Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.370504] ==================================================================
[   19.370557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.370609] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.370668] 
[   19.370700] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.371151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.371637] Hardware name: linux,dummy-virt (DT)
[   19.371703] Call trace:
[   19.371729]  show_stack+0x20/0x38 (C)
[   19.371784]  dump_stack_lvl+0x8c/0xd0
[   19.372132]  print_report+0x118/0x5d0
[   19.372473]  kasan_report+0xdc/0x128
[   19.372707]  kasan_check_range+0x100/0x1a8
[   19.372777]  __kasan_check_read+0x20/0x30
[   19.373092]  kasan_atomics_helper+0xdd4/0x4858
[   19.373189]  kasan_atomics+0x198/0x2e0
[   19.373307]  kunit_try_run_case+0x170/0x3f0
[   19.373361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.373414]  kthread+0x328/0x630
[   19.373458]  ret_from_fork+0x10/0x20
[   19.373507] 
[   19.373765] Allocated by task 265:
[   19.374108]  kasan_save_stack+0x3c/0x68
[   19.374163]  kasan_save_track+0x20/0x40
[   19.374421]  kasan_save_alloc_info+0x40/0x58
[   19.374695]  __kasan_kmalloc+0xd4/0xd8
[   19.374875]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.375085]  kasan_atomics+0xb8/0x2e0
[   19.375226]  kunit_try_run_case+0x170/0x3f0
[   19.375272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.375347]  kthread+0x328/0x630
[   19.375398]  ret_from_fork+0x10/0x20
[   19.375451] 
[   19.375475] The buggy address belongs to the object at fff00000c5b24500
[   19.375475]  which belongs to the cache kmalloc-64 of size 64
[   19.375542] The buggy address is located 0 bytes to the right of
[   19.375542]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.375638] 
[   19.375660] The buggy address belongs to the physical page:
[   19.375694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.375759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.375808] page_type: f5(slab)
[   19.375850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.375916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.375959] page dumped because: kasan: bad access detected
[   19.375999] 
[   19.376030] Memory state around the buggy address:
[   19.376088]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.376134]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.376181] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.376224]                                      ^
[   19.376271]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.376317]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.376358] ==================================================================
[   19.475013] ==================================================================
[   19.475267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.475348] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.475411] 
[   19.475562] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.475660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.475690] Hardware name: linux,dummy-virt (DT)
[   19.475730] Call trace:
[   19.475757]  show_stack+0x20/0x38 (C)
[   19.475808]  dump_stack_lvl+0x8c/0xd0
[   19.475858]  print_report+0x118/0x5d0
[   19.475917]  kasan_report+0xdc/0x128
[   19.475963]  kasan_check_range+0x100/0x1a8
[   19.476013]  __kasan_check_write+0x20/0x30
[   19.476059]  kasan_atomics_helper+0x11f8/0x4858
[   19.476109]  kasan_atomics+0x198/0x2e0
[   19.476155]  kunit_try_run_case+0x170/0x3f0
[   19.476204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.476574]  kthread+0x328/0x630
[   19.476887]  ret_from_fork+0x10/0x20
[   19.476973] 
[   19.477020] Allocated by task 265:
[   19.477089]  kasan_save_stack+0x3c/0x68
[   19.477135]  kasan_save_track+0x20/0x40
[   19.477216]  kasan_save_alloc_info+0x40/0x58
[   19.477259]  __kasan_kmalloc+0xd4/0xd8
[   19.477326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.477678]  kasan_atomics+0xb8/0x2e0
[   19.477730]  kunit_try_run_case+0x170/0x3f0
[   19.478043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.478126]  kthread+0x328/0x630
[   19.478163]  ret_from_fork+0x10/0x20
[   19.478201] 
[   19.478235] The buggy address belongs to the object at fff00000c5b24500
[   19.478235]  which belongs to the cache kmalloc-64 of size 64
[   19.478323] The buggy address is located 0 bytes to the right of
[   19.478323]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.478392] 
[   19.478416] The buggy address belongs to the physical page:
[   19.478449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.478505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.478556] page_type: f5(slab)
[   19.478596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.478656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.478701] page dumped because: kasan: bad access detected
[   19.478735] 
[   19.478757] Memory state around the buggy address:
[   19.478790]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.478836]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.478881] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.478935]                                      ^
[   19.478971]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.479017]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.479059] ==================================================================
[   19.530220] ==================================================================
[   19.530299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.531048] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.531427] 
[   19.531463] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.531549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.531577] Hardware name: linux,dummy-virt (DT)
[   19.531610] Call trace:
[   19.531633]  show_stack+0x20/0x38 (C)
[   19.531687]  dump_stack_lvl+0x8c/0xd0
[   19.532786]  print_report+0x118/0x5d0
[   19.532853]  kasan_report+0xdc/0x128
[   19.532914]  kasan_check_range+0x100/0x1a8
[   19.532964]  __kasan_check_write+0x20/0x30
[   19.534368]  kasan_atomics_helper+0x14e4/0x4858
[   19.534446]  kasan_atomics+0x198/0x2e0
[   19.534496]  kunit_try_run_case+0x170/0x3f0
[   19.534546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535708]  kthread+0x328/0x630
[   19.536282]  ret_from_fork+0x10/0x20
[   19.536652] 
[   19.536681] Allocated by task 265:
[   19.536713]  kasan_save_stack+0x3c/0x68
[   19.536761]  kasan_save_track+0x20/0x40
[   19.536800]  kasan_save_alloc_info+0x40/0x58
[   19.536843]  __kasan_kmalloc+0xd4/0xd8
[   19.538333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.538439]  kasan_atomics+0xb8/0x2e0
[   19.538478]  kunit_try_run_case+0x170/0x3f0
[   19.538522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.538568]  kthread+0x328/0x630
[   19.538604]  ret_from_fork+0x10/0x20
[   19.538648] 
[   19.540315] The buggy address belongs to the object at fff00000c5b24500
[   19.540315]  which belongs to the cache kmalloc-64 of size 64
[   19.540725] The buggy address is located 0 bytes to the right of
[   19.540725]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.540802] 
[   19.540826] The buggy address belongs to the physical page:
[   19.541884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.542010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.542062] page_type: f5(slab)
[   19.542104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.543662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.543942] page dumped because: kasan: bad access detected
[   19.544441] 
[   19.544518] Memory state around the buggy address:
[   19.544634]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544684]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544730] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.544773]                                      ^
[   19.546166]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.547141]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.547418] ==================================================================
[   19.596684] ==================================================================
[   19.597172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.597468] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.597887] 
[   19.597958] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.598047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.598274] Hardware name: linux,dummy-virt (DT)
[   19.598367] Call trace:
[   19.598397]  show_stack+0x20/0x38 (C)
[   19.598637]  dump_stack_lvl+0x8c/0xd0
[   19.599165]  print_report+0x118/0x5d0
[   19.599330]  kasan_report+0xdc/0x128
[   19.599758]  kasan_check_range+0x100/0x1a8
[   19.599824]  __kasan_check_write+0x20/0x30
[   19.600552]  kasan_atomics_helper+0x1644/0x4858
[   19.600666]  kasan_atomics+0x198/0x2e0
[   19.601310]  kunit_try_run_case+0x170/0x3f0
[   19.601589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.601833]  kthread+0x328/0x630
[   19.601983]  ret_from_fork+0x10/0x20
[   19.602161] 
[   19.602546] Allocated by task 265:
[   19.602586]  kasan_save_stack+0x3c/0x68
[   19.602809]  kasan_save_track+0x20/0x40
[   19.602931]  kasan_save_alloc_info+0x40/0x58
[   19.603074]  __kasan_kmalloc+0xd4/0xd8
[   19.603114]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.603156]  kasan_atomics+0xb8/0x2e0
[   19.603800]  kunit_try_run_case+0x170/0x3f0
[   19.603858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.604045]  kthread+0x328/0x630
[   19.604427]  ret_from_fork+0x10/0x20
[   19.604630] 
[   19.605004] The buggy address belongs to the object at fff00000c5b24500
[   19.605004]  which belongs to the cache kmalloc-64 of size 64
[   19.605243] The buggy address is located 0 bytes to the right of
[   19.605243]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.605481] 
[   19.605771] The buggy address belongs to the physical page:
[   19.606025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.606090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.606142] page_type: f5(slab)
[   19.606185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.606239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.606284] page dumped because: kasan: bad access detected
[   19.606318] 
[   19.606340] Memory state around the buggy address:
[   19.606374]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.606420]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.606467] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.606910]                                      ^
[   19.607147]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.607197]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.607237] ==================================================================
[   19.566977] ==================================================================
[   19.567033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.567086] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.567137] 
[   19.567172] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.567258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.567286] Hardware name: linux,dummy-virt (DT)
[   19.567320] Call trace:
[   19.568774]  show_stack+0x20/0x38 (C)
[   19.569014]  dump_stack_lvl+0x8c/0xd0
[   19.569912]  print_report+0x118/0x5d0
[   19.570637]  kasan_report+0xdc/0x128
[   19.571131]  kasan_check_range+0x100/0x1a8
[   19.571704]  __kasan_check_write+0x20/0x30
[   19.571849]  kasan_atomics_helper+0x15b4/0x4858
[   19.572009]  kasan_atomics+0x198/0x2e0
[   19.572079]  kunit_try_run_case+0x170/0x3f0
[   19.572131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.572380]  kthread+0x328/0x630
[   19.573423]  ret_from_fork+0x10/0x20
[   19.574154] 
[   19.574183] Allocated by task 265:
[   19.574216]  kasan_save_stack+0x3c/0x68
[   19.574266]  kasan_save_track+0x20/0x40
[   19.574561]  kasan_save_alloc_info+0x40/0x58
[   19.575006]  __kasan_kmalloc+0xd4/0xd8
[   19.575673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.575785]  kasan_atomics+0xb8/0x2e0
[   19.575826]  kunit_try_run_case+0x170/0x3f0
[   19.576585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.576990]  kthread+0x328/0x630
[   19.577687]  ret_from_fork+0x10/0x20
[   19.577980] 
[   19.578057] The buggy address belongs to the object at fff00000c5b24500
[   19.578057]  which belongs to the cache kmalloc-64 of size 64
[   19.578308] The buggy address is located 0 bytes to the right of
[   19.578308]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.578637] 
[   19.578660] The buggy address belongs to the physical page:
[   19.578936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.579747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.580789] page_type: f5(slab)
[   19.581111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.581713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.581800] page dumped because: kasan: bad access detected
[   19.582006] 
[   19.582679] Memory state around the buggy address:
[   19.582747]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.582796]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.583072] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.583119]                                      ^
[   19.583204]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.583428]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.583743] ==================================================================
[   19.667687] ==================================================================
[   19.667819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.667935] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.668543] 
[   19.668579] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.669878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.669974] Hardware name: linux,dummy-virt (DT)
[   19.670006] Call trace:
[   19.670834]  show_stack+0x20/0x38 (C)
[   19.671240]  dump_stack_lvl+0x8c/0xd0
[   19.671854]  print_report+0x118/0x5d0
[   19.671942]  kasan_report+0xdc/0x128
[   19.672012]  kasan_check_range+0x100/0x1a8
[   19.672114]  __kasan_check_write+0x20/0x30
[   19.672414]  kasan_atomics_helper+0x17ec/0x4858
[   19.673082]  kasan_atomics+0x198/0x2e0
[   19.673498]  kunit_try_run_case+0x170/0x3f0
[   19.673837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.673934]  kthread+0x328/0x630
[   19.674350]  ret_from_fork+0x10/0x20
[   19.675344] 
[   19.675459] Allocated by task 265:
[   19.675608]  kasan_save_stack+0x3c/0x68
[   19.675972]  kasan_save_track+0x20/0x40
[   19.676544]  kasan_save_alloc_info+0x40/0x58
[   19.676723]  __kasan_kmalloc+0xd4/0xd8
[   19.677209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.677737]  kasan_atomics+0xb8/0x2e0
[   19.679161]  kunit_try_run_case+0x170/0x3f0
[   19.679488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.679546]  kthread+0x328/0x630
[   19.679580]  ret_from_fork+0x10/0x20
[   19.679620] 
[   19.679645] The buggy address belongs to the object at fff00000c5b24500
[   19.679645]  which belongs to the cache kmalloc-64 of size 64
[   19.679706] The buggy address is located 0 bytes to the right of
[   19.679706]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.680115] 
[   19.680357] The buggy address belongs to the physical page:
[   19.680421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.680640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.680749] page_type: f5(slab)
[   19.680791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.680846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.680890] page dumped because: kasan: bad access detected
[   19.680936] 
[   19.680979] Memory state around the buggy address:
[   19.681156]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.681395]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.681523] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.681604]                                      ^
[   19.681752]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.681840]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.681883] ==================================================================
[   19.584511] ==================================================================
[   19.584566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.584616] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.584669] 
[   19.584701] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.584784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.584813] Hardware name: linux,dummy-virt (DT)
[   19.584846] Call trace:
[   19.584869]  show_stack+0x20/0x38 (C)
[   19.586558]  dump_stack_lvl+0x8c/0xd0
[   19.586652]  print_report+0x118/0x5d0
[   19.586708]  kasan_report+0xdc/0x128
[   19.586758]  __asan_report_load8_noabort+0x20/0x30
[   19.586812]  kasan_atomics_helper+0x3db0/0x4858
[   19.586864]  kasan_atomics+0x198/0x2e0
[   19.586920]  kunit_try_run_case+0x170/0x3f0
[   19.586971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.587028]  kthread+0x328/0x630
[   19.587795]  ret_from_fork+0x10/0x20
[   19.587874] 
[   19.587894] Allocated by task 265:
[   19.588128]  kasan_save_stack+0x3c/0x68
[   19.588173]  kasan_save_track+0x20/0x40
[   19.588324]  kasan_save_alloc_info+0x40/0x58
[   19.588730]  __kasan_kmalloc+0xd4/0xd8
[   19.589041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.589287]  kasan_atomics+0xb8/0x2e0
[   19.589331]  kunit_try_run_case+0x170/0x3f0
[   19.589756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.590020]  kthread+0x328/0x630
[   19.590739]  ret_from_fork+0x10/0x20
[   19.590810] 
[   19.590834] The buggy address belongs to the object at fff00000c5b24500
[   19.590834]  which belongs to the cache kmalloc-64 of size 64
[   19.590905] The buggy address is located 0 bytes to the right of
[   19.590905]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.591589] 
[   19.592225] The buggy address belongs to the physical page:
[   19.592557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.592620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.592986] page_type: f5(slab)
[   19.593360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.593701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.593754] page dumped because: kasan: bad access detected
[   19.594056] 
[   19.594148] Memory state around the buggy address:
[   19.594451]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.594538]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.594829] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.595225]                                      ^
[   19.595275]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.595708]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.596157] ==================================================================
[   19.243298] ==================================================================
[   19.243352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   19.243550] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.243612] 
[   19.243676] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.243824] Hardware name: linux,dummy-virt (DT)
[   19.244124]  print_report+0x118/0x5d0
[   19.245341] Allocated by task 265:
[   19.245782]  kasan_atomics+0xb8/0x2e0
[   19.246562] The buggy address is located 0 bytes to the right of
[   19.246562]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.246627] 
[   19.247051] The buggy address belongs to the physical page:
[   19.247184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.247270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.247406] page_type: f5(slab)
[   19.247464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.247527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.248238] page dumped because: kasan: bad access detected
[   19.248280] 
[   19.248302] Memory state around the buggy address:
[   19.248337]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.248390]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.248436] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.248478]                                      ^
[   19.248513]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.248559]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.248600] ==================================================================
[   19.170265] ==================================================================
[   19.170364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   19.170546] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.170598] 
[   19.170633] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.171309] Hardware name: linux,dummy-virt (DT)
[   19.171425] Call trace:
[   19.171451]  show_stack+0x20/0x38 (C)
[   19.171502]  dump_stack_lvl+0x8c/0xd0
[   19.171552]  print_report+0x118/0x5d0
[   19.171599]  kasan_report+0xdc/0x128
[   19.171697]  __kasan_check_write+0x20/0x30
[   19.171792]  kasan_atomics+0x198/0x2e0
[   19.173694]  kasan_save_stack+0x3c/0x68
[   19.174059]  kasan_save_track+0x20/0x40
[   19.174103]  kasan_save_alloc_info+0x40/0x58
[   19.174147]  __kasan_kmalloc+0xd4/0xd8
[   19.174250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.174563]  kasan_atomics+0xb8/0x2e0
[   19.174785]  kthread+0x328/0x630
[   19.175341] The buggy address is located 0 bytes to the right of
[   19.175341]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.175651] 
[   19.175697] The buggy address belongs to the physical page:
[   19.175842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.177953]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.177998] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.178039]                                      ^
[   19.178073]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.178245]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.178516] ==================================================================
[   19.650735] ==================================================================
[   19.650978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.651075] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.651130] 
[   19.651162] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.651275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.651386] Hardware name: linux,dummy-virt (DT)
[   19.651424] Call trace:
[   19.651449]  show_stack+0x20/0x38 (C)
[   19.651499]  dump_stack_lvl+0x8c/0xd0
[   19.651549]  print_report+0x118/0x5d0
[   19.651617]  kasan_report+0xdc/0x128
[   19.651705]  kasan_check_range+0x100/0x1a8
[   19.651920]  __kasan_check_write+0x20/0x30
[   19.652145]  kasan_atomics_helper+0x175c/0x4858
[   19.652196]  kasan_atomics+0x198/0x2e0
[   19.652242]  kunit_try_run_case+0x170/0x3f0
[   19.652293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.652349]  kthread+0x328/0x630
[   19.652391]  ret_from_fork+0x10/0x20
[   19.652442] 
[   19.652463] Allocated by task 265:
[   19.652493]  kasan_save_stack+0x3c/0x68
[   19.652563]  kasan_save_track+0x20/0x40
[   19.652605]  kasan_save_alloc_info+0x40/0x58
[   19.652647]  __kasan_kmalloc+0xd4/0xd8
[   19.652687]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.652734]  kasan_atomics+0xb8/0x2e0
[   19.653098]  kunit_try_run_case+0x170/0x3f0
[   19.653860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.653963]  kthread+0x328/0x630
[   19.654000]  ret_from_fork+0x10/0x20
[   19.654187] 
[   19.654333] The buggy address belongs to the object at fff00000c5b24500
[   19.654333]  which belongs to the cache kmalloc-64 of size 64
[   19.655113] The buggy address is located 0 bytes to the right of
[   19.655113]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.655765] 
[   19.655907] The buggy address belongs to the physical page:
[   19.656264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.656331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.657116] page_type: f5(slab)
