
[   15.580291]  kunit_try_run_case+0x1a5/0x480
[   15.580533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.580726]  kthread+0x337/0x6f0
[   15.580915]  ret_from_fork+0x116/0x1d0
[   15.581089]  ret_from_fork_asm+0x1a/0x30
[   15.581230] 
[   15.581302] The buggy address belongs to the object at ffff8881026d6200
[   15.581302]  which belongs to the cache kmalloc-64 of size 64
[   15.581885] The buggy address is located 0 bytes to the right of
[   15.581885]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.582419] 
[   15.582534] The buggy address belongs to the physical page:
[   15.582764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.583108] flags: 0x200000000000000(node=0|zone=2)
[   15.583336] page_type: f5(slab)
[   15.583514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.583846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.584169] page dumped because: kasan: bad access detected
[   15.584422] 
[   15.584544] Memory state around the buggy address:
[   15.584734]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.584950]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.585166] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.585421]                                      ^
[   15.585667]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.585979]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.586293] ==================================================================
[   15.587561] ==================================================================
[   15.587917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.588224] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.588521] 
[   15.588636] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.588682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.588695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.588718] Call Trace:
[   15.588736]  <TASK>
[   15.588755]  dump_stack_lvl+0x73/0xb0
[   15.588784]  print_report+0xd1/0x610
[   15.588807]  ? __virt_addr_valid+0x1db/0x2d0
[   15.588830]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.588852]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.588876]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.588898]  kasan_report+0x141/0x180
[   15.588921]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.588947]  kasan_check_range+0x10c/0x1c0
[   15.588972]  __kasan_check_write+0x18/0x20
[   15.588991]  kasan_atomics_helper+0xfa9/0x5450
[   15.589015]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.589037]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.589068]  kasan_atomics+0x1dc/0x310
[   15.589092]  ? __pfx_kasan_atomics+0x10/0x10
[   15.589116]  ? __pfx_read_tsc+0x10/0x10
[   15.589138]  ? ktime_get_ts64+0x86/0x230
[   15.589162]  kunit_try_run_case+0x1a5/0x480
[   15.589187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.589210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.589234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.589258]  ? __kthread_parkme+0x82/0x180
[   15.589279]  ? preempt_count_sub+0x50/0x80
[   15.589303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.589328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.589352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.589378]  kthread+0x337/0x6f0
[   15.589397]  ? trace_preempt_on+0x20/0xc0
[   15.589422]  ? __pfx_kthread+0x10/0x10
[   15.589443]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.589573]  ? calculate_sigpending+0x7b/0xa0
[   15.589601]  ? __pfx_kthread+0x10/0x10
[   15.589625]  ret_from_fork+0x116/0x1d0
[   15.589646]  ? __pfx_kthread+0x10/0x10
[   15.589669]  ret_from_fork_asm+0x1a/0x30
[   15.589701]  </TASK>
[   15.589712] 
[   15.597148] Allocated by task 283:
[   15.597331]  kasan_save_stack+0x45/0x70
[   15.597556]  kasan_save_track+0x18/0x40
[   15.597695]  kasan_save_alloc_info+0x3b/0x50
[   15.597848]  __kasan_kmalloc+0xb7/0xc0
[   15.598039]  __kmalloc_cache_noprof+0x189/0x420
[   15.598284]  kasan_atomics+0x95/0x310
[   15.598509]  kunit_try_run_case+0x1a5/0x480
[   15.598719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.598935]  kthread+0x337/0x6f0
[   15.599058]  ret_from_fork+0x116/0x1d0
[   15.599247]  ret_from_fork_asm+0x1a/0x30
[   15.599482] 
[   15.599599] The buggy address belongs to the object at ffff8881026d6200
[   15.599599]  which belongs to the cache kmalloc-64 of size 64
[   15.600092] The buggy address is located 0 bytes to the right of
[   15.600092]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.600643] 
[   15.600741] The buggy address belongs to the physical page:
[   15.600983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.601320] flags: 0x200000000000000(node=0|zone=2)
[   15.601586] page_type: f5(slab)
[   15.601715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.601949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.602182] page dumped because: kasan: bad access detected
[   15.602440] 
[   15.602543] Memory state around the buggy address:
[   15.602764]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.603079]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.603422] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.603743]                                      ^
[   15.603959]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.604233]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.604543] ==================================================================
[   15.278721] ==================================================================
[   15.279472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.280158] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.280717] 
[   15.280895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.280958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.280971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.280995] Call Trace:
[   15.281015]  <TASK>
[   15.281044]  dump_stack_lvl+0x73/0xb0
[   15.281076]  print_report+0xd1/0x610
[   15.281101]  ? __virt_addr_valid+0x1db/0x2d0
[   15.281138]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.281161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.281186]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.281210]  kasan_report+0x141/0x180
[   15.281234]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.281262]  kasan_check_range+0x10c/0x1c0
[   15.281288]  __kasan_check_write+0x18/0x20
[   15.281308]  kasan_atomics_helper+0x5fe/0x5450
[   15.281334]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.281359]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.281410]  kasan_atomics+0x1dc/0x310
[   15.281435]  ? __pfx_kasan_atomics+0x10/0x10
[   15.281470]  ? __pfx_read_tsc+0x10/0x10
[   15.281494]  ? ktime_get_ts64+0x86/0x230
[   15.281521]  kunit_try_run_case+0x1a5/0x480
[   15.281548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.281573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.281600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.281626]  ? __kthread_parkme+0x82/0x180
[   15.281649]  ? preempt_count_sub+0x50/0x80
[   15.281675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.281701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.281728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.281755]  kthread+0x337/0x6f0
[   15.281776]  ? trace_preempt_on+0x20/0xc0
[   15.281802]  ? __pfx_kthread+0x10/0x10
[   15.281824]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.281847]  ? calculate_sigpending+0x7b/0xa0
[   15.281873]  ? __pfx_kthread+0x10/0x10
[   15.281896]  ret_from_fork+0x116/0x1d0
[   15.281916]  ? __pfx_kthread+0x10/0x10
[   15.281939]  ret_from_fork_asm+0x1a/0x30
[   15.281971]  </TASK>
[   15.281983] 
[   15.294503] Allocated by task 283:
[   15.294869]  kasan_save_stack+0x45/0x70
[   15.295043]  kasan_save_track+0x18/0x40
[   15.295327]  kasan_save_alloc_info+0x3b/0x50
[   15.295764]  __kasan_kmalloc+0xb7/0xc0
[   15.296115]  __kmalloc_cache_noprof+0x189/0x420
[   15.296336]  kasan_atomics+0x95/0x310
[   15.296747]  kunit_try_run_case+0x1a5/0x480
[   15.297148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.297440]  kthread+0x337/0x6f0
[   15.297769]  ret_from_fork+0x116/0x1d0
[   15.298002]  ret_from_fork_asm+0x1a/0x30
[   15.298326] 
[   15.298420] The buggy address belongs to the object at ffff8881026d6200
[   15.298420]  which belongs to the cache kmalloc-64 of size 64
[   15.299187] The buggy address is located 0 bytes to the right of
[   15.299187]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.300187] 
[   15.300368] The buggy address belongs to the physical page:
[   15.300816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.301050] flags: 0x200000000000000(node=0|zone=2)
[   15.301209] page_type: f5(slab)
[   15.301328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.301958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.302636] page dumped because: kasan: bad access detected
[   15.303127] 
[   15.303283] Memory state around the buggy address:
[   15.303731]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.304345]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.304970] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.305354]                                      ^
[   15.305776]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.306346]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.306898] ==================================================================
[   16.055129] ==================================================================
[   16.055525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.055852] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.056136] 
[   16.056256] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.056309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.056323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.056346] Call Trace:
[   16.056364]  <TASK>
[   16.056384]  dump_stack_lvl+0x73/0xb0
[   16.056870]  print_report+0xd1/0x610
[   16.056907]  ? __virt_addr_valid+0x1db/0x2d0
[   16.056933]  ? kasan_atomics_helper+0x194a/0x5450
[   16.056958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.056984]  ? kasan_atomics_helper+0x194a/0x5450
[   16.057008]  kasan_report+0x141/0x180
[   16.057032]  ? kasan_atomics_helper+0x194a/0x5450
[   16.057060]  kasan_check_range+0x10c/0x1c0
[   16.057085]  __kasan_check_write+0x18/0x20
[   16.057107]  kasan_atomics_helper+0x194a/0x5450
[   16.057131]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.057156]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.057189]  kasan_atomics+0x1dc/0x310
[   16.057214]  ? __pfx_kasan_atomics+0x10/0x10
[   16.057240]  ? __pfx_read_tsc+0x10/0x10
[   16.057263]  ? ktime_get_ts64+0x86/0x230
[   16.057290]  kunit_try_run_case+0x1a5/0x480
[   16.057317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.057342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.057368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.057394]  ? __kthread_parkme+0x82/0x180
[   16.057428]  ? preempt_count_sub+0x50/0x80
[   16.057466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.057492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.057519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.057547]  kthread+0x337/0x6f0
[   16.057567]  ? trace_preempt_on+0x20/0xc0
[   16.057593]  ? __pfx_kthread+0x10/0x10
[   16.057615]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.057639]  ? calculate_sigpending+0x7b/0xa0
[   16.057665]  ? __pfx_kthread+0x10/0x10
[   16.057688]  ret_from_fork+0x116/0x1d0
[   16.057708]  ? __pfx_kthread+0x10/0x10
[   16.057730]  ret_from_fork_asm+0x1a/0x30
[   16.057763]  </TASK>
[   16.057775] 
[   16.066998] Allocated by task 283:
[   16.067178]  kasan_save_stack+0x45/0x70
[   16.067569]  kasan_save_track+0x18/0x40
[   16.067762]  kasan_save_alloc_info+0x3b/0x50
[   16.068075]  __kasan_kmalloc+0xb7/0xc0
[   16.068261]  __kmalloc_cache_noprof+0x189/0x420
[   16.068600]  kasan_atomics+0x95/0x310
[   16.068749]  kunit_try_run_case+0x1a5/0x480
[   16.068957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.069188]  kthread+0x337/0x6f0
[   16.069348]  ret_from_fork+0x116/0x1d0
[   16.069783]  ret_from_fork_asm+0x1a/0x30
[   16.069980] 
[   16.070190] The buggy address belongs to the object at ffff8881026d6200
[   16.070190]  which belongs to the cache kmalloc-64 of size 64
[   16.070865] The buggy address is located 0 bytes to the right of
[   16.070865]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.071432] 
[   16.071607] The buggy address belongs to the physical page:
[   16.071834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.072279] flags: 0x200000000000000(node=0|zone=2)
[   16.072530] page_type: f5(slab)
[   16.072679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.073004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.073311] page dumped because: kasan: bad access detected
[   16.073843] 
[   16.073942] Memory state around the buggy address:
[   16.074135]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.074433]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.074896] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.075244]                                      ^
[   16.075475]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.075902]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.076261] ==================================================================
[   16.099235] ==================================================================
[   16.099597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.099984] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.100779] 
[   16.100912] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.100960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.100974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.100996] Call Trace:
[   16.101016]  <TASK>
[   16.101035]  dump_stack_lvl+0x73/0xb0
[   16.101066]  print_report+0xd1/0x610
[   16.101094]  ? __virt_addr_valid+0x1db/0x2d0
[   16.101119]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.101143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.101171]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.101194]  kasan_report+0x141/0x180
[   16.101217]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.101245]  kasan_check_range+0x10c/0x1c0
[   16.101271]  __kasan_check_write+0x18/0x20
[   16.101292]  kasan_atomics_helper+0x1a7f/0x5450
[   16.101318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.101343]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.101377]  kasan_atomics+0x1dc/0x310
[   16.101402]  ? __pfx_kasan_atomics+0x10/0x10
[   16.101607]  ? __pfx_read_tsc+0x10/0x10
[   16.101631]  ? ktime_get_ts64+0x86/0x230
[   16.101658]  kunit_try_run_case+0x1a5/0x480
[   16.101686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.101712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.101739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.101766]  ? __kthread_parkme+0x82/0x180
[   16.101789]  ? preempt_count_sub+0x50/0x80
[   16.101815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.101842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.101869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.101897]  kthread+0x337/0x6f0
[   16.101918]  ? trace_preempt_on+0x20/0xc0
[   16.101943]  ? __pfx_kthread+0x10/0x10
[   16.101966]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.101989]  ? calculate_sigpending+0x7b/0xa0
[   16.102016]  ? __pfx_kthread+0x10/0x10
[   16.102039]  ret_from_fork+0x116/0x1d0
[   16.102059]  ? __pfx_kthread+0x10/0x10
[   16.102082]  ret_from_fork_asm+0x1a/0x30
[   16.102116]  </TASK>
[   16.102127] 
[   16.111498] Allocated by task 283:
[   16.111645]  kasan_save_stack+0x45/0x70
[   16.111800]  kasan_save_track+0x18/0x40
[   16.112125]  kasan_save_alloc_info+0x3b/0x50
[   16.112526]  __kasan_kmalloc+0xb7/0xc0
[   16.112861]  __kmalloc_cache_noprof+0x189/0x420
[   16.113271]  kasan_atomics+0x95/0x310
[   16.113658]  kunit_try_run_case+0x1a5/0x480
[   16.114046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.114254]  kthread+0x337/0x6f0
[   16.114377]  ret_from_fork+0x116/0x1d0
[   16.114543]  ret_from_fork_asm+0x1a/0x30
[   16.114691] 
[   16.114768] The buggy address belongs to the object at ffff8881026d6200
[   16.114768]  which belongs to the cache kmalloc-64 of size 64
[   16.115127] The buggy address is located 0 bytes to the right of
[   16.115127]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.115672] 
[   16.115832] The buggy address belongs to the physical page:
[   16.116301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.116992] flags: 0x200000000000000(node=0|zone=2)
[   16.117436] page_type: f5(slab)
[   16.117734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.118366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.119215] page dumped because: kasan: bad access detected
[   16.119797] 
[   16.119954] Memory state around the buggy address:
[   16.120386]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.121205]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.121897] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.122561]                                      ^
[   16.122899]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.123115]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.123331] ==================================================================
[   15.515712] ==================================================================
[   15.516194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.516617] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.516866] 
[   15.517003] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.517050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.517063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.517087] Call Trace:
[   15.517105]  <TASK>
[   15.517134]  dump_stack_lvl+0x73/0xb0
[   15.517164]  print_report+0xd1/0x610
[   15.517200]  ? __virt_addr_valid+0x1db/0x2d0
[   15.517225]  ? kasan_atomics_helper+0xd47/0x5450
[   15.517248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.517274]  ? kasan_atomics_helper+0xd47/0x5450
[   15.517307]  kasan_report+0x141/0x180
[   15.517330]  ? kasan_atomics_helper+0xd47/0x5450
[   15.517368]  kasan_check_range+0x10c/0x1c0
[   15.517413]  __kasan_check_write+0x18/0x20
[   15.517435]  kasan_atomics_helper+0xd47/0x5450
[   15.517474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.517499]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.517542]  kasan_atomics+0x1dc/0x310
[   15.517568]  ? __pfx_kasan_atomics+0x10/0x10
[   15.517594]  ? __pfx_read_tsc+0x10/0x10
[   15.517617]  ? ktime_get_ts64+0x86/0x230
[   15.517653]  kunit_try_run_case+0x1a5/0x480
[   15.517680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.517715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.517742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.517769]  ? __kthread_parkme+0x82/0x180
[   15.517800]  ? preempt_count_sub+0x50/0x80
[   15.517826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.517853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.517889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.517917]  kthread+0x337/0x6f0
[   15.517937]  ? trace_preempt_on+0x20/0xc0
[   15.517971]  ? __pfx_kthread+0x10/0x10
[   15.517993]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.518017]  ? calculate_sigpending+0x7b/0xa0
[   15.518054]  ? __pfx_kthread+0x10/0x10
[   15.518077]  ret_from_fork+0x116/0x1d0
[   15.518098]  ? __pfx_kthread+0x10/0x10
[   15.518120]  ret_from_fork_asm+0x1a/0x30
[   15.518153]  </TASK>
[   15.518174] 
[   15.525505] Allocated by task 283:
[   15.525693]  kasan_save_stack+0x45/0x70
[   15.525908]  kasan_save_track+0x18/0x40
[   15.526116]  kasan_save_alloc_info+0x3b/0x50
[   15.526377]  __kasan_kmalloc+0xb7/0xc0
[   15.526615]  __kmalloc_cache_noprof+0x189/0x420
[   15.526854]  kasan_atomics+0x95/0x310
[   15.527057]  kunit_try_run_case+0x1a5/0x480
[   15.527282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.527530]  kthread+0x337/0x6f0
[   15.527702]  ret_from_fork+0x116/0x1d0
[   15.527872]  ret_from_fork_asm+0x1a/0x30
[   15.528059] 
[   15.528157] The buggy address belongs to the object at ffff8881026d6200
[   15.528157]  which belongs to the cache kmalloc-64 of size 64
[   15.528679] The buggy address is located 0 bytes to the right of
[   15.528679]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.529198] 
[   15.529318] The buggy address belongs to the physical page:
[   15.529604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.529941] flags: 0x200000000000000(node=0|zone=2)
[   15.530170] page_type: f5(slab)
[   15.530347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.530703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.531048] page dumped because: kasan: bad access detected
[   15.531272] 
[   15.531341] Memory state around the buggy address:
[   15.531523]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.531733]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.531989] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.532333]                                      ^
[   15.532628]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532972]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.533281] ==================================================================
[   16.450759] ==================================================================
[   16.451136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.451854] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.452342] 
[   16.452515] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.452564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.452577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.452600] Call Trace:
[   16.452620]  <TASK>
[   16.452640]  dump_stack_lvl+0x73/0xb0
[   16.452671]  print_report+0xd1/0x610
[   16.452697]  ? __virt_addr_valid+0x1db/0x2d0
[   16.452722]  ? kasan_atomics_helper+0x224c/0x5450
[   16.452746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.452771]  ? kasan_atomics_helper+0x224c/0x5450
[   16.452796]  kasan_report+0x141/0x180
[   16.452819]  ? kasan_atomics_helper+0x224c/0x5450
[   16.452848]  kasan_check_range+0x10c/0x1c0
[   16.452873]  __kasan_check_write+0x18/0x20
[   16.452895]  kasan_atomics_helper+0x224c/0x5450
[   16.452920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.452944]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.452977]  kasan_atomics+0x1dc/0x310
[   16.453002]  ? __pfx_kasan_atomics+0x10/0x10
[   16.453028]  ? __pfx_read_tsc+0x10/0x10
[   16.453051]  ? ktime_get_ts64+0x86/0x230
[   16.453078]  kunit_try_run_case+0x1a5/0x480
[   16.453104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.453130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.453156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.453181]  ? __kthread_parkme+0x82/0x180
[   16.453204]  ? preempt_count_sub+0x50/0x80
[   16.453229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.453256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.453282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.453309]  kthread+0x337/0x6f0
[   16.453330]  ? trace_preempt_on+0x20/0xc0
[   16.453355]  ? __pfx_kthread+0x10/0x10
[   16.453378]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.453400]  ? calculate_sigpending+0x7b/0xa0
[   16.453570]  ? __pfx_kthread+0x10/0x10
[   16.453595]  ret_from_fork+0x116/0x1d0
[   16.453617]  ? __pfx_kthread+0x10/0x10
[   16.453639]  ret_from_fork_asm+0x1a/0x30
[   16.453672]  </TASK>
[   16.453683] 
[   16.462930] Allocated by task 283:
[   16.463104]  kasan_save_stack+0x45/0x70
[   16.463299]  kasan_save_track+0x18/0x40
[   16.463871]  kasan_save_alloc_info+0x3b/0x50
[   16.464309]  __kasan_kmalloc+0xb7/0xc0
[   16.464752]  __kmalloc_cache_noprof+0x189/0x420
[   16.465086]  kasan_atomics+0x95/0x310
[   16.465512]  kunit_try_run_case+0x1a5/0x480
[   16.465716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.465949]  kthread+0x337/0x6f0
[   16.466107]  ret_from_fork+0x116/0x1d0
[   16.466286]  ret_from_fork_asm+0x1a/0x30
[   16.466750] 
[   16.466983] The buggy address belongs to the object at ffff8881026d6200
[   16.466983]  which belongs to the cache kmalloc-64 of size 64
[   16.467754] The buggy address is located 0 bytes to the right of
[   16.467754]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.468688] 
[   16.468796] The buggy address belongs to the physical page:
[   16.469040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.469360] flags: 0x200000000000000(node=0|zone=2)
[   16.469851] page_type: f5(slab)
[   16.470123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.470717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.471203] page dumped because: kasan: bad access detected
[   16.471694] 
[   16.471798] Memory state around the buggy address:
[   16.472009]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.472305]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.472911] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.473540]                                      ^
[   16.473823]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.474299]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.474736] ==================================================================
[   16.077067] ==================================================================
[   16.077680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.078006] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.078312] 
[   16.078417] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.078636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.078650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.078674] Call Trace:
[   16.078693]  <TASK>
[   16.078711]  dump_stack_lvl+0x73/0xb0
[   16.078743]  print_report+0xd1/0x610
[   16.078767]  ? __virt_addr_valid+0x1db/0x2d0
[   16.078793]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.078876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.078901]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.078978]  kasan_report+0x141/0x180
[   16.079002]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.079030]  kasan_check_range+0x10c/0x1c0
[   16.079056]  __kasan_check_write+0x18/0x20
[   16.079079]  kasan_atomics_helper+0x19e3/0x5450
[   16.079103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.079128]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.079161]  kasan_atomics+0x1dc/0x310
[   16.079186]  ? __pfx_kasan_atomics+0x10/0x10
[   16.079212]  ? __pfx_read_tsc+0x10/0x10
[   16.079235]  ? ktime_get_ts64+0x86/0x230
[   16.079262]  kunit_try_run_case+0x1a5/0x480
[   16.079288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.079313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.079340]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.079366]  ? __kthread_parkme+0x82/0x180
[   16.079389]  ? preempt_count_sub+0x50/0x80
[   16.079427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.079467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.079494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.079521]  kthread+0x337/0x6f0
[   16.079543]  ? trace_preempt_on+0x20/0xc0
[   16.079569]  ? __pfx_kthread+0x10/0x10
[   16.079591]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.079615]  ? calculate_sigpending+0x7b/0xa0
[   16.079641]  ? __pfx_kthread+0x10/0x10
[   16.079665]  ret_from_fork+0x116/0x1d0
[   16.079685]  ? __pfx_kthread+0x10/0x10
[   16.079707]  ret_from_fork_asm+0x1a/0x30
[   16.079740]  </TASK>
[   16.079751] 
[   16.089154] Allocated by task 283:
[   16.089487]  kasan_save_stack+0x45/0x70
[   16.089680]  kasan_save_track+0x18/0x40
[   16.089851]  kasan_save_alloc_info+0x3b/0x50
[   16.090058]  __kasan_kmalloc+0xb7/0xc0
[   16.090235]  __kmalloc_cache_noprof+0x189/0x420
[   16.090745]  kasan_atomics+0x95/0x310
[   16.090941]  kunit_try_run_case+0x1a5/0x480
[   16.091110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.091480]  kthread+0x337/0x6f0
[   16.091650]  ret_from_fork+0x116/0x1d0
[   16.091944]  ret_from_fork_asm+0x1a/0x30
[   16.092184] 
[   16.092351] The buggy address belongs to the object at ffff8881026d6200
[   16.092351]  which belongs to the cache kmalloc-64 of size 64
[   16.092894] The buggy address is located 0 bytes to the right of
[   16.092894]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.093640] 
[   16.093744] The buggy address belongs to the physical page:
[   16.093941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.094297] flags: 0x200000000000000(node=0|zone=2)
[   16.094755] page_type: f5(slab)
[   16.094913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.095206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.095669] page dumped because: kasan: bad access detected
[   16.095973] 
[   16.096050] Memory state around the buggy address:
[   16.096354]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.096692]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.097143] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.097536]                                      ^
[   16.097830]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.098118]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.098532] ==================================================================
[   16.475292] ==================================================================
[   16.475611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.475963] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.476243] 
[   16.476342] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.476391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.476404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.476440] Call Trace:
[   16.476472]  <TASK>
[   16.476493]  dump_stack_lvl+0x73/0xb0
[   16.476525]  print_report+0xd1/0x610
[   16.476550]  ? __virt_addr_valid+0x1db/0x2d0
[   16.476575]  ? kasan_atomics_helper+0x5115/0x5450
[   16.476599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.476624]  ? kasan_atomics_helper+0x5115/0x5450
[   16.476649]  kasan_report+0x141/0x180
[   16.476672]  ? kasan_atomics_helper+0x5115/0x5450
[   16.476701]  __asan_report_load8_noabort+0x18/0x20
[   16.476729]  kasan_atomics_helper+0x5115/0x5450
[   16.476754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.476778]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.476811]  kasan_atomics+0x1dc/0x310
[   16.476836]  ? __pfx_kasan_atomics+0x10/0x10
[   16.476862]  ? __pfx_read_tsc+0x10/0x10
[   16.476886]  ? ktime_get_ts64+0x86/0x230
[   16.476912]  kunit_try_run_case+0x1a5/0x480
[   16.476939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.476964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.476989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.477015]  ? __kthread_parkme+0x82/0x180
[   16.477037]  ? preempt_count_sub+0x50/0x80
[   16.477063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.477090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.477116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.477143]  kthread+0x337/0x6f0
[   16.477164]  ? trace_preempt_on+0x20/0xc0
[   16.477189]  ? __pfx_kthread+0x10/0x10
[   16.477211]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.477234]  ? calculate_sigpending+0x7b/0xa0
[   16.477260]  ? __pfx_kthread+0x10/0x10
[   16.477283]  ret_from_fork+0x116/0x1d0
[   16.477303]  ? __pfx_kthread+0x10/0x10
[   16.477325]  ret_from_fork_asm+0x1a/0x30
[   16.477358]  </TASK>
[   16.477369] 
[   16.484643] Allocated by task 283:
[   16.484802]  kasan_save_stack+0x45/0x70
[   16.484948]  kasan_save_track+0x18/0x40
[   16.485121]  kasan_save_alloc_info+0x3b/0x50
[   16.485336]  __kasan_kmalloc+0xb7/0xc0
[   16.485540]  __kmalloc_cache_noprof+0x189/0x420
[   16.485749]  kasan_atomics+0x95/0x310
[   16.485885]  kunit_try_run_case+0x1a5/0x480
[   16.486032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.486300]  kthread+0x337/0x6f0
[   16.486546]  ret_from_fork+0x116/0x1d0
[   16.486734]  ret_from_fork_asm+0x1a/0x30
[   16.486907] 
[   16.486981] The buggy address belongs to the object at ffff8881026d6200
[   16.486981]  which belongs to the cache kmalloc-64 of size 64
[   16.487338] The buggy address is located 0 bytes to the right of
[   16.487338]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.487894] 
[   16.487989] The buggy address belongs to the physical page:
[   16.488344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.488624] flags: 0x200000000000000(node=0|zone=2)
[   16.488790] page_type: f5(slab)
[   16.488910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.489250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.489823] page dumped because: kasan: bad access detected
[   16.490066] 
[   16.490149] Memory state around the buggy address:
[   16.490347]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.490597]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.490927] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.491221]                                      ^
[   16.491413]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.491695]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.492121] ==================================================================
[   15.605226] ==================================================================
[   15.605608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.605937] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.606160] 
[   15.606250] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.606296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.606309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.606332] Call Trace:
[   15.606358]  <TASK>
[   15.606376]  dump_stack_lvl+0x73/0xb0
[   15.606430]  print_report+0xd1/0x610
[   15.606463]  ? __virt_addr_valid+0x1db/0x2d0
[   15.606488]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.606512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.606538]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.606563]  kasan_report+0x141/0x180
[   15.606587]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.606615]  __asan_report_load4_noabort+0x18/0x20
[   15.606651]  kasan_atomics_helper+0x4a36/0x5450
[   15.606676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.606701]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.606745]  kasan_atomics+0x1dc/0x310
[   15.606771]  ? __pfx_kasan_atomics+0x10/0x10
[   15.606797]  ? __pfx_read_tsc+0x10/0x10
[   15.606820]  ? ktime_get_ts64+0x86/0x230
[   15.606847]  kunit_try_run_case+0x1a5/0x480
[   15.606874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.606899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.606924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.606951]  ? __kthread_parkme+0x82/0x180
[   15.606973]  ? preempt_count_sub+0x50/0x80
[   15.606998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.607025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.607051]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.607079]  kthread+0x337/0x6f0
[   15.607101]  ? trace_preempt_on+0x20/0xc0
[   15.607126]  ? __pfx_kthread+0x10/0x10
[   15.607148]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.607181]  ? calculate_sigpending+0x7b/0xa0
[   15.607208]  ? __pfx_kthread+0x10/0x10
[   15.607233]  ret_from_fork+0x116/0x1d0
[   15.607266]  ? __pfx_kthread+0x10/0x10
[   15.607288]  ret_from_fork_asm+0x1a/0x30
[   15.607320]  </TASK>
[   15.607331] 
[   15.614787] Allocated by task 283:
[   15.614956]  kasan_save_stack+0x45/0x70
[   15.615161]  kasan_save_track+0x18/0x40
[   15.615361]  kasan_save_alloc_info+0x3b/0x50
[   15.615595]  __kasan_kmalloc+0xb7/0xc0
[   15.615781]  __kmalloc_cache_noprof+0x189/0x420
[   15.615993]  kasan_atomics+0x95/0x310
[   15.616188]  kunit_try_run_case+0x1a5/0x480
[   15.616365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.616571]  kthread+0x337/0x6f0
[   15.616762]  ret_from_fork+0x116/0x1d0
[   15.616949]  ret_from_fork_asm+0x1a/0x30
[   15.617146] 
[   15.617233] The buggy address belongs to the object at ffff8881026d6200
[   15.617233]  which belongs to the cache kmalloc-64 of size 64
[   15.617720] The buggy address is located 0 bytes to the right of
[   15.617720]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.618235] 
[   15.618335] The buggy address belongs to the physical page:
[   15.618612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.618856] flags: 0x200000000000000(node=0|zone=2)
[   15.619021] page_type: f5(slab)
[   15.619142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.619484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.619842] page dumped because: kasan: bad access detected
[   15.620091] 
[   15.620184] Memory state around the buggy address:
[   15.620440]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.620697]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.620914] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.621148]                                      ^
[   15.621371]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.621733]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.622072] ==================================================================
[   15.326704] ==================================================================
[   15.327101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.327517] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.327871] 
[   15.327961] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.328004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.328016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.328038] Call Trace:
[   15.328054]  <TASK>
[   15.328070]  dump_stack_lvl+0x73/0xb0
[   15.328110]  print_report+0xd1/0x610
[   15.328135]  ? __virt_addr_valid+0x1db/0x2d0
[   15.328159]  ? kasan_atomics_helper+0x72f/0x5450
[   15.328188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.328213]  ? kasan_atomics_helper+0x72f/0x5450
[   15.328237]  kasan_report+0x141/0x180
[   15.328260]  ? kasan_atomics_helper+0x72f/0x5450
[   15.328292]  kasan_check_range+0x10c/0x1c0
[   15.328317]  __kasan_check_write+0x18/0x20
[   15.328339]  kasan_atomics_helper+0x72f/0x5450
[   15.328363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.328388]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.328427]  kasan_atomics+0x1dc/0x310
[   15.328480]  ? __pfx_kasan_atomics+0x10/0x10
[   15.328507]  ? __pfx_read_tsc+0x10/0x10
[   15.328530]  ? ktime_get_ts64+0x86/0x230
[   15.328556]  kunit_try_run_case+0x1a5/0x480
[   15.328582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.328607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.328634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.328660]  ? __kthread_parkme+0x82/0x180
[   15.328682]  ? preempt_count_sub+0x50/0x80
[   15.328708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.328735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.328788]  kthread+0x337/0x6f0
[   15.328809]  ? trace_preempt_on+0x20/0xc0
[   15.328843]  ? __pfx_kthread+0x10/0x10
[   15.328865]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.328889]  ? calculate_sigpending+0x7b/0xa0
[   15.328926]  ? __pfx_kthread+0x10/0x10
[   15.328949]  ret_from_fork+0x116/0x1d0
[   15.328969]  ? __pfx_kthread+0x10/0x10
[   15.328991]  ret_from_fork_asm+0x1a/0x30
[   15.329033]  </TASK>
[   15.329044] 
[   15.336412] Allocated by task 283:
[   15.336557]  kasan_save_stack+0x45/0x70
[   15.336765]  kasan_save_track+0x18/0x40
[   15.336961]  kasan_save_alloc_info+0x3b/0x50
[   15.337198]  __kasan_kmalloc+0xb7/0xc0
[   15.337389]  __kmalloc_cache_noprof+0x189/0x420
[   15.337619]  kasan_atomics+0x95/0x310
[   15.337755]  kunit_try_run_case+0x1a5/0x480
[   15.337903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338081]  kthread+0x337/0x6f0
[   15.338204]  ret_from_fork+0x116/0x1d0
[   15.338339]  ret_from_fork_asm+0x1a/0x30
[   15.338549] 
[   15.338647] The buggy address belongs to the object at ffff8881026d6200
[   15.338647]  which belongs to the cache kmalloc-64 of size 64
[   15.339194] The buggy address is located 0 bytes to the right of
[   15.339194]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.339765] 
[   15.339863] The buggy address belongs to the physical page:
[   15.340078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.340323] flags: 0x200000000000000(node=0|zone=2)
[   15.340520] page_type: f5(slab)