[   19.657444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.658102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.658187] page dumped because: kasan: bad access detected
[   19.658325] 
[   19.658347] Memory state around the buggy address:
[   19.660402]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660609]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660853] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.662652]                                      ^
[   19.662705]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.662754]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.662797] ==================================================================
[   19.479246] ==================================================================
[   19.479999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.480068] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.480120] 
[   19.480152] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.480236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.480265] Hardware name: linux,dummy-virt (DT)
[   19.480296] Call trace:
[   19.480321]  show_stack+0x20/0x38 (C)
[   19.480387]  dump_stack_lvl+0x8c/0xd0
[   19.480438]  print_report+0x118/0x5d0
[   19.480487]  kasan_report+0xdc/0x128
[   19.480533]  kasan_check_range+0x100/0x1a8
[   19.480584]  __kasan_check_write+0x20/0x30
[   19.480630]  kasan_atomics_helper+0x126c/0x4858
[   19.480680]  kasan_atomics+0x198/0x2e0
[   19.480725]  kunit_try_run_case+0x170/0x3f0
[   19.480790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.480845]  kthread+0x328/0x630
[   19.480887]  ret_from_fork+0x10/0x20
[   19.481934] 
[   19.481985] Allocated by task 265:
[   19.482167]  kasan_save_stack+0x3c/0x68
[   19.482292]  kasan_save_track+0x20/0x40
[   19.482335]  kasan_save_alloc_info+0x40/0x58
[   19.482377]  __kasan_kmalloc+0xd4/0xd8
[   19.482417]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.482837]  kasan_atomics+0xb8/0x2e0
[   19.483356]  kunit_try_run_case+0x170/0x3f0
[   19.483499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.483645]  kthread+0x328/0x630
[   19.483688]  ret_from_fork+0x10/0x20
[   19.483853] 
[   19.484097] The buggy address belongs to the object at fff00000c5b24500
[   19.484097]  which belongs to the cache kmalloc-64 of size 64
[   19.484522] The buggy address is located 0 bytes to the right of
[   19.484522]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.485116] 
[   19.485360] The buggy address belongs to the physical page:
[   19.485498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.485622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.485923] page_type: f5(slab)
[   19.486174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.486247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.486449] page dumped because: kasan: bad access detected
[   19.486493] 
[   19.486516] Memory state around the buggy address:
[   19.486923]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.487382]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.487438] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.487480]                                      ^
[   19.487518]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.487564]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.487930] ==================================================================
[   19.289336] ==================================================================
[   19.289872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.290117] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.290290] 
[   19.290822] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.290976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.291029] Hardware name: linux,dummy-virt (DT)
[   19.291180] Call trace:
[   19.291327]  show_stack+0x20/0x38 (C)
[   19.291579]  dump_stack_lvl+0x8c/0xd0
[   19.291788]  print_report+0x118/0x5d0
[   19.292067]  kasan_report+0xdc/0x128
[   19.292556]  kasan_check_range+0x100/0x1a8
[   19.293954]  ret_from_fork+0x10/0x20
[   19.294011] 
[   19.294032] Allocated by task 265:
[   19.294334]  kasan_save_stack+0x3c/0x68
[   19.294697]  kasan_save_track+0x20/0x40
[   19.294965]  kasan_save_alloc_info+0x40/0x58
[   19.295061]  __kasan_kmalloc+0xd4/0xd8
[   19.295215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.295396]  kasan_atomics+0xb8/0x2e0
[   19.296465]  kunit_try_run_case+0x170/0x3f0
[   19.296643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.296742]  kthread+0x328/0x630
[   19.296787]  ret_from_fork+0x10/0x20
[   19.296966] 
[   19.297115] The buggy address belongs to the object at fff00000c5b24500
[   19.297115]  which belongs to the cache kmalloc-64 of size 64
[   19.297282] The buggy address is located 0 bytes to the right of
[   19.297282]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.297357] 
[   19.297401] The buggy address belongs to the physical page:
[   19.297671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.298004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.298081] page_type: f5(slab)
[   19.298129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.298184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.298408] page dumped because: kasan: bad access detected
[   19.298659] 
[   19.298684] Memory state around the buggy address:
[   19.298737]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.299195] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.301455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.304044]  ret_from_fork+0x10/0x20
[   19.305982]  kunit_try_run_case+0x170/0x3f0
[   19.306443] The buggy address belongs to the physical page:
[   19.306963]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.307809] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.311112]  kasan_save_stack+0x3c/0x68
[   19.311273]  kasan_save_track+0x20/0x40
[   19.312323]  ret_from_fork+0x10/0x20
[   19.312925] 
[   19.313742] page_type: f5(slab)
[   19.314596]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.316394] Read of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.318933]  kasan_save_alloc_info+0x40/0x58
[   19.321220] 
[   19.321916] The buggy address is located 0 bytes to the right of
[   19.321916]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.323569] 
[   19.324540]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.329186] 
[   19.329645]  kasan_save_alloc_info+0x40/0x58
[   19.329951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.331218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.331614]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.332798]  kasan_atomics+0x198/0x2e0
[   19.335065]  kasan_atomics+0xb8/0x2e0
[   19.335193]  kunit_try_run_case+0x170/0x3f0
[   19.335239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.335645]  kthread+0x328/0x630
[   19.335764]  ret_from_fork+0x10/0x20
[   19.335807] 
[   19.335846] The buggy address belongs to the object at fff00000c5b24500
[   19.335846]  which belongs to the cache kmalloc-64 of size 64
[   19.336217] The buggy address is located 0 bytes to the right of
[   19.336217]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.336330] 
[   19.336356] The buggy address belongs to the physical page:
[   19.336396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.336472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.336787] page_type: f5(slab)
[   19.336914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.337194] page dumped because: kasan: bad access detected
[   19.337883]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.338473]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.339598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.340071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.340850]  dump_stack_lvl+0x8c/0xd0
[   19.341053]  print_report+0x118/0x5d0
[   19.341154]  kasan_report+0xdc/0x128
[   19.341260]  kasan_check_range+0x100/0x1a8
[   19.341314]  __kasan_check_write+0x20/0x30
[   19.341380]  kasan_atomics_helper+0xca0/0x4858
[   19.341716]  ret_from_fork+0x10/0x20
[   19.342960]  kasan_atomics+0xb8/0x2e0
[   19.343102]  kunit_try_run_case+0x170/0x3f0
[   19.343182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.343294]  kthread+0x328/0x630
[   19.343359]  ret_from_fork+0x10/0x20
[   19.343483] 
[   19.343522] The buggy address belongs to the object at fff00000c5b24500
[   19.343522]  which belongs to the cache kmalloc-64 of size 64
[   19.343615] The buggy address is located 0 bytes to the right of
[   19.343615]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.343824] 
[   19.344098] The buggy address belongs to the physical page:
[   19.344223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.344347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.344402] page_type: f5(slab)
[   19.344444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.344874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.345277] page dumped because: kasan: bad access detected
[   19.345368] 
[   19.345418] Memory state around the buggy address:
[   19.345484]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.345674]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.345751] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.345855]                                      ^
[   19.345893]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345974]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.346157] ==================================================================
[   19.418537] ==================================================================
[   19.418590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.418983] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.419311] 
[   19.419391] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.419535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.419584] Hardware name: linux,dummy-virt (DT)
[   19.419618] Call trace:
[   19.419644]  show_stack+0x20/0x38 (C)
[   19.419703]  dump_stack_lvl+0x8c/0xd0
[   19.419751]  print_report+0x118/0x5d0
[   19.419798]  kasan_report+0xdc/0x128
[   19.420128]  kasan_check_range+0x100/0x1a8
[   19.420345]  __kasan_check_write+0x20/0x30
[   19.420450]  kasan_atomics_helper+0xf88/0x4858
[   19.420509]  kasan_atomics+0x198/0x2e0
[   19.420690]  kunit_try_run_case+0x170/0x3f0
[   19.420773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.420871]  kthread+0x328/0x630
[   19.420930]  ret_from_fork+0x10/0x20
[   19.420980] 
[   19.421001] Allocated by task 265:
[   19.421188]  kasan_save_stack+0x3c/0x68
[   19.421252]  kasan_save_track+0x20/0x40
[   19.421521]  kasan_save_alloc_info+0x40/0x58
[   19.421591]  __kasan_kmalloc+0xd4/0xd8
[   19.421737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.421821]  kasan_atomics+0xb8/0x2e0
[   19.421890]  kunit_try_run_case+0x170/0x3f0
[   19.422173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.422588]  kthread+0x328/0x630
[   19.422650]  ret_from_fork+0x10/0x20
[   19.422994] 
[   19.423042] The buggy address belongs to the object at fff00000c5b24500
[   19.423042]  which belongs to the cache kmalloc-64 of size 64
[   19.423133] The buggy address is located 0 bytes to the right of
[   19.423133]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.423568] 
[   19.423612] The buggy address belongs to the physical page:
[   19.423692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.423756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.423823] page_type: f5(slab)
[   19.423865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.424465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.424526] page dumped because: kasan: bad access detected
[   19.424570] 
[   19.424591] Memory state around the buggy address:
[   19.424626]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.424673]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.424719] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.424761]                                      ^
[   19.424795]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.424839]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.424880] ==================================================================
[   19.354576] ==================================================================
[   19.354642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.354986] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.355122] 
[   19.355156] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.355241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.355321] Hardware name: linux,dummy-virt (DT)
[   19.355356] Call trace:
[   19.355382]  show_stack+0x20/0x38 (C)
[   19.355433]  dump_stack_lvl+0x8c/0xd0
[   19.355481]  print_report+0x118/0x5d0
[   19.355567]  kasan_report+0xdc/0x128
[   19.355615]  kasan_check_range+0x100/0x1a8
[   19.355665]  __kasan_check_write+0x20/0x30
[   19.355712]  kasan_atomics_helper+0xd3c/0x4858
[   19.355763]  kasan_atomics+0x198/0x2e0
[   19.355809]  kunit_try_run_case+0x170/0x3f0
[   19.355857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.355936]  kthread+0x328/0x630
[   19.355990]  ret_from_fork+0x10/0x20
[   19.356048] 
[   19.356069] Allocated by task 265:
[   19.356097]  kasan_save_stack+0x3c/0x68
[   19.356142]  kasan_save_track+0x20/0x40
[   19.356192]  kasan_save_alloc_info+0x40/0x58
[   19.356236]  __kasan_kmalloc+0xd4/0xd8
[   19.356276]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.356319]  kasan_atomics+0xb8/0x2e0
[   19.356357]  kunit_try_run_case+0x170/0x3f0
[   19.356399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.356445]  kthread+0x328/0x630
[   19.356479]  ret_from_fork+0x10/0x20
[   19.356517] 
[   19.356546] The buggy address belongs to the object at fff00000c5b24500
[   19.356546]  which belongs to the cache kmalloc-64 of size 64
[   19.356607] The buggy address is located 0 bytes to the right of
[   19.356607]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.356682] 
[   19.356712] The buggy address belongs to the physical page:
[   19.356746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.356808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.356858] page_type: f5(slab)
[   19.356905] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.357399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.357474] page dumped because: kasan: bad access detected
[   19.357523] 
[   19.357553] Memory state around the buggy address:
[   19.357588]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.357646]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.359465] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.359562]                                      ^
[   19.359719]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.359911]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.359975] ==================================================================
[   19.547847] ==================================================================
[   19.547913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.547965] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.548017] 
[   19.548049] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.548133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.548161] Hardware name: linux,dummy-virt (DT)
[   19.548194] Call trace:
[   19.548217]  show_stack+0x20/0x38 (C)
[   19.548269]  dump_stack_lvl+0x8c/0xd0
[   19.548318]  print_report+0x118/0x5d0
[   19.549781]  kasan_report+0xdc/0x128
[   19.551453]  kasan_check_range+0x100/0x1a8
[   19.552128]  __kasan_check_write+0x20/0x30
[   19.552747]  kasan_atomics_helper+0x154c/0x4858
[   19.553109]  kasan_atomics+0x198/0x2e0
[   19.553868]  kunit_try_run_case+0x170/0x3f0
[   19.553956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.554011]  kthread+0x328/0x630
[   19.554055]  ret_from_fork+0x10/0x20
[   19.555089] 
[   19.555195] Allocated by task 265:
[   19.555229]  kasan_save_stack+0x3c/0x68
[   19.555371]  kasan_save_track+0x20/0x40
[   19.555411]  kasan_save_alloc_info+0x40/0x58
[   19.555456]  __kasan_kmalloc+0xd4/0xd8
[   19.555494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.556648]  kasan_atomics+0xb8/0x2e0
[   19.556816]  kunit_try_run_case+0x170/0x3f0
[   19.557635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.558290]  kthread+0x328/0x630
[   19.558526]  ret_from_fork+0x10/0x20
[   19.559017] 
[   19.559588] The buggy address belongs to the object at fff00000c5b24500
[   19.559588]  which belongs to the cache kmalloc-64 of size 64
[   19.559761] The buggy address is located 0 bytes to the right of
[   19.559761]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.560402] 
[   19.560493] The buggy address belongs to the physical page:
[   19.560536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.561276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.562270] page_type: f5(slab)
[   19.562522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.562708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.562968] page dumped because: kasan: bad access detected
[   19.563082] 
[   19.563104] Memory state around the buggy address:
[   19.563815]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.564086]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.564183] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.564409]                                      ^
[   19.564477]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.564997]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.565155] ==================================================================
[   19.181637] ==================================================================
[   19.181699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   19.182114] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.182245] 
[   19.182545] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.182707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.182843] Hardware name: linux,dummy-virt (DT)
[   19.182885] Call trace:
[   19.183006]  show_stack+0x20/0x38 (C)
[   19.183061]  dump_stack_lvl+0x8c/0xd0
[   19.183128]  print_report+0x118/0x5d0
[   19.183403]  kasan_report+0xdc/0x128
[   19.183504]  kasan_check_range+0x100/0x1a8
[   19.183585]  __kasan_check_write+0x20/0x30
[   19.183657]  kasan_atomics_helper+0x47c/0x4858
[   19.183806]  kasan_atomics+0x198/0x2e0
[   19.183855]  kunit_try_run_case+0x170/0x3f0
[   19.185593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.185738]  kthread+0x328/0x630
[   19.186307]  ret_from_fork+0x10/0x20
[   19.186372] 
[   19.186395] Allocated by task 265:
[   19.186598]  kasan_save_stack+0x3c/0x68
[   19.186656]  kasan_save_track+0x20/0x40
[   19.186770]  kasan_save_alloc_info+0x40/0x58
[   19.186842]  __kasan_kmalloc+0xd4/0xd8
[   19.186882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.186933]  kasan_atomics+0xb8/0x2e0
[   19.186971]  kunit_try_run_case+0x170/0x3f0
[   19.187012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.187059]  kthread+0x328/0x630
[   19.187096]  ret_from_fork+0x10/0x20
[   19.187220] The buggy address is located 0 bytes to the right of
[   19.187220]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.189196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.189621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.190325] page dumped because: kasan: bad access detected
[   19.190360] 
[   19.190382] Memory state around the buggy address:
[   19.190417]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.192669]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.193218] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.193283]                                      ^
[   19.193325]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.193456]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.193502] ==================================================================
[   19.425765] ==================================================================
[   19.425832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.425887] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.425952] 
[   19.425984] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.426068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.426095] Hardware name: linux,dummy-virt (DT)
[   19.426130] Call trace:
[   19.426154]  show_stack+0x20/0x38 (C)
[   19.426205]  dump_stack_lvl+0x8c/0xd0
[   19.426253]  print_report+0x118/0x5d0
[   19.426302]  kasan_report+0xdc/0x128
[   19.426348]  kasan_check_range+0x100/0x1a8
[   19.426399]  __kasan_check_write+0x20/0x30
[   19.426445]  kasan_atomics_helper+0xff0/0x4858
[   19.426497]  kasan_atomics+0x198/0x2e0
[   19.426543]  kunit_try_run_case+0x170/0x3f0
[   19.426593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.426652]  kthread+0x328/0x630
[   19.426694]  ret_from_fork+0x10/0x20
[   19.426742] 
[   19.426763] Allocated by task 265:
[   19.426791]  kasan_save_stack+0x3c/0x68
[   19.426834]  kasan_save_track+0x20/0x40
[   19.426873]  kasan_save_alloc_info+0x40/0x58
[   19.426925]  __kasan_kmalloc+0xd4/0xd8
[   19.426964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.427006]  kasan_atomics+0xb8/0x2e0
[   19.427045]  kunit_try_run_case+0x170/0x3f0
[   19.427084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427130]  kthread+0x328/0x630
[   19.427166]  ret_from_fork+0x10/0x20
[   19.427204] 
[   19.427226] The buggy address belongs to the object at fff00000c5b24500
[   19.427226]  which belongs to the cache kmalloc-64 of size 64
[   19.428178] The buggy address is located 0 bytes to the right of
[   19.428178]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.428360] 
[   19.428406] The buggy address belongs to the physical page:
[   19.428787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.428863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.428925] page_type: f5(slab)
[   19.429399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.429681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.429753] page dumped because: kasan: bad access detected
[   19.429857] 
[   19.429916] Memory state around the buggy address:
[   19.430178]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.430232]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.430279] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.430870]                                      ^
[   19.430985]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431130]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431172] ==================================================================
[   19.506639] ==================================================================
[   19.506691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.506743] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.506796] 
[   19.506829] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.507450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.507832] Hardware name: linux,dummy-virt (DT)
[   19.507961] Call trace:
[   19.508008]  show_stack+0x20/0x38 (C)
[   19.508075]  dump_stack_lvl+0x8c/0xd0
[   19.508343]  print_report+0x118/0x5d0
[   19.508439]  kasan_report+0xdc/0x128
[   19.508625]  __asan_report_load8_noabort+0x20/0x30
[   19.508996]  kasan_atomics_helper+0x3f04/0x4858
[   19.509115]  kasan_atomics+0x198/0x2e0
[   19.509240]  kunit_try_run_case+0x170/0x3f0
[   19.509297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.509582]  kthread+0x328/0x630
[   19.509649]  ret_from_fork+0x10/0x20
[   19.510178] 
[   19.510329] Allocated by task 265:
[   19.510404]  kasan_save_stack+0x3c/0x68
[   19.510519]  kasan_save_track+0x20/0x40
[   19.510638]  kasan_save_alloc_info+0x40/0x58
[   19.510894]  __kasan_kmalloc+0xd4/0xd8
[   19.511450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.512047]  kasan_atomics+0xb8/0x2e0
[   19.512319]  kunit_try_run_case+0x170/0x3f0
[   19.512724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.512989]  kthread+0x328/0x630
[   19.513282]  ret_from_fork+0x10/0x20
[   19.513757] 
[   19.513829] The buggy address belongs to the object at fff00000c5b24500