[   15.340650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.340996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.341396] page dumped because: kasan: bad access detected
[   15.341658] 
[   15.341751] Memory state around the buggy address:
[   15.341984]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342303]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342651] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.342921]                                      ^
[   15.343124]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343489]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343784] ==================================================================
[   16.007097] ==================================================================
[   16.007735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.008023] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   16.008249] 
[   16.008350] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.008409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.008423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.008446] Call Trace:
[   16.008476]  <TASK>
[   16.008497]  dump_stack_lvl+0x73/0xb0
[   16.008529]  print_report+0xd1/0x610
[   16.008554]  ? __virt_addr_valid+0x1db/0x2d0
[   16.008579]  ? kasan_atomics_helper+0x1818/0x5450
[   16.008603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.008628]  ? kasan_atomics_helper+0x1818/0x5450
[   16.008652]  kasan_report+0x141/0x180
[   16.008676]  ? kasan_atomics_helper+0x1818/0x5450
[   16.008704]  kasan_check_range+0x10c/0x1c0
[   16.008730]  __kasan_check_write+0x18/0x20
[   16.008752]  kasan_atomics_helper+0x1818/0x5450
[   16.008776]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.008801]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.008834]  kasan_atomics+0x1dc/0x310
[   16.008858]  ? __pfx_kasan_atomics+0x10/0x10
[   16.008884]  ? __pfx_read_tsc+0x10/0x10
[   16.008907]  ? ktime_get_ts64+0x86/0x230
[   16.008934]  kunit_try_run_case+0x1a5/0x480
[   16.008961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.008986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.009012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.009038]  ? __kthread_parkme+0x82/0x180
[   16.009063]  ? preempt_count_sub+0x50/0x80
[   16.009089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.009115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.009142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.009170]  kthread+0x337/0x6f0
[   16.009190]  ? trace_preempt_on+0x20/0xc0
[   16.009217]  ? __pfx_kthread+0x10/0x10
[   16.009240]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.009264]  ? calculate_sigpending+0x7b/0xa0
[   16.009290]  ? __pfx_kthread+0x10/0x10
[   16.009313]  ret_from_fork+0x116/0x1d0
[   16.009334]  ? __pfx_kthread+0x10/0x10
[   16.009356]  ret_from_fork_asm+0x1a/0x30
[   16.009388]  </TASK>
[   16.009400] 
[   16.021575] Allocated by task 283:
[   16.021861]  kasan_save_stack+0x45/0x70
[   16.022070]  kasan_save_track+0x18/0x40
[   16.022241]  kasan_save_alloc_info+0x3b/0x50
[   16.022498]  __kasan_kmalloc+0xb7/0xc0
[   16.022937]  __kmalloc_cache_noprof+0x189/0x420
[   16.023156]  kasan_atomics+0x95/0x310
[   16.023376]  kunit_try_run_case+0x1a5/0x480
[   16.023812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.024140]  kthread+0x337/0x6f0
[   16.024304]  ret_from_fork+0x116/0x1d0
[   16.024711]  ret_from_fork_asm+0x1a/0x30
[   16.024974] 
[   16.025056] The buggy address belongs to the object at ffff8881026d6200
[   16.025056]  which belongs to the cache kmalloc-64 of size 64
[   16.025940] The buggy address is located 0 bytes to the right of
[   16.025940]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   16.026601] 
[   16.026805] The buggy address belongs to the physical page:
[   16.027077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   16.027596] flags: 0x200000000000000(node=0|zone=2)
[   16.027831] page_type: f5(slab)
[   16.028146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.028485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.028945] page dumped because: kasan: bad access detected
[   16.029269] 
[   16.029373] Memory state around the buggy address:
[   16.029773]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.030058]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.030565] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.030975]                                      ^
[   16.031283]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031773]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.032080] ==================================================================
[   15.399371] ==================================================================
[   15.399773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.400117] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.400441] 
[   15.400580] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.400640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.400654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.400677] Call Trace:
[   15.400696]  <TASK>
[   15.400715]  dump_stack_lvl+0x73/0xb0
[   15.400745]  print_report+0xd1/0x610
[   15.400780]  ? __virt_addr_valid+0x1db/0x2d0
[   15.400805]  ? kasan_atomics_helper+0x992/0x5450
[   15.400828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.400865]  ? kasan_atomics_helper+0x992/0x5450
[   15.400888]  kasan_report+0x141/0x180
[   15.400912]  ? kasan_atomics_helper+0x992/0x5450
[   15.400940]  kasan_check_range+0x10c/0x1c0
[   15.400967]  __kasan_check_write+0x18/0x20
[   15.400991]  kasan_atomics_helper+0x992/0x5450
[   15.401016]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.401040]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.401082]  kasan_atomics+0x1dc/0x310
[   15.401108]  ? __pfx_kasan_atomics+0x10/0x10
[   15.401144]  ? __pfx_read_tsc+0x10/0x10
[   15.401167]  ? ktime_get_ts64+0x86/0x230
[   15.401194]  kunit_try_run_case+0x1a5/0x480
[   15.401221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.401282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.401309]  ? __kthread_parkme+0x82/0x180
[   15.401341]  ? preempt_count_sub+0x50/0x80
[   15.401368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.401463]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.401492]  kthread+0x337/0x6f0
[   15.401513]  ? trace_preempt_on+0x20/0xc0
[   15.401539]  ? __pfx_kthread+0x10/0x10
[   15.401561]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.401585]  ? calculate_sigpending+0x7b/0xa0
[   15.401621]  ? __pfx_kthread+0x10/0x10
[   15.401645]  ret_from_fork+0x116/0x1d0
[   15.401675]  ? __pfx_kthread+0x10/0x10
[   15.401698]  ret_from_fork_asm+0x1a/0x30
[   15.401732]  </TASK>
[   15.401744] 
[   15.409131] Allocated by task 283:
[   15.409278]  kasan_save_stack+0x45/0x70
[   15.409458]  kasan_save_track+0x18/0x40
[   15.409598]  kasan_save_alloc_info+0x3b/0x50
[   15.409748]  __kasan_kmalloc+0xb7/0xc0
[   15.409882]  __kmalloc_cache_noprof+0x189/0x420
[   15.410042]  kasan_atomics+0x95/0x310
[   15.410196]  kunit_try_run_case+0x1a5/0x480
[   15.410462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.410716]  kthread+0x337/0x6f0
[   15.410883]  ret_from_fork+0x116/0x1d0
[   15.411068]  ret_from_fork_asm+0x1a/0x30
[   15.411263] 
[   15.411358] The buggy address belongs to the object at ffff8881026d6200
[   15.411358]  which belongs to the cache kmalloc-64 of size 64
[   15.411869] The buggy address is located 0 bytes to the right of
[   15.411869]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.412295] 
[   15.412370] The buggy address belongs to the physical page:
[   15.412576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.412824] flags: 0x200000000000000(node=0|zone=2)
[   15.413031] page_type: f5(slab)
[   15.413201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.413612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.413994] page dumped because: kasan: bad access detected
[   15.414301] 
[   15.414413] Memory state around the buggy address:
[   15.414646]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.414964]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.415309] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.415656]                                      ^
[   15.415845]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.416061]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.416277] ==================================================================
[   15.890240] ==================================================================
[   15.890872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.891465] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.892021] 
[   15.892141] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.892190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.892203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.892227] Call Trace:
[   15.892379]  <TASK>
[   15.892403]  dump_stack_lvl+0x73/0xb0
[   15.892449]  print_report+0xd1/0x610
[   15.892486]  ? __virt_addr_valid+0x1db/0x2d0
[   15.892513]  ? kasan_atomics_helper+0x151d/0x5450
[   15.892536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.892562]  ? kasan_atomics_helper+0x151d/0x5450
[   15.892586]  kasan_report+0x141/0x180
[   15.892608]  ? kasan_atomics_helper+0x151d/0x5450
[   15.892637]  kasan_check_range+0x10c/0x1c0
[   15.892662]  __kasan_check_write+0x18/0x20
[   15.892683]  kasan_atomics_helper+0x151d/0x5450
[   15.892708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.892732]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.892765]  kasan_atomics+0x1dc/0x310
[   15.892790]  ? __pfx_kasan_atomics+0x10/0x10
[   15.892816]  ? __pfx_read_tsc+0x10/0x10
[   15.892840]  ? ktime_get_ts64+0x86/0x230
[   15.892866]  kunit_try_run_case+0x1a5/0x480
[   15.892892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.892917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.892943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.892969]  ? __kthread_parkme+0x82/0x180
[   15.892992]  ? preempt_count_sub+0x50/0x80
[   15.893018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.893044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.893071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.893098]  kthread+0x337/0x6f0
[   15.893119]  ? trace_preempt_on+0x20/0xc0
[   15.893144]  ? __pfx_kthread+0x10/0x10
[   15.893166]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.893189]  ? calculate_sigpending+0x7b/0xa0
[   15.893216]  ? __pfx_kthread+0x10/0x10
[   15.893239]  ret_from_fork+0x116/0x1d0
[   15.893259]  ? __pfx_kthread+0x10/0x10
[   15.893282]  ret_from_fork_asm+0x1a/0x30
[   15.893314]  </TASK>
[   15.893325] 
[   15.903396] Allocated by task 283:
[   15.903922]  kasan_save_stack+0x45/0x70
[   15.904222]  kasan_save_track+0x18/0x40
[   15.904519]  kasan_save_alloc_info+0x3b/0x50
[   15.904829]  __kasan_kmalloc+0xb7/0xc0
[   15.905101]  __kmalloc_cache_noprof+0x189/0x420
[   15.905386]  kasan_atomics+0x95/0x310
[   15.905708]  kunit_try_run_case+0x1a5/0x480
[   15.905913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.906182]  kthread+0x337/0x6f0
[   15.906327]  ret_from_fork+0x116/0x1d0
[   15.906704]  ret_from_fork_asm+0x1a/0x30
[   15.906984] 
[   15.907068] The buggy address belongs to the object at ffff8881026d6200
[   15.907068]  which belongs to the cache kmalloc-64 of size 64
[   15.907884] The buggy address is located 0 bytes to the right of
[   15.907884]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.908420] 
[   15.908755] The buggy address belongs to the physical page:
[   15.909156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.909548] flags: 0x200000000000000(node=0|zone=2)
[   15.909864] page_type: f5(slab)
[   15.910041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.910525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.910961] page dumped because: kasan: bad access detected
[   15.911212] 
[   15.911305] Memory state around the buggy address:
[   15.911718]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.912097]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.912545] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.912978]                                      ^
[   15.913167]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.913657]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.914024] ==================================================================
[   15.381172] ==================================================================
[   15.381432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.382001] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.382547] 
[   15.382672] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.382729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.382743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.382779] Call Trace:
[   15.382797]  <TASK>
[   15.382814]  dump_stack_lvl+0x73/0xb0
[   15.382845]  print_report+0xd1/0x610
[   15.382868]  ? __virt_addr_valid+0x1db/0x2d0
[   15.382894]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.382917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.382942]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.382966]  kasan_report+0x141/0x180
[   15.382989]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.383017]  kasan_check_range+0x10c/0x1c0
[   15.383042]  __kasan_check_write+0x18/0x20
[   15.383074]  kasan_atomics_helper+0x8f9/0x5450
[   15.383099]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.383123]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.383165]  kasan_atomics+0x1dc/0x310
[   15.383191]  ? __pfx_kasan_atomics+0x10/0x10
[   15.383217]  ? __pfx_read_tsc+0x10/0x10
[   15.383249]  ? ktime_get_ts64+0x86/0x230
[   15.383276]  kunit_try_run_case+0x1a5/0x480
[   15.383313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.383338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.383365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.383410]  ? __kthread_parkme+0x82/0x180
[   15.383433]  ? preempt_count_sub+0x50/0x80
[   15.383467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.383494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.383521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.383549]  kthread+0x337/0x6f0
[   15.383570]  ? trace_preempt_on+0x20/0xc0
[   15.383596]  ? __pfx_kthread+0x10/0x10
[   15.383626]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.383650]  ? calculate_sigpending+0x7b/0xa0
[   15.383677]  ? __pfx_kthread+0x10/0x10
[   15.383711]  ret_from_fork+0x116/0x1d0
[   15.383731]  ? __pfx_kthread+0x10/0x10
[   15.383754]  ret_from_fork_asm+0x1a/0x30
[   15.383787]  </TASK>
[   15.383806] 
[   15.391307] Allocated by task 283:
[   15.391518]  kasan_save_stack+0x45/0x70
[   15.391744]  kasan_save_track+0x18/0x40
[   15.391937]  kasan_save_alloc_info+0x3b/0x50
[   15.392146]  __kasan_kmalloc+0xb7/0xc0
[   15.392321]  __kmalloc_cache_noprof+0x189/0x420
[   15.392518]  kasan_atomics+0x95/0x310
[   15.392656]  kunit_try_run_case+0x1a5/0x480
[   15.392806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.392984]  kthread+0x337/0x6f0
[   15.393107]  ret_from_fork+0x116/0x1d0
[   15.393242]  ret_from_fork_asm+0x1a/0x30
[   15.393384] 
[   15.393516] The buggy address belongs to the object at ffff8881026d6200
[   15.393516]  which belongs to the cache kmalloc-64 of size 64
[   15.394050] The buggy address is located 0 bytes to the right of
[   15.394050]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.394631] 
[   15.394730] The buggy address belongs to the physical page:
[   15.395018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.395415] flags: 0x200000000000000(node=0|zone=2)
[   15.395664] page_type: f5(slab)
[   15.395798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.396031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.396260] page dumped because: kasan: bad access detected
[   15.396471] 
[   15.396546] Memory state around the buggy address:
[   15.396708]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.397056]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.397460] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.397827]                                      ^
[   15.398075]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.398413]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.398769] ==================================================================
[   15.148343] ==================================================================
[   15.148962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.149418] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283
[   15.149874] 
[   15.150039] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.150088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.150100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.150123] Call Trace:
[   15.150137]  <TASK>
[   15.150155]  dump_stack_lvl+0x73/0xb0
[   15.150186]  print_report+0xd1/0x610
[   15.150212]  ? __virt_addr_valid+0x1db/0x2d0
[   15.150237]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.150260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.150285]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.150309]  kasan_report+0x141/0x180
[   15.150332]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.150360]  __asan_report_store4_noabort+0x1b/0x30
[   15.150396]  kasan_atomics_helper+0x4b6e/0x5450
[   15.150429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.150470]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.150512]  kasan_atomics+0x1dc/0x310
[   15.150537]  ? __pfx_kasan_atomics+0x10/0x10
[   15.150562]  ? __pfx_read_tsc+0x10/0x10
[   15.150606]  ? ktime_get_ts64+0x86/0x230
[   15.150634]  kunit_try_run_case+0x1a5/0x480
[   15.150660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.150711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.150737]  ? __kthread_parkme+0x82/0x180
[   15.150760]  ? preempt_count_sub+0x50/0x80
[   15.150785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.150837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.150864]  kthread+0x337/0x6f0
[   15.150886]  ? trace_preempt_on+0x20/0xc0
[   15.150910]  ? __pfx_kthread+0x10/0x10
[   15.150933]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.150966]  ? calculate_sigpending+0x7b/0xa0
[   15.150992]  ? __pfx_kthread+0x10/0x10
[   15.151016]  ret_from_fork+0x116/0x1d0
[   15.151047]  ? __pfx_kthread+0x10/0x10
[   15.151069]  ret_from_fork_asm+0x1a/0x30
[   15.151101]  </TASK>
[   15.151112] 
[   15.164665] Allocated by task 283:
[   15.165011]  kasan_save_stack+0x45/0x70
[   15.165508]  kasan_save_track+0x18/0x40
[   15.165871]  kasan_save_alloc_info+0x3b/0x50
[   15.166286]  __kasan_kmalloc+0xb7/0xc0
[   15.166540]  __kmalloc_cache_noprof+0x189/0x420
[   15.167033]  kasan_atomics+0x95/0x310
[   15.167170]  kunit_try_run_case+0x1a5/0x480
[   15.167320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.167544]  kthread+0x337/0x6f0
[   15.167874]  ret_from_fork+0x116/0x1d0
[   15.168266]  ret_from_fork_asm+0x1a/0x30
[   15.168813] 
[   15.168974] The buggy address belongs to the object at ffff8881026d6200
[   15.168974]  which belongs to the cache kmalloc-64 of size 64
[   15.170234] The buggy address is located 0 bytes to the right of
[   15.170234]  allocated 48-byte region [ffff8881026d6200, ffff8881026d6230)
[   15.171524] 
[   15.171751] The buggy address belongs to the physical page:
[   15.172179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6
[   15.172745] flags: 0x200000000000000(node=0|zone=2)
[   15.172927] page_type: f5(slab)
[   15.173065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.173828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.174284] page dumped because: kasan: bad access detected
[   15.174488] 
[   15.174560] Memory state around the buggy address:
[   15.175115]  ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.175664]  ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.176416] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.176965]                                      ^
[   15.177413]  ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177891]  ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.178633] ==================================================================

[   15.707439] ==================================================================
[   15.707805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.708095] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.708633] 
[   15.708812] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.708860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.708874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.708897] Call Trace:
[   15.708916]  <TASK>
[   15.708934]  dump_stack_lvl+0x73/0xb0
[   15.708965]  print_report+0xd1/0x610
[   15.708989]  ? __virt_addr_valid+0x1db/0x2d0
[   15.709013]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.709037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.709078]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.709102]  kasan_report+0x141/0x180
[   15.709149]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.709179]  kasan_check_range+0x10c/0x1c0
[   15.709204]  __kasan_check_write+0x18/0x20
[   15.709225]  kasan_atomics_helper+0x8f9/0x5450
[   15.709250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.709274]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.709302]  ? kasan_atomics+0x152/0x310
[   15.709352]  kasan_atomics+0x1dc/0x310
[   15.709376]  ? __pfx_kasan_atomics+0x10/0x10
[   15.709402]  ? __pfx_read_tsc+0x10/0x10
[   15.709426]  ? ktime_get_ts64+0x86/0x230
[   15.709452]  kunit_try_run_case+0x1a5/0x480
[   15.709479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.709549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.709576]  ? __kthread_parkme+0x82/0x180
[   15.709597]  ? preempt_count_sub+0x50/0x80
[   15.709623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.709716]  kthread+0x337/0x6f0
[   15.709736]  ? trace_preempt_on+0x20/0xc0
[   15.709761]  ? __pfx_kthread+0x10/0x10
[   15.709784]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.709808]  ? calculate_sigpending+0x7b/0xa0
[   15.709834]  ? __pfx_kthread+0x10/0x10
[   15.709857]  ret_from_fork+0x116/0x1d0
[   15.709878]  ? __pfx_kthread+0x10/0x10
[   15.709900]  ret_from_fork_asm+0x1a/0x30
[   15.709934]  </TASK>
[   15.709946] 
[   15.724500] Allocated by task 284:
[   15.724952]  kasan_save_stack+0x45/0x70
[   15.725345]  kasan_save_track+0x18/0x40
[   15.725555]  kasan_save_alloc_info+0x3b/0x50
[   15.725987]  __kasan_kmalloc+0xb7/0xc0
[   15.726409]  __kmalloc_cache_noprof+0x189/0x420
[   15.726937]  kasan_atomics+0x95/0x310
[   15.727287]  kunit_try_run_case+0x1a5/0x480
[   15.727452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.727628]  kthread+0x337/0x6f0
[   15.728210]  ret_from_fork+0x116/0x1d0
[   15.728582]  ret_from_fork_asm+0x1a/0x30
[   15.729091] 
[   15.729291] The buggy address belongs to the object at ffff8881025adf00
[   15.729291]  which belongs to the cache kmalloc-64 of size 64
[   15.730163] The buggy address is located 0 bytes to the right of
[   15.730163]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.731462] 
[   15.731581] The buggy address belongs to the physical page:
[   15.732045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.733109] flags: 0x200000000000000(node=0|zone=2)
[   15.733351] page_type: f5(slab)
[   15.733478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.733775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.734502] page dumped because: kasan: bad access detected
[   15.735150] 
[   15.735340] Memory state around the buggy address:
[   15.735866]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.736720]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.737425] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.737710]                                      ^
[   15.738165]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738929]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.739622] ==================================================================
[   15.534212] ==================================================================
[   15.534559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.534913] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.535821] 
[   15.536048] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.536128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.536144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.536165] Call Trace:
[   15.536179]  <TASK>
[   15.536194]  dump_stack_lvl+0x73/0xb0
[   15.536224]  print_report+0xd1/0x610
[   15.536249]  ? __virt_addr_valid+0x1db/0x2d0
[   15.536274]  ? kasan_atomics_helper+0x565/0x5450
[   15.536335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.536362]  ? kasan_atomics_helper+0x565/0x5450
[   15.536386]  kasan_report+0x141/0x180
[   15.536410]  ? kasan_atomics_helper+0x565/0x5450
[   15.536438]  kasan_check_range+0x10c/0x1c0
[   15.536463]  __kasan_check_write+0x18/0x20
[   15.536484]  kasan_atomics_helper+0x565/0x5450
[   15.536508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.536533]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.536561]  ? kasan_atomics+0x152/0x310
[   15.536590]  kasan_atomics+0x1dc/0x310
[   15.536614]  ? __pfx_kasan_atomics+0x10/0x10
[   15.536711]  ? __pfx_read_tsc+0x10/0x10
[   15.536735]  ? ktime_get_ts64+0x86/0x230
[   15.536762]  kunit_try_run_case+0x1a5/0x480
[   15.536788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.536839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.536865]  ? __kthread_parkme+0x82/0x180
[   15.536887]  ? preempt_count_sub+0x50/0x80
[   15.536913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.536965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.536992]  kthread+0x337/0x6f0
[   15.537012]  ? trace_preempt_on+0x20/0xc0
[   15.537037]  ? __pfx_kthread+0x10/0x10
[   15.537070]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.537094]  ? calculate_sigpending+0x7b/0xa0
[   15.537140]  ? __pfx_kthread+0x10/0x10
[   15.537162]  ret_from_fork+0x116/0x1d0
[   15.537182]  ? __pfx_kthread+0x10/0x10
[   15.537205]  ret_from_fork_asm+0x1a/0x30
[   15.537237]  </TASK>
[   15.537249] 
[   15.553149] Allocated by task 284:
[   15.553555]  kasan_save_stack+0x45/0x70
[   15.553961]  kasan_save_track+0x18/0x40
[   15.554349]  kasan_save_alloc_info+0x3b/0x50
[   15.554668]  __kasan_kmalloc+0xb7/0xc0
[   15.555087]  __kmalloc_cache_noprof+0x189/0x420
[   15.555469]  kasan_atomics+0x95/0x310
[   15.555825]  kunit_try_run_case+0x1a5/0x480
[   15.555978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.556344]  kthread+0x337/0x6f0
[   15.556730]  ret_from_fork+0x116/0x1d0
[   15.557145]  ret_from_fork_asm+0x1a/0x30
[   15.557557] 
[   15.557767] The buggy address belongs to the object at ffff8881025adf00
[   15.557767]  which belongs to the cache kmalloc-64 of size 64
[   15.558846] The buggy address is located 0 bytes to the right of
[   15.558846]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.559285] 
[   15.559457] The buggy address belongs to the physical page:
[   15.559984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.560993] flags: 0x200000000000000(node=0|zone=2)
[   15.561626] page_type: f5(slab)
[   15.561997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.562687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.563276] page dumped because: kasan: bad access detected
[   15.563827] 
[   15.564066] Memory state around the buggy address:
[   15.564308]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.564533]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565225] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.565951]                                      ^
[   15.566435]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566954]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.567427] ==================================================================
[   16.155119] ==================================================================
[   16.155417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   16.155762] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.156075] 
[   16.156163] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.156207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.156221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.156243] Call Trace:
[   16.156258]  <TASK>
[   16.156273]  dump_stack_lvl+0x73/0xb0
[   16.156302]  print_report+0xd1/0x610
[   16.156326]  ? __virt_addr_valid+0x1db/0x2d0
[   16.156350]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.156373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.156432]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.156457]  kasan_report+0x141/0x180
[   16.156480]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.156508]  __asan_report_load4_noabort+0x18/0x20
[   16.156536]  kasan_atomics_helper+0x49ce/0x5450
[   16.156561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.156586]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.156613]  ? kasan_atomics+0x152/0x310
[   16.156641]  kasan_atomics+0x1dc/0x310
[   16.156665]  ? __pfx_kasan_atomics+0x10/0x10
[   16.156691]  ? __pfx_read_tsc+0x10/0x10
[   16.156714]  ? ktime_get_ts64+0x86/0x230
[   16.156739]  kunit_try_run_case+0x1a5/0x480
[   16.156765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.156790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.156816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.156842]  ? __kthread_parkme+0x82/0x180
[   16.156864]  ? preempt_count_sub+0x50/0x80
[   16.156889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.156935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.156961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.156990]  kthread+0x337/0x6f0
[   16.157010]  ? trace_preempt_on+0x20/0xc0
[   16.157035]  ? __pfx_kthread+0x10/0x10
[   16.157067]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.157109]  ? calculate_sigpending+0x7b/0xa0
[   16.157144]  ? __pfx_kthread+0x10/0x10
[   16.157167]  ret_from_fork+0x116/0x1d0
[   16.157189]  ? __pfx_kthread+0x10/0x10
[   16.157211]  ret_from_fork_asm+0x1a/0x30
[   16.157243]  </TASK>
[   16.157254] 
[   16.164942] Allocated by task 284:
[   16.165086]  kasan_save_stack+0x45/0x70
[   16.165232]  kasan_save_track+0x18/0x40
[   16.165448]  kasan_save_alloc_info+0x3b/0x50
[   16.165661]  __kasan_kmalloc+0xb7/0xc0
[   16.165849]  __kmalloc_cache_noprof+0x189/0x420
[   16.166268]  kasan_atomics+0x95/0x310
[   16.166404]  kunit_try_run_case+0x1a5/0x480
[   16.166553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.166734]  kthread+0x337/0x6f0
[   16.166927]  ret_from_fork+0x116/0x1d0
[   16.167134]  ret_from_fork_asm+0x1a/0x30
[   16.167360] 
[   16.167458] The buggy address belongs to the object at ffff8881025adf00
[   16.167458]  which belongs to the cache kmalloc-64 of size 64
[   16.168011] The buggy address is located 0 bytes to the right of
[   16.168011]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.168467] 
[   16.168542] The buggy address belongs to the physical page:
[   16.168742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.169152] flags: 0x200000000000000(node=0|zone=2)
[   16.169390] page_type: f5(slab)
[   16.169559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.170094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.170424] page dumped because: kasan: bad access detected
[   16.170698] 
[   16.170777] Memory state around the buggy address:
[   16.170936]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.171173]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.171479] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.171859]                                      ^
[   16.172187]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.172567]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.172865] ==================================================================
[   16.496118] ==================================================================
[   16.496752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.497132] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.497502] 
[   16.497743] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.497795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.497809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.497833] Call Trace:
[   16.497851]  <TASK>
[   16.497869]  dump_stack_lvl+0x73/0xb0
[   16.497901]  print_report+0xd1/0x610
[   16.497925]  ? __virt_addr_valid+0x1db/0x2d0
[   16.497950]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.497973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.497999]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.498023]  kasan_report+0x141/0x180
[   16.498046]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.498087]  kasan_check_range+0x10c/0x1c0
[   16.498113]  __kasan_check_write+0x18/0x20
[   16.498209]  kasan_atomics_helper+0x1b22/0x5450
[   16.498234]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.498260]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.498289]  ? kasan_atomics+0x152/0x310
[   16.498316]  kasan_atomics+0x1dc/0x310
[   16.498340]  ? __pfx_kasan_atomics+0x10/0x10
[   16.498366]  ? __pfx_read_tsc+0x10/0x10
[   16.498388]  ? ktime_get_ts64+0x86/0x230
[   16.498413]  kunit_try_run_case+0x1a5/0x480
[   16.498440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.498465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.498492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.498518]  ? __kthread_parkme+0x82/0x180
[   16.498539]  ? preempt_count_sub+0x50/0x80
[   16.498565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.498591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.498617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.498645]  kthread+0x337/0x6f0
[   16.498665]  ? trace_preempt_on+0x20/0xc0
[   16.498691]  ? __pfx_kthread+0x10/0x10
[   16.498718]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.498742]  ? calculate_sigpending+0x7b/0xa0
[   16.498767]  ? __pfx_kthread+0x10/0x10
[   16.498790]  ret_from_fork+0x116/0x1d0
[   16.498811]  ? __pfx_kthread+0x10/0x10
[   16.498833]  ret_from_fork_asm+0x1a/0x30
[   16.498866]  </TASK>
[   16.498877] 
[   16.508809] Allocated by task 284:
[   16.509193]  kasan_save_stack+0x45/0x70
[   16.509386]  kasan_save_track+0x18/0x40
[   16.509586]  kasan_save_alloc_info+0x3b/0x50
[   16.509947]  __kasan_kmalloc+0xb7/0xc0
[   16.510169]  __kmalloc_cache_noprof+0x189/0x420
[   16.510515]  kasan_atomics+0x95/0x310
[   16.510673]  kunit_try_run_case+0x1a5/0x480
[   16.510888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.511340]  kthread+0x337/0x6f0
[   16.511501]  ret_from_fork+0x116/0x1d0
[   16.511752]  ret_from_fork_asm+0x1a/0x30
[   16.512000] 
[   16.512118] The buggy address belongs to the object at ffff8881025adf00
[   16.512118]  which belongs to the cache kmalloc-64 of size 64
[   16.512623] The buggy address is located 0 bytes to the right of
[   16.512623]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.513122] 
[   16.513228] The buggy address belongs to the physical page:
[   16.513858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.514313] flags: 0x200000000000000(node=0|zone=2)
[   16.514611] page_type: f5(slab)
[   16.514835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.515251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.515653] page dumped because: kasan: bad access detected
[   16.515872] 
[   16.516082] Memory state around the buggy address:
[   16.516263]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.516675]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.517030] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.517429]                                      ^
[   16.517603]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.518009]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.518426] ==================================================================
[   16.775607] ==================================================================
[   16.776334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.776998] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.777406] 
[   16.777563] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.777827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.777844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.777867] Call Trace:
[   16.777884]  <TASK>
[   16.777901]  dump_stack_lvl+0x73/0xb0
[   16.777934]  print_report+0xd1/0x610
[   16.777957]  ? __virt_addr_valid+0x1db/0x2d0
[   16.777982]  ? kasan_atomics_helper+0x218a/0x5450
[   16.778005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.778030]  ? kasan_atomics_helper+0x218a/0x5450
[   16.778066]  kasan_report+0x141/0x180
[   16.778090]  ? kasan_atomics_helper+0x218a/0x5450
[   16.778118]  kasan_check_range+0x10c/0x1c0
[   16.778144]  __kasan_check_write+0x18/0x20
[   16.778165]  kasan_atomics_helper+0x218a/0x5450
[   16.778190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.778214]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.778242]  ? kasan_atomics+0x152/0x310
[   16.778270]  kasan_atomics+0x1dc/0x310
[   16.778294]  ? __pfx_kasan_atomics+0x10/0x10
[   16.778321]  ? __pfx_read_tsc+0x10/0x10
[   16.778343]  ? ktime_get_ts64+0x86/0x230
[   16.778370]  kunit_try_run_case+0x1a5/0x480
[   16.778396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.778421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.778447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.778473]  ? __kthread_parkme+0x82/0x180
[   16.778495]  ? preempt_count_sub+0x50/0x80
[   16.778521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.778547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.778574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.778601]  kthread+0x337/0x6f0
[   16.778621]  ? trace_preempt_on+0x20/0xc0
[   16.778647]  ? __pfx_kthread+0x10/0x10
[   16.778669]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.778692]  ? calculate_sigpending+0x7b/0xa0
[   16.778724]  ? __pfx_kthread+0x10/0x10
[   16.778750]  ret_from_fork+0x116/0x1d0
[   16.778770]  ? __pfx_kthread+0x10/0x10
[   16.778792]  ret_from_fork_asm+0x1a/0x30
[   16.778824]  </TASK>
[   16.778836] 
[   16.789341] Allocated by task 284:
[   16.789539]  kasan_save_stack+0x45/0x70
[   16.789907]  kasan_save_track+0x18/0x40
[   16.790192]  kasan_save_alloc_info+0x3b/0x50
[   16.790490]  __kasan_kmalloc+0xb7/0xc0
[   16.790680]  __kmalloc_cache_noprof+0x189/0x420
[   16.791009]  kasan_atomics+0x95/0x310
[   16.791363]  kunit_try_run_case+0x1a5/0x480
[   16.791652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.791902]  kthread+0x337/0x6f0
[   16.792087]  ret_from_fork+0x116/0x1d0
[   16.792477]  ret_from_fork_asm+0x1a/0x30
[   16.792741] 
[   16.792924] The buggy address belongs to the object at ffff8881025adf00
[   16.792924]  which belongs to the cache kmalloc-64 of size 64
[   16.793622] The buggy address is located 0 bytes to the right of
[   16.793622]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.794455] 
[   16.794559] The buggy address belongs to the physical page:
[   16.794777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.795105] flags: 0x200000000000000(node=0|zone=2)
[   16.795585] page_type: f5(slab)
[   16.795806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.796268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.796654] page dumped because: kasan: bad access detected
[   16.797006] 
[   16.797202] Memory state around the buggy address:
[   16.797769]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.798641]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.798923] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.799279]                                      ^
[   16.799827]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.800584]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.801289] ==================================================================
[   16.421856] ==================================================================
[   16.422557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.423354] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.424093] 
[   16.424259] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.424307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.424322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.424344] Call Trace:
[   16.424360]  <TASK>
[   16.424377]  dump_stack_lvl+0x73/0xb0
[   16.424408]  print_report+0xd1/0x610
[   16.424432]  ? __virt_addr_valid+0x1db/0x2d0
[   16.424456]  ? kasan_atomics_helper+0x194a/0x5450
[   16.424480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.424506]  ? kasan_atomics_helper+0x194a/0x5450
[   16.424530]  kasan_report+0x141/0x180
[   16.424553]  ? kasan_atomics_helper+0x194a/0x5450
[   16.424581]  kasan_check_range+0x10c/0x1c0
[   16.424607]  __kasan_check_write+0x18/0x20
[   16.424627]  kasan_atomics_helper+0x194a/0x5450
[   16.424651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.424677]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.424704]  ? kasan_atomics+0x152/0x310
[   16.424732]  kasan_atomics+0x1dc/0x310
[   16.424756]  ? __pfx_kasan_atomics+0x10/0x10
[   16.424781]  ? __pfx_read_tsc+0x10/0x10
[   16.424805]  ? ktime_get_ts64+0x86/0x230
[   16.424830]  kunit_try_run_case+0x1a5/0x480
[   16.424857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424881]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.424907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.424933]  ? __kthread_parkme+0x82/0x180
[   16.424954]  ? preempt_count_sub+0x50/0x80
[   16.424980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.425008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.425035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.425182]  kthread+0x337/0x6f0
[   16.425219]  ? trace_preempt_on+0x20/0xc0
[   16.425248]  ? __pfx_kthread+0x10/0x10
[   16.425271]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.425305]  ? calculate_sigpending+0x7b/0xa0
[   16.425332]  ? __pfx_kthread+0x10/0x10
[   16.425354]  ret_from_fork+0x116/0x1d0
[   16.425376]  ? __pfx_kthread+0x10/0x10
[   16.425397]  ret_from_fork_asm+0x1a/0x30
[   16.425430]  </TASK>
[   16.425442] 
[   16.438076] Allocated by task 284:
[   16.438453]  kasan_save_stack+0x45/0x70
[   16.438837]  kasan_save_track+0x18/0x40
[   16.439273]  kasan_save_alloc_info+0x3b/0x50
[   16.439680]  __kasan_kmalloc+0xb7/0xc0
[   16.440045]  __kmalloc_cache_noprof+0x189/0x420
[   16.440285]  kasan_atomics+0x95/0x310
[   16.440680]  kunit_try_run_case+0x1a5/0x480
[   16.440985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.441319]  kthread+0x337/0x6f0
[   16.441652]  ret_from_fork+0x116/0x1d0
[   16.442001]  ret_from_fork_asm+0x1a/0x30
[   16.442392] 
[   16.442469] The buggy address belongs to the object at ffff8881025adf00
[   16.442469]  which belongs to the cache kmalloc-64 of size 64
[   16.442831] The buggy address is located 0 bytes to the right of
[   16.442831]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.443348] 
[   16.443516] The buggy address belongs to the physical page:
[   16.444012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.444790] flags: 0x200000000000000(node=0|zone=2)
[   16.445262] page_type: f5(slab)
[   16.445655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.446440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.447111] page dumped because: kasan: bad access detected
[   16.447609] 
[   16.447785] Memory state around the buggy address:
[   16.448269]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448490]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448709] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.448925]                                      ^
[   16.449097]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.449413]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.449716] ==================================================================
[   15.600431] ==================================================================
[   15.601134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.601717] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.602044] 
[   15.602231] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.602285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.602298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.602319] Call Trace:
[   15.602336]  <TASK>
[   15.602357]  dump_stack_lvl+0x73/0xb0
[   15.602388]  print_report+0xd1/0x610
[   15.602413]  ? __virt_addr_valid+0x1db/0x2d0
[   15.602437]  ? kasan_atomics_helper+0x697/0x5450
[   15.602460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.602487]  ? kasan_atomics_helper+0x697/0x5450
[   15.602511]  kasan_report+0x141/0x180
[   15.602536]  ? kasan_atomics_helper+0x697/0x5450
[   15.602564]  kasan_check_range+0x10c/0x1c0
[   15.602590]  __kasan_check_write+0x18/0x20
[   15.602611]  kasan_atomics_helper+0x697/0x5450
[   15.602636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.602683]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.602715]  ? kasan_atomics+0x152/0x310
[   15.602744]  kasan_atomics+0x1dc/0x310
[   15.602768]  ? __pfx_kasan_atomics+0x10/0x10
[   15.602794]  ? __pfx_read_tsc+0x10/0x10
[   15.602817]  ? ktime_get_ts64+0x86/0x230
[   15.602843]  kunit_try_run_case+0x1a5/0x480
[   15.602869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.602919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.602944]  ? __kthread_parkme+0x82/0x180
[   15.602966]  ? preempt_count_sub+0x50/0x80
[   15.602992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.603018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.603044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.603080]  kthread+0x337/0x6f0
[   15.603100]  ? trace_preempt_on+0x20/0xc0
[   15.603133]  ? __pfx_kthread+0x10/0x10
[   15.603155]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.603179]  ? calculate_sigpending+0x7b/0xa0
[   15.603204]  ? __pfx_kthread+0x10/0x10
[   15.603227]  ret_from_fork+0x116/0x1d0
[   15.603248]  ? __pfx_kthread+0x10/0x10
[   15.603270]  ret_from_fork_asm+0x1a/0x30
[   15.603302]  </TASK>
[   15.603313] 
[   15.618565] Allocated by task 284:
[   15.618699]  kasan_save_stack+0x45/0x70
[   15.619159]  kasan_save_track+0x18/0x40
[   15.619530]  kasan_save_alloc_info+0x3b/0x50
[   15.620040]  __kasan_kmalloc+0xb7/0xc0
[   15.620478]  __kmalloc_cache_noprof+0x189/0x420
[   15.620766]  kasan_atomics+0x95/0x310
[   15.620950]  kunit_try_run_case+0x1a5/0x480
[   15.621361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.621905]  kthread+0x337/0x6f0
[   15.622346]  ret_from_fork+0x116/0x1d0
[   15.622542]  ret_from_fork_asm+0x1a/0x30
[   15.623023] 
[   15.623199] The buggy address belongs to the object at ffff8881025adf00
[   15.623199]  which belongs to the cache kmalloc-64 of size 64
[   15.624299] The buggy address is located 0 bytes to the right of
[   15.624299]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.625357] 
[   15.625574] The buggy address belongs to the physical page:
[   15.626158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.626473] flags: 0x200000000000000(node=0|zone=2)
[   15.626925] page_type: f5(slab)
[   15.627143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.627780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.628063] page dumped because: kasan: bad access detected
[   15.628535] 
[   15.628713] Memory state around the buggy address:
[   15.629225]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.629981]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.630365] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.630987]                                      ^
[   15.631398]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.631619]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.632539] ==================================================================
[   16.554679] ==================================================================
[   16.554988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.555476] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.555776] 
[   16.555867] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.555910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.555923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.555945] Call Trace:
[   16.555960]  <TASK>
[   16.555974]  dump_stack_lvl+0x73/0xb0
[   16.556004]  print_report+0xd1/0x610
[   16.556028]  ? __virt_addr_valid+0x1db/0x2d0
[   16.556064]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.556087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.556113]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.556136]  kasan_report+0x141/0x180
[   16.556160]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.556188]  kasan_check_range+0x10c/0x1c0
[   16.556213]  __kasan_check_write+0x18/0x20
[   16.556236]  kasan_atomics_helper+0x1ce1/0x5450
[   16.556260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.556285]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.556311]  ? kasan_atomics+0x152/0x310
[   16.556340]  kasan_atomics+0x1dc/0x310
[   16.556364]  ? __pfx_kasan_atomics+0x10/0x10
[   16.556390]  ? __pfx_read_tsc+0x10/0x10
[   16.556413]  ? ktime_get_ts64+0x86/0x230
[   16.556439]  kunit_try_run_case+0x1a5/0x480
[   16.556466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.556491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.556518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.556544]  ? __kthread_parkme+0x82/0x180
[   16.556566]  ? preempt_count_sub+0x50/0x80
[   16.556593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.556620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.556647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.556674]  kthread+0x337/0x6f0
[   16.556695]  ? trace_preempt_on+0x20/0xc0
[   16.556720]  ? __pfx_kthread+0x10/0x10
[   16.556742]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.556766]  ? calculate_sigpending+0x7b/0xa0
[   16.556792]  ? __pfx_kthread+0x10/0x10
[   16.556815]  ret_from_fork+0x116/0x1d0
[   16.556837]  ? __pfx_kthread+0x10/0x10
[   16.556858]  ret_from_fork_asm+0x1a/0x30
[   16.556891]  </TASK>
[   16.556902] 
[   16.564519] Allocated by task 284:
[   16.564699]  kasan_save_stack+0x45/0x70
[   16.564899]  kasan_save_track+0x18/0x40
[   16.565101]  kasan_save_alloc_info+0x3b/0x50
[   16.565313]  __kasan_kmalloc+0xb7/0xc0
[   16.565654]  __kmalloc_cache_noprof+0x189/0x420
[   16.565880]  kasan_atomics+0x95/0x310
[   16.566077]  kunit_try_run_case+0x1a5/0x480
[   16.566530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.566745]  kthread+0x337/0x6f0
[   16.566870]  ret_from_fork+0x116/0x1d0
[   16.567005]  ret_from_fork_asm+0x1a/0x30
[   16.567262] 
[   16.567361] The buggy address belongs to the object at ffff8881025adf00
[   16.567361]  which belongs to the cache kmalloc-64 of size 64
[   16.567897] The buggy address is located 0 bytes to the right of
[   16.567897]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.568502] 
[   16.568588] The buggy address belongs to the physical page:
[   16.568811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.569159] flags: 0x200000000000000(node=0|zone=2)
[   16.569349] page_type: f5(slab)
[   16.569507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.569739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.569967] page dumped because: kasan: bad access detected
[   16.571407] 
[   16.571581] Memory state around the buggy address:
[   16.571987]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.572928]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.573825] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.574551]                                      ^
[   16.574725]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.574946]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.575229] ==================================================================
[   15.362412] ==================================================================
[   15.363137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.363576] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.363890] 
[   15.364039] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.364331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.364345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.364437] Call Trace:
[   15.364451]  <TASK>
[   15.364536]  dump_stack_lvl+0x73/0xb0
[   15.364569]  print_report+0xd1/0x610
[   15.364594]  ? __virt_addr_valid+0x1db/0x2d0
[   15.364617]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.364652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.364678]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.364701]  kasan_report+0x141/0x180
[   15.364723]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.364750]  __asan_report_store4_noabort+0x1b/0x30
[   15.364777]  kasan_atomics_helper+0x4ba2/0x5450
[   15.364801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.364823]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.364882]  ? kasan_atomics+0x152/0x310
[   15.364908]  kasan_atomics+0x1dc/0x310
[   15.364932]  ? __pfx_kasan_atomics+0x10/0x10
[   15.364957]  ? __pfx_read_tsc+0x10/0x10
[   15.364978]  ? ktime_get_ts64+0x86/0x230
[   15.365003]  kunit_try_run_case+0x1a5/0x480
[   15.365029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.365063]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.365088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.365113]  ? __kthread_parkme+0x82/0x180
[   15.365145]  ? preempt_count_sub+0x50/0x80
[   15.365169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.365194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.365220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.365246]  kthread+0x337/0x6f0
[   15.365266]  ? trace_preempt_on+0x20/0xc0
[   15.365290]  ? __pfx_kthread+0x10/0x10
[   15.365311]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.365333]  ? calculate_sigpending+0x7b/0xa0
[   15.365359]  ? __pfx_kthread+0x10/0x10
[   15.365381]  ret_from_fork+0x116/0x1d0
[   15.365400]  ? __pfx_kthread+0x10/0x10
[   15.365421]  ret_from_fork_asm+0x1a/0x30
[   15.365453]  </TASK>
[   15.365462] 
[   15.376805] Allocated by task 284:
[   15.377266]  kasan_save_stack+0x45/0x70
[   15.377606]  kasan_save_track+0x18/0x40
[   15.377820]  kasan_save_alloc_info+0x3b/0x50
[   15.378011]  __kasan_kmalloc+0xb7/0xc0
[   15.378335]  __kmalloc_cache_noprof+0x189/0x420
[   15.378637]  kasan_atomics+0x95/0x310
[   15.379083]  kunit_try_run_case+0x1a5/0x480
[   15.379392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.379742]  kthread+0x337/0x6f0
[   15.380014]  ret_from_fork+0x116/0x1d0
[   15.380387]  ret_from_fork_asm+0x1a/0x30
[   15.380561] 
[   15.380667] The buggy address belongs to the object at ffff8881025adf00
[   15.380667]  which belongs to the cache kmalloc-64 of size 64
[   15.381453] The buggy address is located 0 bytes to the right of
[   15.381453]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.382245] 
[   15.382362] The buggy address belongs to the physical page:
[   15.382573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.383347] flags: 0x200000000000000(node=0|zone=2)
[   15.383565] page_type: f5(slab)
[   15.384018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.384539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.385018] page dumped because: kasan: bad access detected
[   15.385339] 
[   15.385439] Memory state around the buggy address:
[   15.385633]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.386171]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.386520] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.386930]                                      ^
[   15.387262]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.387674]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.387999] ==================================================================
[   16.843634] ==================================================================
[   16.843945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.844355] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.844690] 
[   16.844824] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.844869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.844881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.844903] Call Trace:
[   16.844917]  <TASK>
[   16.844932]  dump_stack_lvl+0x73/0xb0
[   16.844962]  print_report+0xd1/0x610
[   16.844985]  ? __virt_addr_valid+0x1db/0x2d0
[   16.845009]  ? kasan_atomics_helper+0x5115/0x5450
[   16.845032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.845069]  ? kasan_atomics_helper+0x5115/0x5450
[   16.845094]  kasan_report+0x141/0x180
[   16.845117]  ? kasan_atomics_helper+0x5115/0x5450
[   16.845160]  __asan_report_load8_noabort+0x18/0x20
[   16.845187]  kasan_atomics_helper+0x5115/0x5450
[   16.845212]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.845256]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.845297]  ? kasan_atomics+0x152/0x310
[   16.845326]  kasan_atomics+0x1dc/0x310
[   16.845350]  ? __pfx_kasan_atomics+0x10/0x10
[   16.845376]  ? __pfx_read_tsc+0x10/0x10
[   16.845400]  ? ktime_get_ts64+0x86/0x230
[   16.845427]  kunit_try_run_case+0x1a5/0x480
[   16.845453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.845478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.845504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.845530]  ? __kthread_parkme+0x82/0x180
[   16.845552]  ? preempt_count_sub+0x50/0x80
[   16.845578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.845605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.845631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.845658]  kthread+0x337/0x6f0
[   16.845679]  ? trace_preempt_on+0x20/0xc0
[   16.845705]  ? __pfx_kthread+0x10/0x10
[   16.845728]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.845751]  ? calculate_sigpending+0x7b/0xa0
[   16.845777]  ? __pfx_kthread+0x10/0x10
[   16.845800]  ret_from_fork+0x116/0x1d0
[   16.845821]  ? __pfx_kthread+0x10/0x10
[   16.845842]  ret_from_fork_asm+0x1a/0x30
[   16.845875]  </TASK>
[   16.845886] 
[   16.854138] Allocated by task 284:
[   16.854352]  kasan_save_stack+0x45/0x70
[   16.854562]  kasan_save_track+0x18/0x40
[   16.854747]  kasan_save_alloc_info+0x3b/0x50
[   16.854981]  __kasan_kmalloc+0xb7/0xc0
[   16.855199]  __kmalloc_cache_noprof+0x189/0x420
[   16.855413]  kasan_atomics+0x95/0x310
[   16.855590]  kunit_try_run_case+0x1a5/0x480
[   16.855821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.856070]  kthread+0x337/0x6f0
[   16.856230]  ret_from_fork+0x116/0x1d0
[   16.856441]  ret_from_fork_asm+0x1a/0x30
[   16.856640] 
[   16.856736] The buggy address belongs to the object at ffff8881025adf00
[   16.856736]  which belongs to the cache kmalloc-64 of size 64
[   16.857214] The buggy address is located 0 bytes to the right of
[   16.857214]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.857812] 
[   16.857920] The buggy address belongs to the physical page:
[   16.858109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.858492] flags: 0x200000000000000(node=0|zone=2)
[   16.858709] page_type: f5(slab)
[   16.858878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.859318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.859626] page dumped because: kasan: bad access detected
[   16.859873] 
[   16.859960] Memory state around the buggy address:
[   16.860159]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.860504]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.860816] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.861082]                                      ^
[   16.861416]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861720]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.861938] ==================================================================
[   16.037345] ==================================================================
[   16.037579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   16.038753] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.039086] 
[   16.039365] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.039414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.039428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.039451] Call Trace:
[   16.039466]  <TASK>
[   16.039481]  dump_stack_lvl+0x73/0xb0
[   16.039512]  print_report+0xd1/0x610
[   16.039537]  ? __virt_addr_valid+0x1db/0x2d0
[   16.039561]  ? kasan_atomics_helper+0x1148/0x5450
[   16.039585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.039611]  ? kasan_atomics_helper+0x1148/0x5450
[   16.039635]  kasan_report+0x141/0x180
[   16.039659]  ? kasan_atomics_helper+0x1148/0x5450
[   16.039688]  kasan_check_range+0x10c/0x1c0
[   16.039714]  __kasan_check_write+0x18/0x20
[   16.039735]  kasan_atomics_helper+0x1148/0x5450
[   16.039759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.039784]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.039811]  ? kasan_atomics+0x152/0x310
[   16.039838]  kasan_atomics+0x1dc/0x310
[   16.039863]  ? __pfx_kasan_atomics+0x10/0x10
[   16.039888]  ? __pfx_read_tsc+0x10/0x10
[   16.039911]  ? ktime_get_ts64+0x86/0x230
[   16.039937]  kunit_try_run_case+0x1a5/0x480
[   16.039963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.039989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.040015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.040041]  ? __kthread_parkme+0x82/0x180
[   16.040076]  ? preempt_count_sub+0x50/0x80
[   16.040102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.040141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.040168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.040195]  kthread+0x337/0x6f0
[   16.040216]  ? trace_preempt_on+0x20/0xc0
[   16.040241]  ? __pfx_kthread+0x10/0x10
[   16.040262]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.040286]  ? calculate_sigpending+0x7b/0xa0
[   16.040313]  ? __pfx_kthread+0x10/0x10
[   16.040335]  ret_from_fork+0x116/0x1d0
[   16.040356]  ? __pfx_kthread+0x10/0x10
[   16.040377]  ret_from_fork_asm+0x1a/0x30
[   16.040410]  </TASK>
[   16.040421] 
[   16.051865] Allocated by task 284:
[   16.052256]  kasan_save_stack+0x45/0x70
[   16.052547]  kasan_save_track+0x18/0x40
[   16.052737]  kasan_save_alloc_info+0x3b/0x50
[   16.052939]  __kasan_kmalloc+0xb7/0xc0
[   16.053137]  __kmalloc_cache_noprof+0x189/0x420
[   16.053668]  kasan_atomics+0x95/0x310
[   16.053949]  kunit_try_run_case+0x1a5/0x480
[   16.054347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.054711]  kthread+0x337/0x6f0
[   16.054965]  ret_from_fork+0x116/0x1d0
[   16.055284]  ret_from_fork_asm+0x1a/0x30
[   16.055570] 
[   16.055772] The buggy address belongs to the object at ffff8881025adf00
[   16.055772]  which belongs to the cache kmalloc-64 of size 64
[   16.056552] The buggy address is located 0 bytes to the right of
[   16.056552]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.057271] 
[   16.057378] The buggy address belongs to the physical page:
[   16.057793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.058282] flags: 0x200000000000000(node=0|zone=2)
[   16.058613] page_type: f5(slab)
[   16.058888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.059403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.059713] page dumped because: kasan: bad access detected
[   16.059968] 
[   16.060073] Memory state around the buggy address:
[   16.060526]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.060889]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.061327] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.061736]                                      ^
[   16.062026]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.062460]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.062878] ==================================================================
[   16.642934] ==================================================================
[   16.643352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.643783] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.644078] 
[   16.644212] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.644255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.644268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.644323] Call Trace:
[   16.644339]  <TASK>
[   16.644378]  dump_stack_lvl+0x73/0xb0
[   16.644410]  print_report+0xd1/0x610
[   16.644434]  ? __virt_addr_valid+0x1db/0x2d0
[   16.644458]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.644480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.644505]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.644530]  kasan_report+0x141/0x180
[   16.644552]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.644581]  kasan_check_range+0x10c/0x1c0
[   16.644636]  __kasan_check_write+0x18/0x20
[   16.644669]  kasan_atomics_helper+0x1f43/0x5450
[   16.644705]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.644729]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.644757]  ? kasan_atomics+0x152/0x310
[   16.644786]  kasan_atomics+0x1dc/0x310
[   16.644809]  ? __pfx_kasan_atomics+0x10/0x10
[   16.644836]  ? __pfx_read_tsc+0x10/0x10
[   16.644858]  ? ktime_get_ts64+0x86/0x230
[   16.644884]  kunit_try_run_case+0x1a5/0x480
[   16.644910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.644935]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.644961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.644987]  ? __kthread_parkme+0x82/0x180
[   16.645009]  ? preempt_count_sub+0x50/0x80
[   16.645036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.645072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.645099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.645145]  kthread+0x337/0x6f0
[   16.645166]  ? trace_preempt_on+0x20/0xc0
[   16.645191]  ? __pfx_kthread+0x10/0x10
[   16.645213]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.645236]  ? calculate_sigpending+0x7b/0xa0
[   16.645262]  ? __pfx_kthread+0x10/0x10
[   16.645285]  ret_from_fork+0x116/0x1d0
[   16.645306]  ? __pfx_kthread+0x10/0x10
[   16.645328]  ret_from_fork_asm+0x1a/0x30
[   16.645360]  </TASK>
[   16.645370] 
[   16.653441] Allocated by task 284:
[   16.653703]  kasan_save_stack+0x45/0x70
[   16.653898]  kasan_save_track+0x18/0x40
[   16.654109]  kasan_save_alloc_info+0x3b/0x50
[   16.654263]  __kasan_kmalloc+0xb7/0xc0
[   16.654460]  __kmalloc_cache_noprof+0x189/0x420
[   16.654694]  kasan_atomics+0x95/0x310
[   16.654878]  kunit_try_run_case+0x1a5/0x480
[   16.655075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.655314]  kthread+0x337/0x6f0
[   16.655483]  ret_from_fork+0x116/0x1d0
[   16.655649]  ret_from_fork_asm+0x1a/0x30
[   16.655832] 
[   16.655925] The buggy address belongs to the object at ffff8881025adf00
[   16.655925]  which belongs to the cache kmalloc-64 of size 64
[   16.656475] The buggy address is located 0 bytes to the right of
[   16.656475]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.656967] 
[   16.657042] The buggy address belongs to the physical page:
[   16.657247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.657491] flags: 0x200000000000000(node=0|zone=2)
[   16.657728] page_type: f5(slab)
[   16.657948] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.658335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.658682] page dumped because: kasan: bad access detected
[   16.658974] 
[   16.659048] Memory state around the buggy address:
[   16.659310]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.659629]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.659925] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.660299]                                      ^
[   16.660508]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.660727]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.661039] ==================================================================
[   15.973378] ==================================================================
[   15.974013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.974764] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.975138] 
[   15.975229] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.975274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.975287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.975310] Call Trace:
[   15.975325]  <TASK>
[   15.975341]  dump_stack_lvl+0x73/0xb0
[   15.975371]  print_report+0xd1/0x610
[   15.975395]  ? __virt_addr_valid+0x1db/0x2d0
[   15.975420]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.975443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.975468]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.975492]  kasan_report+0x141/0x180
[   15.975515]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.975543]  __asan_report_load4_noabort+0x18/0x20
[   15.975569]  kasan_atomics_helper+0x4a36/0x5450
[   15.975594]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.975620]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.975647]  ? kasan_atomics+0x152/0x310
[   15.975675]  kasan_atomics+0x1dc/0x310
[   15.975699]  ? __pfx_kasan_atomics+0x10/0x10
[   15.975724]  ? __pfx_read_tsc+0x10/0x10
[   15.975749]  ? ktime_get_ts64+0x86/0x230
[   15.975775]  kunit_try_run_case+0x1a5/0x480
[   15.975801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.975826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.975852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.975878]  ? __kthread_parkme+0x82/0x180
[   15.975901]  ? preempt_count_sub+0x50/0x80
[   15.975927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.975953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.975979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.976006]  kthread+0x337/0x6f0
[   15.976027]  ? trace_preempt_on+0x20/0xc0
[   15.976066]  ? __pfx_kthread+0x10/0x10
[   15.976089]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.976112]  ? calculate_sigpending+0x7b/0xa0
[   15.976147]  ? __pfx_kthread+0x10/0x10
[   15.976170]  ret_from_fork+0x116/0x1d0
[   15.976190]  ? __pfx_kthread+0x10/0x10
[   15.976213]  ret_from_fork_asm+0x1a/0x30
[   15.976246]  </TASK>
[   15.976257] 
[   15.983584] Allocated by task 284:
[   15.983742]  kasan_save_stack+0x45/0x70
[   15.983889]  kasan_save_track+0x18/0x40
[   15.984092]  kasan_save_alloc_info+0x3b/0x50
[   15.984322]  __kasan_kmalloc+0xb7/0xc0
[   15.984496]  __kmalloc_cache_noprof+0x189/0x420
[   15.984710]  kasan_atomics+0x95/0x310
[   15.984880]  kunit_try_run_case+0x1a5/0x480
[   15.985087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.985330]  kthread+0x337/0x6f0
[   15.985453]  ret_from_fork+0x116/0x1d0
[   15.985589]  ret_from_fork_asm+0x1a/0x30
[   15.985731] 
[   15.985804] The buggy address belongs to the object at ffff8881025adf00
[   15.985804]  which belongs to the cache kmalloc-64 of size 64
[   15.986326] The buggy address is located 0 bytes to the right of
[   15.986326]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.987120] 
[   15.987205] The buggy address belongs to the physical page:
[   15.987381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.987623] flags: 0x200000000000000(node=0|zone=2)
[   15.987787] page_type: f5(slab)
[   15.987927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.988486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.988830] page dumped because: kasan: bad access detected
[   15.989105] 
[   15.989188] Memory state around the buggy address:
[   15.989346]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.989565]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.990069] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.990385]                                      ^
[   15.990609]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990870]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.991111] ==================================================================
[   15.415096] ==================================================================
[   15.415793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.416222] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.416823] 
[   15.416939] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.416986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.417000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.417131] Call Trace:
[   15.417147]  <TASK>
[   15.417164]  dump_stack_lvl+0x73/0xb0
[   15.417195]  print_report+0xd1/0x610
[   15.417219]  ? __virt_addr_valid+0x1db/0x2d0
[   15.417243]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.417267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.417292]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.417316]  kasan_report+0x141/0x180
[   15.417339]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.417367]  __asan_report_store4_noabort+0x1b/0x30
[   15.417395]  kasan_atomics_helper+0x4b6e/0x5450
[   15.417419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.417444]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.417471]  ? kasan_atomics+0x152/0x310
[   15.417499]  kasan_atomics+0x1dc/0x310
[   15.417524]  ? __pfx_kasan_atomics+0x10/0x10
[   15.417550]  ? __pfx_read_tsc+0x10/0x10
[   15.417572]  ? ktime_get_ts64+0x86/0x230
[   15.417599]  kunit_try_run_case+0x1a5/0x480
[   15.417626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.417692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.417718]  ? __kthread_parkme+0x82/0x180
[   15.417741]  ? preempt_count_sub+0x50/0x80
[   15.417767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.417820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.417848]  kthread+0x337/0x6f0
[   15.417869]  ? trace_preempt_on+0x20/0xc0
[   15.417893]  ? __pfx_kthread+0x10/0x10
[   15.417916]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.417939]  ? calculate_sigpending+0x7b/0xa0
[   15.417967]  ? __pfx_kthread+0x10/0x10
[   15.417990]  ret_from_fork+0x116/0x1d0
[   15.418011]  ? __pfx_kthread+0x10/0x10
[   15.418033]  ret_from_fork_asm+0x1a/0x30
[   15.418077]  </TASK>
[   15.418089] 
[   15.428153] Allocated by task 284:
[   15.428297]  kasan_save_stack+0x45/0x70
[   15.428447]  kasan_save_track+0x18/0x40
[   15.428587]  kasan_save_alloc_info+0x3b/0x50
[   15.428740]  __kasan_kmalloc+0xb7/0xc0
[   15.428875]  __kmalloc_cache_noprof+0x189/0x420
[   15.429033]  kasan_atomics+0x95/0x310
[   15.430288]  kunit_try_run_case+0x1a5/0x480
[   15.431226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.432101]  kthread+0x337/0x6f0
[   15.432790]  ret_from_fork+0x116/0x1d0
[   15.433430]  ret_from_fork_asm+0x1a/0x30
[   15.434271] 
[   15.434478] The buggy address belongs to the object at ffff8881025adf00
[   15.434478]  which belongs to the cache kmalloc-64 of size 64
[   15.436288] The buggy address is located 0 bytes to the right of
[   15.436288]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.437537] 
[   15.437654] The buggy address belongs to the physical page:
[   15.438201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.438558] flags: 0x200000000000000(node=0|zone=2)
[   15.438971] page_type: f5(slab)
[   15.439254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.439597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.439924] page dumped because: kasan: bad access detected
[   15.440495] 
[   15.440601] Memory state around the buggy address:
[   15.441048]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441440]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441878] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.442365]                                      ^
[   15.442583]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.443070]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.443335] ==================================================================
[   16.283638] ==================================================================
[   16.284155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.284615] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.284917] 
[   16.285025] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.285082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.285095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.285116] Call Trace:
[   16.285131]  <TASK>
[   16.285147]  dump_stack_lvl+0x73/0xb0
[   16.285176]  print_report+0xd1/0x610
[   16.285436]  ? __virt_addr_valid+0x1db/0x2d0
[   16.285462]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.285485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.285511]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.285535]  kasan_report+0x141/0x180
[   16.285559]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.285587]  kasan_check_range+0x10c/0x1c0
[   16.285613]  __kasan_check_write+0x18/0x20
[   16.285634]  kasan_atomics_helper+0x15b6/0x5450
[   16.285660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.285684]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.285711]  ? kasan_atomics+0x152/0x310
[   16.285739]  kasan_atomics+0x1dc/0x310
[   16.285763]  ? __pfx_kasan_atomics+0x10/0x10
[   16.285789]  ? __pfx_read_tsc+0x10/0x10
[   16.285812]  ? ktime_get_ts64+0x86/0x230
[   16.285838]  kunit_try_run_case+0x1a5/0x480
[   16.285864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.285889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.285915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.285942]  ? __kthread_parkme+0x82/0x180
[   16.285964]  ? preempt_count_sub+0x50/0x80
[   16.285989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.286042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.286082]  kthread+0x337/0x6f0
[   16.286103]  ? trace_preempt_on+0x20/0xc0
[   16.286139]  ? __pfx_kthread+0x10/0x10
[   16.286162]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.286185]  ? calculate_sigpending+0x7b/0xa0
[   16.286211]  ? __pfx_kthread+0x10/0x10
[   16.286234]  ret_from_fork+0x116/0x1d0
[   16.286255]  ? __pfx_kthread+0x10/0x10
[   16.286278]  ret_from_fork_asm+0x1a/0x30
[   16.286310]  </TASK>
[   16.286320] 
[   16.295953] Allocated by task 284:
[   16.296312]  kasan_save_stack+0x45/0x70
[   16.296580]  kasan_save_track+0x18/0x40
[   16.296835]  kasan_save_alloc_info+0x3b/0x50
[   16.297130]  __kasan_kmalloc+0xb7/0xc0
[   16.297285]  __kmalloc_cache_noprof+0x189/0x420
[   16.297637]  kasan_atomics+0x95/0x310
[   16.297794]  kunit_try_run_case+0x1a5/0x480
[   16.297996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.298467]  kthread+0x337/0x6f0
[   16.298625]  ret_from_fork+0x116/0x1d0
[   16.298905]  ret_from_fork_asm+0x1a/0x30
[   16.299077] 
[   16.299189] The buggy address belongs to the object at ffff8881025adf00
[   16.299189]  which belongs to the cache kmalloc-64 of size 64
[   16.299857] The buggy address is located 0 bytes to the right of
[   16.299857]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.300617] 
[   16.300704] The buggy address belongs to the physical page:
[   16.301021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.301426] flags: 0x200000000000000(node=0|zone=2)
[   16.301754] page_type: f5(slab)
[   16.301924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.302426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.302756] page dumped because: kasan: bad access detected
[   16.302991] 
[   16.303097] Memory state around the buggy address:
[   16.303501]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303856]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.304261] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.304519]                                      ^
[   16.304841]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.305242]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.305533] ==================================================================
[   16.704391] ==================================================================
[   16.704729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.705188] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.705521] 
[   16.705609] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.705655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.705668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.705722] Call Trace:
[   16.705736]  <TASK>
[   16.705750]  dump_stack_lvl+0x73/0xb0
[   16.705820]  print_report+0xd1/0x610
[   16.705843]  ? __virt_addr_valid+0x1db/0x2d0
[   16.705867]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.705902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.705929]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.705953]  kasan_report+0x141/0x180
[   16.705976]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.706004]  __asan_report_load8_noabort+0x18/0x20