[   19.513829]  which belongs to the cache kmalloc-64 of size 64
[   19.514099] The buggy address is located 0 bytes to the right of
[   19.514099]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.514708] 
[   19.514746] The buggy address belongs to the physical page:
[   19.514781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.514870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.515109] page_type: f5(slab)
[   19.515446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.515667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.515724] page dumped because: kasan: bad access detected
[   19.515760] 
[   19.516104] Memory state around the buggy address:
[   19.516204]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516408]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516805] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.517004]                                      ^
[   19.517129]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517400]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517565] ==================================================================
[   19.346772] ==================================================================
[   19.346824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.347063] Read of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.347131] 
[   19.347163] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.347280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.347324] Hardware name: linux,dummy-virt (DT)
[   19.347358] Call trace:
[   19.347565]  show_stack+0x20/0x38 (C)
[   19.347971]  dump_stack_lvl+0x8c/0xd0
[   19.348063]  print_report+0x118/0x5d0
[   19.348125]  kasan_report+0xdc/0x128
[   19.348216]  __asan_report_load4_noabort+0x20/0x30
[   19.348291]  kasan_atomics_helper+0x3dd8/0x4858
[   19.348343]  kasan_atomics+0x198/0x2e0
[   19.348654]  kunit_try_run_case+0x170/0x3f0
[   19.348716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.348772]  kthread+0x328/0x630
[   19.349107]  ret_from_fork+0x10/0x20
[   19.349210] 
[   19.349249] Allocated by task 265:
[   19.349351]  kasan_save_stack+0x3c/0x68
[   19.349415]  kasan_save_track+0x20/0x40
[   19.349472]  kasan_save_alloc_info+0x40/0x58
[   19.349516]  __kasan_kmalloc+0xd4/0xd8
[   19.349622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.349689]  kasan_atomics+0xb8/0x2e0
[   19.349734]  kunit_try_run_case+0x170/0x3f0
[   19.349781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.349839]  kthread+0x328/0x630
[   19.350177]  ret_from_fork+0x10/0x20
[   19.350400] 
[   19.350674] The buggy address belongs to the object at fff00000c5b24500
[   19.350674]  which belongs to the cache kmalloc-64 of size 64
[   19.350778] The buggy address is located 0 bytes to the right of
[   19.350778]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.350861] 
[   19.350885] The buggy address belongs to the physical page:
[   19.351274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.351355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.351428] page_type: f5(slab)
[   19.351590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.351658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.351704] page dumped because: kasan: bad access detected
[   19.351826] 
[   19.352275] Memory state around the buggy address:
[   19.352454]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.352845]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.353194] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.353309]                                      ^
[   19.353357]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.353666]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.353808] ==================================================================
[   19.393721] ==================================================================
[   19.393821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.393929] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.394149] 
[   19.394400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.394664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.394766] Hardware name: linux,dummy-virt (DT)
[   19.394811] Call trace:
[   19.395428]  show_stack+0x20/0x38 (C)
[   19.395506]  dump_stack_lvl+0x8c/0xd0
[   19.395603]  print_report+0x118/0x5d0
[   19.395680]  kasan_report+0xdc/0x128
[   19.395820]  __asan_report_store8_noabort+0x20/0x30
[   19.395908]  kasan_atomics_helper+0x3e5c/0x4858
[   19.396004]  kasan_atomics+0x198/0x2e0
[   19.396065]  kunit_try_run_case+0x170/0x3f0
[   19.396114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.396464]  kthread+0x328/0x630
[   19.396549]  ret_from_fork+0x10/0x20
[   19.396915] 
[   19.396973] Allocated by task 265:
[   19.397111]  kasan_save_stack+0x3c/0x68
[   19.397201]  kasan_save_track+0x20/0x40
[   19.397330]  kasan_save_alloc_info+0x40/0x58
[   19.397403]  __kasan_kmalloc+0xd4/0xd8
[   19.397575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.397823]  kasan_atomics+0xb8/0x2e0
[   19.397891]  kunit_try_run_case+0x170/0x3f0
[   19.398342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.398747]  kthread+0x328/0x630
[   19.398828]  ret_from_fork+0x10/0x20
[   19.398923] 
[   19.398984] The buggy address belongs to the object at fff00000c5b24500
[   19.398984]  which belongs to the cache kmalloc-64 of size 64
[   19.399065] The buggy address is located 0 bytes to the right of
[   19.399065]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.399452] 
[   19.399489] The buggy address belongs to the physical page:
[   19.400230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.400404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.400473] page_type: f5(slab)
[   19.400868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.400979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.401207] page dumped because: kasan: bad access detected
[   19.401813] 
[   19.401859] Memory state around the buggy address:
[   19.402344]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.402407]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.402582] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.402626]                                      ^
[   19.402878]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.403024]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.403091] ==================================================================
[   19.608002] ==================================================================
[   19.608413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.608671] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.608920] 
[   19.608981] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.609066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.609543] Hardware name: linux,dummy-virt (DT)
[   19.609738] Call trace:
[   19.609871]  show_stack+0x20/0x38 (C)
[   19.609950]  dump_stack_lvl+0x8c/0xd0
[   19.610002]  print_report+0x118/0x5d0
[   19.610153]  kasan_report+0xdc/0x128
[   19.610203]  __asan_report_load8_noabort+0x20/0x30
[   19.610287]  kasan_atomics_helper+0x3df4/0x4858
[   19.610618]  kasan_atomics+0x198/0x2e0
[   19.611087]  kunit_try_run_case+0x170/0x3f0
[   19.611270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.611683]  kthread+0x328/0x630
[   19.611732]  ret_from_fork+0x10/0x20
[   19.612500] 
[   19.612531] Allocated by task 265:
[   19.612708]  kasan_save_stack+0x3c/0x68
[   19.612769]  kasan_save_track+0x20/0x40
[   19.612809]  kasan_save_alloc_info+0x40/0x58
[   19.613382]  __kasan_kmalloc+0xd4/0xd8
[   19.613438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.613599]  kasan_atomics+0xb8/0x2e0
[   19.613689]  kunit_try_run_case+0x170/0x3f0
[   19.614562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.614658]  kthread+0x328/0x630
[   19.614698]  ret_from_fork+0x10/0x20
[   19.614736] 
[   19.614757] The buggy address belongs to the object at fff00000c5b24500
[   19.614757]  which belongs to the cache kmalloc-64 of size 64
[   19.615405] The buggy address is located 0 bytes to the right of
[   19.615405]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.615488] 
[   19.615512] The buggy address belongs to the physical page:
[   19.615545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.615603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.616028] page_type: f5(slab)
[   19.616570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.617134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.617205] page dumped because: kasan: bad access detected
[   19.617240] 
[   19.617261] Memory state around the buggy address:
[   19.617297]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.617345]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.617392] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.617433]                                      ^
[   19.617470]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.617517]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.617557] ==================================================================
[   19.404224] ==================================================================
[   19.404285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.404338] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.404459] 
[   19.404493] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.404579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.404876] Hardware name: linux,dummy-virt (DT)
[   19.405110] Call trace:
[   19.405295]  show_stack+0x20/0x38 (C)
[   19.405384]  dump_stack_lvl+0x8c/0xd0
[   19.405483]  print_report+0x118/0x5d0
[   19.405558]  kasan_report+0xdc/0x128
[   19.405623]  kasan_check_range+0x100/0x1a8
[   19.405714]  __kasan_check_write+0x20/0x30
[   19.405793]  kasan_atomics_helper+0xeb8/0x4858
[   19.406003]  kasan_atomics+0x198/0x2e0
[   19.406087]  kunit_try_run_case+0x170/0x3f0
[   19.406267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.406353]  kthread+0x328/0x630
[   19.406447]  ret_from_fork+0x10/0x20
[   19.406532] 
[   19.406947] Allocated by task 265:
[   19.407137]  kasan_save_stack+0x3c/0x68
[   19.407245]  kasan_save_track+0x20/0x40
[   19.407655]  kasan_save_alloc_info+0x40/0x58
[   19.407842]  __kasan_kmalloc+0xd4/0xd8
[   19.408035]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.408115]  kasan_atomics+0xb8/0x2e0
[   19.408181]  kunit_try_run_case+0x170/0x3f0
[   19.408232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.408280]  kthread+0x328/0x630
[   19.408316]  ret_from_fork+0x10/0x20
[   19.408355] 
[   19.408379] The buggy address belongs to the object at fff00000c5b24500
[   19.408379]  which belongs to the cache kmalloc-64 of size 64
[   19.408450] The buggy address is located 0 bytes to the right of
[   19.408450]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.408517] 
[   19.408540] The buggy address belongs to the physical page:
[   19.408574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.408636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.408688] page_type: f5(slab)
[   19.408730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.408795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.408848] page dumped because: kasan: bad access detected
[   19.408892] 
[   19.408933] Memory state around the buggy address:
[   19.408968]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409013]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409070] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.409112]                                      ^
[   19.409165]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.409210]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.409253] ==================================================================
[   19.223084] ==================================================================
[   19.223657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   19.223796] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.224160]  kasan_report+0xdc/0x128
[   19.224372]  kasan_atomics+0x198/0x2e0
[   19.224692]  kasan_save_stack+0x3c/0x68
[   19.224775]  kasan_save_alloc_info+0x40/0x58
[   19.227328]  kthread+0x328/0x630
[   19.228440] 
[   19.228504] The buggy address belongs to the physical page:
[   19.228539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.229802] 
[   19.229865]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.230190]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.230261] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.230303]                                      ^
[   19.230339]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.230384]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.230426] ==================================================================
[   19.499748] ==================================================================
[   19.499973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.500050] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.500194] 
[   19.500232] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.500318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.500347] Hardware name: linux,dummy-virt (DT)
[   19.500400] Call trace:
[   19.500431]  show_stack+0x20/0x38 (C)
[   19.500482]  dump_stack_lvl+0x8c/0xd0
[   19.500532]  print_report+0x118/0x5d0
[   19.500581]  kasan_report+0xdc/0x128
[   19.500635]  kasan_check_range+0x100/0x1a8
[   19.500686]  __kasan_check_write+0x20/0x30
[   19.500731]  kasan_atomics_helper+0x1384/0x4858
[   19.500791]  kasan_atomics+0x198/0x2e0
[   19.500837]  kunit_try_run_case+0x170/0x3f0
[   19.500886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.500951]  kthread+0x328/0x630
[   19.500994]  ret_from_fork+0x10/0x20
[   19.501044] 
[   19.501065] Allocated by task 265:
[   19.501103]  kasan_save_stack+0x3c/0x68
[   19.501145]  kasan_save_track+0x20/0x40
[   19.501186]  kasan_save_alloc_info+0x40/0x58
[   19.501227]  __kasan_kmalloc+0xd4/0xd8
[   19.501266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.501307]  kasan_atomics+0xb8/0x2e0
[   19.501346]  kunit_try_run_case+0x170/0x3f0
[   19.501387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501435]  kthread+0x328/0x630
[   19.501479]  ret_from_fork+0x10/0x20
[   19.501521] 
[   19.501545] The buggy address belongs to the object at fff00000c5b24500
[   19.501545]  which belongs to the cache kmalloc-64 of size 64
[   19.501606] The buggy address is located 0 bytes to the right of
[   19.501606]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.501674] 
[   19.501696] The buggy address belongs to the physical page:
[   19.501729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.503068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.503159] page_type: f5(slab)
[   19.503233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.503311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.503373] page dumped because: kasan: bad access detected
[   19.503438] 
[   19.503498] Memory state around the buggy address:
[   19.503547]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.503923]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.504147] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.504354]                                      ^
[   19.504893]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505484]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505553] ==================================================================
[   19.526564] ==================================================================
[   19.526611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.526668] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.526719] 
[   19.526749] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.526832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.526860] Hardware name: linux,dummy-virt (DT)
[   19.526893] Call trace:
[   19.526933]  show_stack+0x20/0x38 (C)
[   19.526985]  dump_stack_lvl+0x8c/0xd0
[   19.527033]  print_report+0x118/0x5d0
[   19.527079]  kasan_report+0xdc/0x128
[   19.527127]  kasan_check_range+0x100/0x1a8
[   19.527175]  __kasan_check_write+0x20/0x30
[   19.527223]  kasan_atomics_helper+0x147c/0x4858
[   19.527313]  kasan_atomics+0x198/0x2e0
[   19.527698]  kunit_try_run_case+0x170/0x3f0
[   19.527783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.527861]  kthread+0x328/0x630
[   19.527916]  ret_from_fork+0x10/0x20
[   19.527983] 
[   19.528006] Allocated by task 265:
[   19.528072]  kasan_save_stack+0x3c/0x68
[   19.528117]  kasan_save_track+0x20/0x40
[   19.528174]  kasan_save_alloc_info+0x40/0x58
[   19.528576]  __kasan_kmalloc+0xd4/0xd8
[   19.528637]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.528719]  kasan_atomics+0xb8/0x2e0
[   19.528761]  kunit_try_run_case+0x170/0x3f0
[   19.528830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.528907]  kthread+0x328/0x630
[   19.528942]  ret_from_fork+0x10/0x20
[   19.529029] 
[   19.529054] The buggy address belongs to the object at fff00000c5b24500
[   19.529054]  which belongs to the cache kmalloc-64 of size 64
[   19.529114] The buggy address is located 0 bytes to the right of
[   19.529114]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.529183] 
[   19.529204] The buggy address belongs to the physical page:
[   19.529238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.529292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.529462] page_type: f5(slab)
[   19.529504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.529559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.529741] page dumped because: kasan: bad access detected
[   19.529790] 
[   19.529812] Memory state around the buggy address:
[   19.529847]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.529893]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.529948] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.529990]                                      ^
[   19.530025]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.530068]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.530109] ==================================================================
[   19.519475] ==================================================================
[   19.519533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.519603] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.520006] 
[   19.520056] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.520143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.520327] Hardware name: linux,dummy-virt (DT)
[   19.520373] Call trace:
[   19.520401]  show_stack+0x20/0x38 (C)
[   19.520454]  dump_stack_lvl+0x8c/0xd0
[   19.520503]  print_report+0x118/0x5d0
[   19.520885]  kasan_report+0xdc/0x128
[   19.520968]  kasan_check_range+0x100/0x1a8
[   19.521586]  __kasan_check_write+0x20/0x30
[   19.521801]  kasan_atomics_helper+0x1414/0x4858
[   19.521884]  kasan_atomics+0x198/0x2e0
[   19.522094]  kunit_try_run_case+0x170/0x3f0
[   19.522150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522222]  kthread+0x328/0x630
[   19.522275]  ret_from_fork+0x10/0x20
[   19.522325] 
[   19.522346] Allocated by task 265:
[   19.522386]  kasan_save_stack+0x3c/0x68
[   19.522429]  kasan_save_track+0x20/0x40
[   19.522470]  kasan_save_alloc_info+0x40/0x58
[   19.522511]  __kasan_kmalloc+0xd4/0xd8
[   19.522551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.522591]  kasan_atomics+0xb8/0x2e0
[   19.522636]  kunit_try_run_case+0x170/0x3f0
[   19.522675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522722]  kthread+0x328/0x630
[   19.522756]  ret_from_fork+0x10/0x20
[   19.522793] 
[   19.522815] The buggy address belongs to the object at fff00000c5b24500
[   19.522815]  which belongs to the cache kmalloc-64 of size 64
[   19.522875] The buggy address is located 0 bytes to the right of
[   19.522875]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.523161] 
[   19.523218] The buggy address belongs to the physical page:
[   19.523330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.523555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.523611] page_type: f5(slab)
[   19.523653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.524021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.524236] page dumped because: kasan: bad access detected
[   19.524524] 
[   19.524664] Memory state around the buggy address:
[   19.524754]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.524993]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525267] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.525320]                                      ^
[   19.525628]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526307]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526366] ==================================================================
[   19.388348] ==================================================================
[   19.388500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.388574] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.388627] 
[   19.388938] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.389214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.389248] Hardware name: linux,dummy-virt (DT)
[   19.389280] Call trace:
[   19.389304]  show_stack+0x20/0x38 (C)
[   19.389369]  dump_stack_lvl+0x8c/0xd0
[   19.389426]  print_report+0x118/0x5d0
[   19.389490]  kasan_report+0xdc/0x128
[   19.389540]  kasan_check_range+0x100/0x1a8
[   19.389590]  __kasan_check_write+0x20/0x30
[   19.389647]  kasan_atomics_helper+0xe44/0x4858
[   19.389698]  kasan_atomics+0x198/0x2e0
[   19.389744]  kunit_try_run_case+0x170/0x3f0
[   19.389793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.389848]  kthread+0x328/0x630
[   19.389912]  ret_from_fork+0x10/0x20
[   19.389962] 
[   19.389983] Allocated by task 265:
[   19.390013]  kasan_save_stack+0x3c/0x68
[   19.390055]  kasan_save_track+0x20/0x40
[   19.390097]  kasan_save_alloc_info+0x40/0x58
[   19.390139]  __kasan_kmalloc+0xd4/0xd8
[   19.390177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.390218]  kasan_atomics+0xb8/0x2e0
[   19.390257]  kunit_try_run_case+0x170/0x3f0
[   19.390298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390344]  kthread+0x328/0x630
[   19.390380]  ret_from_fork+0x10/0x20
[   19.390419] 
[   19.390450] The buggy address belongs to the object at fff00000c5b24500
[   19.390450]  which belongs to the cache kmalloc-64 of size 64
[   19.390511] The buggy address is located 0 bytes to the right of
[   19.390511]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.390577] 
[   19.390599] The buggy address belongs to the physical page:
[   19.390637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.390699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.390750] page_type: f5(slab)
[   19.390790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.390853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.390907] page dumped because: kasan: bad access detected
[   19.390952] 
[   19.390990] Memory state around the buggy address:
[   19.391050]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.391096]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.391140] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.391180]                                      ^
[   19.392130]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.392220]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.392282] ==================================================================
[   19.197034] ==================================================================
[   19.197318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   19.197437] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.197682] 
[   19.197833] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.199663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.199702] Hardware name: linux,dummy-virt (DT)
[   19.199756] Call trace:
[   19.199784]  show_stack+0x20/0x38 (C)
[   19.199843]  dump_stack_lvl+0x8c/0xd0
[   19.199892]  print_report+0x118/0x5d0
[   19.200608]  kasan_report+0xdc/0x128
[   19.200822]  kasan_check_range+0x100/0x1a8
[   19.200874]  __kasan_check_write+0x20/0x30
[   19.201920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.202013]  kthread+0x328/0x630
[   19.202136]  ret_from_fork+0x10/0x20
[   19.202348] 
[   19.202373] Allocated by task 265:
[   19.202455]  kasan_save_stack+0x3c/0x68
[   19.202537]  kasan_save_track+0x20/0x40
[   19.202612]  kasan_save_alloc_info+0x40/0x58
[   19.202687]  __kasan_kmalloc+0xd4/0xd8
[   19.203631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.203690]  kasan_atomics+0xb8/0x2e0
[   19.203954] 
[   19.204103] 
[   19.204226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.207961]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.208011]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.208179]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209993] ==================================================================
[   19.283057] ==================================================================
[   19.283118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.283194] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.283353] 
[   19.283392] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.283569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.283618] Hardware name: linux,dummy-virt (DT)
[   19.283652] Call trace:
[   19.284006]  show_stack+0x20/0x38 (C)
[   19.284213]  dump_stack_lvl+0x8c/0xd0
[   19.284274]  print_report+0x118/0x5d0
[   19.284419]  kasan_report+0xdc/0x128
[   19.284473]  kasan_check_range+0x100/0x1a8
[   19.284534]  __kasan_check_write+0x20/0x30
[   19.284609]  kasan_atomics_helper+0xa6c/0x4858
[   19.284676]  kasan_atomics+0x198/0x2e0
[   19.285009]  kunit_try_run_case+0x170/0x3f0
[   19.285196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.285321]  kthread+0x328/0x630
[   19.285545]  ret_from_fork+0x10/0x20
[   19.285786] 
[   19.285993] Allocated by task 265:
[   19.286073]  kasan_save_stack+0x3c/0x68
[   19.286240]  kasan_save_track+0x20/0x40
[   19.286310]  kasan_save_alloc_info+0x40/0x58
[   19.286353]  __kasan_kmalloc+0xd4/0xd8
[   19.286393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.286434]  kasan_atomics+0xb8/0x2e0
[   19.286840]  kunit_try_run_case+0x170/0x3f0
[   19.287271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.287331]  kthread+0x328/0x630
[   19.287400]  ret_from_fork+0x10/0x20
[   19.287460] 
[   19.287494] The buggy address belongs to the object at fff00000c5b24500
[   19.287494]  which belongs to the cache kmalloc-64 of size 64
[   19.287571] The buggy address is located 0 bytes to the right of
[   19.287571]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.287642] 
[   19.287673] The buggy address belongs to the physical page:
[   19.287708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.287762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.287812] page_type: f5(slab)
[   19.287862] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.287938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.287990] page dumped because: kasan: bad access detected
[   19.288034] 
[   19.288064] Memory state around the buggy address:
[   19.288109]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.288154]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.288199] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.288248]                                      ^
[   19.288291]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.288336]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.288386] ==================================================================
[   19.411292] ==================================================================
[   19.411375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.411686] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.411757] 
[   19.411830] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.411957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.412146] Hardware name: linux,dummy-virt (DT)
[   19.412211] Call trace:
[   19.412255]  show_stack+0x20/0x38 (C)
[   19.412319]  dump_stack_lvl+0x8c/0xd0
[   19.412507]  print_report+0x118/0x5d0
[   19.412590]  kasan_report+0xdc/0x128
[   19.412663]  kasan_check_range+0x100/0x1a8
[   19.412715]  __kasan_check_write+0x20/0x30
[   19.412762]  kasan_atomics_helper+0xf20/0x4858
[   19.412810]  kasan_atomics+0x198/0x2e0
[   19.413143]  kunit_try_run_case+0x170/0x3f0
[   19.413420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413487]  kthread+0x328/0x630
[   19.413533]  ret_from_fork+0x10/0x20
[   19.413689] 
[   19.413727] Allocated by task 265:
[   19.413826]  kasan_save_stack+0x3c/0x68
[   19.413882]  kasan_save_track+0x20/0x40
[   19.413984]  kasan_save_alloc_info+0x40/0x58
[   19.414026]  __kasan_kmalloc+0xd4/0xd8
[   19.414066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.414108]  kasan_atomics+0xb8/0x2e0
[   19.414145]  kunit_try_run_case+0x170/0x3f0
[   19.414186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.414232]  kthread+0x328/0x630
[   19.414515]  ret_from_fork+0x10/0x20
[   19.414763] 
[   19.414934] The buggy address belongs to the object at fff00000c5b24500
[   19.414934]  which belongs to the cache kmalloc-64 of size 64
[   19.415070] The buggy address is located 0 bytes to the right of
[   19.415070]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.415150] 
[   19.415172] The buggy address belongs to the physical page:
[   19.415374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.415614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.415694] page_type: f5(slab)
[   19.415750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.416130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.416489] page dumped because: kasan: bad access detected
[   19.416556] 
[   19.416952] Memory state around the buggy address:
[   19.417015]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417099]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417148] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.417358]                                      ^
[   19.417565]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417636]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.418122] ==================================================================
[   19.361061] ==================================================================
[   19.361125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.361242] Read of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.361294] 
[   19.361606] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.361991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.362106] Hardware name: linux,dummy-virt (DT)
[   19.362174] Call trace:
[   19.362212]  show_stack+0x20/0x38 (C)
[   19.362364]  dump_stack_lvl+0x8c/0xd0
[   19.362461]  print_report+0x118/0x5d0
[   19.362612]  kasan_report+0xdc/0x128
[   19.362667]  __asan_report_load4_noabort+0x20/0x30
[   19.362758]  kasan_atomics_helper+0x3e04/0x4858
[   19.362811]  kasan_atomics+0x198/0x2e0
[   19.363154]  kunit_try_run_case+0x170/0x3f0
[   19.363402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.363620]  kthread+0x328/0x630
[   19.363705]  ret_from_fork+0x10/0x20
[   19.363855] 
[   19.363895] Allocated by task 265:
[   19.364025]  kasan_save_stack+0x3c/0x68
[   19.364101]  kasan_save_track+0x20/0x40
[   19.364161]  kasan_save_alloc_info+0x40/0x58
[   19.364211]  __kasan_kmalloc+0xd4/0xd8
[   19.364436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.364646]  kasan_atomics+0xb8/0x2e0
[   19.364875]  kunit_try_run_case+0x170/0x3f0
[   19.365102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.365412]  kthread+0x328/0x630
[   19.365507]  ret_from_fork+0x10/0x20
[   19.365807] 
[   19.365924] The buggy address belongs to the object at fff00000c5b24500
[   19.365924]  which belongs to the cache kmalloc-64 of size 64
[   19.366019] The buggy address is located 0 bytes to the right of
[   19.366019]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.366096] 
[   19.366505] The buggy address belongs to the physical page:
[   19.366850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.366946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.367420] page_type: f5(slab)
[   19.367486] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.367636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.367692] page dumped because: kasan: bad access detected
[   19.367948] 
[   19.368087] Memory state around the buggy address:
[   19.368493]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.368867]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.369376] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.369494]                                      ^
[   19.369561]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.369632]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.369860] ==================================================================
[   19.443545] ==================================================================
[   19.443608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.443771] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.443951] 
[   19.443987] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.444200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.444277] Hardware name: linux,dummy-virt (DT)
[   19.444311] Call trace:
[   19.444338]  show_stack+0x20/0x38 (C)
[   19.444391]  dump_stack_lvl+0x8c/0xd0
[   19.444724]  print_report+0x118/0x5d0
[   19.444940]  kasan_report+0xdc/0x128
[   19.445009]  kasan_check_range+0x100/0x1a8
[   19.445223]  __kasan_check_write+0x20/0x30
[   19.445676]  kasan_atomics_helper+0x10c0/0x4858
[   19.445795]  kasan_atomics+0x198/0x2e0
[   19.446076]  kunit_try_run_case+0x170/0x3f0
[   19.446243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.446305]  kthread+0x328/0x630
[   19.446371]  ret_from_fork+0x10/0x20
[   19.446680] 
[   19.446967] Allocated by task 265:
[   19.447317]  kasan_save_stack+0x3c/0x68
[   19.447431]  kasan_save_track+0x20/0x40
[   19.447538]  kasan_save_alloc_info+0x40/0x58
[   19.447637]  __kasan_kmalloc+0xd4/0xd8
[   19.447927]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.447981]  kasan_atomics+0xb8/0x2e0
[   19.448019]  kunit_try_run_case+0x170/0x3f0
[   19.448461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.448844]  kthread+0x328/0x630
[   19.449476]  ret_from_fork+0x10/0x20
[   19.449536] 
[   19.449561] The buggy address belongs to the object at fff00000c5b24500
[   19.449561]  which belongs to the cache kmalloc-64 of size 64
[   19.450000] The buggy address is located 0 bytes to the right of
[   19.450000]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.450231] 
[   19.450258] The buggy address belongs to the physical page:
[   19.450471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.450874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.451256] page_type: f5(slab)
[   19.451308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.451670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.451750] page dumped because: kasan: bad access detected
[   19.451785] 
[   19.451808] Memory state around the buggy address:
[   19.451844]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451892]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451946] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.452035]                                      ^
[   19.452082]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452130]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452172] ==================================================================
[   19.663522] ==================================================================
[   19.663573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.663627] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.663680] 
[   19.663711] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.663794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.663825] Hardware name: linux,dummy-virt (DT)
[   19.663859] Call trace:
[   19.663882]  show_stack+0x20/0x38 (C)
[   19.663945]  dump_stack_lvl+0x8c/0xd0
[   19.663994]  print_report+0x118/0x5d0
[   19.664042]  kasan_report+0xdc/0x128
[   19.664091]  __asan_report_load8_noabort+0x20/0x30
[   19.664145]  kasan_atomics_helper+0x3e20/0x4858
[   19.664194]  kasan_atomics+0x198/0x2e0
[   19.664393]  kunit_try_run_case+0x170/0x3f0
[   19.664820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665568]  kthread+0x328/0x630
[   19.665840]  ret_from_fork+0x10/0x20
[   19.665915] 
[   19.665938] Allocated by task 265:
[   19.665967]  kasan_save_stack+0x3c/0x68
[   19.666018]  kasan_save_track+0x20/0x40
[   19.666057]  kasan_save_alloc_info+0x40/0x58
[   19.666100]  __kasan_kmalloc+0xd4/0xd8
[   19.666145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.666202]  kasan_atomics+0xb8/0x2e0
[   19.666239]  kunit_try_run_case+0x170/0x3f0
[   19.666279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.666325]  kthread+0x328/0x630
[   19.666358]  ret_from_fork+0x10/0x20
[   19.666396] 
[   19.666418] The buggy address belongs to the object at fff00000c5b24500
[   19.666418]  which belongs to the cache kmalloc-64 of size 64
[   19.666478] The buggy address is located 0 bytes to the right of
[   19.666478]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.666546] 
[   19.666568] The buggy address belongs to the physical page:
[   19.666601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.666663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.666715] page_type: f5(slab)
[   19.666755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.666808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.666852] page dumped because: kasan: bad access detected
[   19.666886] 
[   19.666917] Memory state around the buggy address:
[   19.666950]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.666998]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.667044] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.667087]                                      ^
[   19.667122]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.667168]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.667210] ==================================================================
[   19.617789] ==================================================================
[   19.617841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.617890] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.617952] 
[   19.618039] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.618128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.618156] Hardware name: linux,dummy-virt (DT)
[   19.618372] Call trace:
[   19.618495]  show_stack+0x20/0x38 (C)
[   19.618776]  dump_stack_lvl+0x8c/0xd0
[   19.618839]  print_report+0x118/0x5d0
[   19.618890]  kasan_report+0xdc/0x128
[   19.619458]  kasan_check_range+0x100/0x1a8
[   19.619787]  __kasan_check_write+0x20/0x30
[   19.620054]  kasan_atomics_helper+0x16d0/0x4858
[   19.620322]  kasan_atomics+0x198/0x2e0
[   19.620771]  kunit_try_run_case+0x170/0x3f0
[   19.621005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.621282]  kthread+0x328/0x630
[   19.621503]  ret_from_fork+0x10/0x20
[   19.622104] 
[   19.622138] Allocated by task 265:
[   19.622454]  kasan_save_stack+0x3c/0x68
[   19.622695]  kasan_save_track+0x20/0x40
[   19.622737]  kasan_save_alloc_info+0x40/0x58
[   19.622780]  __kasan_kmalloc+0xd4/0xd8
[   19.623321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.623416]  kasan_atomics+0xb8/0x2e0
[   19.623455]  kunit_try_run_case+0x170/0x3f0
[   19.623497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.624141]  kthread+0x328/0x630
[   19.624535]  ret_from_fork+0x10/0x20
[   19.624795] 
[   19.624819] The buggy address belongs to the object at fff00000c5b24500
[   19.624819]  which belongs to the cache kmalloc-64 of size 64
[   19.625119] The buggy address is located 0 bytes to the right of
[   19.625119]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.625191] 
[   19.625573] The buggy address belongs to the physical page:
[   19.625621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.625882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.626538] page_type: f5(slab)
[   19.626597] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.626656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.627060] page dumped because: kasan: bad access detected
[   19.627467] 
[   19.627495] Memory state around the buggy address:
[   19.627755]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.628214]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.628282] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.628326]                                      ^
[   19.628364]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628935]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628981] ==================================================================
[   19.631500] ==================================================================
[   19.631554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.631615] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.631668] 
[   19.631699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.631784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.631812] Hardware name: linux,dummy-virt (DT)
[   19.631848] Call trace:
[   19.631872]  show_stack+0x20/0x38 (C)
[   19.631934]  dump_stack_lvl+0x8c/0xd0
[   19.631983]  print_report+0x118/0x5d0
[   19.634076]  kasan_report+0xdc/0x128
[   19.634467]  __asan_report_load8_noabort+0x20/0x30
[   19.634523]  kasan_atomics_helper+0x3e10/0x4858
[   19.635686]  kasan_atomics+0x198/0x2e0
[   19.635929]  kunit_try_run_case+0x170/0x3f0
[   19.636448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.636910]  kthread+0x328/0x630
[   19.637062]  ret_from_fork+0x10/0x20
[   19.637669] 
[   19.637707] Allocated by task 265:
[   19.638339]  kasan_save_stack+0x3c/0x68
[   19.638400]  kasan_save_track+0x20/0x40
[   19.638443]  kasan_save_alloc_info+0x40/0x58
[   19.638485]  __kasan_kmalloc+0xd4/0xd8
[   19.638525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.639398]  kasan_atomics+0xb8/0x2e0
[   19.639478]  kunit_try_run_case+0x170/0x3f0
[   19.639927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.640023]  kthread+0x328/0x630
[   19.640061]  ret_from_fork+0x10/0x20
[   19.640847] 
[   19.640876] The buggy address belongs to the object at fff00000c5b24500
[   19.640876]  which belongs to the cache kmalloc-64 of size 64
[   19.640952] The buggy address is located 0 bytes to the right of
[   19.640952]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.642047] 
[   19.642081] The buggy address belongs to the physical page:
[   19.642127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.643087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.643417] page_type: f5(slab)
[   19.643743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.644054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.644605] page dumped because: kasan: bad access detected
[   19.644926] 
[   19.644957] Memory state around the buggy address:
[   19.645370]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645471]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.646196] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.646247]                                      ^
[   19.646447]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.646730]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.647356] ==================================================================
[   19.461841] ==================================================================
[   19.462109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.462274] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.462494] 
[   19.462605] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.463144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.463328] Hardware name: linux,dummy-virt (DT)
[   19.463491] Call trace:
[   19.463585]  show_stack+0x20/0x38 (C)
[   19.463641]  dump_stack_lvl+0x8c/0xd0
[   19.463690]  print_report+0x118/0x5d0
[   19.463740]  kasan_report+0xdc/0x128
[   19.464201]  kasan_check_range+0x100/0x1a8
[   19.464363]  __kasan_check_write+0x20/0x30
[   19.464507]  kasan_atomics_helper+0x1190/0x4858
[   19.464557]  kasan_atomics+0x198/0x2e0
[   19.464612]  kunit_try_run_case+0x170/0x3f0
[   19.464969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.465368]  kthread+0x328/0x630
[   19.465495]  ret_from_fork+0x10/0x20
[   19.465587] 
[   19.465996] Allocated by task 265:
[   19.466258]  kasan_save_stack+0x3c/0x68
[   19.466331]  kasan_save_track+0x20/0x40
[   19.466464]  kasan_save_alloc_info+0x40/0x58
[   19.466553]  __kasan_kmalloc+0xd4/0xd8
[   19.466859]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.466989]  kasan_atomics+0xb8/0x2e0
[   19.467376]  kunit_try_run_case+0x170/0x3f0
[   19.467785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.467864]  kthread+0x328/0x630
[   19.468216]  ret_from_fork+0x10/0x20
[   19.468381] 
[   19.468609] The buggy address belongs to the object at fff00000c5b24500
[   19.468609]  which belongs to the cache kmalloc-64 of size 64
[   19.469224] The buggy address is located 0 bytes to the right of
[   19.469224]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.469614] 
[   19.469666] The buggy address belongs to the physical page:
[   19.469730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.469843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.470167] page_type: f5(slab)
[   19.470248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.470768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.470846] page dumped because: kasan: bad access detected
[   19.471062] 
[   19.471129] Memory state around the buggy address:
[   19.471371]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.471584]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.472042] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.472173]                                      ^
[   19.472644]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.472854]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.473042] ==================================================================
[   19.230835] ==================================================================
[   19.230886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   19.230953] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.231004] 
[   19.231035] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.231118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.231158] Hardware name: linux,dummy-virt (DT)
[   19.231210] Call trace:
[   19.231237]  show_stack+0x20/0x38 (C)
[   19.231300]  dump_stack_lvl+0x8c/0xd0
[   19.231350]  print_report+0x118/0x5d0
[   19.231524]  kasan_report+0xdc/0x128
[   19.231724]  kasan_check_range+0x100/0x1a8
[   19.231812]  __kasan_check_write+0x20/0x30
[   19.231926]  kasan_atomics_helper+0x6ec/0x4858
[   19.231977]  kasan_atomics+0x198/0x2e0
[   19.232023]  kunit_try_run_case+0x170/0x3f0
[   19.232591]  kthread+0x328/0x630
[   19.232703] 
[   19.232723] Allocated by task 265:
[   19.232798]  kasan_save_track+0x20/0x40
[   19.232937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.233103]  kthread+0x328/0x630
[   19.233197] The buggy address belongs to the object at fff00000c5b24500
[   19.233197]  which belongs to the cache kmalloc-64 of size 64
[   19.233324] 
[   19.233346] The buggy address belongs to the physical page:
[   19.233379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.233433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.233481] page_type: f5(slab)
[   19.233535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.233588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.233643] page dumped because: kasan: bad access detected