[   16.706031]  kasan_atomics_helper+0x4f98/0x5450
[   16.706065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.706090]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.706154]  ? kasan_atomics+0x152/0x310
[   16.706184]  kasan_atomics+0x1dc/0x310
[   16.706222]  ? __pfx_kasan_atomics+0x10/0x10
[   16.706248]  ? __pfx_read_tsc+0x10/0x10
[   16.706272]  ? ktime_get_ts64+0x86/0x230
[   16.706298]  kunit_try_run_case+0x1a5/0x480
[   16.706325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.706350]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.706376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.706402]  ? __kthread_parkme+0x82/0x180
[   16.706425]  ? preempt_count_sub+0x50/0x80
[   16.706450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.706476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.706502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.706529]  kthread+0x337/0x6f0
[   16.706550]  ? trace_preempt_on+0x20/0xc0
[   16.706575]  ? __pfx_kthread+0x10/0x10
[   16.706598]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.706621]  ? calculate_sigpending+0x7b/0xa0
[   16.706647]  ? __pfx_kthread+0x10/0x10
[   16.706670]  ret_from_fork+0x116/0x1d0
[   16.706690]  ? __pfx_kthread+0x10/0x10
[   16.706721]  ret_from_fork_asm+0x1a/0x30
[   16.706754]  </TASK>
[   16.706765] 
[   16.714590] Allocated by task 284:
[   16.714736]  kasan_save_stack+0x45/0x70
[   16.714939]  kasan_save_track+0x18/0x40
[   16.715148]  kasan_save_alloc_info+0x3b/0x50
[   16.715304]  __kasan_kmalloc+0xb7/0xc0
[   16.715521]  __kmalloc_cache_noprof+0x189/0x420
[   16.715839]  kasan_atomics+0x95/0x310
[   16.716062]  kunit_try_run_case+0x1a5/0x480
[   16.716273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.716534]  kthread+0x337/0x6f0
[   16.716723]  ret_from_fork+0x116/0x1d0
[   16.716899]  ret_from_fork_asm+0x1a/0x30
[   16.717097] 
[   16.717201] The buggy address belongs to the object at ffff8881025adf00
[   16.717201]  which belongs to the cache kmalloc-64 of size 64
[   16.717676] The buggy address is located 0 bytes to the right of
[   16.717676]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.718254] 
[   16.718353] The buggy address belongs to the physical page:
[   16.718595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.718844] flags: 0x200000000000000(node=0|zone=2)
[   16.719009] page_type: f5(slab)
[   16.719169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.719556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.719901] page dumped because: kasan: bad access detected
[   16.720189] 
[   16.720278] Memory state around the buggy address:
[   16.720569]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.720835]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.721189] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.721405]                                      ^
[   16.721590]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.721963]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.722397] ==================================================================
[   16.801706] ==================================================================
[   16.802797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.803682] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.804384] 
[   16.804482] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.804529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.804543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.804566] Call Trace:
[   16.804582]  <TASK>
[   16.804598]  dump_stack_lvl+0x73/0xb0
[   16.804629]  print_report+0xd1/0x610
[   16.804655]  ? __virt_addr_valid+0x1db/0x2d0
[   16.804678]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.804701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.804727]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.804750]  kasan_report+0x141/0x180
[   16.804774]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.804804]  __asan_report_load8_noabort+0x18/0x20
[   16.804830]  kasan_atomics_helper+0x4fa5/0x5450
[   16.804855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.804880]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.804907]  ? kasan_atomics+0x152/0x310
[   16.804935]  kasan_atomics+0x1dc/0x310
[   16.804959]  ? __pfx_kasan_atomics+0x10/0x10
[   16.804985]  ? __pfx_read_tsc+0x10/0x10
[   16.805008]  ? ktime_get_ts64+0x86/0x230
[   16.805034]  kunit_try_run_case+0x1a5/0x480
[   16.805072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.805097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.805135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.805161]  ? __kthread_parkme+0x82/0x180
[   16.805183]  ? preempt_count_sub+0x50/0x80
[   16.805246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.805273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.805299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.805327]  kthread+0x337/0x6f0
[   16.805347]  ? trace_preempt_on+0x20/0xc0
[   16.805373]  ? __pfx_kthread+0x10/0x10
[   16.805395]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.805419]  ? calculate_sigpending+0x7b/0xa0
[   16.805446]  ? __pfx_kthread+0x10/0x10
[   16.805469]  ret_from_fork+0x116/0x1d0
[   16.805490]  ? __pfx_kthread+0x10/0x10
[   16.805512]  ret_from_fork_asm+0x1a/0x30
[   16.805544]  </TASK>
[   16.805555] 
[   16.814947] Allocated by task 284:
[   16.815140]  kasan_save_stack+0x45/0x70
[   16.815366]  kasan_save_track+0x18/0x40
[   16.815561]  kasan_save_alloc_info+0x3b/0x50
[   16.815775]  __kasan_kmalloc+0xb7/0xc0
[   16.815949]  __kmalloc_cache_noprof+0x189/0x420
[   16.816120]  kasan_atomics+0x95/0x310
[   16.816329]  kunit_try_run_case+0x1a5/0x480
[   16.816578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.816841]  kthread+0x337/0x6f0
[   16.816989]  ret_from_fork+0x116/0x1d0
[   16.817164]  ret_from_fork_asm+0x1a/0x30
[   16.817382] 
[   16.817496] The buggy address belongs to the object at ffff8881025adf00
[   16.817496]  which belongs to the cache kmalloc-64 of size 64
[   16.817964] The buggy address is located 0 bytes to the right of
[   16.817964]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.818630] 
[   16.818832] The buggy address belongs to the physical page:
[   16.819083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.819484] flags: 0x200000000000000(node=0|zone=2)
[   16.819737] page_type: f5(slab)
[   16.819904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.820402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.820635] page dumped because: kasan: bad access detected
[   16.820810] 
[   16.820881] Memory state around the buggy address:
[   16.821114]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.821474]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.821812] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.822150]                                      ^
[   16.822403]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.822714]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.823020] ==================================================================
[   15.493077] ==================================================================
[   15.493680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.493974] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.494367] 
[   15.494482] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.494527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.494540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.494562] Call Trace:
[   15.494577]  <TASK>
[   15.494592]  dump_stack_lvl+0x73/0xb0
[   15.494621]  print_report+0xd1/0x610
[   15.494656]  ? __virt_addr_valid+0x1db/0x2d0
[   15.494680]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.494709]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.494734]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.494758]  kasan_report+0x141/0x180
[   15.494781]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.494808]  kasan_check_range+0x10c/0x1c0
[   15.494835]  __kasan_check_write+0x18/0x20
[   15.494855]  kasan_atomics_helper+0x4a0/0x5450
[   15.494881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.494916]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.494943]  ? kasan_atomics+0x152/0x310
[   15.494971]  kasan_atomics+0x1dc/0x310
[   15.494995]  ? __pfx_kasan_atomics+0x10/0x10
[   15.495021]  ? __pfx_read_tsc+0x10/0x10
[   15.495044]  ? ktime_get_ts64+0x86/0x230
[   15.495081]  kunit_try_run_case+0x1a5/0x480
[   15.495106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.495132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.495157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.495182]  ? __kthread_parkme+0x82/0x180
[   15.495214]  ? preempt_count_sub+0x50/0x80
[   15.495240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.495266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.495293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.495319]  kthread+0x337/0x6f0
[   15.495340]  ? trace_preempt_on+0x20/0xc0
[   15.495364]  ? __pfx_kthread+0x10/0x10
[   15.495387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.495411]  ? calculate_sigpending+0x7b/0xa0
[   15.495436]  ? __pfx_kthread+0x10/0x10
[   15.495459]  ret_from_fork+0x116/0x1d0
[   15.495480]  ? __pfx_kthread+0x10/0x10
[   15.495502]  ret_from_fork_asm+0x1a/0x30
[   15.495534]  </TASK>
[   15.495545] 
[   15.503391] Allocated by task 284:
[   15.503584]  kasan_save_stack+0x45/0x70
[   15.503954]  kasan_save_track+0x18/0x40
[   15.504188]  kasan_save_alloc_info+0x3b/0x50
[   15.504353]  __kasan_kmalloc+0xb7/0xc0
[   15.504489]  __kmalloc_cache_noprof+0x189/0x420
[   15.504660]  kasan_atomics+0x95/0x310
[   15.504991]  kunit_try_run_case+0x1a5/0x480
[   15.505324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505583]  kthread+0x337/0x6f0
[   15.505772]  ret_from_fork+0x116/0x1d0
[   15.506003]  ret_from_fork_asm+0x1a/0x30
[   15.506218] 
[   15.506302] The buggy address belongs to the object at ffff8881025adf00
[   15.506302]  which belongs to the cache kmalloc-64 of size 64
[   15.506896] The buggy address is located 0 bytes to the right of
[   15.506896]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.507410] 
[   15.507483] The buggy address belongs to the physical page:
[   15.507660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.507903] flags: 0x200000000000000(node=0|zone=2)
[   15.508079] page_type: f5(slab)
[   15.508248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.508587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.509131] page dumped because: kasan: bad access detected
[   15.509676] 
[   15.509771] Memory state around the buggy address:
[   15.510142]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.510479]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.510765] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.511143]                                      ^
[   15.511395]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.511812]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.512110] ==================================================================
[   16.192980] ==================================================================
[   16.193610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.193978] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.194342] 
[   16.194451] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.194495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.194539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.194559] Call Trace:
[   16.194575]  <TASK>
[   16.194590]  dump_stack_lvl+0x73/0xb0
[   16.194620]  print_report+0xd1/0x610
[   16.194674]  ? __virt_addr_valid+0x1db/0x2d0
[   16.194700]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.194727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.194752]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.194776]  kasan_report+0x141/0x180
[   16.194830]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.194859]  __asan_report_load8_noabort+0x18/0x20
[   16.194886]  kasan_atomics_helper+0x4eae/0x5450
[   16.194910]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.194964]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.194991]  ? kasan_atomics+0x152/0x310
[   16.195020]  kasan_atomics+0x1dc/0x310
[   16.195044]  ? __pfx_kasan_atomics+0x10/0x10
[   16.195112]  ? __pfx_read_tsc+0x10/0x10
[   16.195136]  ? ktime_get_ts64+0x86/0x230
[   16.195161]  kunit_try_run_case+0x1a5/0x480
[   16.195197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.195222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.195248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.195305]  ? __kthread_parkme+0x82/0x180
[   16.195327]  ? preempt_count_sub+0x50/0x80
[   16.195352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.195378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.195404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.195432]  kthread+0x337/0x6f0
[   16.195483]  ? trace_preempt_on+0x20/0xc0
[   16.195508]  ? __pfx_kthread+0x10/0x10
[   16.195530]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.195553]  ? calculate_sigpending+0x7b/0xa0
[   16.195610]  ? __pfx_kthread+0x10/0x10
[   16.195634]  ret_from_fork+0x116/0x1d0
[   16.195655]  ? __pfx_kthread+0x10/0x10
[   16.195678]  ret_from_fork_asm+0x1a/0x30
[   16.195710]  </TASK>
[   16.195751] 
[   16.204831] Allocated by task 284:
[   16.205015]  kasan_save_stack+0x45/0x70
[   16.205419]  kasan_save_track+0x18/0x40
[   16.206070]  kasan_save_alloc_info+0x3b/0x50
[   16.206286]  __kasan_kmalloc+0xb7/0xc0
[   16.206792]  __kmalloc_cache_noprof+0x189/0x420
[   16.206959]  kasan_atomics+0x95/0x310
[   16.207111]  kunit_try_run_case+0x1a5/0x480
[   16.207258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.207431]  kthread+0x337/0x6f0
[   16.207549]  ret_from_fork+0x116/0x1d0
[   16.207679]  ret_from_fork_asm+0x1a/0x30
[   16.207816] 
[   16.207890] The buggy address belongs to the object at ffff8881025adf00
[   16.207890]  which belongs to the cache kmalloc-64 of size 64
[   16.208267] The buggy address is located 0 bytes to the right of
[   16.208267]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.208638] 
[   16.208711] The buggy address belongs to the physical page:
[   16.208887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.209137] flags: 0x200000000000000(node=0|zone=2)
[   16.209302] page_type: f5(slab)
[   16.209420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.209873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.210331] page dumped because: kasan: bad access detected
[   16.210579] 
[   16.210652] Memory state around the buggy address:
[   16.210871]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.211184]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.211766] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.212099]                                      ^
[   16.212360]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.212688]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.213039] ==================================================================
[   16.823722] ==================================================================
[   16.824026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.824471] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.824789] 
[   16.824920] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.825005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.825022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.825064] Call Trace:
[   16.825080]  <TASK>
[   16.825095]  dump_stack_lvl+0x73/0xb0
[   16.825142]  print_report+0xd1/0x610
[   16.825169]  ? __virt_addr_valid+0x1db/0x2d0
[   16.825196]  ? kasan_atomics_helper+0x224c/0x5450
[   16.825222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.825252]  ? kasan_atomics_helper+0x224c/0x5450
[   16.825279]  kasan_report+0x141/0x180
[   16.825304]  ? kasan_atomics_helper+0x224c/0x5450
[   16.825336]  kasan_check_range+0x10c/0x1c0
[   16.825363]  __kasan_check_write+0x18/0x20
[   16.825387]  kasan_atomics_helper+0x224c/0x5450
[   16.825415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.825443]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.825474]  ? kasan_atomics+0x152/0x310
[   16.825505]  kasan_atomics+0x1dc/0x310
[   16.825530]  ? __pfx_kasan_atomics+0x10/0x10
[   16.825558]  ? __pfx_read_tsc+0x10/0x10
[   16.825583]  ? ktime_get_ts64+0x86/0x230
[   16.825611]  kunit_try_run_case+0x1a5/0x480
[   16.825640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.825687]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.825718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.825747]  ? __kthread_parkme+0x82/0x180
[   16.825790]  ? preempt_count_sub+0x50/0x80
[   16.825818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.825848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.825879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.825912]  kthread+0x337/0x6f0
[   16.825933]  ? trace_preempt_on+0x20/0xc0
[   16.825977]  ? __pfx_kthread+0x10/0x10
[   16.826001]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.826027]  ? calculate_sigpending+0x7b/0xa0
[   16.826082]  ? __pfx_kthread+0x10/0x10
[   16.826107]  ret_from_fork+0x116/0x1d0
[   16.826140]  ? __pfx_kthread+0x10/0x10
[   16.826164]  ret_from_fork_asm+0x1a/0x30
[   16.826198]  </TASK>
[   16.826210] 
[   16.834351] Allocated by task 284:
[   16.834564]  kasan_save_stack+0x45/0x70
[   16.834766]  kasan_save_track+0x18/0x40
[   16.834967]  kasan_save_alloc_info+0x3b/0x50
[   16.835246]  __kasan_kmalloc+0xb7/0xc0
[   16.835467]  __kmalloc_cache_noprof+0x189/0x420
[   16.835706]  kasan_atomics+0x95/0x310
[   16.835910]  kunit_try_run_case+0x1a5/0x480
[   16.836127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.836597]  kthread+0x337/0x6f0
[   16.836767]  ret_from_fork+0x116/0x1d0
[   16.836950]  ret_from_fork_asm+0x1a/0x30
[   16.837221] 
[   16.837305] The buggy address belongs to the object at ffff8881025adf00
[   16.837305]  which belongs to the cache kmalloc-64 of size 64
[   16.837676] The buggy address is located 0 bytes to the right of
[   16.837676]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.838389] 
[   16.838511] The buggy address belongs to the physical page:
[   16.838793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.839233] flags: 0x200000000000000(node=0|zone=2)
[   16.839473] page_type: f5(slab)
[   16.839604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.839885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.840559] page dumped because: kasan: bad access detected
[   16.840743] 
[   16.840815] Memory state around the buggy address:
[   16.840993]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.841326]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.841741] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.842061]                                      ^
[   16.842353]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.842690]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.843136] ==================================================================
[   15.470184] ==================================================================
[   15.470482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.471351] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.471941] 
[   15.472045] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.472103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.472116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.472138] Call Trace:
[   15.472153]  <TASK>
[   15.472169]  dump_stack_lvl+0x73/0xb0
[   15.472202]  print_report+0xd1/0x610
[   15.472227]  ? __virt_addr_valid+0x1db/0x2d0
[   15.472333]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.472357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.472382]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.472407]  kasan_report+0x141/0x180
[   15.472430]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.472458]  __asan_report_load4_noabort+0x18/0x20
[   15.472485]  kasan_atomics_helper+0x4b54/0x5450
[   15.472510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.472535]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.472562]  ? kasan_atomics+0x152/0x310
[   15.472590]  kasan_atomics+0x1dc/0x310
[   15.472614]  ? __pfx_kasan_atomics+0x10/0x10
[   15.472702]  ? __pfx_read_tsc+0x10/0x10
[   15.472728]  ? ktime_get_ts64+0x86/0x230
[   15.472755]  kunit_try_run_case+0x1a5/0x480
[   15.472781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.472806]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.472832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.472858]  ? __kthread_parkme+0x82/0x180
[   15.472880]  ? preempt_count_sub+0x50/0x80
[   15.472906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.472932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.472959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.472986]  kthread+0x337/0x6f0
[   15.473006]  ? trace_preempt_on+0x20/0xc0
[   15.473032]  ? __pfx_kthread+0x10/0x10
[   15.473065]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.473088]  ? calculate_sigpending+0x7b/0xa0
[   15.473115]  ? __pfx_kthread+0x10/0x10
[   15.473148]  ret_from_fork+0x116/0x1d0
[   15.473168]  ? __pfx_kthread+0x10/0x10
[   15.473190]  ret_from_fork_asm+0x1a/0x30
[   15.473223]  </TASK>
[   15.473234] 
[   15.483982] Allocated by task 284:
[   15.484263]  kasan_save_stack+0x45/0x70
[   15.484459]  kasan_save_track+0x18/0x40
[   15.484862]  kasan_save_alloc_info+0x3b/0x50
[   15.485035]  __kasan_kmalloc+0xb7/0xc0
[   15.485383]  __kmalloc_cache_noprof+0x189/0x420
[   15.485596]  kasan_atomics+0x95/0x310
[   15.485891]  kunit_try_run_case+0x1a5/0x480
[   15.486234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.486482]  kthread+0x337/0x6f0
[   15.486734]  ret_from_fork+0x116/0x1d0
[   15.486993]  ret_from_fork_asm+0x1a/0x30
[   15.487235] 
[   15.487311] The buggy address belongs to the object at ffff8881025adf00
[   15.487311]  which belongs to the cache kmalloc-64 of size 64
[   15.487768] The buggy address is located 0 bytes to the right of
[   15.487768]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.488349] 
[   15.488459] The buggy address belongs to the physical page:
[   15.488679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.488989] flags: 0x200000000000000(node=0|zone=2)
[   15.489215] page_type: f5(slab)
[   15.489388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.489701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.489962] page dumped because: kasan: bad access detected
[   15.490489] 
[   15.490698] Memory state around the buggy address:
[   15.490941]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.491278]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.491560] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.491813]                                      ^
[   15.491993]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.492372]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.492675] ==================================================================
[   15.944025] ==================================================================
[   15.944520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.944832] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.945622] 
[   15.945733] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.945779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.945792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.945813] Call Trace:
[   15.945828]  <TASK>
[   15.945842]  dump_stack_lvl+0x73/0xb0
[   15.947581]  print_report+0xd1/0x610
[   15.947645]  ? __virt_addr_valid+0x1db/0x2d0
[   15.947673]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.947697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.947722]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.947746]  kasan_report+0x141/0x180
[   15.947770]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.947798]  kasan_check_range+0x10c/0x1c0
[   15.947824]  __kasan_check_write+0x18/0x20
[   15.947845]  kasan_atomics_helper+0xfa9/0x5450
[   15.947870]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.947894]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.947922]  ? kasan_atomics+0x152/0x310
[   15.947952]  kasan_atomics+0x1dc/0x310
[   15.947976]  ? __pfx_kasan_atomics+0x10/0x10
[   15.948003]  ? __pfx_read_tsc+0x10/0x10
[   15.948025]  ? ktime_get_ts64+0x86/0x230
[   15.948066]  kunit_try_run_case+0x1a5/0x480
[   15.948094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.948168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.948194]  ? __kthread_parkme+0x82/0x180
[   15.948216]  ? preempt_count_sub+0x50/0x80
[   15.948241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.948294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.948322]  kthread+0x337/0x6f0
[   15.948342]  ? trace_preempt_on+0x20/0xc0
[   15.948368]  ? __pfx_kthread+0x10/0x10
[   15.948390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.948413]  ? calculate_sigpending+0x7b/0xa0
[   15.948439]  ? __pfx_kthread+0x10/0x10
[   15.948462]  ret_from_fork+0x116/0x1d0
[   15.948482]  ? __pfx_kthread+0x10/0x10
[   15.948505]  ret_from_fork_asm+0x1a/0x30
[   15.948537]  </TASK>
[   15.948549] 
[   15.960985] Allocated by task 284:
[   15.961339]  kasan_save_stack+0x45/0x70
[   15.961702]  kasan_save_track+0x18/0x40
[   15.962087]  kasan_save_alloc_info+0x3b/0x50
[   15.962490]  __kasan_kmalloc+0xb7/0xc0
[   15.962685]  __kmalloc_cache_noprof+0x189/0x420
[   15.962851]  kasan_atomics+0x95/0x310
[   15.962989]  kunit_try_run_case+0x1a5/0x480
[   15.963165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963448]  kthread+0x337/0x6f0
[   15.963742]  ret_from_fork+0x116/0x1d0
[   15.964096]  ret_from_fork_asm+0x1a/0x30
[   15.964432] 
[   15.964510] The buggy address belongs to the object at ffff8881025adf00
[   15.964510]  which belongs to the cache kmalloc-64 of size 64
[   15.964872] The buggy address is located 0 bytes to the right of
[   15.964872]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.965669] 
[   15.965832] The buggy address belongs to the physical page:
[   15.966338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.966731] flags: 0x200000000000000(node=0|zone=2)
[   15.966899] page_type: f5(slab)
[   15.967022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.968302] page dumped because: kasan: bad access detected
[   15.968795] 
[   15.968952] Memory state around the buggy address:
[   15.969431]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.970072]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.970788] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.971149]                                      ^
[   15.971575]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.972090]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.972412] ==================================================================
[   15.659138] ==================================================================
[   15.659464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.659871] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.660184] 
[   15.660298] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.660351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.660364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.660386] Call Trace:
[   15.660401]  <TASK>
[   15.660426]  dump_stack_lvl+0x73/0xb0
[   15.660455]  print_report+0xd1/0x610
[   15.660478]  ? __virt_addr_valid+0x1db/0x2d0
[   15.660511]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.660534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.660559]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.660593]  kasan_report+0x141/0x180
[   15.660616]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.660645]  kasan_check_range+0x10c/0x1c0
[   15.660679]  __kasan_check_write+0x18/0x20
[   15.660701]  kasan_atomics_helper+0x7c7/0x5450
[   15.660726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.660760]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.660787]  ? kasan_atomics+0x152/0x310
[   15.660825]  kasan_atomics+0x1dc/0x310
[   15.660850]  ? __pfx_kasan_atomics+0x10/0x10
[   15.660876]  ? __pfx_read_tsc+0x10/0x10
[   15.660899]  ? ktime_get_ts64+0x86/0x230
[   15.660934]  kunit_try_run_case+0x1a5/0x480
[   15.660960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.661020]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.661048]  ? __kthread_parkme+0x82/0x180
[   15.661079]  ? preempt_count_sub+0x50/0x80
[   15.661104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.661138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661174]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.661202]  kthread+0x337/0x6f0
[   15.661232]  ? trace_preempt_on+0x20/0xc0
[   15.661258]  ? __pfx_kthread+0x10/0x10
[   15.661289]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.661312]  ? calculate_sigpending+0x7b/0xa0
[   15.661348]  ? __pfx_kthread+0x10/0x10
[   15.661370]  ret_from_fork+0x116/0x1d0
[   15.661390]  ? __pfx_kthread+0x10/0x10
[   15.661421]  ret_from_fork_asm+0x1a/0x30
[   15.661453]  </TASK>
[   15.661464] 
[   15.669899] Allocated by task 284:
[   15.670257]  kasan_save_stack+0x45/0x70
[   15.670469]  kasan_save_track+0x18/0x40
[   15.670686]  kasan_save_alloc_info+0x3b/0x50
[   15.670900]  __kasan_kmalloc+0xb7/0xc0
[   15.671098]  __kmalloc_cache_noprof+0x189/0x420
[   15.671331]  kasan_atomics+0x95/0x310
[   15.671481]  kunit_try_run_case+0x1a5/0x480
[   15.671654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.671936]  kthread+0x337/0x6f0
[   15.672135]  ret_from_fork+0x116/0x1d0
[   15.672335]  ret_from_fork_asm+0x1a/0x30
[   15.672520] 
[   15.672595] The buggy address belongs to the object at ffff8881025adf00
[   15.672595]  which belongs to the cache kmalloc-64 of size 64
[   15.673399] The buggy address is located 0 bytes to the right of
[   15.673399]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.674023] 
[   15.674137] The buggy address belongs to the physical page:
[   15.674406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.674651] flags: 0x200000000000000(node=0|zone=2)
[   15.674820] page_type: f5(slab)
[   15.674980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.675361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.675810] page dumped because: kasan: bad access detected
[   15.676140] 
[   15.676236] Memory state around the buggy address:
[   15.676537]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.676824]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.677173] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.677909]                                      ^
[   15.678139]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.678408]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.678726] ==================================================================
[   16.519141] ==================================================================
[   16.519417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.519998] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.520401] 
[   16.520505] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.520549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.520563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.520584] Call Trace:
[   16.520600]  <TASK>
[   16.520617]  dump_stack_lvl+0x73/0xb0
[   16.520648]  print_report+0xd1/0x610
[   16.520672]  ? __virt_addr_valid+0x1db/0x2d0
[   16.520696]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.520719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.520745]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.520769]  kasan_report+0x141/0x180
[   16.520794]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.520823]  kasan_check_range+0x10c/0x1c0
[   16.520848]  __kasan_check_write+0x18/0x20
[   16.520869]  kasan_atomics_helper+0x1c18/0x5450
[   16.520894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.520919]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.520946]  ? kasan_atomics+0x152/0x310
[   16.520974]  kasan_atomics+0x1dc/0x310
[   16.520998]  ? __pfx_kasan_atomics+0x10/0x10
[   16.521025]  ? __pfx_read_tsc+0x10/0x10
[   16.521047]  ? ktime_get_ts64+0x86/0x230
[   16.521083]  kunit_try_run_case+0x1a5/0x480
[   16.521110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.521134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.521159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.521185]  ? __kthread_parkme+0x82/0x180
[   16.521207]  ? preempt_count_sub+0x50/0x80
[   16.521232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.521258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.521285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.521312]  kthread+0x337/0x6f0
[   16.521333]  ? trace_preempt_on+0x20/0xc0
[   16.521357]  ? __pfx_kthread+0x10/0x10
[   16.521391]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.521414]  ? calculate_sigpending+0x7b/0xa0
[   16.521440]  ? __pfx_kthread+0x10/0x10
[   16.521464]  ret_from_fork+0x116/0x1d0
[   16.521484]  ? __pfx_kthread+0x10/0x10
[   16.521506]  ret_from_fork_asm+0x1a/0x30
[   16.521538]  </TASK>
[   16.521550] 
[   16.529044] Allocated by task 284:
[   16.529268]  kasan_save_stack+0x45/0x70
[   16.529414]  kasan_save_track+0x18/0x40
[   16.529553]  kasan_save_alloc_info+0x3b/0x50
[   16.529769]  __kasan_kmalloc+0xb7/0xc0
[   16.529960]  __kmalloc_cache_noprof+0x189/0x420
[   16.530261]  kasan_atomics+0x95/0x310
[   16.530420]  kunit_try_run_case+0x1a5/0x480
[   16.530609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.530812]  kthread+0x337/0x6f0
[   16.530987]  ret_from_fork+0x116/0x1d0
[   16.531211]  ret_from_fork_asm+0x1a/0x30
[   16.531389] 
[   16.531491] The buggy address belongs to the object at ffff8881025adf00
[   16.531491]  which belongs to the cache kmalloc-64 of size 64
[   16.531965] The buggy address is located 0 bytes to the right of
[   16.531965]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.532470] 
[   16.532571] The buggy address belongs to the physical page:
[   16.532784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.533072] flags: 0x200000000000000(node=0|zone=2)
[   16.533305] page_type: f5(slab)
[   16.533471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.533782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.534049] page dumped because: kasan: bad access detected
[   16.534469] 
[   16.534565] Memory state around the buggy address:
[   16.534806]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.535066]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.535479] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.535737]                                      ^
[   16.535938]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536280]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.536540] ==================================================================
[   16.012291] ==================================================================
[   16.012774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.013546] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.014003] 
[   16.014118] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.014395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.014412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.014433] Call Trace:
[   16.014450]  <TASK>
[   16.014466]  dump_stack_lvl+0x73/0xb0
[   16.014499]  print_report+0xd1/0x610
[   16.014522]  ? __virt_addr_valid+0x1db/0x2d0
[   16.014546]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.014569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.014594]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.014619]  kasan_report+0x141/0x180
[   16.014642]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.014671]  __asan_report_load4_noabort+0x18/0x20
[   16.014698]  kasan_atomics_helper+0x4a1c/0x5450
[   16.014732]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.014756]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.014783]  ? kasan_atomics+0x152/0x310
[   16.014810]  kasan_atomics+0x1dc/0x310
[   16.014834]  ? __pfx_kasan_atomics+0x10/0x10
[   16.014860]  ? __pfx_read_tsc+0x10/0x10
[   16.014883]  ? ktime_get_ts64+0x86/0x230
[   16.014909]  kunit_try_run_case+0x1a5/0x480
[   16.014935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.014985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.015011]  ? __kthread_parkme+0x82/0x180
[   16.015032]  ? preempt_count_sub+0x50/0x80
[   16.015069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.015096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.015131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.015159]  kthread+0x337/0x6f0
[   16.015179]  ? trace_preempt_on+0x20/0xc0
[   16.015204]  ? __pfx_kthread+0x10/0x10
[   16.015226]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.015250]  ? calculate_sigpending+0x7b/0xa0
[   16.015275]  ? __pfx_kthread+0x10/0x10
[   16.015297]  ret_from_fork+0x116/0x1d0
[   16.015319]  ? __pfx_kthread+0x10/0x10
[   16.015341]  ret_from_fork_asm+0x1a/0x30
[   16.015373]  </TASK>
[   16.015384] 
[   16.025940] Allocated by task 284:
[   16.026488]  kasan_save_stack+0x45/0x70
[   16.026684]  kasan_save_track+0x18/0x40
[   16.026953]  kasan_save_alloc_info+0x3b/0x50
[   16.027343]  __kasan_kmalloc+0xb7/0xc0
[   16.027662]  __kmalloc_cache_noprof+0x189/0x420
[   16.027975]  kasan_atomics+0x95/0x310
[   16.028319]  kunit_try_run_case+0x1a5/0x480
[   16.028644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.028995]  kthread+0x337/0x6f0
[   16.029211]  ret_from_fork+0x116/0x1d0
[   16.029581]  ret_from_fork_asm+0x1a/0x30
[   16.029861] 
[   16.030072] The buggy address belongs to the object at ffff8881025adf00
[   16.030072]  which belongs to the cache kmalloc-64 of size 64
[   16.030738] The buggy address is located 0 bytes to the right of
[   16.030738]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.031403] 
[   16.031496] The buggy address belongs to the physical page:
[   16.031735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.032095] flags: 0x200000000000000(node=0|zone=2)
[   16.032625] page_type: f5(slab)
[   16.032775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.033344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.033786] page dumped because: kasan: bad access detected
[   16.034149] 
[   16.034273] Memory state around the buggy address:
[   16.034652]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.035084]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.035509] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.035908]                                      ^
[   16.036245]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.036520]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.036792] ==================================================================
[   16.213791] ==================================================================
[   16.214225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.214815] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.215261] 
[   16.215398] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.215441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.215454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.215478] Call Trace:
[   16.215492]  <TASK>
[   16.215517]  dump_stack_lvl+0x73/0xb0
[   16.215548]  print_report+0xd1/0x610
[   16.215572]  ? __virt_addr_valid+0x1db/0x2d0
[   16.215595]  ? kasan_atomics_helper+0x1467/0x5450
[   16.215618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.215643]  ? kasan_atomics_helper+0x1467/0x5450
[   16.215667]  kasan_report+0x141/0x180
[   16.215690]  ? kasan_atomics_helper+0x1467/0x5450
[   16.215748]  kasan_check_range+0x10c/0x1c0
[   16.215775]  __kasan_check_write+0x18/0x20
[   16.215797]  kasan_atomics_helper+0x1467/0x5450
[   16.215821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.215846]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.215873]  ? kasan_atomics+0x152/0x310
[   16.216372]  kasan_atomics+0x1dc/0x310
[   16.216401]  ? __pfx_kasan_atomics+0x10/0x10
[   16.216430]  ? __pfx_read_tsc+0x10/0x10
[   16.216454]  ? ktime_get_ts64+0x86/0x230
[   16.216482]  kunit_try_run_case+0x1a5/0x480
[   16.216508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.216561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.216742]  ? __kthread_parkme+0x82/0x180
[   16.216767]  ? preempt_count_sub+0x50/0x80
[   16.216793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.216875]  kthread+0x337/0x6f0
[   16.216896]  ? trace_preempt_on+0x20/0xc0
[   16.216922]  ? __pfx_kthread+0x10/0x10
[   16.216945]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.216968]  ? calculate_sigpending+0x7b/0xa0
[   16.216994]  ? __pfx_kthread+0x10/0x10
[   16.217017]  ret_from_fork+0x116/0x1d0
[   16.217038]  ? __pfx_kthread+0x10/0x10
[   16.217073]  ret_from_fork_asm+0x1a/0x30
[   16.217105]  </TASK>
[   16.217116] 
[   16.224103] Allocated by task 284:
[   16.224333]  kasan_save_stack+0x45/0x70
[   16.224538]  kasan_save_track+0x18/0x40
[   16.224736]  kasan_save_alloc_info+0x3b/0x50
[   16.224995]  __kasan_kmalloc+0xb7/0xc0
[   16.225171]  __kmalloc_cache_noprof+0x189/0x420
[   16.225362]  kasan_atomics+0x95/0x310
[   16.225524]  kunit_try_run_case+0x1a5/0x480
[   16.225763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.226033]  kthread+0x337/0x6f0
[   16.226263]  ret_from_fork+0x116/0x1d0
[   16.226448]  ret_from_fork_asm+0x1a/0x30
[   16.226646] 
[   16.226756] The buggy address belongs to the object at ffff8881025adf00
[   16.226756]  which belongs to the cache kmalloc-64 of size 64
[   16.227366] The buggy address is located 0 bytes to the right of
[   16.227366]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.227814] 
[   16.227887] The buggy address belongs to the physical page:
[   16.228106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.228477] flags: 0x200000000000000(node=0|zone=2)
[   16.228750] page_type: f5(slab)
[   16.228921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.229405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.229761] page dumped because: kasan: bad access detected
[   16.229970] 
[   16.230041] Memory state around the buggy address:
[   16.230210]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.230421]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.230825] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.231398]                                      ^
[   16.231633]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233161]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.234503] ==================================================================
[   15.740920] ==================================================================
[   15.742099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.742458] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.742690] 
[   15.742788] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.742836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.742850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.742872] Call Trace:
[   15.742886]  <TASK>
[   15.742903]  dump_stack_lvl+0x73/0xb0
[   15.742934]  print_report+0xd1/0x610
[   15.742958]  ? __virt_addr_valid+0x1db/0x2d0
[   15.742982]  ? kasan_atomics_helper+0x992/0x5450
[   15.743006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.743032]  ? kasan_atomics_helper+0x992/0x5450
[   15.743066]  kasan_report+0x141/0x180
[   15.743090]  ? kasan_atomics_helper+0x992/0x5450
[   15.743144]  kasan_check_range+0x10c/0x1c0
[   15.743170]  __kasan_check_write+0x18/0x20
[   15.743191]  kasan_atomics_helper+0x992/0x5450
[   15.743250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.743275]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.743303]  ? kasan_atomics+0x152/0x310
[   15.743343]  kasan_atomics+0x1dc/0x310
[   15.743367]  ? __pfx_kasan_atomics+0x10/0x10
[   15.743394]  ? __pfx_read_tsc+0x10/0x10
[   15.743418]  ? ktime_get_ts64+0x86/0x230
[   15.743444]  kunit_try_run_case+0x1a5/0x480
[   15.743470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.743494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.743520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.743546]  ? __kthread_parkme+0x82/0x180
[   15.743567]  ? preempt_count_sub+0x50/0x80
[   15.743593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.743618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.743672]  kthread+0x337/0x6f0
[   15.743693]  ? trace_preempt_on+0x20/0xc0
[   15.743717]  ? __pfx_kthread+0x10/0x10
[   15.743739]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.743763]  ? calculate_sigpending+0x7b/0xa0
[   15.743789]  ? __pfx_kthread+0x10/0x10
[   15.743812]  ret_from_fork+0x116/0x1d0
[   15.743833]  ? __pfx_kthread+0x10/0x10
[   15.743855]  ret_from_fork_asm+0x1a/0x30
[   15.743888]  </TASK>
[   15.743898] 
[   15.756663] Allocated by task 284:
[   15.756930]  kasan_save_stack+0x45/0x70
[   15.757187]  kasan_save_track+0x18/0x40
[   15.757426]  kasan_save_alloc_info+0x3b/0x50
[   15.757660]  __kasan_kmalloc+0xb7/0xc0
[   15.757799]  __kmalloc_cache_noprof+0x189/0x420
[   15.758022]  kasan_atomics+0x95/0x310
[   15.758230]  kunit_try_run_case+0x1a5/0x480
[   15.758422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.758675]  kthread+0x337/0x6f0
[   15.758850]  ret_from_fork+0x116/0x1d0
[   15.759039]  ret_from_fork_asm+0x1a/0x30
[   15.759429] 
[   15.759504] The buggy address belongs to the object at ffff8881025adf00
[   15.759504]  which belongs to the cache kmalloc-64 of size 64
[   15.760210] The buggy address is located 0 bytes to the right of
[   15.760210]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.761339] 
[   15.761537] The buggy address belongs to the physical page:
[   15.762063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.762589] flags: 0x200000000000000(node=0|zone=2)
[   15.762764] page_type: f5(slab)
[   15.762886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.763179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.763939] page dumped because: kasan: bad access detected
[   15.764459] 
[   15.764617] Memory state around the buggy address:
[   15.765088]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.765751]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.766130] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.766787]                                      ^
[   15.767183]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.767408]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.767623] ==================================================================
[   16.397125] ==================================================================
[   16.397619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.398191] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.398875] 
[   16.399085] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.399136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.399150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.399172] Call Trace:
[   16.399189]  <TASK>
[   16.399292]  dump_stack_lvl+0x73/0xb0
[   16.399330]  print_report+0xd1/0x610
[   16.399354]  ? __virt_addr_valid+0x1db/0x2d0
[   16.399379]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.399402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.399428]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.399451]  kasan_report+0x141/0x180
[   16.399475]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.399503]  kasan_check_range+0x10c/0x1c0
[   16.399527]  __kasan_check_write+0x18/0x20
[   16.399549]  kasan_atomics_helper+0x18b1/0x5450
[   16.399574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.399599]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.399626]  ? kasan_atomics+0x152/0x310
[   16.399654]  kasan_atomics+0x1dc/0x310
[   16.399678]  ? __pfx_kasan_atomics+0x10/0x10
[   16.399704]  ? __pfx_read_tsc+0x10/0x10
[   16.399727]  ? ktime_get_ts64+0x86/0x230
[   16.399752]  kunit_try_run_case+0x1a5/0x480
[   16.399779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.399804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.399830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.399855]  ? __kthread_parkme+0x82/0x180
[   16.399878]  ? preempt_count_sub+0x50/0x80
[   16.399903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.399929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.399955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.399983]  kthread+0x337/0x6f0
[   16.400004]  ? trace_preempt_on+0x20/0xc0
[   16.400028]  ? __pfx_kthread+0x10/0x10
[   16.400064]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.400087]  ? calculate_sigpending+0x7b/0xa0
[   16.400113]  ? __pfx_kthread+0x10/0x10
[   16.400148]  ret_from_fork+0x116/0x1d0
[   16.400169]  ? __pfx_kthread+0x10/0x10
[   16.400191]  ret_from_fork_asm+0x1a/0x30
[   16.400223]  </TASK>
[   16.400234] 
[   16.410840] Allocated by task 284:
[   16.411007]  kasan_save_stack+0x45/0x70
[   16.411480]  kasan_save_track+0x18/0x40
[   16.411681]  kasan_save_alloc_info+0x3b/0x50
[   16.411997]  __kasan_kmalloc+0xb7/0xc0
[   16.412228]  __kmalloc_cache_noprof+0x189/0x420
[   16.412524]  kasan_atomics+0x95/0x310
[   16.412810]  kunit_try_run_case+0x1a5/0x480
[   16.413007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.413480]  kthread+0x337/0x6f0
[   16.413662]  ret_from_fork+0x116/0x1d0
[   16.413932]  ret_from_fork_asm+0x1a/0x30
[   16.414251] 
[   16.414334] The buggy address belongs to the object at ffff8881025adf00
[   16.414334]  which belongs to the cache kmalloc-64 of size 64
[   16.415046] The buggy address is located 0 bytes to the right of
[   16.415046]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.415738] 
[   16.415835] The buggy address belongs to the physical page:
[   16.416244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.416583] flags: 0x200000000000000(node=0|zone=2)
[   16.416814] page_type: f5(slab)
[   16.416975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.417559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.417965] page dumped because: kasan: bad access detected
[   16.418326] 
[   16.418432] Memory state around the buggy address:
[   16.418780]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.419230]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.419552] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.419854]                                      ^
[   16.420085]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.420645]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.421006] ==================================================================
[   15.844174] ==================================================================
[   15.844509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.844919] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.845208] 
[   15.845295] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.845337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.845350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.845370] Call Trace:
[   15.845385]  <TASK>
[   15.845401]  dump_stack_lvl+0x73/0xb0
[   15.845428]  print_report+0xd1/0x610
[   15.845452]  ? __virt_addr_valid+0x1db/0x2d0
[   15.845477]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.845500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.845525]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.845549]  kasan_report+0x141/0x180
[   15.845572]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.845601]  __asan_report_load4_noabort+0x18/0x20
[   15.845628]  kasan_atomics_helper+0x4a84/0x5450
[   15.845665]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.845690]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.845718]  ? kasan_atomics+0x152/0x310
[   15.845759]  kasan_atomics+0x1dc/0x310
[   15.845783]  ? __pfx_kasan_atomics+0x10/0x10
[   15.845810]  ? __pfx_read_tsc+0x10/0x10
[   15.845832]  ? ktime_get_ts64+0x86/0x230
[   15.845858]  kunit_try_run_case+0x1a5/0x480
[   15.845884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845909]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.845935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.845961]  ? __kthread_parkme+0x82/0x180
[   15.845983]  ? preempt_count_sub+0x50/0x80
[   15.846008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.846041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.846083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.846129]  kthread+0x337/0x6f0
[   15.846150]  ? trace_preempt_on+0x20/0xc0
[   15.846176]  ? __pfx_kthread+0x10/0x10
[   15.846197]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.846221]  ? calculate_sigpending+0x7b/0xa0
[   15.846247]  ? __pfx_kthread+0x10/0x10
[   15.846270]  ret_from_fork+0x116/0x1d0
[   15.846290]  ? __pfx_kthread+0x10/0x10
[   15.846312]  ret_from_fork_asm+0x1a/0x30
[   15.846344]  </TASK>
[   15.846354] 
[   15.853887] Allocated by task 284:
[   15.854098]  kasan_save_stack+0x45/0x70
[   15.854342]  kasan_save_track+0x18/0x40
[   15.854522]  kasan_save_alloc_info+0x3b/0x50
[   15.854675]  __kasan_kmalloc+0xb7/0xc0
[   15.854870]  __kmalloc_cache_noprof+0x189/0x420
[   15.855136]  kasan_atomics+0x95/0x310
[   15.855319]  kunit_try_run_case+0x1a5/0x480
[   15.855509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.855749]  kthread+0x337/0x6f0
[   15.855901]  ret_from_fork+0x116/0x1d0
[   15.856132]  ret_from_fork_asm+0x1a/0x30
[   15.856353] 
[   15.856456] The buggy address belongs to the object at ffff8881025adf00
[   15.856456]  which belongs to the cache kmalloc-64 of size 64
[   15.856942] The buggy address is located 0 bytes to the right of
[   15.856942]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.857392] 
[   15.857466] The buggy address belongs to the physical page:
[   15.857642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.857882] flags: 0x200000000000000(node=0|zone=2)
[   15.858173] page_type: f5(slab)
[   15.858342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.858680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.859015] page dumped because: kasan: bad access detected
[   15.859298] 
[   15.859395] Memory state around the buggy address:
[   15.859618]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.859907]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.860199] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.860552]                                      ^
[   15.860815]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861125]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.861341] ==================================================================
[   15.789568] ==================================================================
[   15.789976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.790408] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.790790] 
[   15.790917] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.790973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.790987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.791009] Call Trace:
[   15.791023]  <TASK>
[   15.791064]  dump_stack_lvl+0x73/0xb0
[   15.791095]  print_report+0xd1/0x610
[   15.791126]  ? __virt_addr_valid+0x1db/0x2d0
[   15.791149]  ? kasan_atomics_helper+0xac7/0x5450
[   15.791172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.791198]  ? kasan_atomics_helper+0xac7/0x5450
[   15.791222]  kasan_report+0x141/0x180
[   15.791245]  ? kasan_atomics_helper+0xac7/0x5450
[   15.791273]  kasan_check_range+0x10c/0x1c0
[   15.791297]  __kasan_check_write+0x18/0x20
[   15.791319]  kasan_atomics_helper+0xac7/0x5450
[   15.791343]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.791368]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.791395]  ? kasan_atomics+0x152/0x310
[   15.791423]  kasan_atomics+0x1dc/0x310
[   15.791447]  ? __pfx_kasan_atomics+0x10/0x10
[   15.791473]  ? __pfx_read_tsc+0x10/0x10
[   15.791495]  ? ktime_get_ts64+0x86/0x230
[   15.791545]  kunit_try_run_case+0x1a5/0x480
[   15.791571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.791607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.791634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.791660]  ? __kthread_parkme+0x82/0x180
[   15.791682]  ? preempt_count_sub+0x50/0x80
[   15.791707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.791733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.791758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.791795]  kthread+0x337/0x6f0
[   15.791817]  ? trace_preempt_on+0x20/0xc0
[   15.791842]  ? __pfx_kthread+0x10/0x10
[   15.791863]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.791886]  ? calculate_sigpending+0x7b/0xa0
[   15.791912]  ? __pfx_kthread+0x10/0x10
[   15.791935]  ret_from_fork+0x116/0x1d0
[   15.791957]  ? __pfx_kthread+0x10/0x10
[   15.791979]  ret_from_fork_asm+0x1a/0x30
[   15.792019]  </TASK>
[   15.792030] 
[   15.799784] Allocated by task 284:
[   15.799966]  kasan_save_stack+0x45/0x70
[   15.800138]  kasan_save_track+0x18/0x40
[   15.800276]  kasan_save_alloc_info+0x3b/0x50
[   15.800475]  __kasan_kmalloc+0xb7/0xc0
[   15.800675]  __kmalloc_cache_noprof+0x189/0x420
[   15.800898]  kasan_atomics+0x95/0x310
[   15.801100]  kunit_try_run_case+0x1a5/0x480
[   15.801328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.801543]  kthread+0x337/0x6f0
[   15.801700]  ret_from_fork+0x116/0x1d0
[   15.801893]  ret_from_fork_asm+0x1a/0x30
[   15.802125] 
[   15.802202] The buggy address belongs to the object at ffff8881025adf00
[   15.802202]  which belongs to the cache kmalloc-64 of size 64
[   15.802558] The buggy address is located 0 bytes to the right of
[   15.802558]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.803158] 
[   15.803256] The buggy address belongs to the physical page:
[   15.803509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.803867] flags: 0x200000000000000(node=0|zone=2)
[   15.804036] page_type: f5(slab)
[   15.804191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.804466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.804842] page dumped because: kasan: bad access detected
[   15.805158] 
[   15.805255] Memory state around the buggy address:
[   15.805497]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.805768]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.806095] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.806427]                                      ^
[   15.806640]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.806864]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.807159] ==================================================================
[   15.512599] ==================================================================
[   15.512997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.513298] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.513528] 
[   15.513611] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.513653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.513666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.513688] Call Trace:
[   15.513702]  <TASK>
[   15.513718]  dump_stack_lvl+0x73/0xb0
[   15.513745]  print_report+0xd1/0x610
[   15.513770]  ? __virt_addr_valid+0x1db/0x2d0
[   15.513795]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.513819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.513844]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.513869]  kasan_report+0x141/0x180
[   15.513892]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.513921]  __asan_report_store4_noabort+0x1b/0x30
[   15.513949]  kasan_atomics_helper+0x4b3a/0x5450
[   15.513974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.513999]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.514026]  ? kasan_atomics+0x152/0x310
[   15.514065]  kasan_atomics+0x1dc/0x310
[   15.514091]  ? __pfx_kasan_atomics+0x10/0x10
[   15.514118]  ? __pfx_read_tsc+0x10/0x10
[   15.514140]  ? ktime_get_ts64+0x86/0x230
[   15.514165]  kunit_try_run_case+0x1a5/0x480
[   15.514191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.514241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.514268]  ? __kthread_parkme+0x82/0x180
[   15.514290]  ? preempt_count_sub+0x50/0x80
[   15.514315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.514369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.514396]  kthread+0x337/0x6f0
[   15.514417]  ? trace_preempt_on+0x20/0xc0
[   15.514456]  ? __pfx_kthread+0x10/0x10
[   15.514479]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.514511]  ? calculate_sigpending+0x7b/0xa0
[   15.514538]  ? __pfx_kthread+0x10/0x10
[   15.514561]  ret_from_fork+0x116/0x1d0
[   15.514582]  ? __pfx_kthread+0x10/0x10
[   15.514604]  ret_from_fork_asm+0x1a/0x30
[   15.514636]  </TASK>
[   15.514648] 
[   15.523354] Allocated by task 284:
[   15.523570]  kasan_save_stack+0x45/0x70
[   15.523717]  kasan_save_track+0x18/0x40
[   15.523857]  kasan_save_alloc_info+0x3b/0x50
[   15.524008]  __kasan_kmalloc+0xb7/0xc0
[   15.524153]  __kmalloc_cache_noprof+0x189/0x420
[   15.524313]  kasan_atomics+0x95/0x310
[   15.524558]  kunit_try_run_case+0x1a5/0x480
[   15.525013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.525303]  kthread+0x337/0x6f0
[   15.525597]  ret_from_fork+0x116/0x1d0
[   15.525862]  ret_from_fork_asm+0x1a/0x30
[   15.526074] 
[   15.526173] The buggy address belongs to the object at ffff8881025adf00
[   15.526173]  which belongs to the cache kmalloc-64 of size 64
[   15.526561] The buggy address is located 0 bytes to the right of
[   15.526561]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.526936] 
[   15.527007] The buggy address belongs to the physical page:
[   15.527193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.527434] flags: 0x200000000000000(node=0|zone=2)
[   15.527955] page_type: f5(slab)
[   15.528315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.528664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.529324] page dumped because: kasan: bad access detected
[   15.529565] 
[   15.530253] Memory state around the buggy address:
[   15.530485]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.531422]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.532236] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.532533]                                      ^
[   15.533373]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.533609]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.533836] ==================================================================
[   16.536980] ==================================================================
[   16.537313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.537626] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.537925] 
[   16.538122] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.538168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.538180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.538201] Call Trace:
[   16.538215]  <TASK>
[   16.538230]  dump_stack_lvl+0x73/0xb0
[   16.538259]  print_report+0xd1/0x610
[   16.538283]  ? __virt_addr_valid+0x1db/0x2d0
[   16.538307]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.538331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.538356]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.538380]  kasan_report+0x141/0x180
[   16.538404]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.538433]  __asan_report_load8_noabort+0x18/0x20
[   16.538459]  kasan_atomics_helper+0x4f30/0x5450
[   16.538484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.538509]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.538537]  ? kasan_atomics+0x152/0x310
[   16.538565]  kasan_atomics+0x1dc/0x310
[   16.538590]  ? __pfx_kasan_atomics+0x10/0x10
[   16.538615]  ? __pfx_read_tsc+0x10/0x10
[   16.538639]  ? ktime_get_ts64+0x86/0x230
[   16.538665]  kunit_try_run_case+0x1a5/0x480
[   16.538692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.538725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.538750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.538776]  ? __kthread_parkme+0x82/0x180
[   16.538798]  ? preempt_count_sub+0x50/0x80
[   16.538823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.538849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.538875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.538903]  kthread+0x337/0x6f0
[   16.538924]  ? trace_preempt_on+0x20/0xc0
[   16.538950]  ? __pfx_kthread+0x10/0x10
[   16.538972]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.538995]  ? calculate_sigpending+0x7b/0xa0
[   16.539020]  ? __pfx_kthread+0x10/0x10
[   16.539043]  ret_from_fork+0x116/0x1d0
[   16.539076]  ? __pfx_kthread+0x10/0x10
[   16.539099]  ret_from_fork_asm+0x1a/0x30
[   16.539131]  </TASK>
[   16.539142] 
[   16.546477] Allocated by task 284:
[   16.546660]  kasan_save_stack+0x45/0x70
[   16.546846]  kasan_save_track+0x18/0x40
[   16.547045]  kasan_save_alloc_info+0x3b/0x50
[   16.547268]  __kasan_kmalloc+0xb7/0xc0
[   16.547405]  __kmalloc_cache_noprof+0x189/0x420
[   16.547564]  kasan_atomics+0x95/0x310
[   16.547700]  kunit_try_run_case+0x1a5/0x480
[   16.547849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.548028]  kthread+0x337/0x6f0
[   16.548206]  ret_from_fork+0x116/0x1d0
[   16.548395]  ret_from_fork_asm+0x1a/0x30
[   16.548594] 
[   16.548690] The buggy address belongs to the object at ffff8881025adf00
[   16.548690]  which belongs to the cache kmalloc-64 of size 64
[   16.549236] The buggy address is located 0 bytes to the right of
[   16.549236]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.550011] 
[   16.550106] The buggy address belongs to the physical page:
[   16.550281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.550521] flags: 0x200000000000000(node=0|zone=2)
[   16.550685] page_type: f5(slab)
[   16.550812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.551533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.551870] page dumped because: kasan: bad access detected
[   16.552129] 
[   16.552230] Memory state around the buggy address:
[   16.552451]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.552735]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.552996] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.553297]                                      ^
[   16.553522]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.553829]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.554085] ==================================================================
[   15.444181] ==================================================================
[   15.444431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.444811] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.445667] 
[   15.445940] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.446075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.446092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.446115] Call Trace:
[   15.446139]  <TASK>
[   15.446155]  dump_stack_lvl+0x73/0xb0
[   15.446188]  print_report+0xd1/0x610
[   15.446212]  ? __virt_addr_valid+0x1db/0x2d0
[   15.446237]  ? kasan_atomics_helper+0x3df/0x5450
[   15.446260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.446285]  ? kasan_atomics_helper+0x3df/0x5450
[   15.446309]  kasan_report+0x141/0x180
[   15.446332]  ? kasan_atomics_helper+0x3df/0x5450
[   15.446360]  kasan_check_range+0x10c/0x1c0
[   15.446385]  __kasan_check_read+0x15/0x20
[   15.446405]  kasan_atomics_helper+0x3df/0x5450
[   15.446430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.446454]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.446480]  ? kasan_atomics+0x152/0x310
[   15.446508]  kasan_atomics+0x1dc/0x310
[   15.446532]  ? __pfx_kasan_atomics+0x10/0x10
[   15.446559]  ? __pfx_read_tsc+0x10/0x10
[   15.446581]  ? ktime_get_ts64+0x86/0x230
[   15.446608]  kunit_try_run_case+0x1a5/0x480
[   15.446633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.446678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.446707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.446733]  ? __kthread_parkme+0x82/0x180
[   15.446754]  ? preempt_count_sub+0x50/0x80
[   15.446779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.446805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.446831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.446859]  kthread+0x337/0x6f0
[   15.446879]  ? trace_preempt_on+0x20/0xc0
[   15.446905]  ? __pfx_kthread+0x10/0x10
[   15.446927]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.446950]  ? calculate_sigpending+0x7b/0xa0
[   15.446976]  ? __pfx_kthread+0x10/0x10
[   15.446999]  ret_from_fork+0x116/0x1d0
[   15.447019]  ? __pfx_kthread+0x10/0x10
[   15.447041]  ret_from_fork_asm+0x1a/0x30
[   15.447084]  </TASK>
[   15.447096] 
[   15.458871] Allocated by task 284:
[   15.459061]  kasan_save_stack+0x45/0x70
[   15.459359]  kasan_save_track+0x18/0x40
[   15.459784]  kasan_save_alloc_info+0x3b/0x50
[   15.460255]  __kasan_kmalloc+0xb7/0xc0
[   15.460416]  __kmalloc_cache_noprof+0x189/0x420
[   15.460785]  kasan_atomics+0x95/0x310
[   15.461071]  kunit_try_run_case+0x1a5/0x480
[   15.461244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.461585]  kthread+0x337/0x6f0
[   15.461840]  ret_from_fork+0x116/0x1d0
[   15.462201]  ret_from_fork_asm+0x1a/0x30
[   15.462412] 
[   15.462662] The buggy address belongs to the object at ffff8881025adf00
[   15.462662]  which belongs to the cache kmalloc-64 of size 64
[   15.463324] The buggy address is located 0 bytes to the right of
[   15.463324]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.464047] 
[   15.464405] The buggy address belongs to the physical page:
[   15.464656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.465070] flags: 0x200000000000000(node=0|zone=2)
[   15.465325] page_type: f5(slab)
[   15.465635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.466073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.466555] page dumped because: kasan: bad access detected
[   15.466892] 
[   15.466995] Memory state around the buggy address:
[   15.467381]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.467738]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.467967] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.468399]                                      ^
[   15.468826]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469093]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.469578] ==================================================================
[   15.567837] ==================================================================
[   15.568572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.569323] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.570018] 
[   15.570257] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.570302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.570316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.570339] Call Trace:
[   15.570354]  <TASK>
[   15.570370]  dump_stack_lvl+0x73/0xb0
[   15.570400]  print_report+0xd1/0x610
[   15.570423]  ? __virt_addr_valid+0x1db/0x2d0
[   15.570447]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.570481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.570506]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.570530]  kasan_report+0x141/0x180
[   15.570565]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.570594]  kasan_check_range+0x10c/0x1c0
[   15.570620]  __kasan_check_write+0x18/0x20
[   15.570658]  kasan_atomics_helper+0x5fe/0x5450
[   15.570701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.570731]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.570759]  ? kasan_atomics+0x152/0x310
[   15.570787]  kasan_atomics+0x1dc/0x310
[   15.570812]  ? __pfx_kasan_atomics+0x10/0x10
[   15.570838]  ? __pfx_read_tsc+0x10/0x10
[   15.570861]  ? ktime_get_ts64+0x86/0x230
[   15.570886]  kunit_try_run_case+0x1a5/0x480
[   15.570913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.570938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.570963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.570989]  ? __kthread_parkme+0x82/0x180
[   15.571011]  ? preempt_count_sub+0x50/0x80
[   15.571036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.571072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.571098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.571134]  kthread+0x337/0x6f0
[   15.571154]  ? trace_preempt_on+0x20/0xc0
[   15.571178]  ? __pfx_kthread+0x10/0x10
[   15.571202]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.571225]  ? calculate_sigpending+0x7b/0xa0
[   15.571251]  ? __pfx_kthread+0x10/0x10
[   15.571273]  ret_from_fork+0x116/0x1d0
[   15.571293]  ? __pfx_kthread+0x10/0x10
[   15.571316]  ret_from_fork_asm+0x1a/0x30
[   15.571348]  </TASK>
[   15.571359] 
[   15.586205] Allocated by task 284:
[   15.586605]  kasan_save_stack+0x45/0x70
[   15.586940]  kasan_save_track+0x18/0x40
[   15.587341]  kasan_save_alloc_info+0x3b/0x50
[   15.587512]  __kasan_kmalloc+0xb7/0xc0
[   15.587826]  __kmalloc_cache_noprof+0x189/0x420
[   15.588265]  kasan_atomics+0x95/0x310
[   15.588732]  kunit_try_run_case+0x1a5/0x480
[   15.589096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.589545]  kthread+0x337/0x6f0
[   15.589687]  ret_from_fork+0x116/0x1d0
[   15.589864]  ret_from_fork_asm+0x1a/0x30
[   15.590300] 
[   15.590487] The buggy address belongs to the object at ffff8881025adf00
[   15.590487]  which belongs to the cache kmalloc-64 of size 64
[   15.591875] The buggy address is located 0 bytes to the right of
[   15.591875]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.592455] 
[   15.592568] The buggy address belongs to the physical page:
[   15.592970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.593687] flags: 0x200000000000000(node=0|zone=2)
[   15.594233] page_type: f5(slab)
[   15.594423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.595090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.595888] page dumped because: kasan: bad access detected
[   15.596101] 
[   15.596285] Memory state around the buggy address:
[   15.596811]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.597516]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.598154] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.598597]                                      ^
[   15.599065]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599481]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.599719] ==================================================================
[   15.991742] ==================================================================
[   15.992097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.992402] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.992648] 
[   15.992869] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.992915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.992928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.992951] Call Trace:
[   15.992966]  <TASK>
[   15.992982]  dump_stack_lvl+0x73/0xb0
[   15.993012]  print_report+0xd1/0x610
[   15.993035]  ? __virt_addr_valid+0x1db/0x2d0
[   15.993071]  ? kasan_atomics_helper+0x1079/0x5450
[   15.993094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.993120]  ? kasan_atomics_helper+0x1079/0x5450
[   15.993152]  kasan_report+0x141/0x180
[   15.993175]  ? kasan_atomics_helper+0x1079/0x5450
[   15.993204]  kasan_check_range+0x10c/0x1c0
[   15.993230]  __kasan_check_write+0x18/0x20
[   15.993252]  kasan_atomics_helper+0x1079/0x5450
[   15.993276]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.993301]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.993328]  ? kasan_atomics+0x152/0x310
[   15.993356]  kasan_atomics+0x1dc/0x310
[   15.993380]  ? __pfx_kasan_atomics+0x10/0x10
[   15.993406]  ? __pfx_read_tsc+0x10/0x10
[   15.993429]  ? ktime_get_ts64+0x86/0x230
[   15.993454]  kunit_try_run_case+0x1a5/0x480
[   15.993481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.993534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.993562]  ? __kthread_parkme+0x82/0x180
[   15.993584]  ? preempt_count_sub+0x50/0x80
[   15.993609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.993689]  kthread+0x337/0x6f0
[   15.993709]  ? trace_preempt_on+0x20/0xc0
[   15.993734]  ? __pfx_kthread+0x10/0x10
[   15.993756]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.993780]  ? calculate_sigpending+0x7b/0xa0
[   15.993807]  ? __pfx_kthread+0x10/0x10
[   15.993830]  ret_from_fork+0x116/0x1d0
[   15.993851]  ? __pfx_kthread+0x10/0x10
[   15.993872]  ret_from_fork_asm+0x1a/0x30
[   15.993905]  </TASK>
[   15.993916] 
[   16.001499] Allocated by task 284:
[   16.001682]  kasan_save_stack+0x45/0x70
[   16.001889]  kasan_save_track+0x18/0x40
[   16.002094]  kasan_save_alloc_info+0x3b/0x50
[   16.002257]  __kasan_kmalloc+0xb7/0xc0
[   16.002427]  __kmalloc_cache_noprof+0x189/0x420
[   16.002652]  kasan_atomics+0x95/0x310
[   16.002844]  kunit_try_run_case+0x1a5/0x480
[   16.003036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.003290]  kthread+0x337/0x6f0
[   16.003448]  ret_from_fork+0x116/0x1d0
[   16.003643]  ret_from_fork_asm+0x1a/0x30
[   16.003830] 
[   16.003903] The buggy address belongs to the object at ffff8881025adf00
[   16.003903]  which belongs to the cache kmalloc-64 of size 64
[   16.004271] The buggy address is located 0 bytes to the right of
[   16.004271]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.004899] 
[   16.004996] The buggy address belongs to the physical page:
[   16.005260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.005743] flags: 0x200000000000000(node=0|zone=2)
[   16.005978] page_type: f5(slab)
[   16.006115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.006430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.006692] page dumped because: kasan: bad access detected
[   16.006869] 
[   16.006940] Memory state around the buggy address:
[   16.007156]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.007484]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.007806] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.008139]                                      ^
[   16.008337]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.008627]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.008922] ==================================================================
[   16.136434] ==================================================================
[   16.137143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   16.137540] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.137852] 
[   16.137956] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.138001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.138014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.138036] Call Trace:
[   16.138062]  <TASK>
[   16.138079]  dump_stack_lvl+0x73/0xb0
[   16.138109]  print_report+0xd1/0x610
[   16.138157]  ? __virt_addr_valid+0x1db/0x2d0
[   16.138181]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.138204]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.138230]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.138255]  kasan_report+0x141/0x180
[   16.138278]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.138306]  kasan_check_range+0x10c/0x1c0
[   16.138343]  __kasan_check_write+0x18/0x20
[   16.138365]  kasan_atomics_helper+0x12e6/0x5450
[   16.138390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.138414]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.138441]  ? kasan_atomics+0x152/0x310
[   16.138468]  kasan_atomics+0x1dc/0x310
[   16.138492]  ? __pfx_kasan_atomics+0x10/0x10
[   16.138519]  ? __pfx_read_tsc+0x10/0x10
[   16.138542]  ? ktime_get_ts64+0x86/0x230
[   16.138568]  kunit_try_run_case+0x1a5/0x480
[   16.138594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.138619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.138645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.138671]  ? __kthread_parkme+0x82/0x180
[   16.138693]  ? preempt_count_sub+0x50/0x80
[   16.138723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.138750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.138776]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.138804]  kthread+0x337/0x6f0
[   16.138824]  ? trace_preempt_on+0x20/0xc0
[   16.138849]  ? __pfx_kthread+0x10/0x10
[   16.138870]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.138894]  ? calculate_sigpending+0x7b/0xa0
[   16.138920]  ? __pfx_kthread+0x10/0x10
[   16.138943]  ret_from_fork+0x116/0x1d0
[   16.138963]  ? __pfx_kthread+0x10/0x10
[   16.138986]  ret_from_fork_asm+0x1a/0x30
[   16.139017]  </TASK>
[   16.139028] 
[   16.146782] Allocated by task 284:
[   16.146986]  kasan_save_stack+0x45/0x70
[   16.147199]  kasan_save_track+0x18/0x40