[   19.233748]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.234041]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.234705] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.234944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.235245] Call trace:
[   19.235383]  print_report+0x118/0x5d0
[   19.235432]  kasan_report+0xdc/0x128
[   19.235480]  kasan_check_range+0x100/0x1a8
[   19.235826]  kunit_try_run_case+0x170/0x3f0
[   19.235877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.235943]  kthread+0x328/0x630
[   19.236002]  ret_from_fork+0x10/0x20
[   19.236067] 
[   19.236424]  kasan_save_track+0x20/0x40
[   19.236466]  kasan_save_alloc_info+0x40/0x58
[   19.236510]  __kasan_kmalloc+0xd4/0xd8
[   19.236550]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.236592]  kasan_atomics+0xb8/0x2e0
[   19.236631]  kunit_try_run_case+0x170/0x3f0
[   19.236671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.237723] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.237765]                                      ^
[   19.237827]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.241484] page_type: f5(slab)
[   19.241529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.241581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.241634] page dumped because: kasan: bad access detected
[   19.241668] 
[   19.241688] Memory state around the buggy address:
[   19.241721]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.241771]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.242030] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.242376]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.242493]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.242563] ==================================================================
[   19.377316] ==================================================================
[   19.377369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.377429] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.377494] 
[   19.377533] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.377837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.378107] Hardware name: linux,dummy-virt (DT)
[   19.378168] Call trace:
[   19.378217]  show_stack+0x20/0x38 (C)
[   19.378637]  dump_stack_lvl+0x8c/0xd0
[   19.378731]  print_report+0x118/0x5d0
[   19.380317]  kasan_report+0xdc/0x128
[   19.380382]  __asan_report_load8_noabort+0x20/0x30
[   19.380692]  kasan_atomics_helper+0x3f58/0x4858
[   19.380929]  kasan_atomics+0x198/0x2e0
[   19.381014]  kunit_try_run_case+0x170/0x3f0
[   19.381171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381275]  kthread+0x328/0x630
[   19.381323]  ret_from_fork+0x10/0x20
[   19.381784] 
[   19.382608] Allocated by task 265:
[   19.382687]  kasan_save_stack+0x3c/0x68
[   19.382739]  kasan_save_track+0x20/0x40
[   19.382796]  kasan_save_alloc_info+0x40/0x58
[   19.382858]  __kasan_kmalloc+0xd4/0xd8
[   19.382941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.383192]  kasan_atomics+0xb8/0x2e0
[   19.383528]  kunit_try_run_case+0x170/0x3f0
[   19.383882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.384220]  kthread+0x328/0x630
[   19.384353]  ret_from_fork+0x10/0x20
[   19.384502] 
[   19.384779] The buggy address belongs to the object at fff00000c5b24500
[   19.384779]  which belongs to the cache kmalloc-64 of size 64
[   19.384866] The buggy address is located 0 bytes to the right of
[   19.384866]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.385254] 
[   19.385337] The buggy address belongs to the physical page:
[   19.385392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.385467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.385725] page_type: f5(slab)
[   19.385923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.386031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.386236] page dumped because: kasan: bad access detected
[   19.386434] 
[   19.386473] Memory state around the buggy address:
[   19.386521]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.386570]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.386614] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.387002]                                      ^
[   19.387461]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.387563]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.387655] ==================================================================
[   19.212729] ==================================================================
[   19.213014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   19.213392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.213460] Hardware name: linux,dummy-virt (DT)
[   19.213496] Call trace:
[   19.213697]  dump_stack_lvl+0x8c/0xd0
[   19.214189]  __kasan_check_write+0x20/0x30
[   19.216164] 
[   19.216252] The buggy address belongs to the physical page:
[   19.216287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.216818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.217551] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.217624]                                      ^
[   19.217721]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.218945] ==================================================================
[   19.267404] ==================================================================
[   19.267581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.267793] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.268008] 
[   19.268122] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.269272]  kasan_atomics+0x198/0x2e0
[   19.269709]  kasan_save_alloc_info+0x40/0x58
[   19.271615] The buggy address belongs to the object at fff00000c5b24500
[   19.271615]  which belongs to the cache kmalloc-64 of size 64
[   19.272154] page dumped because: kasan: bad access detected
[   19.273188] ==================================================================
[   19.488579] ==================================================================
[   19.488632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.488962] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.489344] 
[   19.489384] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.489474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.489981] Hardware name: linux,dummy-virt (DT)
[   19.490250] Call trace:
[   19.490668]  show_stack+0x20/0x38 (C)
[   19.490765]  dump_stack_lvl+0x8c/0xd0
[   19.490825]  print_report+0x118/0x5d0
[   19.491196]  kasan_report+0xdc/0x128
[   19.491623]  kasan_check_range+0x100/0x1a8
[   19.491720]  __kasan_check_write+0x20/0x30
[   19.491961]  kasan_atomics_helper+0x12d8/0x4858
[   19.492088]  kasan_atomics+0x198/0x2e0
[   19.492141]  kunit_try_run_case+0x170/0x3f0
[   19.492383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.492634]  kthread+0x328/0x630
[   19.493059]  ret_from_fork+0x10/0x20
[   19.493292] 
[   19.493682] Allocated by task 265:
[   19.493738]  kasan_save_stack+0x3c/0x68
[   19.494040]  kasan_save_track+0x20/0x40
[   19.494131]  kasan_save_alloc_info+0x40/0x58
[   19.494266]  __kasan_kmalloc+0xd4/0xd8
[   19.494352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.494396]  kasan_atomics+0xb8/0x2e0
[   19.494435]  kunit_try_run_case+0x170/0x3f0
[   19.494680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.494869]  kthread+0x328/0x630
[   19.495195]  ret_from_fork+0x10/0x20
[   19.495410] 
[   19.495455] The buggy address belongs to the object at fff00000c5b24500
[   19.495455]  which belongs to the cache kmalloc-64 of size 64
[   19.495692] The buggy address is located 0 bytes to the right of
[   19.495692]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.495885] 
[   19.495984] The buggy address belongs to the physical page:
[   19.496297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.496726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.497174] page_type: f5(slab)
[   19.497242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.497477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.497614] page dumped because: kasan: bad access detected
[   19.497927] 
[   19.498226] Memory state around the buggy address:
[   19.498434]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.498496]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.498785] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.499262]                                      ^
[   19.499342]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499435]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499477] ==================================================================
[   19.432777] ==================================================================
[   19.432910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.433053] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.433115] 
[   19.433145] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.433391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.433434] Hardware name: linux,dummy-virt (DT)
[   19.433933] Call trace:
[   19.433979]  show_stack+0x20/0x38 (C)
[   19.434034]  dump_stack_lvl+0x8c/0xd0
[   19.434216]  print_report+0x118/0x5d0
[   19.434384]  kasan_report+0xdc/0x128
[   19.434436]  kasan_check_range+0x100/0x1a8
[   19.434502]  __kasan_check_write+0x20/0x30
[   19.434753]  kasan_atomics_helper+0x1058/0x4858
[   19.434862]  kasan_atomics+0x198/0x2e0
[   19.435161]  kunit_try_run_case+0x170/0x3f0
[   19.435231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435417]  kthread+0x328/0x630
[   19.435472]  ret_from_fork+0x10/0x20
[   19.435573] 
[   19.435606] Allocated by task 265:
[   19.435639]  kasan_save_stack+0x3c/0x68
[   19.435701]  kasan_save_track+0x20/0x40
[   19.435759]  kasan_save_alloc_info+0x40/0x58
[   19.435800]  __kasan_kmalloc+0xd4/0xd8
[   19.435842]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.436135]  kasan_atomics+0xb8/0x2e0
[   19.436239]  kunit_try_run_case+0x170/0x3f0
[   19.436702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.436911]  kthread+0x328/0x630
[   19.437243]  ret_from_fork+0x10/0x20
[   19.437526] 
[   19.437556] The buggy address belongs to the object at fff00000c5b24500
[   19.437556]  which belongs to the cache kmalloc-64 of size 64
[   19.438052] The buggy address is located 0 bytes to the right of
[   19.438052]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.438415] 
[   19.438922] The buggy address belongs to the physical page:
[   19.440336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.440462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.440654] page_type: f5(slab)
[   19.440720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.440778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.441178] page dumped because: kasan: bad access detected
[   19.441478] 
[   19.441544] Memory state around the buggy address:
[   19.441644]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.441711]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.442079] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.442450]                                      ^
[   19.442652]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.442703]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.442745] ==================================================================
[   19.452495] ==================================================================
[   19.452546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.452597] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265
[   19.452649] 
[   19.452681] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.452766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.452793] Hardware name: linux,dummy-virt (DT)
[   19.452826] Call trace:
[   19.452852]  show_stack+0x20/0x38 (C)
[   19.452917]  dump_stack_lvl+0x8c/0xd0
[   19.452965]  print_report+0x118/0x5d0
[   19.453837]  kasan_report+0xdc/0x128
[   19.453985]  kasan_check_range+0x100/0x1a8
[   19.454115]  __kasan_check_write+0x20/0x30
[   19.454176]  kasan_atomics_helper+0x1128/0x4858
[   19.454507]  kasan_atomics+0x198/0x2e0
[   19.454990]  kunit_try_run_case+0x170/0x3f0
[   19.455142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455402]  kthread+0x328/0x630
[   19.455519]  ret_from_fork+0x10/0x20
[   19.455932] 
[   19.456145] Allocated by task 265:
[   19.456275]  kasan_save_stack+0x3c/0x68
[   19.456383]  kasan_save_track+0x20/0x40
[   19.456426]  kasan_save_alloc_info+0x40/0x58
[   19.456522]  __kasan_kmalloc+0xd4/0xd8
[   19.456711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.456987]  kasan_atomics+0xb8/0x2e0
[   19.457219]  kunit_try_run_case+0x170/0x3f0
[   19.457384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457607]  kthread+0x328/0x630
[   19.457650]  ret_from_fork+0x10/0x20
[   19.457824] 
[   19.457867] The buggy address belongs to the object at fff00000c5b24500
[   19.457867]  which belongs to the cache kmalloc-64 of size 64
[   19.458399] The buggy address is located 0 bytes to the right of
[   19.458399]  allocated 48-byte region [fff00000c5b24500, fff00000c5b24530)
[   19.458606] 
[   19.458701] The buggy address belongs to the physical page:
[   19.458749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24
[   19.458949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.459029] page_type: f5(slab)
[   19.459162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.459220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.459291] page dumped because: kasan: bad access detected
[   19.459327] 
[   19.459348] Memory state around the buggy address:
[   19.459383]  fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.459941]  fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.460174] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.460227]                                      ^
[   19.460306]  fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.460590]  fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.460744] ==================================================================

[   19.878836] ==================================================================
[   19.878891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.878944] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.879200] 
[   19.879244] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.879485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.879518] Hardware name: linux,dummy-virt (DT)
[   19.879552] Call trace:
[   19.879577]  show_stack+0x20/0x38 (C)
[   19.879650]  dump_stack_lvl+0x8c/0xd0
[   19.880017]  print_report+0x118/0x5d0
[   19.880093]  kasan_report+0xdc/0x128
[   19.880392]  __asan_report_load8_noabort+0x20/0x30
[   19.881497]  kasan_atomics_helper+0x3df4/0x4858
[   19.881611]  kasan_atomics+0x198/0x2e0
[   19.881871]  kunit_try_run_case+0x170/0x3f0
[   19.882026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.882165]  kthread+0x328/0x630
[   19.882423]  ret_from_fork+0x10/0x20
[   19.882695] 
[   19.882752] Allocated by task 265:
[   19.883140]  kasan_save_stack+0x3c/0x68
[   19.883228]  kasan_save_track+0x20/0x40
[   19.883415]  kasan_save_alloc_info+0x40/0x58
[   19.883491]  __kasan_kmalloc+0xd4/0xd8
[   19.883768]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.883982]  kasan_atomics+0xb8/0x2e0
[   19.884232]  kunit_try_run_case+0x170/0x3f0
[   19.884491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.884669]  kthread+0x328/0x630
[   19.884987]  ret_from_fork+0x10/0x20
[   19.885305] 
[   19.885334] The buggy address belongs to the object at fff00000c5b40680
[   19.885334]  which belongs to the cache kmalloc-64 of size 64
[   19.885494] The buggy address is located 0 bytes to the right of
[   19.885494]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.885579] 
[   19.885600] The buggy address belongs to the physical page:
[   19.885645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.885703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.885754] page_type: f5(slab)
[   19.885795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.886017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.886067] page dumped because: kasan: bad access detected
[   19.886110] 
[   19.886132] Memory state around the buggy address:
[   19.886167]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.886216]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.886262] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.886304]                                      ^
[   19.886350]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886395]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886445] ==================================================================
[   19.887014] ==================================================================
[   19.887079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.887133] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.887191] 
[   19.887230] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.887315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.887354] Hardware name: linux,dummy-virt (DT)
[   19.887386] Call trace:
[   19.887412]  show_stack+0x20/0x38 (C)
[   19.887460]  dump_stack_lvl+0x8c/0xd0
[   19.887518]  print_report+0x118/0x5d0
[   19.887571]  kasan_report+0xdc/0x128
[   19.888590]  kasan_check_range+0x100/0x1a8
[   19.888711]  __kasan_check_write+0x20/0x30
[   19.888764]  kasan_atomics_helper+0x16d0/0x4858
[   19.889063]  kasan_atomics+0x198/0x2e0
[   19.889450]  kunit_try_run_case+0x170/0x3f0
[   19.889522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889578]  kthread+0x328/0x630
[   19.889631]  ret_from_fork+0x10/0x20
[   19.890138] 
[   19.890182] Allocated by task 265:
[   19.890675]  kasan_save_stack+0x3c/0x68
[   19.890780]  kasan_save_track+0x20/0x40
[   19.891227]  kasan_save_alloc_info+0x40/0x58
[   19.891305]  __kasan_kmalloc+0xd4/0xd8
[   19.891703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.891929]  kasan_atomics+0xb8/0x2e0
[   19.892029]  kunit_try_run_case+0x170/0x3f0
[   19.892119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.892682]  kthread+0x328/0x630
[   19.892789]  ret_from_fork+0x10/0x20
[   19.893184] 
[   19.893232] The buggy address belongs to the object at fff00000c5b40680
[   19.893232]  which belongs to the cache kmalloc-64 of size 64
[   19.893600] The buggy address is located 0 bytes to the right of
[   19.893600]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.893689] 
[   19.893714] The buggy address belongs to the physical page:
[   19.894173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.894526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.894714] page_type: f5(slab)
[   19.895016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.895336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.895605] page dumped because: kasan: bad access detected
[   19.896047] 
[   19.896112] Memory state around the buggy address:
[   19.896490]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.896939]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.897030] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.897276]                                      ^
[   19.897402]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.897717]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.897972] ==================================================================
[   19.921128] ==================================================================
[   19.921254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.921506] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.921580] 
[   19.921630] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.921715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.922375] Hardware name: linux,dummy-virt (DT)
[   19.922546] Call trace:
[   19.922597]  show_stack+0x20/0x38 (C)
[   19.922796]  dump_stack_lvl+0x8c/0xd0
[   19.923212]  print_report+0x118/0x5d0
[   19.923317]  kasan_report+0xdc/0x128
[   19.923477]  __asan_report_load8_noabort+0x20/0x30
[   19.923548]  kasan_atomics_helper+0x3e20/0x4858
[   19.923829]  kasan_atomics+0x198/0x2e0
[   19.924172]  kunit_try_run_case+0x170/0x3f0
[   19.924348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.924415]  kthread+0x328/0x630
[   19.924461]  ret_from_fork+0x10/0x20
[   19.924533] 
[   19.924579] Allocated by task 265:
[   19.924639]  kasan_save_stack+0x3c/0x68
[   19.924685]  kasan_save_track+0x20/0x40
[   19.924727]  kasan_save_alloc_info+0x40/0x58
[   19.924769]  __kasan_kmalloc+0xd4/0xd8
[   19.924811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.924852]  kasan_atomics+0xb8/0x2e0
[   19.924903]  kunit_try_run_case+0x170/0x3f0
[   19.924957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.925004]  kthread+0x328/0x630
[   19.925043]  ret_from_fork+0x10/0x20
[   19.925083] 
[   19.925105] The buggy address belongs to the object at fff00000c5b40680
[   19.925105]  which belongs to the cache kmalloc-64 of size 64
[   19.925167] The buggy address is located 0 bytes to the right of
[   19.925167]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.925236] 
[   19.925259] The buggy address belongs to the physical page:
[   19.925292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.925349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.925399] page_type: f5(slab)
[   19.925441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.925512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.925557] page dumped because: kasan: bad access detected
[   19.925592] 
[   19.925614] Memory state around the buggy address:
[   19.926083]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.926151]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.926198] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.926569]                                      ^
[   19.926654]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.926718]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.927015] ==================================================================
[   19.825868] ==================================================================
[   19.825931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.825985] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.826192] 
[   19.826269] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.826736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.826823] Hardware name: linux,dummy-virt (DT)
[   19.826859] Call trace:
[   19.827207]  show_stack+0x20/0x38 (C)
[   19.827369]  dump_stack_lvl+0x8c/0xd0
[   19.827432]  print_report+0x118/0x5d0
[   19.827482]  kasan_report+0xdc/0x128
[   19.827706]  kasan_check_range+0x100/0x1a8
[   19.827778]  __kasan_check_write+0x20/0x30
[   19.828111]  kasan_atomics_helper+0x147c/0x4858
[   19.828222]  kasan_atomics+0x198/0x2e0
[   19.828404]  kunit_try_run_case+0x170/0x3f0
[   19.828517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.828578]  kthread+0x328/0x630
[   19.828633]  ret_from_fork+0x10/0x20
[   19.828966] 
[   19.829005] Allocated by task 265:
[   19.829397]  kasan_save_stack+0x3c/0x68
[   19.829656]  kasan_save_track+0x20/0x40
[   19.829783]  kasan_save_alloc_info+0x40/0x58
[   19.829901]  __kasan_kmalloc+0xd4/0xd8
[   19.829943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.829985]  kasan_atomics+0xb8/0x2e0
[   19.830026]  kunit_try_run_case+0x170/0x3f0
[   19.830066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.830111]  kthread+0x328/0x630
[   19.830459]  ret_from_fork+0x10/0x20
[   19.830938] 
[   19.830974] The buggy address belongs to the object at fff00000c5b40680
[   19.830974]  which belongs to the cache kmalloc-64 of size 64
[   19.831307] The buggy address is located 0 bytes to the right of
[   19.831307]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.831581] 
[   19.831637] The buggy address belongs to the physical page:
[   19.831673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.832159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.832546] page_type: f5(slab)
[   19.832798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.833049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.833233] page dumped because: kasan: bad access detected
[   19.833273] 
[   19.833293] Memory state around the buggy address:
[   19.833331]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.833377]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.833607] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.834065]                                      ^
[   19.834253]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.834336]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.834424] ==================================================================
[   19.680546] ==================================================================
[   19.680783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.680889] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.681094] 
[   19.681216] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.681308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.681351] Hardware name: linux,dummy-virt (DT)
[   19.681533] Call trace:
[   19.681645]  show_stack+0x20/0x38 (C)
[   19.681960]  dump_stack_lvl+0x8c/0xd0
[   19.682140]  print_report+0x118/0x5d0
[   19.682392]  kasan_report+0xdc/0x128
[   19.682748]  __asan_report_store8_noabort+0x20/0x30
[   19.682979]  kasan_atomics_helper+0x3e5c/0x4858
[   19.683361]  kasan_atomics+0x198/0x2e0
[   19.683470]  kunit_try_run_case+0x170/0x3f0
[   19.683927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.683996]  kthread+0x328/0x630
[   19.684215]  ret_from_fork+0x10/0x20
[   19.684474] 
[   19.684515] Allocated by task 265:
[   19.684687]  kasan_save_stack+0x3c/0x68
[   19.684960]  kasan_save_track+0x20/0x40
[   19.685132]  kasan_save_alloc_info+0x40/0x58
[   19.685392]  __kasan_kmalloc+0xd4/0xd8
[   19.685463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.685583]  kasan_atomics+0xb8/0x2e0
[   19.685648]  kunit_try_run_case+0x170/0x3f0
[   19.685689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.685788]  kthread+0x328/0x630
[   19.685841]  ret_from_fork+0x10/0x20
[   19.685890] 
[   19.685931] The buggy address belongs to the object at fff00000c5b40680
[   19.685931]  which belongs to the cache kmalloc-64 of size 64
[   19.686009] The buggy address is located 0 bytes to the right of
[   19.686009]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.686084] 
[   19.686120] The buggy address belongs to the physical page:
[   19.686169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.686246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.686305] page_type: f5(slab)
[   19.686363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.686427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.686472] page dumped because: kasan: bad access detected
[   19.686506] 
[   19.686529] Memory state around the buggy address:
[   19.686582]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.686637]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.686692] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.686734]                                      ^
[   19.686769]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686827]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686869] ==================================================================
[   19.510278] ==================================================================
[   19.510332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.510391] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.510446] 
[   19.512294] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.512459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.512491] Hardware name: linux,dummy-virt (DT)
[   19.512531] Call trace:
[   19.513424]  show_stack+0x20/0x38 (C)
[   19.513500]  dump_stack_lvl+0x8c/0xd0
[   19.513555]  print_report+0x118/0x5d0
[   19.514600]  kasan_report+0xdc/0x128
[   19.515287]  __asan_report_load4_noabort+0x20/0x30
[   19.515370]  kasan_atomics_helper+0x42d8/0x4858
[   19.516024]  kasan_atomics+0x198/0x2e0
[   19.516546]  kunit_try_run_case+0x170/0x3f0
[   19.516914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.517298]  kthread+0x328/0x630
[   19.517349]  ret_from_fork+0x10/0x20
[   19.518785] 
[   19.518913] Allocated by task 265:
[   19.518953]  kasan_save_stack+0x3c/0x68
[   19.519002]  kasan_save_track+0x20/0x40
[   19.519083]  kasan_save_alloc_info+0x40/0x58
[   19.519157]  __kasan_kmalloc+0xd4/0xd8
[   19.519371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.519413]  kasan_atomics+0xb8/0x2e0
[   19.519782]  kunit_try_run_case+0x170/0x3f0
[   19.519942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520405]  kthread+0x328/0x630
[   19.520533]  ret_from_fork+0x10/0x20
[   19.520573] 
[   19.520595] The buggy address belongs to the object at fff00000c5b40680
[   19.520595]  which belongs to the cache kmalloc-64 of size 64
[   19.521573] The buggy address is located 0 bytes to the right of
[   19.521573]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.521996] 
[   19.522025] The buggy address belongs to the physical page:
[   19.522666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.523876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.530143] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.530344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.530374] Hardware name: linux,dummy-virt (DT)
[   19.530408] Call trace:
[   19.530435]  show_stack+0x20/0x38 (C)
[   19.530486]  dump_stack_lvl+0x8c/0xd0
[   19.530538]  print_report+0x118/0x5d0
[   19.530587]  kasan_report+0xdc/0x128
[   19.530648]  kasan_check_range+0x100/0x1a8
[   19.530698]  __kasan_check_write+0x20/0x30
[   19.530747]  kasan_atomics_helper+0x934/0x4858
[   19.530797]  kasan_atomics+0x198/0x2e0
[   19.530843]  kunit_try_run_case+0x170/0x3f0
[   19.530894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530948]  kthread+0x328/0x630
[   19.530991]  ret_from_fork+0x10/0x20
[   19.531040] 
[   19.531063] Allocated by task 265:
[   19.531095]  kasan_save_stack+0x3c/0x68
[   19.531138]  kasan_save_track+0x20/0x40
[   19.531178]  kasan_save_alloc_info+0x40/0x58
[   19.531219]  __kasan_kmalloc+0xd4/0xd8
[   19.531258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.531300]  kasan_atomics+0xb8/0x2e0
[   19.531338]  kunit_try_run_case+0x170/0x3f0
[   19.531377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.531423]  kthread+0x328/0x630
[   19.531457]  ret_from_fork+0x10/0x20
[   19.531494] 
[   19.531515] The buggy address belongs to the object at fff00000c5b40680
[   19.531515]  which belongs to the cache kmalloc-64 of size 64
[   19.531575] The buggy address is located 0 bytes to the right of
[   19.531575]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.536356] 
[   19.537165] The buggy address belongs to the physical page:
[   19.537279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.539322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.539655] page_type: f5(slab)
[   19.539938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.540220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.540295] page dumped because: kasan: bad access detected
[   19.540330] 
[   19.540353] Memory state around the buggy address:
[   19.541684]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.542093]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.542587] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.543014]                                      ^
[   19.543448]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.543501]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544066] ==================================================================
[   19.766166] ==================================================================
[   19.766295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.766510] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.766640] 
[   19.766676] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.766765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.766840] Hardware name: linux,dummy-virt (DT)
[   19.766876] Call trace:
[   19.766973]  show_stack+0x20/0x38 (C)
[   19.767035]  dump_stack_lvl+0x8c/0xd0
[   19.767084]  print_report+0x118/0x5d0
[   19.767407]  kasan_report+0xdc/0x128
[   19.767705]  kasan_check_range+0x100/0x1a8
[   19.767960]  __kasan_check_write+0x20/0x30
[   19.768043]  kasan_atomics_helper+0x11f8/0x4858
[   19.768096]  kasan_atomics+0x198/0x2e0
[   19.768222]  kunit_try_run_case+0x170/0x3f0
[   19.768275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.768330]  kthread+0x328/0x630
[   19.768375]  ret_from_fork+0x10/0x20
[   19.769002] 
[   19.769056] Allocated by task 265:
[   19.769189]  kasan_save_stack+0x3c/0x68
[   19.769296]  kasan_save_track+0x20/0x40
[   19.769439]  kasan_save_alloc_info+0x40/0x58
[   19.769508]  __kasan_kmalloc+0xd4/0xd8
[   19.769567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.769627]  kasan_atomics+0xb8/0x2e0
[   19.769935]  kunit_try_run_case+0x170/0x3f0
[   19.770221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.770400]  kthread+0x328/0x630
[   19.770875]  ret_from_fork+0x10/0x20
[   19.770960] 
[   19.771346] The buggy address belongs to the object at fff00000c5b40680
[   19.771346]  which belongs to the cache kmalloc-64 of size 64
[   19.771554] The buggy address is located 0 bytes to the right of
[   19.771554]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.771795] 
[   19.771903] The buggy address belongs to the physical page:
[   19.772390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.772784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.773191] page_type: f5(slab)
[   19.773418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.773536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.773610] page dumped because: kasan: bad access detected
[   19.773657] 
[   19.773678] Memory state around the buggy address:
[   19.773714]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.774378]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.774516] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.774784]                                      ^
[   19.775008]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775089]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775586] ==================================================================
[   19.547175] ==================================================================
[   19.550559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.550962] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.551306] 
[   19.551548] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.552116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.552180] Hardware name: linux,dummy-virt (DT)
[   19.553022] Call trace:
[   19.553071]  show_stack+0x20/0x38 (C)
[   19.553528]  dump_stack_lvl+0x8c/0xd0
[   19.553643]  print_report+0x118/0x5d0
[   19.554211]  kasan_report+0xdc/0x128
[   19.554357]  kasan_check_range+0x100/0x1a8
[   19.554798]  __kasan_check_write+0x20/0x30
[   19.554971]  kasan_atomics_helper+0x99c/0x4858
[   19.555762]  kasan_atomics+0x198/0x2e0
[   19.555822]  kunit_try_run_case+0x170/0x3f0
[   19.555874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555930]  kthread+0x328/0x630
[   19.555975]  ret_from_fork+0x10/0x20
[   19.556689] 
[   19.556716] Allocated by task 265:
[   19.556754]  kasan_save_stack+0x3c/0x68
[   19.556805]  kasan_save_track+0x20/0x40
[   19.556846]  kasan_save_alloc_info+0x40/0x58
[   19.557047]  __kasan_kmalloc+0xd4/0xd8
[   19.557224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.557524]  kasan_atomics+0xb8/0x2e0
[   19.557570]  kunit_try_run_case+0x170/0x3f0
[   19.557656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557704]  kthread+0x328/0x630
[   19.557740]  ret_from_fork+0x10/0x20
[   19.557778] 
[   19.557801] The buggy address belongs to the object at fff00000c5b40680
[   19.557801]  which belongs to the cache kmalloc-64 of size 64
[   19.557862] The buggy address is located 0 bytes to the right of
[   19.557862]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.557933] 
[   19.557957] The buggy address belongs to the physical page:
[   19.557991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.558045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.558095] page_type: f5(slab)
[   19.558135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.558191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.558235] page dumped because: kasan: bad access detected
[   19.558267] 
[   19.558287] Memory state around the buggy address:
[   19.558324]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.558371]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.558417] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.558459]                                      ^
[   19.558494]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.558540]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.558581] ==================================================================
[   19.898756] ==================================================================
[   19.898810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.898864] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.898918] 
[   19.899297] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.899400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.899431] Hardware name: linux,dummy-virt (DT)
[   19.899709] Call trace:
[   19.899754]  show_stack+0x20/0x38 (C)
[   19.899997]  dump_stack_lvl+0x8c/0xd0
[   19.900071]  print_report+0x118/0x5d0
[   19.900377]  kasan_report+0xdc/0x128
[   19.900448]  __asan_report_load8_noabort+0x20/0x30
[   19.900711]  kasan_atomics_helper+0x3e10/0x4858
[   19.900789]  kasan_atomics+0x198/0x2e0
[   19.900841]  kunit_try_run_case+0x170/0x3f0
[   19.901279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.901410]  kthread+0x328/0x630
[   19.901523]  ret_from_fork+0x10/0x20
[   19.901652] 
[   19.901675] Allocated by task 265:
[   19.901734]  kasan_save_stack+0x3c/0x68
[   19.901788]  kasan_save_track+0x20/0x40
[   19.902098]  kasan_save_alloc_info+0x40/0x58
[   19.902570]  __kasan_kmalloc+0xd4/0xd8
[   19.902641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.902804]  kasan_atomics+0xb8/0x2e0
[   19.903112]  kunit_try_run_case+0x170/0x3f0
[   19.903270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.903348]  kthread+0x328/0x630
[   19.903497]  ret_from_fork+0x10/0x20
[   19.903881] 
[   19.904011] The buggy address belongs to the object at fff00000c5b40680
[   19.904011]  which belongs to the cache kmalloc-64 of size 64
[   19.904230] The buggy address is located 0 bytes to the right of
[   19.904230]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.904366] 
[   19.904420] The buggy address belongs to the physical page:
[   19.904678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.904879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.904938] page_type: f5(slab)
[   19.905202] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.905477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.905558] page dumped because: kasan: bad access detected
[   19.905651] 
[   19.905878] Memory state around the buggy address:
[   19.905993]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.906425]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.906679] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.906755]                                      ^
[   19.907266]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.907489]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.907883] ==================================================================
[   19.927905] ==================================================================
[   19.927967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.928021] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.928074] 
[   19.928497] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.928601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.928993] Hardware name: linux,dummy-virt (DT)
[   19.929061] Call trace:
[   19.929214]  show_stack+0x20/0x38 (C)
[   19.929363]  dump_stack_lvl+0x8c/0xd0
[   19.929428]  print_report+0x118/0x5d0
[   19.929480]  kasan_report+0xdc/0x128
[   19.929557]  kasan_check_range+0x100/0x1a8
[   19.929975]  __kasan_check_write+0x20/0x30
[   19.930032]  kasan_atomics_helper+0x17ec/0x4858
[   19.930453]  kasan_atomics+0x198/0x2e0
[   19.930566]  kunit_try_run_case+0x170/0x3f0
[   19.930912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.931136]  kthread+0x328/0x630
[   19.931420]  ret_from_fork+0x10/0x20
[   19.931613] 
[   19.931677] Allocated by task 265:
[   19.931936]  kasan_save_stack+0x3c/0x68
[   19.932118]  kasan_save_track+0x20/0x40
[   19.932252]  kasan_save_alloc_info+0x40/0x58
[   19.932406]  __kasan_kmalloc+0xd4/0xd8
[   19.932450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.932742]  kasan_atomics+0xb8/0x2e0
[   19.933191]  kunit_try_run_case+0x170/0x3f0
[   19.933265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.933438]  kthread+0x328/0x630
[   19.933532]  ret_from_fork+0x10/0x20
[   19.934208] 
[   19.934273] The buggy address belongs to the object at fff00000c5b40680
[   19.934273]  which belongs to the cache kmalloc-64 of size 64
[   19.934374] The buggy address is located 0 bytes to the right of
[   19.934374]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.934649] 
[   19.934700] The buggy address belongs to the physical page:
[   19.934746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.935097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.935519] page_type: f5(slab)
[   19.935780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.936188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.936438] page dumped because: kasan: bad access detected
[   19.936509] 
[   19.936677] Memory state around the buggy address:
[   19.936918]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.936983]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.937236] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.937499]                                      ^
[   19.937758]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.937834]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.938074] ==================================================================
[   19.670422] ==================================================================
[   19.670485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.670865] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.671053] 
[   19.671139] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.671236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.671600] Hardware name: linux,dummy-virt (DT)
[   19.671717] Call trace:
[   19.671784]  show_stack+0x20/0x38 (C)
[   19.671843]  dump_stack_lvl+0x8c/0xd0
[   19.671895]  print_report+0x118/0x5d0
[   19.671942]  kasan_report+0xdc/0x128
[   19.672214]  kasan_check_range+0x100/0x1a8
[   19.672274]  __kasan_check_write+0x20/0x30
[   19.672331]  kasan_atomics_helper+0xe44/0x4858
[   19.672383]  kasan_atomics+0x198/0x2e0
[   19.672429]  kunit_try_run_case+0x170/0x3f0
[   19.672485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.672542]  kthread+0x328/0x630
[   19.672587]  ret_from_fork+0x10/0x20
[   19.672650] 
[   19.672670] Allocated by task 265:
[   19.672725]  kasan_save_stack+0x3c/0x68
[   19.672783]  kasan_save_track+0x20/0x40
[   19.672825]  kasan_save_alloc_info+0x40/0x58
[   19.672876]  __kasan_kmalloc+0xd4/0xd8
[   19.672924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.673536]  kasan_atomics+0xb8/0x2e0
[   19.673721]  kunit_try_run_case+0x170/0x3f0
[   19.673949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.674330]  kthread+0x328/0x630
[   19.674612]  ret_from_fork+0x10/0x20
[   19.674704] 
[   19.674872] The buggy address belongs to the object at fff00000c5b40680
[   19.674872]  which belongs to the cache kmalloc-64 of size 64
[   19.675591] The buggy address is located 0 bytes to the right of
[   19.675591]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.675826] 
[   19.675890] The buggy address belongs to the physical page:
[   19.675939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.676409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.676518] page_type: f5(slab)
[   19.676587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.676932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.677158] page dumped because: kasan: bad access detected
[   19.677236] 
[   19.677390] Memory state around the buggy address:
[   19.677439]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.677488]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.677941] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.678020]                                      ^
[   19.678069]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678581]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678644] ==================================================================
[   19.758702] ==================================================================
[   19.758973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.759053] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.759107] 
[   19.759321] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.759676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.759722] Hardware name: linux,dummy-virt (DT)
[   19.759880] Call trace:
[   19.760096]  show_stack+0x20/0x38 (C)
[   19.760294]  dump_stack_lvl+0x8c/0xd0
[   19.760380]  print_report+0x118/0x5d0
[   19.760471]  kasan_report+0xdc/0x128
[   19.760524]  kasan_check_range+0x100/0x1a8
[   19.760612]  __kasan_check_write+0x20/0x30
[   19.760712]  kasan_atomics_helper+0x1190/0x4858
[   19.760764]  kasan_atomics+0x198/0x2e0
[   19.761283]  kunit_try_run_case+0x170/0x3f0
[   19.761520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.761702]  kthread+0x328/0x630
[   19.761921]  ret_from_fork+0x10/0x20
[   19.762039] 
[   19.762337] Allocated by task 265:
[   19.762692]  kasan_save_stack+0x3c/0x68
[   19.762777]  kasan_save_track+0x20/0x40
[   19.762834]  kasan_save_alloc_info+0x40/0x58
[   19.762969]  __kasan_kmalloc+0xd4/0xd8
[   19.763073]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.763115]  kasan_atomics+0xb8/0x2e0
[   19.763302]  kunit_try_run_case+0x170/0x3f0
[   19.763566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.763669]  kthread+0x328/0x630
[   19.763706]  ret_from_fork+0x10/0x20
[   19.763753] 
[   19.763788] The buggy address belongs to the object at fff00000c5b40680
[   19.763788]  which belongs to the cache kmalloc-64 of size 64
[   19.763850] The buggy address is located 0 bytes to the right of
[   19.763850]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.763919] 
[   19.763956] The buggy address belongs to the physical page:
[   19.764014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.764074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.764124] page_type: f5(slab)
[   19.764172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.764229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.764274] page dumped because: kasan: bad access detected
[   19.764308] 
[   19.764329] Memory state around the buggy address:
[   19.764373]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.764430]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.764493] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.764546]                                      ^
[   19.764582]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.764657]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.764737] ==================================================================
[   19.730095] ==================================================================