[   16.147369]  kasan_save_alloc_info+0x3b/0x50
[   16.147630]  __kasan_kmalloc+0xb7/0xc0
[   16.147781]  __kmalloc_cache_noprof+0x189/0x420
[   16.148088]  kasan_atomics+0x95/0x310
[   16.148294]  kunit_try_run_case+0x1a5/0x480
[   16.148491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.148714]  kthread+0x337/0x6f0
[   16.148838]  ret_from_fork+0x116/0x1d0
[   16.148978]  ret_from_fork_asm+0x1a/0x30
[   16.149185] 
[   16.149285] The buggy address belongs to the object at ffff8881025adf00
[   16.149285]  which belongs to the cache kmalloc-64 of size 64
[   16.149807] The buggy address is located 0 bytes to the right of
[   16.149807]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.150364] 
[   16.150465] The buggy address belongs to the physical page:
[   16.150742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.151111] flags: 0x200000000000000(node=0|zone=2)
[   16.151356] page_type: f5(slab)
[   16.151483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.151854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.152095] page dumped because: kasan: bad access detected
[   16.152292] 
[   16.152389] Memory state around the buggy address:
[   16.152616]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.153072]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.153404] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.153620]                                      ^
[   16.153848]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.154290]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.154595] ==================================================================
[   16.329026] ==================================================================
[   16.329289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.330035] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.330487] 
[   16.330610] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.330656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.330669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.330690] Call Trace:
[   16.330711]  <TASK>
[   16.330727]  dump_stack_lvl+0x73/0xb0
[   16.330758]  print_report+0xd1/0x610
[   16.330782]  ? __virt_addr_valid+0x1db/0x2d0
[   16.330807]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.330830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.330855]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.330879]  kasan_report+0x141/0x180
[   16.330902]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.330930]  kasan_check_range+0x10c/0x1c0
[   16.330956]  __kasan_check_write+0x18/0x20
[   16.330977]  kasan_atomics_helper+0x16e7/0x5450
[   16.331002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.331025]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.331065]  ? kasan_atomics+0x152/0x310
[   16.331093]  kasan_atomics+0x1dc/0x310
[   16.331117]  ? __pfx_kasan_atomics+0x10/0x10
[   16.331159]  ? __pfx_read_tsc+0x10/0x10
[   16.331182]  ? ktime_get_ts64+0x86/0x230
[   16.331208]  kunit_try_run_case+0x1a5/0x480
[   16.331235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.331260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.331286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.331311]  ? __kthread_parkme+0x82/0x180
[   16.331333]  ? preempt_count_sub+0x50/0x80
[   16.331359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.331385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.331412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.331439]  kthread+0x337/0x6f0
[   16.331460]  ? trace_preempt_on+0x20/0xc0
[   16.331485]  ? __pfx_kthread+0x10/0x10
[   16.331508]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.331531]  ? calculate_sigpending+0x7b/0xa0
[   16.331557]  ? __pfx_kthread+0x10/0x10
[   16.331580]  ret_from_fork+0x116/0x1d0
[   16.331601]  ? __pfx_kthread+0x10/0x10
[   16.331624]  ret_from_fork_asm+0x1a/0x30
[   16.331656]  </TASK>
[   16.331667] 
[   16.339015] Allocated by task 284:
[   16.339159]  kasan_save_stack+0x45/0x70
[   16.339338]  kasan_save_track+0x18/0x40
[   16.339536]  kasan_save_alloc_info+0x3b/0x50
[   16.339746]  __kasan_kmalloc+0xb7/0xc0
[   16.339916]  __kmalloc_cache_noprof+0x189/0x420
[   16.340083]  kasan_atomics+0x95/0x310
[   16.340216]  kunit_try_run_case+0x1a5/0x480
[   16.340622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.340878]  kthread+0x337/0x6f0
[   16.341049]  ret_from_fork+0x116/0x1d0
[   16.341246]  ret_from_fork_asm+0x1a/0x30
[   16.341420] 
[   16.341493] The buggy address belongs to the object at ffff8881025adf00
[   16.341493]  which belongs to the cache kmalloc-64 of size 64
[   16.341985] The buggy address is located 0 bytes to the right of
[   16.341985]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.342513] 
[   16.342612] The buggy address belongs to the physical page:
[   16.342834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.343194] flags: 0x200000000000000(node=0|zone=2)
[   16.343393] page_type: f5(slab)
[   16.343540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.343766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.343988] page dumped because: kasan: bad access detected
[   16.344228] 
[   16.344326] Memory state around the buggy address:
[   16.344555]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.344867]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.345270] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.345542]                                      ^
[   16.345696]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.345910]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.346388] ==================================================================
[   15.826061] ==================================================================
[   15.826411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.826767] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.827097] 
[   15.827230] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.827285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.827298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.827321] Call Trace:
[   15.827348]  <TASK>
[   15.827363]  dump_stack_lvl+0x73/0xb0
[   15.827392]  print_report+0xd1/0x610
[   15.827425]  ? __virt_addr_valid+0x1db/0x2d0
[   15.827449]  ? kasan_atomics_helper+0xc70/0x5450
[   15.827472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.827507]  ? kasan_atomics_helper+0xc70/0x5450
[   15.827531]  kasan_report+0x141/0x180
[   15.827555]  ? kasan_atomics_helper+0xc70/0x5450
[   15.827592]  kasan_check_range+0x10c/0x1c0
[   15.827618]  __kasan_check_write+0x18/0x20
[   15.827651]  kasan_atomics_helper+0xc70/0x5450
[   15.827676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.827701]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.827728]  ? kasan_atomics+0x152/0x310
[   15.827756]  kasan_atomics+0x1dc/0x310
[   15.827780]  ? __pfx_kasan_atomics+0x10/0x10
[   15.827807]  ? __pfx_read_tsc+0x10/0x10
[   15.827829]  ? ktime_get_ts64+0x86/0x230
[   15.827856]  kunit_try_run_case+0x1a5/0x480
[   15.827883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.827908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.827934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.827959]  ? __kthread_parkme+0x82/0x180
[   15.827980]  ? preempt_count_sub+0x50/0x80
[   15.828005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.828031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.828067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.828095]  kthread+0x337/0x6f0
[   15.828135]  ? trace_preempt_on+0x20/0xc0
[   15.828159]  ? __pfx_kthread+0x10/0x10
[   15.828182]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.828205]  ? calculate_sigpending+0x7b/0xa0
[   15.828232]  ? __pfx_kthread+0x10/0x10
[   15.828263]  ret_from_fork+0x116/0x1d0
[   15.828284]  ? __pfx_kthread+0x10/0x10
[   15.828306]  ret_from_fork_asm+0x1a/0x30
[   15.828350]  </TASK>
[   15.828361] 
[   15.835985] Allocated by task 284:
[   15.836149]  kasan_save_stack+0x45/0x70
[   15.836297]  kasan_save_track+0x18/0x40
[   15.836437]  kasan_save_alloc_info+0x3b/0x50
[   15.836588]  __kasan_kmalloc+0xb7/0xc0
[   15.836774]  __kmalloc_cache_noprof+0x189/0x420
[   15.837029]  kasan_atomics+0x95/0x310
[   15.837275]  kunit_try_run_case+0x1a5/0x480
[   15.837524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.837792]  kthread+0x337/0x6f0
[   15.837961]  ret_from_fork+0x116/0x1d0
[   15.838194]  ret_from_fork_asm+0x1a/0x30
[   15.838424] 
[   15.838521] The buggy address belongs to the object at ffff8881025adf00
[   15.838521]  which belongs to the cache kmalloc-64 of size 64
[   15.839027] The buggy address is located 0 bytes to the right of
[   15.839027]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.839601] 
[   15.839702] The buggy address belongs to the physical page:
[   15.839942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.840322] flags: 0x200000000000000(node=0|zone=2)
[   15.840577] page_type: f5(slab)
[   15.840748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.841092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.841446] page dumped because: kasan: bad access detected
[   15.841695] 
[   15.841791] Memory state around the buggy address:
[   15.842009]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.842377]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.842691] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.842910]                                      ^
[   15.843074]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.843317]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.843661] ==================================================================
[   16.469162] ==================================================================
[   16.469603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.469955] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.470307] 
[   16.470395] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.470437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.470450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.470472] Call Trace:
[   16.470486]  <TASK>
[   16.470501]  dump_stack_lvl+0x73/0xb0
[   16.470531]  print_report+0xd1/0x610
[   16.470555]  ? __virt_addr_valid+0x1db/0x2d0
[   16.470591]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.470615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.470640]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.470675]  kasan_report+0x141/0x180
[   16.470699]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.470731]  kasan_check_range+0x10c/0x1c0
[   16.470757]  __kasan_check_write+0x18/0x20
[   16.470779]  kasan_atomics_helper+0x1a7f/0x5450
[   16.470804]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.470828]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.470854]  ? kasan_atomics+0x152/0x310
[   16.470882]  kasan_atomics+0x1dc/0x310
[   16.470906]  ? __pfx_kasan_atomics+0x10/0x10
[   16.470932]  ? __pfx_read_tsc+0x10/0x10
[   16.470955]  ? ktime_get_ts64+0x86/0x230
[   16.470981]  kunit_try_run_case+0x1a5/0x480
[   16.471007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.471032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.471076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.471102]  ? __kthread_parkme+0x82/0x180
[   16.471145]  ? preempt_count_sub+0x50/0x80
[   16.471170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.471197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.471224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.471261]  kthread+0x337/0x6f0
[   16.471281]  ? trace_preempt_on+0x20/0xc0
[   16.471306]  ? __pfx_kthread+0x10/0x10
[   16.471338]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.471362]  ? calculate_sigpending+0x7b/0xa0
[   16.471387]  ? __pfx_kthread+0x10/0x10
[   16.471419]  ret_from_fork+0x116/0x1d0
[   16.471440]  ? __pfx_kthread+0x10/0x10
[   16.471461]  ret_from_fork_asm+0x1a/0x30
[   16.471504]  </TASK>
[   16.471515] 
[   16.485384] Allocated by task 284:
[   16.485590]  kasan_save_stack+0x45/0x70
[   16.485778]  kasan_save_track+0x18/0x40
[   16.485977]  kasan_save_alloc_info+0x3b/0x50
[   16.486501]  __kasan_kmalloc+0xb7/0xc0
[   16.486699]  __kmalloc_cache_noprof+0x189/0x420
[   16.487026]  kasan_atomics+0x95/0x310
[   16.487249]  kunit_try_run_case+0x1a5/0x480
[   16.487618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.487954]  kthread+0x337/0x6f0
[   16.488116]  ret_from_fork+0x116/0x1d0
[   16.488461]  ret_from_fork_asm+0x1a/0x30
[   16.488667] 
[   16.488749] The buggy address belongs to the object at ffff8881025adf00
[   16.488749]  which belongs to the cache kmalloc-64 of size 64
[   16.489258] The buggy address is located 0 bytes to the right of
[   16.489258]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.490136] 
[   16.490309] The buggy address belongs to the physical page:
[   16.490678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.491001] flags: 0x200000000000000(node=0|zone=2)
[   16.491443] page_type: f5(slab)
[   16.491618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.492038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.492399] page dumped because: kasan: bad access detected
[   16.492639] 
[   16.492718] Memory state around the buggy address:
[   16.492936]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.493529]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.493902] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.494301]                                      ^
[   16.494518]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.494953]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.495384] ==================================================================
[   16.112584] ==================================================================
[   16.112976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   16.113254] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.114062] 
[   16.114181] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.114227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.114240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.114261] Call Trace:
[   16.114276]  <TASK>
[   16.114293]  dump_stack_lvl+0x73/0xb0
[   16.114324]  print_report+0xd1/0x610
[   16.114348]  ? __virt_addr_valid+0x1db/0x2d0
[   16.114372]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.114395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.114422]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.114446]  kasan_report+0x141/0x180
[   16.114483]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.114512]  __asan_report_load4_noabort+0x18/0x20
[   16.114539]  kasan_atomics_helper+0x49e8/0x5450
[   16.114564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.114589]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.114615]  ? kasan_atomics+0x152/0x310
[   16.114644]  kasan_atomics+0x1dc/0x310
[   16.114668]  ? __pfx_kasan_atomics+0x10/0x10
[   16.114694]  ? __pfx_read_tsc+0x10/0x10
[   16.114946]  ? ktime_get_ts64+0x86/0x230
[   16.114975]  kunit_try_run_case+0x1a5/0x480
[   16.115002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.115027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.115066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.115092]  ? __kthread_parkme+0x82/0x180
[   16.115113]  ? preempt_count_sub+0x50/0x80
[   16.115153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.115179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.115205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.115233]  kthread+0x337/0x6f0
[   16.115254]  ? trace_preempt_on+0x20/0xc0
[   16.115279]  ? __pfx_kthread+0x10/0x10
[   16.115302]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.115326]  ? calculate_sigpending+0x7b/0xa0
[   16.115351]  ? __pfx_kthread+0x10/0x10
[   16.115374]  ret_from_fork+0x116/0x1d0
[   16.115394]  ? __pfx_kthread+0x10/0x10
[   16.115417]  ret_from_fork_asm+0x1a/0x30
[   16.115449]  </TASK>
[   16.115459] 
[   16.125592] Allocated by task 284:
[   16.125771]  kasan_save_stack+0x45/0x70
[   16.126102]  kasan_save_track+0x18/0x40
[   16.126467]  kasan_save_alloc_info+0x3b/0x50
[   16.126677]  __kasan_kmalloc+0xb7/0xc0
[   16.126946]  __kmalloc_cache_noprof+0x189/0x420
[   16.127354]  kasan_atomics+0x95/0x310
[   16.127544]  kunit_try_run_case+0x1a5/0x480
[   16.127769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.127975]  kthread+0x337/0x6f0
[   16.128332]  ret_from_fork+0x116/0x1d0
[   16.128631]  ret_from_fork_asm+0x1a/0x30
[   16.128857] 
[   16.128945] The buggy address belongs to the object at ffff8881025adf00
[   16.128945]  which belongs to the cache kmalloc-64 of size 64
[   16.129674] The buggy address is located 0 bytes to the right of
[   16.129674]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.130386] 
[   16.130479] The buggy address belongs to the physical page:
[   16.130854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.131303] flags: 0x200000000000000(node=0|zone=2)
[   16.131611] page_type: f5(slab)
[   16.131862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.132308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.132698] page dumped because: kasan: bad access detected
[   16.132996] 
[   16.133089] Memory state around the buggy address:
[   16.133413]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.133834]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.134251] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.134653]                                      ^
[   16.134939]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.135223]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.135707] ==================================================================
[   16.684887] ==================================================================
[   16.685457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.685849] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.686273] 
[   16.686379] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.686423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.686436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.686457] Call Trace:
[   16.686472]  <TASK>
[   16.686488]  dump_stack_lvl+0x73/0xb0
[   16.686517]  print_report+0xd1/0x610
[   16.686540]  ? __virt_addr_valid+0x1db/0x2d0
[   16.686564]  ? kasan_atomics_helper+0x2006/0x5450
[   16.686587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.686612]  ? kasan_atomics_helper+0x2006/0x5450
[   16.686635]  kasan_report+0x141/0x180
[   16.686658]  ? kasan_atomics_helper+0x2006/0x5450
[   16.686687]  kasan_check_range+0x10c/0x1c0
[   16.686719]  __kasan_check_write+0x18/0x20
[   16.686741]  kasan_atomics_helper+0x2006/0x5450
[   16.686765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.686791]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.686817]  ? kasan_atomics+0x152/0x310
[   16.686846]  kasan_atomics+0x1dc/0x310
[   16.686870]  ? __pfx_kasan_atomics+0x10/0x10
[   16.686896]  ? __pfx_read_tsc+0x10/0x10
[   16.686918]  ? ktime_get_ts64+0x86/0x230
[   16.686944]  kunit_try_run_case+0x1a5/0x480
[   16.686970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.686994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.687020]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.687045]  ? __kthread_parkme+0x82/0x180
[   16.687130]  ? preempt_count_sub+0x50/0x80
[   16.687158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.687184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.687211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.687238]  kthread+0x337/0x6f0
[   16.687260]  ? trace_preempt_on+0x20/0xc0
[   16.687285]  ? __pfx_kthread+0x10/0x10
[   16.687308]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.687331]  ? calculate_sigpending+0x7b/0xa0
[   16.687357]  ? __pfx_kthread+0x10/0x10
[   16.687380]  ret_from_fork+0x116/0x1d0
[   16.687401]  ? __pfx_kthread+0x10/0x10
[   16.687423]  ret_from_fork_asm+0x1a/0x30
[   16.687455]  </TASK>
[   16.687466] 
[   16.695490] Allocated by task 284:
[   16.695715]  kasan_save_stack+0x45/0x70
[   16.696001]  kasan_save_track+0x18/0x40
[   16.696225]  kasan_save_alloc_info+0x3b/0x50
[   16.696442]  __kasan_kmalloc+0xb7/0xc0
[   16.696613]  __kmalloc_cache_noprof+0x189/0x420
[   16.696775]  kasan_atomics+0x95/0x310
[   16.697015]  kunit_try_run_case+0x1a5/0x480
[   16.697336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.697587]  kthread+0x337/0x6f0
[   16.697712]  ret_from_fork+0x116/0x1d0
[   16.697905]  ret_from_fork_asm+0x1a/0x30
[   16.698182] 
[   16.698285] The buggy address belongs to the object at ffff8881025adf00
[   16.698285]  which belongs to the cache kmalloc-64 of size 64
[   16.698769] The buggy address is located 0 bytes to the right of
[   16.698769]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.699307] 
[   16.699385] The buggy address belongs to the physical page:
[   16.699629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.700007] flags: 0x200000000000000(node=0|zone=2)
[   16.700332] page_type: f5(slab)
[   16.700583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.700927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.701192] page dumped because: kasan: bad access detected
[   16.701452] 
[   16.701594] Memory state around the buggy address:
[   16.701825]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.702208]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.702484] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.702860]                                      ^
[   16.703128]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.703373]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.703738] ==================================================================
[   15.335232] ==================================================================
[   15.336044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.336554] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.336867] 
[   15.336980] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.337027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.337039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.337226] Call Trace:
[   15.337239]  <TASK>
[   15.337268]  dump_stack_lvl+0x73/0xb0
[   15.337302]  print_report+0xd1/0x610
[   15.337325]  ? __virt_addr_valid+0x1db/0x2d0
[   15.337350]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.337373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.337396]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.337419]  kasan_report+0x141/0x180
[   15.337442]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.337468]  __asan_report_load4_noabort+0x18/0x20
[   15.337494]  kasan_atomics_helper+0x4bbc/0x5450
[   15.337519]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.337544]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.337571]  ? kasan_atomics+0x152/0x310
[   15.337599]  kasan_atomics+0x1dc/0x310
[   15.337621]  ? __pfx_kasan_atomics+0x10/0x10
[   15.337798]  ? __pfx_read_tsc+0x10/0x10
[   15.337822]  ? ktime_get_ts64+0x86/0x230
[   15.337847]  kunit_try_run_case+0x1a5/0x480
[   15.337874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.337898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.337922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.337948]  ? __kthread_parkme+0x82/0x180
[   15.337969]  ? preempt_count_sub+0x50/0x80
[   15.337995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.338085]  kthread+0x337/0x6f0
[   15.338105]  ? trace_preempt_on+0x20/0xc0
[   15.338131]  ? __pfx_kthread+0x10/0x10
[   15.338153]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.338175]  ? calculate_sigpending+0x7b/0xa0
[   15.338201]  ? __pfx_kthread+0x10/0x10
[   15.338223]  ret_from_fork+0x116/0x1d0
[   15.338242]  ? __pfx_kthread+0x10/0x10
[   15.338264]  ret_from_fork_asm+0x1a/0x30
[   15.338297]  </TASK>
[   15.338307] 
[   15.349963] Allocated by task 284:
[   15.350386]  kasan_save_stack+0x45/0x70
[   15.350706]  kasan_save_track+0x18/0x40
[   15.351039]  kasan_save_alloc_info+0x3b/0x50
[   15.351344]  __kasan_kmalloc+0xb7/0xc0
[   15.351537]  __kmalloc_cache_noprof+0x189/0x420
[   15.351907]  kasan_atomics+0x95/0x310
[   15.352253]  kunit_try_run_case+0x1a5/0x480
[   15.352540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352931]  kthread+0x337/0x6f0
[   15.353211]  ret_from_fork+0x116/0x1d0
[   15.353363]  ret_from_fork_asm+0x1a/0x30
[   15.353728] 
[   15.353940] The buggy address belongs to the object at ffff8881025adf00
[   15.353940]  which belongs to the cache kmalloc-64 of size 64
[   15.354591] The buggy address is located 0 bytes to the right of
[   15.354591]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.355459] 
[   15.355566] The buggy address belongs to the physical page:
[   15.356145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.356565] flags: 0x200000000000000(node=0|zone=2)
[   15.356844] page_type: f5(slab)
[   15.357003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.357554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.358048] page dumped because: kasan: bad access detected
[   15.358311] 
[   15.358578] Memory state around the buggy address:
[   15.358865]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359351]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359742] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.360245]                                      ^
[   15.360625]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361049]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.361555] ==================================================================
[   15.768151] ==================================================================
[   15.768875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.769652] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.770379] 
[   15.770590] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.770635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.770649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.770670] Call Trace:
[   15.770687]  <TASK>
[   15.770706]  dump_stack_lvl+0x73/0xb0
[   15.770737]  print_report+0xd1/0x610
[   15.770760]  ? __virt_addr_valid+0x1db/0x2d0
[   15.770784]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.770807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.770831]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.770854]  kasan_report+0x141/0x180
[   15.770878]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.770906]  kasan_check_range+0x10c/0x1c0
[   15.770931]  __kasan_check_write+0x18/0x20
[   15.770952]  kasan_atomics_helper+0xa2b/0x5450
[   15.770976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.771001]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.771027]  ? kasan_atomics+0x152/0x310
[   15.771071]  kasan_atomics+0x1dc/0x310
[   15.771123]  ? __pfx_kasan_atomics+0x10/0x10
[   15.771150]  ? __pfx_read_tsc+0x10/0x10
[   15.771186]  ? ktime_get_ts64+0x86/0x230
[   15.771212]  kunit_try_run_case+0x1a5/0x480
[   15.771239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.771289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.771314]  ? __kthread_parkme+0x82/0x180
[   15.771336]  ? preempt_count_sub+0x50/0x80
[   15.771361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.771413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.771441]  kthread+0x337/0x6f0
[   15.771461]  ? trace_preempt_on+0x20/0xc0
[   15.771486]  ? __pfx_kthread+0x10/0x10
[   15.771508]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.771532]  ? calculate_sigpending+0x7b/0xa0
[   15.771559]  ? __pfx_kthread+0x10/0x10
[   15.771582]  ret_from_fork+0x116/0x1d0
[   15.771603]  ? __pfx_kthread+0x10/0x10
[   15.771625]  ret_from_fork_asm+0x1a/0x30
[   15.771657]  </TASK>
[   15.771669] 
[   15.781392] Allocated by task 284:
[   15.781583]  kasan_save_stack+0x45/0x70
[   15.781769]  kasan_save_track+0x18/0x40
[   15.781981]  kasan_save_alloc_info+0x3b/0x50
[   15.782228]  __kasan_kmalloc+0xb7/0xc0
[   15.782431]  __kmalloc_cache_noprof+0x189/0x420
[   15.782644]  kasan_atomics+0x95/0x310
[   15.782787]  kunit_try_run_case+0x1a5/0x480
[   15.782937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.783171]  kthread+0x337/0x6f0
[   15.783353]  ret_from_fork+0x116/0x1d0
[   15.783560]  ret_from_fork_asm+0x1a/0x30
[   15.783763] 
[   15.783858] The buggy address belongs to the object at ffff8881025adf00
[   15.783858]  which belongs to the cache kmalloc-64 of size 64
[   15.784416] The buggy address is located 0 bytes to the right of
[   15.784416]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.784886] 
[   15.784960] The buggy address belongs to the physical page:
[   15.785203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.785583] flags: 0x200000000000000(node=0|zone=2)
[   15.785842] page_type: f5(slab)
[   15.785995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.786362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.786708] page dumped because: kasan: bad access detected
[   15.786914] 
[   15.787015] Memory state around the buggy address:
[   15.787281]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.787602]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.787831] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.788047]                                      ^
[   15.788281]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.788611]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.788928] ==================================================================
[   15.861863] ==================================================================
[   15.862305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.862672] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.862965] 
[   15.863066] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.863128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.863142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.863162] Call Trace:
[   15.863176]  <TASK>
[   15.863192]  dump_stack_lvl+0x73/0xb0
[   15.863231]  print_report+0xd1/0x610
[   15.863255]  ? __virt_addr_valid+0x1db/0x2d0
[   15.863279]  ? kasan_atomics_helper+0xd47/0x5450
[   15.863313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.863339]  ? kasan_atomics_helper+0xd47/0x5450
[   15.863362]  kasan_report+0x141/0x180
[   15.863386]  ? kasan_atomics_helper+0xd47/0x5450
[   15.863414]  kasan_check_range+0x10c/0x1c0
[   15.863440]  __kasan_check_write+0x18/0x20
[   15.863461]  kasan_atomics_helper+0xd47/0x5450
[   15.863487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.863512]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.863538]  ? kasan_atomics+0x152/0x310
[   15.863575]  kasan_atomics+0x1dc/0x310
[   15.863599]  ? __pfx_kasan_atomics+0x10/0x10
[   15.863636]  ? __pfx_read_tsc+0x10/0x10
[   15.863660]  ? ktime_get_ts64+0x86/0x230
[   15.863685]  kunit_try_run_case+0x1a5/0x480
[   15.863712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.863746]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.863773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.863810]  ? __kthread_parkme+0x82/0x180
[   15.863832]  ? preempt_count_sub+0x50/0x80
[   15.863859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.863885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.863921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.863950]  kthread+0x337/0x6f0
[   15.863982]  ? trace_preempt_on+0x20/0xc0
[   15.864007]  ? __pfx_kthread+0x10/0x10
[   15.864029]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.864067]  ? calculate_sigpending+0x7b/0xa0
[   15.864093]  ? __pfx_kthread+0x10/0x10
[   15.864139]  ret_from_fork+0x116/0x1d0
[   15.864160]  ? __pfx_kthread+0x10/0x10
[   15.864182]  ret_from_fork_asm+0x1a/0x30
[   15.864215]  </TASK>
[   15.864234] 
[   15.871926] Allocated by task 284:
[   15.872149]  kasan_save_stack+0x45/0x70
[   15.872383]  kasan_save_track+0x18/0x40
[   15.872554]  kasan_save_alloc_info+0x3b/0x50
[   15.872843]  __kasan_kmalloc+0xb7/0xc0
[   15.872982]  __kmalloc_cache_noprof+0x189/0x420
[   15.873176]  kasan_atomics+0x95/0x310
[   15.873312]  kunit_try_run_case+0x1a5/0x480
[   15.873460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.873638]  kthread+0x337/0x6f0
[   15.873809]  ret_from_fork+0x116/0x1d0
[   15.873997]  ret_from_fork_asm+0x1a/0x30
[   15.874278] 
[   15.874377] The buggy address belongs to the object at ffff8881025adf00
[   15.874377]  which belongs to the cache kmalloc-64 of size 64
[   15.874916] The buggy address is located 0 bytes to the right of
[   15.874916]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.875358] 
[   15.875433] The buggy address belongs to the physical page:
[   15.875608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.875939] flags: 0x200000000000000(node=0|zone=2)
[   15.876319] page_type: f5(slab)
[   15.876547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.876913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.877277] page dumped because: kasan: bad access detected
[   15.877533] 
[   15.877628] Memory state around the buggy address:
[   15.877806]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878129]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878480] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.878822]                                      ^
[   15.879013]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.879266]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.879527] ==================================================================
[   16.235830] ==================================================================
[   16.236124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.236979] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.237418] 
[   16.237622] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.237670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.237684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.237706] Call Trace:
[   16.237721]  <TASK>
[   16.237737]  dump_stack_lvl+0x73/0xb0
[   16.237868]  print_report+0xd1/0x610
[   16.237894]  ? __virt_addr_valid+0x1db/0x2d0
[   16.237918]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.237941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.237967]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.237991]  kasan_report+0x141/0x180
[   16.238014]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.238044]  __asan_report_store8_noabort+0x1b/0x30
[   16.238097]  kasan_atomics_helper+0x50d4/0x5450
[   16.238135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.238160]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.238188]  ? kasan_atomics+0x152/0x310
[   16.238216]  kasan_atomics+0x1dc/0x310
[   16.238240]  ? __pfx_kasan_atomics+0x10/0x10
[   16.238266]  ? __pfx_read_tsc+0x10/0x10
[   16.238289]  ? ktime_get_ts64+0x86/0x230
[   16.238314]  kunit_try_run_case+0x1a5/0x480
[   16.238341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.238366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.238392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.238418]  ? __kthread_parkme+0x82/0x180
[   16.238440]  ? preempt_count_sub+0x50/0x80
[   16.238466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.238493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.238519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.238547]  kthread+0x337/0x6f0
[   16.238567]  ? trace_preempt_on+0x20/0xc0
[   16.238592]  ? __pfx_kthread+0x10/0x10
[   16.238614]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.238638]  ? calculate_sigpending+0x7b/0xa0
[   16.238664]  ? __pfx_kthread+0x10/0x10
[   16.238687]  ret_from_fork+0x116/0x1d0
[   16.238711]  ? __pfx_kthread+0x10/0x10
[   16.238734]  ret_from_fork_asm+0x1a/0x30
[   16.238765]  </TASK>
[   16.238777] 
[   16.249624] Allocated by task 284:
[   16.249775]  kasan_save_stack+0x45/0x70
[   16.249990]  kasan_save_track+0x18/0x40
[   16.250408]  kasan_save_alloc_info+0x3b/0x50
[   16.250591]  __kasan_kmalloc+0xb7/0xc0
[   16.250904]  __kmalloc_cache_noprof+0x189/0x420
[   16.251238]  kasan_atomics+0x95/0x310
[   16.251517]  kunit_try_run_case+0x1a5/0x480
[   16.251867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.252133]  kthread+0x337/0x6f0
[   16.252433]  ret_from_fork+0x116/0x1d0
[   16.252621]  ret_from_fork_asm+0x1a/0x30
[   16.252828] 
[   16.252914] The buggy address belongs to the object at ffff8881025adf00
[   16.252914]  which belongs to the cache kmalloc-64 of size 64
[   16.253635] The buggy address is located 0 bytes to the right of
[   16.253635]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.254463] 
[   16.254579] The buggy address belongs to the physical page:
[   16.254945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.255397] flags: 0x200000000000000(node=0|zone=2)
[   16.255723] page_type: f5(slab)
[   16.255855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.256412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.256827] page dumped because: kasan: bad access detected
[   16.257138] 
[   16.257244] Memory state around the buggy address:
[   16.257444]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.257772]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.258359] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.258748]                                      ^
[   16.259065]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.259543]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.259892] ==================================================================
[   15.807751] ==================================================================
[   15.808411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.808760] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.809075] 
[   15.809215] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.809269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.809281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.809313] Call Trace:
[   15.809329]  <TASK>
[   15.809343]  dump_stack_lvl+0x73/0xb0
[   15.809373]  print_report+0xd1/0x610
[   15.809407]  ? __virt_addr_valid+0x1db/0x2d0
[   15.809431]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.809454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.809491]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.809515]  kasan_report+0x141/0x180
[   15.809538]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.809574]  kasan_check_range+0x10c/0x1c0
[   15.809600]  __kasan_check_write+0x18/0x20
[   15.809620]  kasan_atomics_helper+0xb6a/0x5450
[   15.809655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.809680]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.809707]  ? kasan_atomics+0x152/0x310
[   15.809744]  kasan_atomics+0x1dc/0x310
[   15.809768]  ? __pfx_kasan_atomics+0x10/0x10
[   15.809804]  ? __pfx_read_tsc+0x10/0x10
[   15.809828]  ? ktime_get_ts64+0x86/0x230
[   15.809853]  kunit_try_run_case+0x1a5/0x480
[   15.809888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.809912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.809937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.809974]  ? __kthread_parkme+0x82/0x180
[   15.809996]  ? preempt_count_sub+0x50/0x80
[   15.810021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.810070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.810095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.810141]  kthread+0x337/0x6f0
[   15.810162]  ? trace_preempt_on+0x20/0xc0
[   15.810187]  ? __pfx_kthread+0x10/0x10
[   15.810209]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.810233]  ? calculate_sigpending+0x7b/0xa0
[   15.810258]  ? __pfx_kthread+0x10/0x10
[   15.810282]  ret_from_fork+0x116/0x1d0
[   15.810302]  ? __pfx_kthread+0x10/0x10
[   15.810324]  ret_from_fork_asm+0x1a/0x30
[   15.810366]  </TASK>
[   15.810376] 
[   15.817962] Allocated by task 284:
[   15.818129]  kasan_save_stack+0x45/0x70
[   15.818332]  kasan_save_track+0x18/0x40
[   15.818493]  kasan_save_alloc_info+0x3b/0x50
[   15.818691]  __kasan_kmalloc+0xb7/0xc0
[   15.818883]  __kmalloc_cache_noprof+0x189/0x420
[   15.819141]  kasan_atomics+0x95/0x310
[   15.819349]  kunit_try_run_case+0x1a5/0x480
[   15.819556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.819801]  kthread+0x337/0x6f0
[   15.819962]  ret_from_fork+0x116/0x1d0
[   15.820189]  ret_from_fork_asm+0x1a/0x30
[   15.820375] 
[   15.820487] The buggy address belongs to the object at ffff8881025adf00