[   19.730185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.730242] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.730295] 
[   19.730326] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.730411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.730452] Hardware name: linux,dummy-virt (DT)
[   19.730487] Call trace:
[   19.730512]  show_stack+0x20/0x38 (C)
[   19.730565]  dump_stack_lvl+0x8c/0xd0
[   19.730615]  print_report+0x118/0x5d0
[   19.730677]  kasan_report+0xdc/0x128
[   19.730729]  kasan_check_range+0x100/0x1a8
[   19.730779]  __kasan_check_write+0x20/0x30
[   19.730828]  kasan_atomics_helper+0x1058/0x4858
[   19.730878]  kasan_atomics+0x198/0x2e0
[   19.730931]  kunit_try_run_case+0x170/0x3f0
[   19.730982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.731036]  kthread+0x328/0x630
[   19.731079]  ret_from_fork+0x10/0x20
[   19.731129] 
[   19.731161] Allocated by task 265:
[   19.731192]  kasan_save_stack+0x3c/0x68
[   19.731244]  kasan_save_track+0x20/0x40
[   19.731292]  kasan_save_alloc_info+0x40/0x58
[   19.731345]  __kasan_kmalloc+0xd4/0xd8
[   19.731392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.731450]  kasan_atomics+0xb8/0x2e0
[   19.731489]  kunit_try_run_case+0x170/0x3f0
[   19.731536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.731583]  kthread+0x328/0x630
[   19.732081]  ret_from_fork+0x10/0x20
[   19.732508] 
[   19.732543] The buggy address belongs to the object at fff00000c5b40680
[   19.732543]  which belongs to the cache kmalloc-64 of size 64
[   19.732640] The buggy address is located 0 bytes to the right of
[   19.732640]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.732710] 
[   19.732742] The buggy address belongs to the physical page:
[   19.732777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.733080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.733210] page_type: f5(slab)
[   19.733319] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.733875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.734079] page dumped because: kasan: bad access detected
[   19.734639] 
[   19.734809] Memory state around the buggy address:
[   19.734961]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.735139]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.735524] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.735842]                                      ^
[   19.736176]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.736397]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.736466] ==================================================================
[   19.688981] ==================================================================
[   19.689043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.689340] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.689695] 
[   19.689799] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.690186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.690291] Hardware name: linux,dummy-virt (DT)
[   19.690432] Call trace:
[   19.690552]  show_stack+0x20/0x38 (C)
[   19.690808]  dump_stack_lvl+0x8c/0xd0
[   19.691242]  print_report+0x118/0x5d0
[   19.691543]  kasan_report+0xdc/0x128
[   19.691824]  kasan_check_range+0x100/0x1a8
[   19.692090]  __kasan_check_write+0x20/0x30
[   19.692226]  kasan_atomics_helper+0xeb8/0x4858
[   19.692358]  kasan_atomics+0x198/0x2e0
[   19.692452]  kunit_try_run_case+0x170/0x3f0
[   19.692711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.692944]  kthread+0x328/0x630
[   19.693090]  ret_from_fork+0x10/0x20
[   19.693292] 
[   19.693365] Allocated by task 265:
[   19.693410]  kasan_save_stack+0x3c/0x68
[   19.693470]  kasan_save_track+0x20/0x40
[   19.693740]  kasan_save_alloc_info+0x40/0x58
[   19.694075]  __kasan_kmalloc+0xd4/0xd8
[   19.694190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.694431]  kasan_atomics+0xb8/0x2e0
[   19.694548]  kunit_try_run_case+0x170/0x3f0
[   19.694722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.694827]  kthread+0x328/0x630
[   19.694872]  ret_from_fork+0x10/0x20
[   19.695336] 
[   19.695446] The buggy address belongs to the object at fff00000c5b40680
[   19.695446]  which belongs to the cache kmalloc-64 of size 64
[   19.695678] The buggy address is located 0 bytes to the right of
[   19.695678]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.695761] 
[   19.695932] The buggy address belongs to the physical page:
[   19.696185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.696376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.696644] page_type: f5(slab)
[   19.696744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.697093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.697278] page dumped because: kasan: bad access detected
[   19.697364] 
[   19.697388] Memory state around the buggy address:
[   19.697425]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.697613]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.697890] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.698036]                                      ^
[   19.698100]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.698164]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.698337] ==================================================================
[   19.708211] ==================================================================
[   19.708749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.708842] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.709258] 
[   19.709357] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.709444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.709474] Hardware name: linux,dummy-virt (DT)
[   19.709510] Call trace:
[   19.709746]  show_stack+0x20/0x38 (C)
[   19.709997]  dump_stack_lvl+0x8c/0xd0
[   19.710458]  print_report+0x118/0x5d0
[   19.710784]  kasan_report+0xdc/0x128
[   19.710920]  kasan_check_range+0x100/0x1a8
[   19.711423]  __kasan_check_write+0x20/0x30
[   19.711571]  kasan_atomics_helper+0xf88/0x4858
[   19.711676]  kasan_atomics+0x198/0x2e0
[   19.711782]  kunit_try_run_case+0x170/0x3f0
[   19.712284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.712385]  kthread+0x328/0x630
[   19.712605]  ret_from_fork+0x10/0x20
[   19.712909] 
[   19.712958] Allocated by task 265:
[   19.712994]  kasan_save_stack+0x3c/0x68
[   19.713215]  kasan_save_track+0x20/0x40
[   19.713437]  kasan_save_alloc_info+0x40/0x58
[   19.713560]  __kasan_kmalloc+0xd4/0xd8
[   19.713731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.713775]  kasan_atomics+0xb8/0x2e0
[   19.713993]  kunit_try_run_case+0x170/0x3f0
[   19.714104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714167]  kthread+0x328/0x630
[   19.714318]  ret_from_fork+0x10/0x20
[   19.714606] 
[   19.714651] The buggy address belongs to the object at fff00000c5b40680
[   19.714651]  which belongs to the cache kmalloc-64 of size 64
[   19.715083] The buggy address is located 0 bytes to the right of
[   19.715083]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.715586] 
[   19.715647] The buggy address belongs to the physical page:
[   19.715795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.716008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.716077] page_type: f5(slab)
[   19.716244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.716347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.716396] page dumped because: kasan: bad access detected
[   19.716433] 
[   19.716453] Memory state around the buggy address:
[   19.716487]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.716535]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.716582] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.716643]                                      ^
[   19.716680]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.716727]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.716768] ==================================================================
[   19.787796] ==================================================================
[   19.788177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.788358] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.788422] 
[   19.788610] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.788723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.788751] Hardware name: linux,dummy-virt (DT)
[   19.788785] Call trace:
[   19.788810]  show_stack+0x20/0x38 (C)
[   19.788866]  dump_stack_lvl+0x8c/0xd0
[   19.789449]  print_report+0x118/0x5d0
[   19.789742]  kasan_report+0xdc/0x128
[   19.790021]  kasan_check_range+0x100/0x1a8
[   19.790241]  __kasan_check_write+0x20/0x30
[   19.790369]  kasan_atomics_helper+0x12d8/0x4858
[   19.790556]  kasan_atomics+0x198/0x2e0
[   19.790608]  kunit_try_run_case+0x170/0x3f0
[   19.791262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.791578]  kthread+0x328/0x630
[   19.791795]  ret_from_fork+0x10/0x20
[   19.791862] 
[   19.791924] Allocated by task 265:
[   19.792321]  kasan_save_stack+0x3c/0x68
[   19.792560]  kasan_save_track+0x20/0x40
[   19.792734]  kasan_save_alloc_info+0x40/0x58
[   19.792983]  __kasan_kmalloc+0xd4/0xd8
[   19.793078]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.793332]  kasan_atomics+0xb8/0x2e0
[   19.793456]  kunit_try_run_case+0x170/0x3f0
[   19.793695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.794742]  kthread+0x328/0x630
[   19.794814]  ret_from_fork+0x10/0x20
[   19.794876] 
[   19.794899] The buggy address belongs to the object at fff00000c5b40680
[   19.794899]  which belongs to the cache kmalloc-64 of size 64
[   19.794979] The buggy address is located 0 bytes to the right of
[   19.794979]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.795080] 
[   19.795133] The buggy address belongs to the physical page:
[   19.795200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.795271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.795565] page_type: f5(slab)
[   19.795659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.796200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.796256] page dumped because: kasan: bad access detected
[   19.796292] 
[   19.796312] Memory state around the buggy address:
[   19.796631]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.797069]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.797261] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.797581]                                      ^
[   19.797945]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.798186]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.798748] ==================================================================
[   19.559207] ==================================================================
[   19.559262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   19.559315] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.559368] 
[   19.559400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.559484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.559513] Hardware name: linux,dummy-virt (DT)
[   19.559547] Call trace:
[   19.559573]  show_stack+0x20/0x38 (C)
[   19.560166]  dump_stack_lvl+0x8c/0xd0
[   19.560281]  print_report+0x118/0x5d0
[   19.560391]  kasan_report+0xdc/0x128
[   19.560447]  kasan_check_range+0x100/0x1a8
[   19.560500]  __kasan_check_write+0x20/0x30
[   19.560814]  kasan_atomics_helper+0xa04/0x4858
[   19.560889]  kasan_atomics+0x198/0x2e0
[   19.560944]  kunit_try_run_case+0x170/0x3f0
[   19.560994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.561049]  kthread+0x328/0x630
[   19.561094]  ret_from_fork+0x10/0x20
[   19.561143] 
[   19.561164] Allocated by task 265:
[   19.561197]  kasan_save_stack+0x3c/0x68
[   19.561511]  kasan_save_track+0x20/0x40
[   19.561823]  kasan_save_alloc_info+0x40/0x58
[   19.562080]  __kasan_kmalloc+0xd4/0xd8
[   19.562721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.562806]  kasan_atomics+0xb8/0x2e0
[   19.562849]  kunit_try_run_case+0x170/0x3f0
[   19.562925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.562993]  kthread+0x328/0x630
[   19.563395]  ret_from_fork+0x10/0x20
[   19.563467] 
[   19.563692] The buggy address belongs to the object at fff00000c5b40680
[   19.563692]  which belongs to the cache kmalloc-64 of size 64
[   19.563903] The buggy address is located 0 bytes to the right of
[   19.563903]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.564197] 
[   19.564341] The buggy address belongs to the physical page:
[   19.564389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.564470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.564714] page_type: f5(slab)
[   19.564861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.564943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.565008] page dumped because: kasan: bad access detected
[   19.565043] 
[   19.565601] Memory state around the buggy address:
[   19.565677]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.565850]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.566029] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.566119]                                      ^
[   19.566259]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566335]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566438] ==================================================================
[   19.818308] ==================================================================
[   19.818376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.818431] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.818483] 
[   19.818572] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.818676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.819061] Hardware name: linux,dummy-virt (DT)
[   19.819104] Call trace:
[   19.819132]  show_stack+0x20/0x38 (C)
[   19.819307]  dump_stack_lvl+0x8c/0xd0
[   19.819365]  print_report+0x118/0x5d0
[   19.819415]  kasan_report+0xdc/0x128
[   19.819464]  kasan_check_range+0x100/0x1a8
[   19.819515]  __kasan_check_write+0x20/0x30
[   19.819564]  kasan_atomics_helper+0x1414/0x4858
[   19.819613]  kasan_atomics+0x198/0x2e0
[   19.819675]  kunit_try_run_case+0x170/0x3f0
[   19.819848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.819942]  kthread+0x328/0x630
[   19.820020]  ret_from_fork+0x10/0x20
[   19.820072] 
[   19.820094] Allocated by task 265:
[   19.820124]  kasan_save_stack+0x3c/0x68
[   19.820177]  kasan_save_track+0x20/0x40
[   19.820224]  kasan_save_alloc_info+0x40/0x58
[   19.820276]  __kasan_kmalloc+0xd4/0xd8
[   19.820315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.820357]  kasan_atomics+0xb8/0x2e0
[   19.820394]  kunit_try_run_case+0x170/0x3f0
[   19.820441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.820486]  kthread+0x328/0x630
[   19.820522]  ret_from_fork+0x10/0x20
[   19.820562] 
[   19.820583] The buggy address belongs to the object at fff00000c5b40680
[   19.820583]  which belongs to the cache kmalloc-64 of size 64
[   19.820657] The buggy address is located 0 bytes to the right of
[   19.820657]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.820972] 
[   19.821047] The buggy address belongs to the physical page:
[   19.821314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.821609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.822377] page_type: f5(slab)
[   19.822468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.822988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.823417] page dumped because: kasan: bad access detected
[   19.823461] 
[   19.823502] Memory state around the buggy address:
[   19.823574]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.823659]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.823729] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.823985]                                      ^
[   19.824226]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824573]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824654] ==================================================================
[   19.567401] ==================================================================
[   19.567479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.567536] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.567606] 
[   19.567651] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.567748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.567778] Hardware name: linux,dummy-virt (DT)
[   19.567818] Call trace:
[   19.567843]  show_stack+0x20/0x38 (C)
[   19.567894]  dump_stack_lvl+0x8c/0xd0
[   19.567943]  print_report+0x118/0x5d0
[   19.567992]  kasan_report+0xdc/0x128
[   19.568046]  kasan_check_range+0x100/0x1a8
[   19.568106]  __kasan_check_write+0x20/0x30
[   19.568154]  kasan_atomics_helper+0xa6c/0x4858
[   19.568204]  kasan_atomics+0x198/0x2e0
[   19.568252]  kunit_try_run_case+0x170/0x3f0
[   19.568303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.568359]  kthread+0x328/0x630
[   19.568403]  ret_from_fork+0x10/0x20
[   19.568452] 
[   19.568475] Allocated by task 265:
[   19.568507]  kasan_save_stack+0x3c/0x68
[   19.568552]  kasan_save_track+0x20/0x40
[   19.568593]  kasan_save_alloc_info+0x40/0x58
[   19.569767]  __kasan_kmalloc+0xd4/0xd8
[   19.569840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.569943]  kasan_atomics+0xb8/0x2e0
[   19.569984]  kunit_try_run_case+0x170/0x3f0
[   19.570421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.570563]  kthread+0x328/0x630
[   19.570649]  ret_from_fork+0x10/0x20
[   19.570694] 
[   19.571182] The buggy address belongs to the object at fff00000c5b40680
[   19.571182]  which belongs to the cache kmalloc-64 of size 64
[   19.571282] The buggy address is located 0 bytes to the right of
[   19.571282]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.571706] 
[   19.571756] The buggy address belongs to the physical page:
[   19.571860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.571965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.572034] page_type: f5(slab)
[   19.572365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.572739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.572802] page dumped because: kasan: bad access detected
[   19.572911] 
[   19.573023] Memory state around the buggy address:
[   19.573061]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.573109]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.573441] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.573915]                                      ^
[   19.573966]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.575903]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.575982] ==================================================================
[   19.863115] ==================================================================
[   19.863186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.863242] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.863295] 
[   19.863574] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.864036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.864087] Hardware name: linux,dummy-virt (DT)
[   19.864123] Call trace:
[   19.864329]  show_stack+0x20/0x38 (C)
[   19.864535]  dump_stack_lvl+0x8c/0xd0
[   19.864820]  print_report+0x118/0x5d0
[   19.865130]  kasan_report+0xdc/0x128
[   19.865376]  __asan_report_load8_noabort+0x20/0x30
[   19.865751]  kasan_atomics_helper+0x3db0/0x4858
[   19.865851]  kasan_atomics+0x198/0x2e0
[   19.865995]  kunit_try_run_case+0x170/0x3f0
[   19.866203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.866336]  kthread+0x328/0x630
[   19.866385]  ret_from_fork+0x10/0x20
[   19.866666] 
[   19.866878] Allocated by task 265:
[   19.866951]  kasan_save_stack+0x3c/0x68
[   19.867356]  kasan_save_track+0x20/0x40
[   19.867428]  kasan_save_alloc_info+0x40/0x58
[   19.867609]  __kasan_kmalloc+0xd4/0xd8
[   19.867680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.867963]  kasan_atomics+0xb8/0x2e0
[   19.868165]  kunit_try_run_case+0x170/0x3f0
[   19.868465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868793]  kthread+0x328/0x630
[   19.868861]  ret_from_fork+0x10/0x20
[   19.868903] 
[   19.868932] The buggy address belongs to the object at fff00000c5b40680
[   19.868932]  which belongs to the cache kmalloc-64 of size 64
[   19.869208] The buggy address is located 0 bytes to the right of
[   19.869208]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.869608] 
[   19.869800] The buggy address belongs to the physical page:
[   19.869853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.869923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.869977] page_type: f5(slab)
[   19.870224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.870458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.870511] page dumped because: kasan: bad access detected
[   19.870546] 
[   19.870568] Memory state around the buggy address:
[   19.870603]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.870664]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.870711] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.870753]                                      ^
[   19.870789]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.870833]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.870874] ==================================================================
[   19.585838] ==================================================================
[   19.585911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.586248] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.586311] 
[   19.586364] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.586639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.586684] Hardware name: linux,dummy-virt (DT)
[   19.586907] Call trace:
[   19.586947]  show_stack+0x20/0x38 (C)
[   19.587001]  dump_stack_lvl+0x8c/0xd0
[   19.587372]  print_report+0x118/0x5d0
[   19.587469]  kasan_report+0xdc/0x128
[   19.587521]  __asan_report_load4_noabort+0x20/0x30
[   19.587668]  kasan_atomics_helper+0x3dcc/0x4858
[   19.587763]  kasan_atomics+0x198/0x2e0
[   19.587889]  kunit_try_run_case+0x170/0x3f0
[   19.587953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588018]  kthread+0x328/0x630
[   19.588082]  ret_from_fork+0x10/0x20
[   19.588278] 
[   19.588421] Allocated by task 265:
[   19.588527]  kasan_save_stack+0x3c/0x68
[   19.588644]  kasan_save_track+0x20/0x40
[   19.588691]  kasan_save_alloc_info+0x40/0x58
[   19.588766]  __kasan_kmalloc+0xd4/0xd8
[   19.588815]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.588859]  kasan_atomics+0xb8/0x2e0
[   19.589151]  kunit_try_run_case+0x170/0x3f0
[   19.589258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.589570]  kthread+0x328/0x630
[   19.589652]  ret_from_fork+0x10/0x20
[   19.589768] 
[   19.589866] The buggy address belongs to the object at fff00000c5b40680
[   19.589866]  which belongs to the cache kmalloc-64 of size 64
[   19.589969] The buggy address is located 0 bytes to the right of
[   19.589969]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.590164] 
[   19.590335] The buggy address belongs to the physical page:
[   19.590373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.590649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.590962] page_type: f5(slab)
[   19.591069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.591134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.591178] page dumped because: kasan: bad access detected
[   19.591221] 
[   19.591247] Memory state around the buggy address:
[   19.591300]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591356]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591403] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.591454]                                      ^
[   19.593049] 
[   19.594395]  print_report+0x118/0x5d0
[   19.594738]  kasan_check_range+0x100/0x1a8
[   19.595511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.596491]  kasan_save_track+0x20/0x40