[   15.820487]  which belongs to the cache kmalloc-64 of size 64
[   15.820952] The buggy address is located 0 bytes to the right of
[   15.820952]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.821411] 
[   15.821485] The buggy address belongs to the physical page:
[   15.821664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.821966] flags: 0x200000000000000(node=0|zone=2)
[   15.822245] page_type: f5(slab)
[   15.822417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.822762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.823151] page dumped because: kasan: bad access detected
[   15.823443] 
[   15.823538] Memory state around the buggy address:
[   15.823699]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.823916]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.824169] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.824408]                                      ^
[   15.824663]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.825011]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.825380] ==================================================================
[   16.575789] ==================================================================
[   16.576146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.576466] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.576769] 
[   16.576886] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.576931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.576943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.576966] Call Trace:
[   16.576982]  <TASK>
[   16.576997]  dump_stack_lvl+0x73/0xb0
[   16.577027]  print_report+0xd1/0x610
[   16.577062]  ? __virt_addr_valid+0x1db/0x2d0
[   16.577087]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.577110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.577145]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.577169]  kasan_report+0x141/0x180
[   16.577192]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.577222]  kasan_check_range+0x10c/0x1c0
[   16.577248]  __kasan_check_write+0x18/0x20
[   16.577269]  kasan_atomics_helper+0x1d7a/0x5450
[   16.577294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.577319]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.577347]  ? kasan_atomics+0x152/0x310
[   16.577376]  kasan_atomics+0x1dc/0x310
[   16.577400]  ? __pfx_kasan_atomics+0x10/0x10
[   16.577427]  ? __pfx_read_tsc+0x10/0x10
[   16.577449]  ? ktime_get_ts64+0x86/0x230
[   16.577475]  kunit_try_run_case+0x1a5/0x480
[   16.577502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.577528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.577554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.577581]  ? __kthread_parkme+0x82/0x180
[   16.577603]  ? preempt_count_sub+0x50/0x80
[   16.577628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.577654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.577680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.577708]  kthread+0x337/0x6f0
[   16.577728]  ? trace_preempt_on+0x20/0xc0
[   16.577752]  ? __pfx_kthread+0x10/0x10
[   16.577775]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.577799]  ? calculate_sigpending+0x7b/0xa0
[   16.577824]  ? __pfx_kthread+0x10/0x10
[   16.577847]  ret_from_fork+0x116/0x1d0
[   16.577867]  ? __pfx_kthread+0x10/0x10
[   16.577889]  ret_from_fork_asm+0x1a/0x30
[   16.577921]  </TASK>
[   16.577932] 
[   16.585482] Allocated by task 284:
[   16.585685]  kasan_save_stack+0x45/0x70
[   16.585856]  kasan_save_track+0x18/0x40
[   16.585995]  kasan_save_alloc_info+0x3b/0x50
[   16.586160]  __kasan_kmalloc+0xb7/0xc0
[   16.586296]  __kmalloc_cache_noprof+0x189/0x420
[   16.586506]  kasan_atomics+0x95/0x310
[   16.586698]  kunit_try_run_case+0x1a5/0x480
[   16.586916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.587187]  kthread+0x337/0x6f0
[   16.587386]  ret_from_fork+0x116/0x1d0
[   16.587784]  ret_from_fork_asm+0x1a/0x30
[   16.587934] 
[   16.588007] The buggy address belongs to the object at ffff8881025adf00
[   16.588007]  which belongs to the cache kmalloc-64 of size 64
[   16.588713] The buggy address is located 0 bytes to the right of
[   16.588713]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.589290] 
[   16.589387] The buggy address belongs to the physical page:
[   16.589586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.589875] flags: 0x200000000000000(node=0|zone=2)
[   16.590107] page_type: f5(slab)
[   16.590343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.590656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.590958] page dumped because: kasan: bad access detected
[   16.591238] 
[   16.591312] Memory state around the buggy address:
[   16.591471]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.591688]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.591917] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.592240]                                      ^
[   16.592466]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592793]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.593077] ==================================================================
[   16.593704] ==================================================================
[   16.594157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.594463] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.594756] 
[   16.594888] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.594931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.594944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.594965] Call Trace:
[   16.594979]  <TASK>
[   16.594994]  dump_stack_lvl+0x73/0xb0
[   16.595022]  print_report+0xd1/0x610
[   16.595046]  ? __virt_addr_valid+0x1db/0x2d0
[   16.595081]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.595104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.595129]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.595153]  kasan_report+0x141/0x180
[   16.595177]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.595205]  kasan_check_range+0x10c/0x1c0
[   16.595231]  __kasan_check_write+0x18/0x20
[   16.595254]  kasan_atomics_helper+0x1e12/0x5450
[   16.595279]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.595304]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.595331]  ? kasan_atomics+0x152/0x310
[   16.595360]  kasan_atomics+0x1dc/0x310
[   16.595384]  ? __pfx_kasan_atomics+0x10/0x10
[   16.595410]  ? __pfx_read_tsc+0x10/0x10
[   16.595434]  ? ktime_get_ts64+0x86/0x230
[   16.595461]  kunit_try_run_case+0x1a5/0x480
[   16.595499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.595525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.595553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.595580]  ? __kthread_parkme+0x82/0x180
[   16.595602]  ? preempt_count_sub+0x50/0x80
[   16.595628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.595654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.595681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.595708]  kthread+0x337/0x6f0
[   16.595729]  ? trace_preempt_on+0x20/0xc0
[   16.595754]  ? __pfx_kthread+0x10/0x10
[   16.595776]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.595800]  ? calculate_sigpending+0x7b/0xa0
[   16.595827]  ? __pfx_kthread+0x10/0x10
[   16.595852]  ret_from_fork+0x116/0x1d0
[   16.595874]  ? __pfx_kthread+0x10/0x10
[   16.595896]  ret_from_fork_asm+0x1a/0x30
[   16.595928]  </TASK>
[   16.595939] 
[   16.605827] Allocated by task 284:
[   16.606297]  kasan_save_stack+0x45/0x70
[   16.606779]  kasan_save_track+0x18/0x40
[   16.606932]  kasan_save_alloc_info+0x3b/0x50
[   16.607101]  __kasan_kmalloc+0xb7/0xc0
[   16.607561]  __kmalloc_cache_noprof+0x189/0x420
[   16.608017]  kasan_atomics+0x95/0x310
[   16.608454]  kunit_try_run_case+0x1a5/0x480
[   16.608876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.609069]  kthread+0x337/0x6f0
[   16.609449]  ret_from_fork+0x116/0x1d0
[   16.609846]  ret_from_fork_asm+0x1a/0x30
[   16.610279] 
[   16.610499] The buggy address belongs to the object at ffff8881025adf00
[   16.610499]  which belongs to the cache kmalloc-64 of size 64
[   16.610885] The buggy address is located 0 bytes to the right of
[   16.610885]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.611691] 
[   16.611895] The buggy address belongs to the physical page:
[   16.612432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.613172] flags: 0x200000000000000(node=0|zone=2)
[   16.613636] page_type: f5(slab)
[   16.613963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.614476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.614957] page dumped because: kasan: bad access detected
[   16.615252] 
[   16.615453] Memory state around the buggy address:
[   16.615916]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.616494]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.616721] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.616936]                                      ^
[   16.617171]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.617807]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.618188] ==================================================================
[   16.750918] ==================================================================
[   16.751367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.752003] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.752732] 
[   16.752934] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.753079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.753096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.753118] Call Trace:
[   16.753147]  <TASK>
[   16.753165]  dump_stack_lvl+0x73/0xb0
[   16.753197]  print_report+0xd1/0x610
[   16.753220]  ? __virt_addr_valid+0x1db/0x2d0
[   16.753246]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.753269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.753295]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.753319]  kasan_report+0x141/0x180
[   16.753342]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.753370]  __asan_report_load8_noabort+0x18/0x20
[   16.753397]  kasan_atomics_helper+0x4fb2/0x5450
[   16.753422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.753447]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.753474]  ? kasan_atomics+0x152/0x310
[   16.753503]  kasan_atomics+0x1dc/0x310
[   16.753527]  ? __pfx_kasan_atomics+0x10/0x10
[   16.753553]  ? __pfx_read_tsc+0x10/0x10
[   16.753575]  ? ktime_get_ts64+0x86/0x230
[   16.753602]  kunit_try_run_case+0x1a5/0x480
[   16.753629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.753654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.753680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.753706]  ? __kthread_parkme+0x82/0x180
[   16.753729]  ? preempt_count_sub+0x50/0x80
[   16.753755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.753782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.753808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.753836]  kthread+0x337/0x6f0
[   16.753857]  ? trace_preempt_on+0x20/0xc0
[   16.753883]  ? __pfx_kthread+0x10/0x10
[   16.753905]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.753928]  ? calculate_sigpending+0x7b/0xa0
[   16.753955]  ? __pfx_kthread+0x10/0x10
[   16.753978]  ret_from_fork+0x116/0x1d0
[   16.753998]  ? __pfx_kthread+0x10/0x10
[   16.754020]  ret_from_fork_asm+0x1a/0x30
[   16.754063]  </TASK>
[   16.754075] 
[   16.764372] Allocated by task 284:
[   16.764590]  kasan_save_stack+0x45/0x70
[   16.764795]  kasan_save_track+0x18/0x40
[   16.764972]  kasan_save_alloc_info+0x3b/0x50
[   16.765416]  __kasan_kmalloc+0xb7/0xc0
[   16.765680]  __kmalloc_cache_noprof+0x189/0x420
[   16.765958]  kasan_atomics+0x95/0x310
[   16.766165]  kunit_try_run_case+0x1a5/0x480
[   16.766513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.766842]  kthread+0x337/0x6f0
[   16.767026]  ret_from_fork+0x116/0x1d0
[   16.767338]  ret_from_fork_asm+0x1a/0x30
[   16.767619] 
[   16.767704] The buggy address belongs to the object at ffff8881025adf00
[   16.767704]  which belongs to the cache kmalloc-64 of size 64
[   16.768453] The buggy address is located 0 bytes to the right of
[   16.768453]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.769215] 
[   16.769323] The buggy address belongs to the physical page:
[   16.769645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.770063] flags: 0x200000000000000(node=0|zone=2)
[   16.770461] page_type: f5(slab)
[   16.770648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.770962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.771516] page dumped because: kasan: bad access detected
[   16.771863] 
[   16.771941] Memory state around the buggy address:
[   16.772400]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.772795]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.773222] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.773523]                                      ^
[   16.773883]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.774362]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.774749] ==================================================================
[   16.372318] ==================================================================
[   16.373024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.373691] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.374376] 
[   16.374620] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.374668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.374681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.374708] Call Trace:
[   16.374726]  <TASK>
[   16.374743]  dump_stack_lvl+0x73/0xb0
[   16.374775]  print_report+0xd1/0x610
[   16.374799]  ? __virt_addr_valid+0x1db/0x2d0
[   16.374822]  ? kasan_atomics_helper+0x1818/0x5450
[   16.374869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.374895]  ? kasan_atomics_helper+0x1818/0x5450
[   16.374919]  kasan_report+0x141/0x180
[   16.374943]  ? kasan_atomics_helper+0x1818/0x5450
[   16.374971]  kasan_check_range+0x10c/0x1c0
[   16.374996]  __kasan_check_write+0x18/0x20
[   16.375017]  kasan_atomics_helper+0x1818/0x5450
[   16.375043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.375078]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.375106]  ? kasan_atomics+0x152/0x310
[   16.375144]  kasan_atomics+0x1dc/0x310
[   16.375168]  ? __pfx_kasan_atomics+0x10/0x10
[   16.375195]  ? __pfx_read_tsc+0x10/0x10
[   16.375219]  ? ktime_get_ts64+0x86/0x230
[   16.375245]  kunit_try_run_case+0x1a5/0x480
[   16.375271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.375323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.375349]  ? __kthread_parkme+0x82/0x180
[   16.375371]  ? preempt_count_sub+0x50/0x80
[   16.375397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.375477]  kthread+0x337/0x6f0
[   16.375498]  ? trace_preempt_on+0x20/0xc0
[   16.375523]  ? __pfx_kthread+0x10/0x10
[   16.375545]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.375569]  ? calculate_sigpending+0x7b/0xa0
[   16.375595]  ? __pfx_kthread+0x10/0x10
[   16.375618]  ret_from_fork+0x116/0x1d0
[   16.375638]  ? __pfx_kthread+0x10/0x10
[   16.375660]  ret_from_fork_asm+0x1a/0x30
[   16.375693]  </TASK>
[   16.375704] 
[   16.386121] Allocated by task 284:
[   16.386412]  kasan_save_stack+0x45/0x70
[   16.386699]  kasan_save_track+0x18/0x40
[   16.386888]  kasan_save_alloc_info+0x3b/0x50
[   16.387194]  __kasan_kmalloc+0xb7/0xc0
[   16.387477]  __kmalloc_cache_noprof+0x189/0x420
[   16.387659]  kasan_atomics+0x95/0x310
[   16.387852]  kunit_try_run_case+0x1a5/0x480
[   16.388072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.388590]  kthread+0x337/0x6f0
[   16.388828]  ret_from_fork+0x116/0x1d0
[   16.389108]  ret_from_fork_asm+0x1a/0x30
[   16.389425] 
[   16.389506] The buggy address belongs to the object at ffff8881025adf00
[   16.389506]  which belongs to the cache kmalloc-64 of size 64
[   16.390293] The buggy address is located 0 bytes to the right of
[   16.390293]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.390962] 
[   16.391064] The buggy address belongs to the physical page:
[   16.391503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.391870] flags: 0x200000000000000(node=0|zone=2)
[   16.392061] page_type: f5(slab)
[   16.392540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.392841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.393288] page dumped because: kasan: bad access detected
[   16.393635] 
[   16.393740] Memory state around the buggy address:
[   16.394093]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.394593]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.395014] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.395459]                                      ^
[   16.395753]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.396132]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.396507] ==================================================================
[   16.306200] ==================================================================
[   16.306472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.307174] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.307496] 
[   16.307605] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.307648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.307661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.307682] Call Trace:
[   16.307697]  <TASK>
[   16.307712]  dump_stack_lvl+0x73/0xb0
[   16.307742]  print_report+0xd1/0x610
[   16.307767]  ? __virt_addr_valid+0x1db/0x2d0
[   16.307790]  ? kasan_atomics_helper+0x164f/0x5450
[   16.307813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.307839]  ? kasan_atomics_helper+0x164f/0x5450
[   16.307864]  kasan_report+0x141/0x180
[   16.307887]  ? kasan_atomics_helper+0x164f/0x5450
[   16.307917]  kasan_check_range+0x10c/0x1c0
[   16.307943]  __kasan_check_write+0x18/0x20
[   16.307965]  kasan_atomics_helper+0x164f/0x5450
[   16.307989]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.308013]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.308042]  ? kasan_atomics+0x152/0x310
[   16.308084]  kasan_atomics+0x1dc/0x310
[   16.308108]  ? __pfx_kasan_atomics+0x10/0x10
[   16.308332]  ? __pfx_read_tsc+0x10/0x10
[   16.308356]  ? ktime_get_ts64+0x86/0x230
[   16.308383]  kunit_try_run_case+0x1a5/0x480
[   16.308409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.308435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.308462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.308488]  ? __kthread_parkme+0x82/0x180
[   16.308510]  ? preempt_count_sub+0x50/0x80
[   16.308536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.308562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.308589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.308617]  kthread+0x337/0x6f0
[   16.308638]  ? trace_preempt_on+0x20/0xc0
[   16.308663]  ? __pfx_kthread+0x10/0x10
[   16.308685]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.308709]  ? calculate_sigpending+0x7b/0xa0
[   16.308735]  ? __pfx_kthread+0x10/0x10
[   16.308758]  ret_from_fork+0x116/0x1d0
[   16.308779]  ? __pfx_kthread+0x10/0x10
[   16.308801]  ret_from_fork_asm+0x1a/0x30
[   16.308833]  </TASK>
[   16.308844] 
[   16.318736] Allocated by task 284:
[   16.319042]  kasan_save_stack+0x45/0x70
[   16.319332]  kasan_save_track+0x18/0x40
[   16.319604]  kasan_save_alloc_info+0x3b/0x50
[   16.319881]  __kasan_kmalloc+0xb7/0xc0
[   16.320141]  __kmalloc_cache_noprof+0x189/0x420
[   16.320357]  kasan_atomics+0x95/0x310
[   16.320652]  kunit_try_run_case+0x1a5/0x480
[   16.320906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.321231]  kthread+0x337/0x6f0
[   16.321464]  ret_from_fork+0x116/0x1d0
[   16.321639]  ret_from_fork_asm+0x1a/0x30
[   16.321829] 
[   16.321914] The buggy address belongs to the object at ffff8881025adf00
[   16.321914]  which belongs to the cache kmalloc-64 of size 64
[   16.322669] The buggy address is located 0 bytes to the right of
[   16.322669]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.323281] 
[   16.323541] The buggy address belongs to the physical page:
[   16.323781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.324183] flags: 0x200000000000000(node=0|zone=2)
[   16.324496] page_type: f5(slab)
[   16.324629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.325072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.325463] page dumped because: kasan: bad access detected
[   16.325654] 
[   16.325875] Memory state around the buggy address:
[   16.326049]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.326566]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.326954] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.327377]                                      ^
[   16.327607]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.327913]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.328420] ==================================================================
[   15.880092] ==================================================================
[   15.880729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.881181] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.881472] 
[   15.881562] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.881605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.881618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.881640] Call Trace:
[   15.881654]  <TASK>
[   15.881668]  dump_stack_lvl+0x73/0xb0
[   15.881698]  print_report+0xd1/0x610
[   15.881722]  ? __virt_addr_valid+0x1db/0x2d0
[   15.881745]  ? kasan_atomics_helper+0xde0/0x5450
[   15.881768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.881793]  ? kasan_atomics_helper+0xde0/0x5450
[   15.881817]  kasan_report+0x141/0x180
[   15.881840]  ? kasan_atomics_helper+0xde0/0x5450
[   15.881868]  kasan_check_range+0x10c/0x1c0
[   15.881893]  __kasan_check_write+0x18/0x20
[   15.881915]  kasan_atomics_helper+0xde0/0x5450
[   15.881940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.882001]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.882028]  ? kasan_atomics+0x152/0x310
[   15.882077]  kasan_atomics+0x1dc/0x310
[   15.882148]  ? __pfx_kasan_atomics+0x10/0x10
[   15.882177]  ? __pfx_read_tsc+0x10/0x10
[   15.882200]  ? ktime_get_ts64+0x86/0x230
[   15.882238]  kunit_try_run_case+0x1a5/0x480
[   15.882265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.882316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.882342]  ? __kthread_parkme+0x82/0x180
[   15.882365]  ? preempt_count_sub+0x50/0x80
[   15.882418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.882495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.882522]  kthread+0x337/0x6f0
[   15.882545]  ? trace_preempt_on+0x20/0xc0
[   15.882569]  ? __pfx_kthread+0x10/0x10
[   15.882591]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.882615]  ? calculate_sigpending+0x7b/0xa0
[   15.882642]  ? __pfx_kthread+0x10/0x10
[   15.882665]  ret_from_fork+0x116/0x1d0
[   15.882685]  ? __pfx_kthread+0x10/0x10
[   15.882712]  ret_from_fork_asm+0x1a/0x30
[   15.882774]  </TASK>
[   15.882785] 
[   15.891277] Allocated by task 284:
[   15.891449]  kasan_save_stack+0x45/0x70
[   15.891653]  kasan_save_track+0x18/0x40
[   15.891897]  kasan_save_alloc_info+0x3b/0x50
[   15.892195]  __kasan_kmalloc+0xb7/0xc0
[   15.892379]  __kmalloc_cache_noprof+0x189/0x420
[   15.892539]  kasan_atomics+0x95/0x310
[   15.892730]  kunit_try_run_case+0x1a5/0x480
[   15.892941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.893245]  kthread+0x337/0x6f0
[   15.893403]  ret_from_fork+0x116/0x1d0
[   15.893613]  ret_from_fork_asm+0x1a/0x30
[   15.893801] 
[   15.893875] The buggy address belongs to the object at ffff8881025adf00
[   15.893875]  which belongs to the cache kmalloc-64 of size 64
[   15.894308] The buggy address is located 0 bytes to the right of
[   15.894308]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.894917] 
[   15.895015] The buggy address belongs to the physical page:
[   15.895255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.895612] flags: 0x200000000000000(node=0|zone=2)
[   15.895805] page_type: f5(slab)
[   15.895969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.896341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.896573] page dumped because: kasan: bad access detected
[   15.896747] 
[   15.896818] Memory state around the buggy address:
[   15.896975]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.897620]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.898297] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.898934]                                      ^
[   15.899418]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.900072]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.900725] ==================================================================
[   15.679114] ==================================================================
[   15.679429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.679760] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.680100] 
[   15.680197] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.680239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.680251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.680272] Call Trace:
[   15.680287]  <TASK>
[   15.680313]  dump_stack_lvl+0x73/0xb0
[   15.680342]  print_report+0xd1/0x610
[   15.680377]  ? __virt_addr_valid+0x1db/0x2d0
[   15.680401]  ? kasan_atomics_helper+0x860/0x5450
[   15.680424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.680449]  ? kasan_atomics_helper+0x860/0x5450
[   15.680472]  kasan_report+0x141/0x180
[   15.680496]  ? kasan_atomics_helper+0x860/0x5450
[   15.680525]  kasan_check_range+0x10c/0x1c0
[   15.680561]  __kasan_check_write+0x18/0x20
[   15.680582]  kasan_atomics_helper+0x860/0x5450
[   15.680607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.680644]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.680677]  ? kasan_atomics+0x152/0x310
[   15.680716]  kasan_atomics+0x1dc/0x310
[   15.680741]  ? __pfx_kasan_atomics+0x10/0x10
[   15.680767]  ? __pfx_read_tsc+0x10/0x10
[   15.680790]  ? ktime_get_ts64+0x86/0x230
[   15.680816]  kunit_try_run_case+0x1a5/0x480
[   15.680842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.680867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.680892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.680928]  ? __kthread_parkme+0x82/0x180
[   15.680949]  ? preempt_count_sub+0x50/0x80
[   15.680975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.681011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.681039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.681076]  kthread+0x337/0x6f0
[   15.681097]  ? trace_preempt_on+0x20/0xc0
[   15.681122]  ? __pfx_kthread+0x10/0x10
[   15.681144]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.681178]  ? calculate_sigpending+0x7b/0xa0
[   15.681204]  ? __pfx_kthread+0x10/0x10
[   15.681227]  ret_from_fork+0x116/0x1d0
[   15.681248]  ? __pfx_kthread+0x10/0x10
[   15.681280]  ret_from_fork_asm+0x1a/0x30
[   15.681313]  </TASK>
[   15.681325] 
[   15.697449] Allocated by task 284:
[   15.697662]  kasan_save_stack+0x45/0x70
[   15.697909]  kasan_save_track+0x18/0x40
[   15.698116]  kasan_save_alloc_info+0x3b/0x50
[   15.698393]  __kasan_kmalloc+0xb7/0xc0
[   15.698538]  __kmalloc_cache_noprof+0x189/0x420
[   15.698909]  kasan_atomics+0x95/0x310
[   15.699133]  kunit_try_run_case+0x1a5/0x480
[   15.699395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.699631]  kthread+0x337/0x6f0
[   15.699966]  ret_from_fork+0x116/0x1d0
[   15.700215]  ret_from_fork_asm+0x1a/0x30
[   15.700365] 
[   15.700439] The buggy address belongs to the object at ffff8881025adf00
[   15.700439]  which belongs to the cache kmalloc-64 of size 64
[   15.701219] The buggy address is located 0 bytes to the right of
[   15.701219]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.701853] 
[   15.701930] The buggy address belongs to the physical page:
[   15.702346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.702743] flags: 0x200000000000000(node=0|zone=2)
[   15.702999] page_type: f5(slab)
[   15.703216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.703546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.704066] page dumped because: kasan: bad access detected
[   15.704251] 
[   15.704345] Memory state around the buggy address:
[   15.704615]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705092]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705586] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.705944]                                      ^
[   15.706230]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.706500]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.706975] ==================================================================
[   16.260653] ==================================================================
[   16.261292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.261728] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.262294] 
[   16.262407] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.262453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.262465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.262488] Call Trace:
[   16.262505]  <TASK>
[   16.262522]  dump_stack_lvl+0x73/0xb0
[   16.262552]  print_report+0xd1/0x610
[   16.262576]  ? __virt_addr_valid+0x1db/0x2d0
[   16.262599]  ? kasan_atomics_helper+0x151d/0x5450
[   16.262623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.262648]  ? kasan_atomics_helper+0x151d/0x5450
[   16.262672]  kasan_report+0x141/0x180
[   16.262695]  ? kasan_atomics_helper+0x151d/0x5450
[   16.262728]  kasan_check_range+0x10c/0x1c0
[   16.262754]  __kasan_check_write+0x18/0x20
[   16.262775]  kasan_atomics_helper+0x151d/0x5450
[   16.262800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.262825]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.262851]  ? kasan_atomics+0x152/0x310
[   16.262880]  kasan_atomics+0x1dc/0x310
[   16.262904]  ? __pfx_kasan_atomics+0x10/0x10
[   16.262930]  ? __pfx_read_tsc+0x10/0x10
[   16.262953]  ? ktime_get_ts64+0x86/0x230
[   16.262978]  kunit_try_run_case+0x1a5/0x480
[   16.263004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.263066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.263213]  ? __kthread_parkme+0x82/0x180
[   16.263237]  ? preempt_count_sub+0x50/0x80
[   16.263263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.263317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.263344]  kthread+0x337/0x6f0
[   16.263365]  ? trace_preempt_on+0x20/0xc0
[   16.263390]  ? __pfx_kthread+0x10/0x10
[   16.263413]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.263437]  ? calculate_sigpending+0x7b/0xa0
[   16.263464]  ? __pfx_kthread+0x10/0x10
[   16.263487]  ret_from_fork+0x116/0x1d0
[   16.263508]  ? __pfx_kthread+0x10/0x10
[   16.263530]  ret_from_fork_asm+0x1a/0x30
[   16.263562]  </TASK>
[   16.263574] 
[   16.273305] Allocated by task 284:
[   16.273638]  kasan_save_stack+0x45/0x70
[   16.273909]  kasan_save_track+0x18/0x40
[   16.274181]  kasan_save_alloc_info+0x3b/0x50
[   16.274462]  __kasan_kmalloc+0xb7/0xc0
[   16.274618]  __kmalloc_cache_noprof+0x189/0x420
[   16.274956]  kasan_atomics+0x95/0x310
[   16.275122]  kunit_try_run_case+0x1a5/0x480
[   16.275348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.275590]  kthread+0x337/0x6f0
[   16.275753]  ret_from_fork+0x116/0x1d0
[   16.275921]  ret_from_fork_asm+0x1a/0x30
[   16.276116] 
[   16.276526] The buggy address belongs to the object at ffff8881025adf00
[   16.276526]  which belongs to the cache kmalloc-64 of size 64
[   16.277143] The buggy address is located 0 bytes to the right of
[   16.277143]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.277688] 
[   16.277941] The buggy address belongs to the physical page:
[   16.278302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.278691] flags: 0x200000000000000(node=0|zone=2)
[   16.278986] page_type: f5(slab)
[   16.279128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.279633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.280066] page dumped because: kasan: bad access detected
[   16.280450] 
[   16.280529] Memory state around the buggy address:
[   16.280761]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.281069]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.281584] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.281933]                                      ^
[   16.282236]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282623]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.282932] ==================================================================
[   16.088390] ==================================================================
[   16.088940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.089508] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.090004] 
[   16.090139] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.090185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.090336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.090360] Call Trace:
[   16.090376]  <TASK>
[   16.090392]  dump_stack_lvl+0x73/0xb0
[   16.090424]  print_report+0xd1/0x610
[   16.090448]  ? __virt_addr_valid+0x1db/0x2d0
[   16.090472]  ? kasan_atomics_helper+0x1217/0x5450
[   16.090496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.090522]  ? kasan_atomics_helper+0x1217/0x5450
[   16.090546]  kasan_report+0x141/0x180
[   16.090570]  ? kasan_atomics_helper+0x1217/0x5450
[   16.090598]  kasan_check_range+0x10c/0x1c0
[   16.090624]  __kasan_check_write+0x18/0x20
[   16.090646]  kasan_atomics_helper+0x1217/0x5450
[   16.090671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.090695]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.090728]  ? kasan_atomics+0x152/0x310
[   16.090757]  kasan_atomics+0x1dc/0x310
[   16.090782]  ? __pfx_kasan_atomics+0x10/0x10
[   16.090809]  ? __pfx_read_tsc+0x10/0x10
[   16.090832]  ? ktime_get_ts64+0x86/0x230
[   16.090859]  kunit_try_run_case+0x1a5/0x480
[   16.090884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.090909]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.090934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.090960]  ? __kthread_parkme+0x82/0x180
[   16.090983]  ? preempt_count_sub+0x50/0x80
[   16.091008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.091034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.091073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.091101]  kthread+0x337/0x6f0
[   16.091130]  ? trace_preempt_on+0x20/0xc0
[   16.091156]  ? __pfx_kthread+0x10/0x10
[   16.091178]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.091201]  ? calculate_sigpending+0x7b/0xa0
[   16.091227]  ? __pfx_kthread+0x10/0x10
[   16.091250]  ret_from_fork+0x116/0x1d0
[   16.091271]  ? __pfx_kthread+0x10/0x10
[   16.091293]  ret_from_fork_asm+0x1a/0x30
[   16.091325]  </TASK>
[   16.091337] 
[   16.101643] Allocated by task 284:
[   16.101814]  kasan_save_stack+0x45/0x70
[   16.102085]  kasan_save_track+0x18/0x40
[   16.102399]  kasan_save_alloc_info+0x3b/0x50
[   16.102726]  __kasan_kmalloc+0xb7/0xc0
[   16.102905]  __kmalloc_cache_noprof+0x189/0x420
[   16.103279]  kasan_atomics+0x95/0x310
[   16.103558]  kunit_try_run_case+0x1a5/0x480
[   16.103725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.104072]  kthread+0x337/0x6f0
[   16.104403]  ret_from_fork+0x116/0x1d0
[   16.104644]  ret_from_fork_asm+0x1a/0x30
[   16.104824] 
[   16.104924] The buggy address belongs to the object at ffff8881025adf00
[   16.104924]  which belongs to the cache kmalloc-64 of size 64
[   16.105696] The buggy address is located 0 bytes to the right of
[   16.105696]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.106423] 
[   16.106504] The buggy address belongs to the physical page:
[   16.106879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.107356] flags: 0x200000000000000(node=0|zone=2)
[   16.107733] page_type: f5(slab)
[   16.107879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.108321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.108734] page dumped because: kasan: bad access detected
[   16.109031] 
[   16.109142] Memory state around the buggy address:
[   16.109368]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.109685]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.109979] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.110665]                                      ^
[   16.110995]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.111523]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.111909] ==================================================================
[   16.618850] ==================================================================
[   16.619587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.620335] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.620990] 
[   16.621239] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.621286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.621299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.621320] Call Trace:
[   16.621336]  <TASK>
[   16.621352]  dump_stack_lvl+0x73/0xb0
[   16.621382]  print_report+0xd1/0x610
[   16.621440]  ? __virt_addr_valid+0x1db/0x2d0
[   16.621464]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.621499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.621525]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.621548]  kasan_report+0x141/0x180
[   16.621572]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.621600]  kasan_check_range+0x10c/0x1c0
[   16.621626]  __kasan_check_write+0x18/0x20
[   16.621646]  kasan_atomics_helper+0x1eaa/0x5450
[   16.621671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.621696]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.621723]  ? kasan_atomics+0x152/0x310
[   16.621751]  kasan_atomics+0x1dc/0x310
[   16.621776]  ? __pfx_kasan_atomics+0x10/0x10
[   16.621803]  ? __pfx_read_tsc+0x10/0x10
[   16.621826]  ? ktime_get_ts64+0x86/0x230
[   16.621852]  kunit_try_run_case+0x1a5/0x480
[   16.621878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.621903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.621930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.621956]  ? __kthread_parkme+0x82/0x180
[   16.621978]  ? preempt_count_sub+0x50/0x80
[   16.622003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.622067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.622095]  kthread+0x337/0x6f0
[   16.622135]  ? trace_preempt_on+0x20/0xc0
[   16.622162]  ? __pfx_kthread+0x10/0x10
[   16.622184]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.622207]  ? calculate_sigpending+0x7b/0xa0
[   16.622233]  ? __pfx_kthread+0x10/0x10
[   16.622256]  ret_from_fork+0x116/0x1d0
[   16.622276]  ? __pfx_kthread+0x10/0x10
[   16.622298]  ret_from_fork_asm+0x1a/0x30
[   16.622330]  </TASK>
[   16.622341] 
[   16.633806] Allocated by task 284:
[   16.633973]  kasan_save_stack+0x45/0x70
[   16.634247]  kasan_save_track+0x18/0x40
[   16.634447]  kasan_save_alloc_info+0x3b/0x50
[   16.634614]  __kasan_kmalloc+0xb7/0xc0
[   16.634757]  __kmalloc_cache_noprof+0x189/0x420
[   16.634917]  kasan_atomics+0x95/0x310
[   16.635096]  kunit_try_run_case+0x1a5/0x480
[   16.635432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.635694]  kthread+0x337/0x6f0
[   16.635868]  ret_from_fork+0x116/0x1d0
[   16.636145]  ret_from_fork_asm+0x1a/0x30
[   16.636410] 
[   16.636510] The buggy address belongs to the object at ffff8881025adf00
[   16.636510]  which belongs to the cache kmalloc-64 of size 64
[   16.637082] The buggy address is located 0 bytes to the right of
[   16.637082]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.637526] 
[   16.637625] The buggy address belongs to the physical page:
[   16.637955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.638368] flags: 0x200000000000000(node=0|zone=2)
[   16.638694] page_type: f5(slab)
[   16.638871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.639287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.639579] page dumped because: kasan: bad access detected
[   16.639815] 
[   16.639949] Memory state around the buggy address:
[   16.640316]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.640571]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.640905] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.641337]                                      ^
[   16.641540]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.641853]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.642200] ==================================================================
[   16.663092] ==================================================================
[   16.663409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.663942] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.664698] 
[   16.664934] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.664980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.664993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.665015] Call Trace:
[   16.665067]  <TASK>
[   16.665082]  dump_stack_lvl+0x73/0xb0
[   16.665138]  print_report+0xd1/0x610
[   16.665162]  ? __virt_addr_valid+0x1db/0x2d0
[   16.665186]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.665209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.665235]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.665258]  kasan_report+0x141/0x180
[   16.665282]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.665310]  __asan_report_load8_noabort+0x18/0x20
[   16.665336]  kasan_atomics_helper+0x4f71/0x5450
[   16.665363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.665387]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.665415]  ? kasan_atomics+0x152/0x310
[   16.665443]  kasan_atomics+0x1dc/0x310
[   16.665467]  ? __pfx_kasan_atomics+0x10/0x10
[   16.665494]  ? __pfx_read_tsc+0x10/0x10
[   16.665516]  ? ktime_get_ts64+0x86/0x230
[   16.665541]  kunit_try_run_case+0x1a5/0x480
[   16.665568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.665593]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.665619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.665645]  ? __kthread_parkme+0x82/0x180
[   16.665667]  ? preempt_count_sub+0x50/0x80
[   16.665693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.665720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.665746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.665774]  kthread+0x337/0x6f0
[   16.665795]  ? trace_preempt_on+0x20/0xc0
[   16.665820]  ? __pfx_kthread+0x10/0x10
[   16.665842]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.665865]  ? calculate_sigpending+0x7b/0xa0
[   16.665891]  ? __pfx_kthread+0x10/0x10
[   16.665914]  ret_from_fork+0x116/0x1d0
[   16.665935]  ? __pfx_kthread+0x10/0x10
[   16.665957]  ret_from_fork_asm+0x1a/0x30
[   16.665990]  </TASK>
[   16.666000] 
[   16.676159] Allocated by task 284:
[   16.676296]  kasan_save_stack+0x45/0x70
[   16.676465]  kasan_save_track+0x18/0x40
[   16.676712]  kasan_save_alloc_info+0x3b/0x50
[   16.676935]  __kasan_kmalloc+0xb7/0xc0
[   16.677222]  __kmalloc_cache_noprof+0x189/0x420
[   16.677527]  kasan_atomics+0x95/0x310
[   16.677721]  kunit_try_run_case+0x1a5/0x480
[   16.677953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.678170]  kthread+0x337/0x6f0
[   16.678323]  ret_from_fork+0x116/0x1d0
[   16.678553]  ret_from_fork_asm+0x1a/0x30
[   16.678777] 
[   16.678876] The buggy address belongs to the object at ffff8881025adf00
[   16.678876]  which belongs to the cache kmalloc-64 of size 64
[   16.679447] The buggy address is located 0 bytes to the right of
[   16.679447]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.679950] 
[   16.680030] The buggy address belongs to the physical page:
[   16.680315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.680674] flags: 0x200000000000000(node=0|zone=2)
[   16.681018] page_type: f5(slab)
[   16.681170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.681547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.681907] page dumped because: kasan: bad access detected
[   16.682201] 
[   16.682276] Memory state around the buggy address:
[   16.682502]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.682771]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.683151] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.683500]                                      ^
[   16.683703]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.684010]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.684373] ==================================================================
[   16.450344] ==================================================================
[   16.451138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.451487] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.451803] 
[   16.451930] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.451994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.452008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.452030] Call Trace:
[   16.452047]  <TASK>
[   16.452078]  dump_stack_lvl+0x73/0xb0
[   16.452108]  print_report+0xd1/0x610
[   16.452142]  ? __virt_addr_valid+0x1db/0x2d0
[   16.452166]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.452189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.452215]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.452248]  kasan_report+0x141/0x180
[   16.452272]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.452300]  kasan_check_range+0x10c/0x1c0
[   16.452338]  __kasan_check_write+0x18/0x20
[   16.452358]  kasan_atomics_helper+0x19e3/0x5450
[   16.452383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.452418]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.452444]  ? kasan_atomics+0x152/0x310
[   16.452473]  kasan_atomics+0x1dc/0x310
[   16.452497]  ? __pfx_kasan_atomics+0x10/0x10
[   16.452523]  ? __pfx_read_tsc+0x10/0x10
[   16.452546]  ? ktime_get_ts64+0x86/0x230
[   16.452572]  kunit_try_run_case+0x1a5/0x480
[   16.452607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.452632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.452670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.452695]  ? __kthread_parkme+0x82/0x180
[   16.452717]  ? preempt_count_sub+0x50/0x80
[   16.452753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.452780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.452807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.452834]  kthread+0x337/0x6f0
[   16.452855]  ? trace_preempt_on+0x20/0xc0
[   16.452880]  ? __pfx_kthread+0x10/0x10
[   16.452902]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.452926]  ? calculate_sigpending+0x7b/0xa0
[   16.452951]  ? __pfx_kthread+0x10/0x10
[   16.452974]  ret_from_fork+0x116/0x1d0
[   16.452994]  ? __pfx_kthread+0x10/0x10
[   16.453017]  ret_from_fork_asm+0x1a/0x30
[   16.453048]  </TASK>
[   16.453069] 
[   16.460707] Allocated by task 284:
[   16.460884]  kasan_save_stack+0x45/0x70
[   16.461096]  kasan_save_track+0x18/0x40
[   16.461459]  kasan_save_alloc_info+0x3b/0x50
[   16.461666]  __kasan_kmalloc+0xb7/0xc0
[   16.461802]  __kmalloc_cache_noprof+0x189/0x420
[   16.461967]  kasan_atomics+0x95/0x310
[   16.462231]  kunit_try_run_case+0x1a5/0x480
[   16.462462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.462725]  kthread+0x337/0x6f0
[   16.462889]  ret_from_fork+0x116/0x1d0
[   16.463129]  ret_from_fork_asm+0x1a/0x30
[   16.463304] 
[   16.463413] The buggy address belongs to the object at ffff8881025adf00
[   16.463413]  which belongs to the cache kmalloc-64 of size 64
[   16.463929] The buggy address is located 0 bytes to the right of
[   16.463929]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.464498] 
[   16.464593] The buggy address belongs to the physical page:
[   16.464796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.465043] flags: 0x200000000000000(node=0|zone=2)
[   16.465348] page_type: f5(slab)
[   16.465516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.465888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.466267] page dumped because: kasan: bad access detected
[   16.466457] 
[   16.466528] Memory state around the buggy address:
[   16.466716]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.467076]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.467463] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.467765]                                      ^
[   16.467973]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.468348]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.468662] ==================================================================
[   16.063908] ==================================================================
[   16.064459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   16.064934] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.065428] 
[   16.065543] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.065590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.065603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.065626] Call Trace:
[   16.065642]  <TASK>
[   16.065660]  dump_stack_lvl+0x73/0xb0
[   16.065692]  print_report+0xd1/0x610
[   16.065717]  ? __virt_addr_valid+0x1db/0x2d0
[   16.065742]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.065765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.065790]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.065814]  kasan_report+0x141/0x180
[   16.065838]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.065867]  __asan_report_load4_noabort+0x18/0x20
[   16.065895]  kasan_atomics_helper+0x4a02/0x5450
[   16.065919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.065945]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.065972]  ? kasan_atomics+0x152/0x310
[   16.066000]  kasan_atomics+0x1dc/0x310
[   16.066025]  ? __pfx_kasan_atomics+0x10/0x10
[   16.066063]  ? __pfx_read_tsc+0x10/0x10
[   16.066263]  ? ktime_get_ts64+0x86/0x230
[   16.066297]  kunit_try_run_case+0x1a5/0x480
[   16.066324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.066349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.066376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.066403]  ? __kthread_parkme+0x82/0x180
[   16.066425]  ? preempt_count_sub+0x50/0x80
[   16.066451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.066477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.066504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.066532]  kthread+0x337/0x6f0
[   16.066553]  ? trace_preempt_on+0x20/0xc0
[   16.066578]  ? __pfx_kthread+0x10/0x10
[   16.066600]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.066623]  ? calculate_sigpending+0x7b/0xa0
[   16.066649]  ? __pfx_kthread+0x10/0x10
[   16.066672]  ret_from_fork+0x116/0x1d0
[   16.066693]  ? __pfx_kthread+0x10/0x10
[   16.066721]  ret_from_fork_asm+0x1a/0x30
[   16.066754]  </TASK>
[   16.066766] 
[   16.076932] Allocated by task 284:
[   16.077107]  kasan_save_stack+0x45/0x70
[   16.077565]  kasan_save_track+0x18/0x40
[   16.077853]  kasan_save_alloc_info+0x3b/0x50
[   16.078045]  __kasan_kmalloc+0xb7/0xc0
[   16.078447]  __kmalloc_cache_noprof+0x189/0x420
[   16.078693]  kasan_atomics+0x95/0x310
[   16.078883]  kunit_try_run_case+0x1a5/0x480
[   16.079100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.079594]  kthread+0x337/0x6f0
[   16.079837]  ret_from_fork+0x116/0x1d0
[   16.080028]  ret_from_fork_asm+0x1a/0x30
[   16.080415] 
[   16.080530] The buggy address belongs to the object at ffff8881025adf00
[   16.080530]  which belongs to the cache kmalloc-64 of size 64
[   16.081319] The buggy address is located 0 bytes to the right of
[   16.081319]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.081903] 
[   16.082009] The buggy address belongs to the physical page:
[   16.082522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.082944] flags: 0x200000000000000(node=0|zone=2)
[   16.083339] page_type: f5(slab)
[   16.083591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.083966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.084480] page dumped because: kasan: bad access detected
[   16.084800] 
[   16.084878] Memory state around the buggy address:
[   16.085363]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.085677]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086000] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.086487]                                      ^
[   16.086803]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.087183]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.087606] ==================================================================
[   15.633519] ==================================================================
[   15.634197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.634900] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.635357] 
[   15.635603] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.635648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.635661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.635683] Call Trace:
[   15.635699]  <TASK>
[   15.635716]  dump_stack_lvl+0x73/0xb0
[   15.635746]  print_report+0xd1/0x610
[   15.635770]  ? __virt_addr_valid+0x1db/0x2d0
[   15.635795]  ? kasan_atomics_helper+0x72f/0x5450
[   15.635818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.635851]  ? kasan_atomics_helper+0x72f/0x5450
[   15.635876]  kasan_report+0x141/0x180
[   15.635899]  ? kasan_atomics_helper+0x72f/0x5450
[   15.635938]  kasan_check_range+0x10c/0x1c0
[   15.635964]  __kasan_check_write+0x18/0x20
[   15.635997]  kasan_atomics_helper+0x72f/0x5450
[   15.636022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.636047]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.636082]  ? kasan_atomics+0x152/0x310
[   15.636111]  kasan_atomics+0x1dc/0x310
[   15.636145]  ? __pfx_kasan_atomics+0x10/0x10
[   15.636171]  ? __pfx_read_tsc+0x10/0x10
[   15.636194]  ? ktime_get_ts64+0x86/0x230
[   15.636220]  kunit_try_run_case+0x1a5/0x480
[   15.636246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.636270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.636297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.636323]  ? __kthread_parkme+0x82/0x180
[   15.636344]  ? preempt_count_sub+0x50/0x80
[   15.636370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.636395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.636422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.636448]  kthread+0x337/0x6f0
[   15.636468]  ? trace_preempt_on+0x20/0xc0
[   15.636493]  ? __pfx_kthread+0x10/0x10
[   15.636515]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.636538]  ? calculate_sigpending+0x7b/0xa0
[   15.636565]  ? __pfx_kthread+0x10/0x10
[   15.636587]  ret_from_fork+0x116/0x1d0
[   15.636607]  ? __pfx_kthread+0x10/0x10
[   15.636630]  ret_from_fork_asm+0x1a/0x30
[   15.636679]  </TASK>
[   15.636690] 
[   15.650013] Allocated by task 284:
[   15.650358]  kasan_save_stack+0x45/0x70
[   15.650572]  kasan_save_track+0x18/0x40
[   15.650742]  kasan_save_alloc_info+0x3b/0x50
[   15.650951]  __kasan_kmalloc+0xb7/0xc0
[   15.651100]  __kmalloc_cache_noprof+0x189/0x420
[   15.651259]  kasan_atomics+0x95/0x310
[   15.651426]  kunit_try_run_case+0x1a5/0x480
[   15.651657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.651952]  kthread+0x337/0x6f0
[   15.652179]  ret_from_fork+0x116/0x1d0
[   15.652325]  ret_from_fork_asm+0x1a/0x30
[   15.652467] 
[   15.652541] The buggy address belongs to the object at ffff8881025adf00
[   15.652541]  which belongs to the cache kmalloc-64 of size 64
[   15.653375] The buggy address is located 0 bytes to the right of
[   15.653375]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.653982] 
[   15.654078] The buggy address belongs to the physical page:
[   15.654326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.654797] flags: 0x200000000000000(node=0|zone=2)
[   15.655041] page_type: f5(slab)
[   15.655172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.655405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.655815] page dumped because: kasan: bad access detected
[   15.656073] 
[   15.656166] Memory state around the buggy address:
[   15.656435]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.656652]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.657289] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.657669]                                      ^
[   15.657862]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.658220]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.658490] ==================================================================
[   15.925043] ==================================================================
[   15.925366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.925780] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.926159] 
[   15.926320] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.926367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.926380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.926400] Call Trace:
[   15.926417]  <TASK>
[   15.926432]  dump_stack_lvl+0x73/0xb0
[   15.926462]  print_report+0xd1/0x610
[   15.926519]  ? __virt_addr_valid+0x1db/0x2d0
[   15.926543]  ? kasan_atomics_helper+0xf10/0x5450
[   15.926566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.926603]  ? kasan_atomics_helper+0xf10/0x5450
[   15.926655]  kasan_report+0x141/0x180
[   15.926679]  ? kasan_atomics_helper+0xf10/0x5450
[   15.926723]  kasan_check_range+0x10c/0x1c0
[   15.926749]  __kasan_check_write+0x18/0x20
[   15.926769]  kasan_atomics_helper+0xf10/0x5450
[   15.926794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.926819]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.926846]  ? kasan_atomics+0x152/0x310
[   15.926875]  kasan_atomics+0x1dc/0x310
[   15.926899]  ? __pfx_kasan_atomics+0x10/0x10
[   15.926955]  ? __pfx_read_tsc+0x10/0x10
[   15.926978]  ? ktime_get_ts64+0x86/0x230
[   15.927004]  kunit_try_run_case+0x1a5/0x480
[   15.927042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.927079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.927157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.927186]  ? __kthread_parkme+0x82/0x180
[   15.927219]  ? preempt_count_sub+0x50/0x80
[   15.927245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.927271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.927298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.927325]  kthread+0x337/0x6f0
[   15.927346]  ? trace_preempt_on+0x20/0xc0
[   15.927371]  ? __pfx_kthread+0x10/0x10
[   15.927393]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.927417]  ? calculate_sigpending+0x7b/0xa0
[   15.927443]  ? __pfx_kthread+0x10/0x10
[   15.927466]  ret_from_fork+0x116/0x1d0
[   15.927486]  ? __pfx_kthread+0x10/0x10
[   15.927509]  ret_from_fork_asm+0x1a/0x30
[   15.927540]  </TASK>
[   15.927552] 
[   15.935458] Allocated by task 284:
[   15.935624]  kasan_save_stack+0x45/0x70
[   15.935807]  kasan_save_track+0x18/0x40
[   15.935990]  kasan_save_alloc_info+0x3b/0x50
[   15.936228]  __kasan_kmalloc+0xb7/0xc0
[   15.936369]  __kmalloc_cache_noprof+0x189/0x420
[   15.936576]  kasan_atomics+0x95/0x310
[   15.936769]  kunit_try_run_case+0x1a5/0x480
[   15.937019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.937316]  kthread+0x337/0x6f0
[   15.937535]  ret_from_fork+0x116/0x1d0
[   15.937738]  ret_from_fork_asm+0x1a/0x30
[   15.937936] 
[   15.938011] The buggy address belongs to the object at ffff8881025adf00
[   15.938011]  which belongs to the cache kmalloc-64 of size 64
[   15.938503] The buggy address is located 0 bytes to the right of
[   15.938503]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.939136] 
[   15.939211] The buggy address belongs to the physical page:
[   15.939552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.939930] flags: 0x200000000000000(node=0|zone=2)
[   15.940124] page_type: f5(slab)
[   15.940247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.940575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.940965] page dumped because: kasan: bad access detected
[   15.941252] 
[   15.941348] Memory state around the buggy address:
[   15.941628]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.941849]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.942187] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.942556]                                      ^
[   15.942846]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.943175]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.943459] ==================================================================
[   15.901749] ==================================================================
[   15.902511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.903378] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.904199] 
[   15.904405] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.904462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.904476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.904498] Call Trace:
[   15.904513]  <TASK>
[   15.904528]  dump_stack_lvl+0x73/0xb0
[   15.904589]  print_report+0xd1/0x610
[   15.904612]  ? __virt_addr_valid+0x1db/0x2d0
[   15.904656]  ? kasan_atomics_helper+0xe78/0x5450
[   15.904679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.904704]  ? kasan_atomics_helper+0xe78/0x5450
[   15.904727]  kasan_report+0x141/0x180
[   15.904751]  ? kasan_atomics_helper+0xe78/0x5450
[   15.904778]  kasan_check_range+0x10c/0x1c0
[   15.904803]  __kasan_check_write+0x18/0x20
[   15.904824]  kasan_atomics_helper+0xe78/0x5450
[   15.904849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.904873]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.904901]  ? kasan_atomics+0x152/0x310
[   15.904929]  kasan_atomics+0x1dc/0x310
[   15.904953]  ? __pfx_kasan_atomics+0x10/0x10
[   15.904979]  ? __pfx_read_tsc+0x10/0x10
[   15.905002]  ? ktime_get_ts64+0x86/0x230
[   15.905028]  kunit_try_run_case+0x1a5/0x480
[   15.905065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.905090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.905134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.905160]  ? __kthread_parkme+0x82/0x180
[   15.905181]  ? preempt_count_sub+0x50/0x80
[   15.905207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.905233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.905260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.905288]  kthread+0x337/0x6f0
[   15.905308]  ? trace_preempt_on+0x20/0xc0
[   15.905333]  ? __pfx_kthread+0x10/0x10
[   15.905355]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.905378]  ? calculate_sigpending+0x7b/0xa0
[   15.905404]  ? __pfx_kthread+0x10/0x10
[   15.905427]  ret_from_fork+0x116/0x1d0
[   15.905448]  ? __pfx_kthread+0x10/0x10
[   15.905470]  ret_from_fork_asm+0x1a/0x30
[   15.905503]  </TASK>
[   15.905513] 
[   15.916217] Allocated by task 284:
[   15.916406]  kasan_save_stack+0x45/0x70
[   15.916618]  kasan_save_track+0x18/0x40
[   15.916869]  kasan_save_alloc_info+0x3b/0x50
[   15.917134]  __kasan_kmalloc+0xb7/0xc0
[   15.917273]  __kmalloc_cache_noprof+0x189/0x420
[   15.917433]  kasan_atomics+0x95/0x310
[   15.917612]  kunit_try_run_case+0x1a5/0x480
[   15.917872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918171]  kthread+0x337/0x6f0
[   15.918346]  ret_from_fork+0x116/0x1d0
[   15.918571]  ret_from_fork_asm+0x1a/0x30
[   15.918818] 
[   15.918920] The buggy address belongs to the object at ffff8881025adf00
[   15.918920]  which belongs to the cache kmalloc-64 of size 64
[   15.919462] The buggy address is located 0 bytes to the right of
[   15.919462]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.919936] 
[   15.920061] The buggy address belongs to the physical page:
[   15.920364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.920772] flags: 0x200000000000000(node=0|zone=2)
[   15.920993] page_type: f5(slab)
[   15.921195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.921551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.921830] page dumped because: kasan: bad access detected
[   15.922098] 
[   15.922256] Memory state around the buggy address:
[   15.922556]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.922858]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.923192] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.923560]                                      ^
[   15.923729]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.924043]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.924440] ==================================================================
[   16.173481] ==================================================================
[   16.173907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   16.174154] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.174643] 
[   16.174890] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.174936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.174949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.174969] Call Trace:
[   16.174984]  <TASK>
[   16.174998]  dump_stack_lvl+0x73/0xb0
[   16.175027]  print_report+0xd1/0x610
[   16.175063]  ? __virt_addr_valid+0x1db/0x2d0
[   16.175088]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.175111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.175137]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.175162]  kasan_report+0x141/0x180
[   16.175185]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.175249]  kasan_check_range+0x10c/0x1c0
[   16.175275]  __kasan_check_read+0x15/0x20
[   16.175296]  kasan_atomics_helper+0x13b5/0x5450
[   16.175322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.175358]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.175384]  ? kasan_atomics+0x152/0x310
[   16.175444]  kasan_atomics+0x1dc/0x310
[   16.175469]  ? __pfx_kasan_atomics+0x10/0x10
[   16.175494]  ? __pfx_read_tsc+0x10/0x10
[   16.175518]  ? ktime_get_ts64+0x86/0x230
[   16.175543]  kunit_try_run_case+0x1a5/0x480
[   16.175599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.175649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.175674]  ? __kthread_parkme+0x82/0x180
[   16.175726]  ? preempt_count_sub+0x50/0x80
[   16.175752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.175804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.175863]  kthread+0x337/0x6f0
[   16.175885]  ? trace_preempt_on+0x20/0xc0
[   16.175910]  ? __pfx_kthread+0x10/0x10
[   16.175932]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.175983]  ? calculate_sigpending+0x7b/0xa0
[   16.176010]  ? __pfx_kthread+0x10/0x10
[   16.176033]  ret_from_fork+0x116/0x1d0
[   16.176064]  ? __pfx_kthread+0x10/0x10
[   16.176086]  ret_from_fork_asm+0x1a/0x30
[   16.176118]  </TASK>
[   16.176161] 
[   16.184365] Allocated by task 284:
[   16.184563]  kasan_save_stack+0x45/0x70
[   16.184732]  kasan_save_track+0x18/0x40
[   16.184959]  kasan_save_alloc_info+0x3b/0x50
[   16.185202]  __kasan_kmalloc+0xb7/0xc0
[   16.185390]  __kmalloc_cache_noprof+0x189/0x420
[   16.185646]  kasan_atomics+0x95/0x310
[   16.185842]  kunit_try_run_case+0x1a5/0x480
[   16.186038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.186368]  kthread+0x337/0x6f0
[   16.186557]  ret_from_fork+0x116/0x1d0
[   16.186759]  ret_from_fork_asm+0x1a/0x30
[   16.186986] 
[   16.187179] The buggy address belongs to the object at ffff8881025adf00
[   16.187179]  which belongs to the cache kmalloc-64 of size 64
[   16.187526] The buggy address is located 0 bytes to the right of
[   16.187526]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.187977] 
[   16.188109] The buggy address belongs to the physical page:
[   16.188359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.188705] flags: 0x200000000000000(node=0|zone=2)
[   16.188906] page_type: f5(slab)
[   16.189023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.189258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.189478] page dumped because: kasan: bad access detected
[   16.189784] 
[   16.189881] Memory state around the buggy address:
[   16.190187]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.190625]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.191008] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.191633]                                      ^
[   16.191891]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.192298]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.192513] ==================================================================
[   16.723750] ==================================================================
[   16.724080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.724444] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.724835] 
[   16.724976] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.725140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.725157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.725179] Call Trace:
[   16.725195]  <TASK>
[   16.725211]  dump_stack_lvl+0x73/0xb0
[   16.725291]  print_report+0xd1/0x610
[   16.725326]  ? __virt_addr_valid+0x1db/0x2d0
[   16.725350]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.725373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.725399]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.725422]  kasan_report+0x141/0x180
[   16.725445]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.725473]  kasan_check_range+0x10c/0x1c0
[   16.725499]  __kasan_check_write+0x18/0x20
[   16.725520]  kasan_atomics_helper+0x20c8/0x5450
[   16.725545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.725570]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.725596]  ? kasan_atomics+0x152/0x310
[   16.725624]  kasan_atomics+0x1dc/0x310
[   16.725649]  ? __pfx_kasan_atomics+0x10/0x10
[   16.725675]  ? __pfx_read_tsc+0x10/0x10
[   16.725697]  ? ktime_get_ts64+0x86/0x230
[   16.725723]  kunit_try_run_case+0x1a5/0x480
[   16.725748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.725774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.725800]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.725826]  ? __kthread_parkme+0x82/0x180
[   16.725848]  ? preempt_count_sub+0x50/0x80
[   16.725873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.725899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.725925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.725953]  kthread+0x337/0x6f0
[   16.725973]  ? trace_preempt_on+0x20/0xc0
[   16.725998]  ? __pfx_kthread+0x10/0x10
[   16.726019]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.726043]  ? calculate_sigpending+0x7b/0xa0
[   16.726077]  ? __pfx_kthread+0x10/0x10
[   16.726100]  ret_from_fork+0x116/0x1d0
[   16.726140]  ? __pfx_kthread+0x10/0x10
[   16.726162]  ret_from_fork_asm+0x1a/0x30
[   16.726194]  </TASK>
[   16.726205] 
[   16.736758] Allocated by task 284:
[   16.736906]  kasan_save_stack+0x45/0x70
[   16.737072]  kasan_save_track+0x18/0x40
[   16.737658]  kasan_save_alloc_info+0x3b/0x50
[   16.738553]  __kasan_kmalloc+0xb7/0xc0
[   16.739120]  __kmalloc_cache_noprof+0x189/0x420
[   16.739929]  kasan_atomics+0x95/0x310
[   16.740438]  kunit_try_run_case+0x1a5/0x480
[   16.741281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.741901]  kthread+0x337/0x6f0
[   16.742039]  ret_from_fork+0x116/0x1d0
[   16.742211]  ret_from_fork_asm+0x1a/0x30
[   16.742356] 
[   16.742431] The buggy address belongs to the object at ffff8881025adf00
[   16.742431]  which belongs to the cache kmalloc-64 of size 64
[   16.743616] The buggy address is located 0 bytes to the right of
[   16.743616]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.744556] 
[   16.744668] The buggy address belongs to the physical page:
[   16.744948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.745556] flags: 0x200000000000000(node=0|zone=2)
[   16.745788] page_type: f5(slab)
[   16.746115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.746557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.746892] page dumped because: kasan: bad access detected
[   16.747400] 
[   16.747593] Memory state around the buggy address:
[   16.747788]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.748205]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.748767] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.749082]                                      ^
[   16.749370]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.749772]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.750077] ==================================================================
[   16.347019] ==================================================================
[   16.347393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.347749] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284
[   16.348060] 
[   16.348194] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.348237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.348250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.348272] Call Trace:
[   16.348288]  <TASK>
[   16.348303]  dump_stack_lvl+0x73/0xb0
[   16.348332]  print_report+0xd1/0x610
[   16.348356]  ? __virt_addr_valid+0x1db/0x2d0
[   16.348380]  ? kasan_atomics_helper+0x177f/0x5450
[   16.348403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.348428]  ? kasan_atomics_helper+0x177f/0x5450
[   16.348451]  kasan_report+0x141/0x180
[   16.348475]  ? kasan_atomics_helper+0x177f/0x5450
[   16.348504]  kasan_check_range+0x10c/0x1c0
[   16.348528]  __kasan_check_write+0x18/0x20
[   16.348562]  kasan_atomics_helper+0x177f/0x5450
[   16.348587]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.348611]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.348639]  ? kasan_atomics+0x152/0x310
[   16.348677]  kasan_atomics+0x1dc/0x310
[   16.348701]  ? __pfx_kasan_atomics+0x10/0x10
[   16.348727]  ? __pfx_read_tsc+0x10/0x10
[   16.348749]  ? ktime_get_ts64+0x86/0x230
[   16.348775]  kunit_try_run_case+0x1a5/0x480
[   16.348801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.348826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.348852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.348877]  ? __kthread_parkme+0x82/0x180
[   16.348898]  ? preempt_count_sub+0x50/0x80
[   16.348924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.348950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.348977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.349004]  kthread+0x337/0x6f0
[   16.349024]  ? trace_preempt_on+0x20/0xc0
[   16.349049]  ? __pfx_kthread+0x10/0x10
[   16.349083]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.349107]  ? calculate_sigpending+0x7b/0xa0
[   16.349145]  ? __pfx_kthread+0x10/0x10
[   16.349168]  ret_from_fork+0x116/0x1d0
[   16.349189]  ? __pfx_kthread+0x10/0x10
[   16.349212]  ret_from_fork_asm+0x1a/0x30
[   16.349245]  </TASK>
[   16.349256] 
[   16.358682] Allocated by task 284:
[   16.358825]  kasan_save_stack+0x45/0x70
[   16.358975]  kasan_save_track+0x18/0x40
[   16.359242]  kasan_save_alloc_info+0x3b/0x50
[   16.359622]  __kasan_kmalloc+0xb7/0xc0
[   16.360082]  __kmalloc_cache_noprof+0x189/0x420
[   16.360486]  kasan_atomics+0x95/0x310
[   16.360812]  kunit_try_run_case+0x1a5/0x480
[   16.361293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.361754]  kthread+0x337/0x6f0
[   16.362045]  ret_from_fork+0x116/0x1d0
[   16.362425]  ret_from_fork_asm+0x1a/0x30
[   16.362781] 
[   16.362943] The buggy address belongs to the object at ffff8881025adf00
[   16.362943]  which belongs to the cache kmalloc-64 of size 64
[   16.364011] The buggy address is located 0 bytes to the right of
[   16.364011]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   16.364889] 
[   16.364965] The buggy address belongs to the physical page:
[   16.365172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   16.365899] flags: 0x200000000000000(node=0|zone=2)
[   16.366400] page_type: f5(slab)
[   16.366689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.367397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.368059] page dumped because: kasan: bad access detected
[   16.368432] 
[   16.368505] Memory state around the buggy address:
[   16.368666]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.368886]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.369129] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.369740]                                      ^
[   16.370255]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.370850]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.371518] ==================================================================
[   15.388967] ==================================================================
[   15.389416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.390034] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284
[   15.390342] 
[   15.390454] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.390510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.390997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.391032] Call Trace:
[   15.391083]  <TASK>
[   15.391098]  dump_stack_lvl+0x73/0xb0
[   15.391149]  print_report+0xd1/0x610
[   15.391174]  ? __virt_addr_valid+0x1db/0x2d0
[   15.391202]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.391228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.391258]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.391285]  kasan_report+0x141/0x180
[   15.391310]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.391342]  __asan_report_load4_noabort+0x18/0x20
[   15.391373]  kasan_atomics_helper+0x4b88/0x5450
[   15.391400]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.391428]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.391459]  ? kasan_atomics+0x152/0x310
[   15.391489]  kasan_atomics+0x1dc/0x310
[   15.391515]  ? __pfx_kasan_atomics+0x10/0x10
[   15.391544]  ? __pfx_read_tsc+0x10/0x10
[   15.391568]  ? ktime_get_ts64+0x86/0x230
[   15.391597]  kunit_try_run_case+0x1a5/0x480
[   15.391625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.391661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.391692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.391723]  ? __kthread_parkme+0x82/0x180
[   15.391747]  ? preempt_count_sub+0x50/0x80
[   15.391775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.391805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.391837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.391869]  kthread+0x337/0x6f0
[   15.391891]  ? trace_preempt_on+0x20/0xc0
[   15.391918]  ? __pfx_kthread+0x10/0x10
[   15.391942]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.391969]  ? calculate_sigpending+0x7b/0xa0
[   15.391998]  ? __pfx_kthread+0x10/0x10
[   15.392023]  ret_from_fork+0x116/0x1d0
[   15.392046]  ? __pfx_kthread+0x10/0x10
[   15.392081]  ret_from_fork_asm+0x1a/0x30
[   15.392116]  </TASK>
[   15.392127] 
[   15.402974] Allocated by task 284:
[   15.403384]  kasan_save_stack+0x45/0x70
[   15.403673]  kasan_save_track+0x18/0x40
[   15.403955]  kasan_save_alloc_info+0x3b/0x50
[   15.404256]  __kasan_kmalloc+0xb7/0xc0
[   15.404524]  __kmalloc_cache_noprof+0x189/0x420
[   15.404740]  kasan_atomics+0x95/0x310
[   15.405151]  kunit_try_run_case+0x1a5/0x480
[   15.405384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.405719]  kthread+0x337/0x6f0
[   15.406194]  ret_from_fork+0x116/0x1d0
[   15.406534]  ret_from_fork_asm+0x1a/0x30
[   15.406755] 
[   15.406861] The buggy address belongs to the object at ffff8881025adf00
[   15.406861]  which belongs to the cache kmalloc-64 of size 64
[   15.407554] The buggy address is located 0 bytes to the right of
[   15.407554]  allocated 48-byte region [ffff8881025adf00, ffff8881025adf30)
[   15.408310] 
[   15.408562] The buggy address belongs to the physical page:
[   15.408874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad
[   15.409409] flags: 0x200000000000000(node=0|zone=2)
[   15.409684] page_type: f5(slab)
[   15.409948] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.410414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.410894] page dumped because: kasan: bad access detected
[   15.411136] 
[   15.411239] Memory state around the buggy address:
[   15.411451]  ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.412008]  ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.412466] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.412922]                                      ^
[   15.413147]  ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.413559]  ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.414021] ==================================================================