[   19.596859]  __kasan_kmalloc+0xd4/0xd8
[   19.597398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.598435] 
[   19.598507] The buggy address belongs to the physical page:
[   19.598858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.599784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.600310]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.603193] 
[   19.603669]  __asan_report_load4_noabort+0x20/0x30
[   19.603937]  kthread+0x328/0x630
[   19.604223]  __kasan_kmalloc+0xd4/0xd8
[   19.604266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.604311]  kasan_atomics+0xb8/0x2e0
[   19.604454]  kthread+0x328/0x630
[   19.604696] 
[   19.605738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.606172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.606661]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.607154]                                      ^
[   19.608467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   19.609147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.609964]  print_report+0x118/0x5d0
[   19.610887]  kasan_atomics+0x198/0x2e0
[   19.612978]  __kasan_kmalloc+0xd4/0xd8
[   19.613321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.613410]  kasan_atomics+0xb8/0x2e0
[   19.613475]  kunit_try_run_case+0x170/0x3f0
[   19.613543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.614560] The buggy address is located 0 bytes to the right of
[   19.614560]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.615306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.617028]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619161] 
[   19.619276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.619815]  kunit_try_run_case+0x170/0x3f0
[   19.620026] 
[   19.620245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.620324]  kunit_try_run_case+0x170/0x3f0
[   19.620376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.620424]  kthread+0x328/0x630
[   19.620466]  ret_from_fork+0x10/0x20
[   19.620596] The buggy address is located 0 bytes to the right of
[   19.620596]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.622678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.622926]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.623585]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.624529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.625449] Call trace:
[   19.626524]  kasan_check_range+0x100/0x1a8
[   19.627467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.628986]  __kasan_kmalloc+0xd4/0xd8
[   19.629346]  kunit_try_run_case+0x170/0x3f0
[   19.629451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.629501]  kthread+0x328/0x630
[   19.629537]  ret_from_fork+0x10/0x20
[   19.629577] 
[   19.629602] The buggy address belongs to the object at fff00000c5b40680
[   19.629602]  which belongs to the cache kmalloc-64 of size 64
[   19.630009] The buggy address is located 0 bytes to the right of
[   19.630009]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.630192] 
[   19.630241] The buggy address belongs to the physical page:
[   19.630643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.630796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.630896] page_type: f5(slab)
[   19.631032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.631128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.631219] page dumped because: kasan: bad access detected
[   19.631316] 
[   19.631338] Memory state around the buggy address:
[   19.631683]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.631855]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.632034] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.632152]                                      ^
[   19.632597]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.632764]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.632850] ==================================================================
[   19.634584] ==================================================================
[   19.634667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.635009] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.635082] 
[   19.635436] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.635553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.635595] Hardware name: linux,dummy-virt (DT)
[   19.635929] Call trace:
[   19.636032]  show_stack+0x20/0x38 (C)
[   19.636138]  dump_stack_lvl+0x8c/0xd0
[   19.636260]  print_report+0x118/0x5d0
[   19.636312]  kasan_report+0xdc/0x128
[   19.636369]  __asan_report_load4_noabort+0x20/0x30
[   19.636423]  kasan_atomics_helper+0x3dd8/0x4858
[   19.636668]  kasan_atomics+0x198/0x2e0
[   19.636946]  kunit_try_run_case+0x170/0x3f0
[   19.637192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637300]  kthread+0x328/0x630
[   19.637426]  ret_from_fork+0x10/0x20
[   19.637486] 
[   19.637509] Allocated by task 265:
[   19.637596]  kasan_save_stack+0x3c/0x68
[   19.637655]  kasan_save_track+0x20/0x40
[   19.637697]  kasan_save_alloc_info+0x40/0x58
[   19.638022]  __kasan_kmalloc+0xd4/0xd8
[   19.638092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.638180]  kasan_atomics+0xb8/0x2e0
[   19.638248]  kunit_try_run_case+0x170/0x3f0
[   19.638592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.638773]  kthread+0x328/0x630
[   19.638882]  ret_from_fork+0x10/0x20
[   19.638995] 
[   19.639019] The buggy address belongs to the object at fff00000c5b40680
[   19.639019]  which belongs to the cache kmalloc-64 of size 64
[   19.639114] The buggy address is located 0 bytes to the right of
[   19.639114]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.639852] 
[   19.640281] The buggy address belongs to the physical page:
[   19.640341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.640683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.640845] page_type: f5(slab)
[   19.640920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.641001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.641044] page dumped because: kasan: bad access detected
[   19.641080] 
[   19.641101] Memory state around the buggy address:
[   19.641136]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.641482]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.641536] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.641880]                                      ^
[   19.641966]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.642095]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.642191] ==================================================================
[   19.656181] ==================================================================
[   19.656232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.656281] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.656333] 
[   19.656376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.656481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.656509] Hardware name: linux,dummy-virt (DT)
[   19.656543] Call trace:
[   19.656575]  show_stack+0x20/0x38 (C)
[   19.657075]  dump_stack_lvl+0x8c/0xd0
[   19.657308]  print_report+0x118/0x5d0
[   19.657416]  kasan_report+0xdc/0x128
[   19.657493]  kasan_check_range+0x100/0x1a8
[   19.657592]  __kasan_check_read+0x20/0x30
[   19.657683]  kasan_atomics_helper+0xdd4/0x4858
[   19.657747]  kasan_atomics+0x198/0x2e0
[   19.657794]  kunit_try_run_case+0x170/0x3f0
[   19.657846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.657905]  kthread+0x328/0x630
[   19.657996]  ret_from_fork+0x10/0x20
[   19.658196] 
[   19.658276] Allocated by task 265:
[   19.658364]  kasan_save_stack+0x3c/0x68
[   19.658460]  kasan_save_track+0x20/0x40
[   19.658587]  kasan_save_alloc_info+0x40/0x58
[   19.658695]  __kasan_kmalloc+0xd4/0xd8
[   19.658760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.658825]  kasan_atomics+0xb8/0x2e0
[   19.658897]  kunit_try_run_case+0x170/0x3f0
[   19.658985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659061]  kthread+0x328/0x630
[   19.659095]  ret_from_fork+0x10/0x20
[   19.659145] 
[   19.659534] The buggy address belongs to the object at fff00000c5b40680
[   19.659534]  which belongs to the cache kmalloc-64 of size 64
[   19.659636] The buggy address is located 0 bytes to the right of
[   19.659636]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.659713] 
[   19.659735] The buggy address belongs to the physical page:
[   19.659770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.660087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.660242] page_type: f5(slab)
[   19.660297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.660387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.660535] page dumped because: kasan: bad access detected
[   19.660603] 
[   19.660735] Memory state around the buggy address:
[   19.660850]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660925]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660997] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.661074]                                      ^
[   19.661112]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.661164]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.661208] ==================================================================
[   19.577575] ==================================================================
[   19.577645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.577701] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.577755] 
[   19.577789] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.578142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.578542] Hardware name: linux,dummy-virt (DT)
[   19.578597] Call trace:
[   19.578649]  show_stack+0x20/0x38 (C)
[   19.578708]  dump_stack_lvl+0x8c/0xd0
[   19.578759]  print_report+0x118/0x5d0
[   19.579064]  kasan_report+0xdc/0x128
[   19.579177]  kasan_check_range+0x100/0x1a8
[   19.579230]  __kasan_check_write+0x20/0x30
[   19.579285]  kasan_atomics_helper+0xad4/0x4858
[   19.579339]  kasan_atomics+0x198/0x2e0
[   19.579649]  kunit_try_run_case+0x170/0x3f0
[   19.579800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.579861]  kthread+0x328/0x630
[   19.579934]  ret_from_fork+0x10/0x20
[   19.580133] 
[   19.580319] Allocated by task 265:
[   19.580374]  kasan_save_stack+0x3c/0x68
[   19.580528]  kasan_save_track+0x20/0x40
[   19.580576]  kasan_save_alloc_info+0x40/0x58
[   19.580903]  __kasan_kmalloc+0xd4/0xd8
[   19.581028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.581179]  kasan_atomics+0xb8/0x2e0
[   19.581391]  kunit_try_run_case+0x170/0x3f0
[   19.581472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.581646]  kthread+0x328/0x630
[   19.581704]  ret_from_fork+0x10/0x20
[   19.581911] 
[   19.581942] The buggy address belongs to the object at fff00000c5b40680
[   19.581942]  which belongs to the cache kmalloc-64 of size 64
[   19.582006] The buggy address is located 0 bytes to the right of
[   19.582006]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.582072] 
[   19.582101] The buggy address belongs to the physical page:
[   19.582135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.582190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.582242] page_type: f5(slab)
[   19.582282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.582336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.582514] page dumped because: kasan: bad access detected
[   19.582907] 
[   19.582989] Memory state around the buggy address:
[   19.583158]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.583252]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.583387] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.583472]                                      ^
[   19.583791]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.583867]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.584035] ==================================================================
[   19.650897] ==================================================================
[   19.651191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.651285] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.651357] 
[   19.651413] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.651512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.651542] Hardware name: linux,dummy-virt (DT)
[   19.651576] Call trace:
[   19.651712]  show_stack+0x20/0x38 (C)
[   19.652056]  dump_stack_lvl+0x8c/0xd0
[   19.652143]  print_report+0x118/0x5d0
[   19.652195]  kasan_report+0xdc/0x128
[   19.652531]  __asan_report_load4_noabort+0x20/0x30
[   19.652674]  kasan_atomics_helper+0x3e04/0x4858
[   19.652728]  kasan_atomics+0x198/0x2e0
[   19.652791]  kunit_try_run_case+0x170/0x3f0
[   19.652842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.652946]  kthread+0x328/0x630
[   19.653227]  ret_from_fork+0x10/0x20
[   19.653293] 
[   19.653536] Allocated by task 265:
[   19.653585]  kasan_save_stack+0x3c/0x68
[   19.653685]  kasan_save_track+0x20/0x40
[   19.653839]  kasan_save_alloc_info+0x40/0x58
[   19.653961]  __kasan_kmalloc+0xd4/0xd8
[   19.654039]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.654179]  kasan_atomics+0xb8/0x2e0
[   19.654261]  kunit_try_run_case+0x170/0x3f0
[   19.654311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.654643]  kthread+0x328/0x630
[   19.654797]  ret_from_fork+0x10/0x20
[   19.654896] 
[   19.655021] The buggy address belongs to the object at fff00000c5b40680
[   19.655021]  which belongs to the cache kmalloc-64 of size 64
[   19.655109] The buggy address is located 0 bytes to the right of
[   19.655109]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.655184] 
[   19.655223] The buggy address belongs to the physical page:
[   19.655276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.655333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.655393] page_type: f5(slab)
[   19.655435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.655491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.655543] page dumped because: kasan: bad access detected
[   19.655589] 
[   19.655627] Memory state around the buggy address:
[   19.655659]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.655706]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.655751] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.655801]                                      ^
[   19.655837]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.655890]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.655930] ==================================================================
[   19.799425] ==================================================================
[   19.799529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.799585] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.799780] 
[   19.799812] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.799897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.799936] Hardware name: linux,dummy-virt (DT)
[   19.799991] Call trace:
[   19.800017]  show_stack+0x20/0x38 (C)
[   19.800070]  dump_stack_lvl+0x8c/0xd0
[   19.800126]  print_report+0x118/0x5d0
[   19.800186]  kasan_report+0xdc/0x128
[   19.800234]  kasan_check_range+0x100/0x1a8
[   19.800288]  __kasan_check_write+0x20/0x30
[   19.800339]  kasan_atomics_helper+0x1384/0x4858
[   19.800399]  kasan_atomics+0x198/0x2e0
[   19.800447]  kunit_try_run_case+0x170/0x3f0
[   19.800497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.800558]  kthread+0x328/0x630
[   19.800603]  ret_from_fork+0x10/0x20
[   19.800663] 
[   19.800686] Allocated by task 265:
[   19.800716]  kasan_save_stack+0x3c/0x68
[   19.800759]  kasan_save_track+0x20/0x40
[   19.800799]  kasan_save_alloc_info+0x40/0x58
[   19.800841]  __kasan_kmalloc+0xd4/0xd8
[   19.800891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.800968]  kasan_atomics+0xb8/0x2e0
[   19.801027]  kunit_try_run_case+0x170/0x3f0
[   19.801811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.801912]  kthread+0x328/0x630
[   19.801974]  ret_from_fork+0x10/0x20
[   19.802053] 
[   19.802302] The buggy address belongs to the object at fff00000c5b40680
[   19.802302]  which belongs to the cache kmalloc-64 of size 64
[   19.802492] The buggy address is located 0 bytes to the right of
[   19.802492]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.802854] 
[   19.802982] The buggy address belongs to the physical page:
[   19.803534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.803604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.804139] page_type: f5(slab)
[   19.804384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.804486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.804559] page dumped because: kasan: bad access detected
[   19.804595] 
[   19.804927] Memory state around the buggy address:
[   19.805220]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.805414]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.805875] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.806007]                                      ^
[   19.806096]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806295]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806504] ==================================================================
[   19.853961] ==================================================================
[   19.854226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.854531] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.854604] 
[   19.854875] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.854983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.855108] Hardware name: linux,dummy-virt (DT)
[   19.855146] Call trace:
[   19.855174]  show_stack+0x20/0x38 (C)
[   19.855227]  dump_stack_lvl+0x8c/0xd0
[   19.855524]  print_report+0x118/0x5d0
[   19.855815]  kasan_report+0xdc/0x128
[   19.855870]  kasan_check_range+0x100/0x1a8
[   19.855923]  __kasan_check_write+0x20/0x30
[   19.855970]  kasan_atomics_helper+0x15b4/0x4858
[   19.856023]  kasan_atomics+0x198/0x2e0
[   19.856240]  kunit_try_run_case+0x170/0x3f0
[   19.856928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.857168]  kthread+0x328/0x630
[   19.857317]  ret_from_fork+0x10/0x20
[   19.857428] 
[   19.857573] Allocated by task 265:
[   19.857610]  kasan_save_stack+0x3c/0x68
[   19.857665]  kasan_save_track+0x20/0x40
[   19.857724]  kasan_save_alloc_info+0x40/0x58
[   19.857766]  __kasan_kmalloc+0xd4/0xd8
[   19.857973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.858208]  kasan_atomics+0xb8/0x2e0
[   19.858435]  kunit_try_run_case+0x170/0x3f0
[   19.858718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.858804]  kthread+0x328/0x630
[   19.858978]  ret_from_fork+0x10/0x20
[   19.859023] 
[   19.859077] The buggy address belongs to the object at fff00000c5b40680
[   19.859077]  which belongs to the cache kmalloc-64 of size 64
[   19.859374] The buggy address is located 0 bytes to the right of
[   19.859374]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.860043] 
[   19.860102] The buggy address belongs to the physical page:
[   19.860156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.861005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.861087] page_type: f5(slab)
[   19.861570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.861650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.861729] page dumped because: kasan: bad access detected
[   19.861766] 
[   19.861798] Memory state around the buggy address:
[   19.861837]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.862209]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.862273] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.862388]                                      ^
[   19.862430]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.862477]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.862528] ==================================================================
[   19.909836] ==================================================================
[   19.909901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.910180] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.910683] 
[   19.910729] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.910843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.910874] Hardware name: linux,dummy-virt (DT)
[   19.910908] Call trace:
[   19.911125]  show_stack+0x20/0x38 (C)
[   19.911412]  dump_stack_lvl+0x8c/0xd0
[   19.911635]  print_report+0x118/0x5d0
[   19.911876]  kasan_report+0xdc/0x128
[   19.911937]  kasan_check_range+0x100/0x1a8
[   19.911990]  __kasan_check_write+0x20/0x30
[   19.912628]  kasan_atomics_helper+0x175c/0x4858
[   19.912703]  kasan_atomics+0x198/0x2e0
[   19.912754]  kunit_try_run_case+0x170/0x3f0
[   19.912802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.912859]  kthread+0x328/0x630
[   19.912905]  ret_from_fork+0x10/0x20
[   19.913454] 
[   19.913518] Allocated by task 265:
[   19.913742]  kasan_save_stack+0x3c/0x68
[   19.913961]  kasan_save_track+0x20/0x40
[   19.914055]  kasan_save_alloc_info+0x40/0x58
[   19.914410]  __kasan_kmalloc+0xd4/0xd8
[   19.914504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.914705]  kasan_atomics+0xb8/0x2e0
[   19.914878]  kunit_try_run_case+0x170/0x3f0
[   19.914981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.915068]  kthread+0x328/0x630
[   19.915269]  ret_from_fork+0x10/0x20
[   19.915879] 
[   19.915928] The buggy address belongs to the object at fff00000c5b40680
[   19.915928]  which belongs to the cache kmalloc-64 of size 64
[   19.916194] The buggy address is located 0 bytes to the right of
[   19.916194]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.916382] 
[   19.916407] The buggy address belongs to the physical page:
[   19.916938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.917298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.917361] page_type: f5(slab)
[   19.917683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.918025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.918472] page dumped because: kasan: bad access detected
[   19.918907] 
[   19.919196] Memory state around the buggy address:
[   19.919278]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.919536]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.919710] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.919757]                                      ^
[   19.919796]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.919842]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.919883] ==================================================================
[   19.871087] ==================================================================
[   19.871135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.871185] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.871236] 
[   19.871265] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.871348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.871376] Hardware name: linux,dummy-virt (DT)
[   19.871409] Call trace:
[   19.871432]  show_stack+0x20/0x38 (C)
[   19.871482]  dump_stack_lvl+0x8c/0xd0
[   19.871529]  print_report+0x118/0x5d0
[   19.871577]  kasan_report+0xdc/0x128
[   19.871657]  kasan_check_range+0x100/0x1a8
[   19.871708]  __kasan_check_write+0x20/0x30
[   19.871755]  kasan_atomics_helper+0x1644/0x4858
[   19.871929]  kasan_atomics+0x198/0x2e0
[   19.872041]  kunit_try_run_case+0x170/0x3f0
[   19.872097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.872267]  kthread+0x328/0x630
[   19.872313]  ret_from_fork+0x10/0x20
[   19.872361] 
[   19.872383] Allocated by task 265:
[   19.872414]  kasan_save_stack+0x3c/0x68
[   19.872459]  kasan_save_track+0x20/0x40
[   19.872541]  kasan_save_alloc_info+0x40/0x58
[   19.872586]  __kasan_kmalloc+0xd4/0xd8
[   19.872637]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.872679]  kasan_atomics+0xb8/0x2e0
[   19.872727]  kunit_try_run_case+0x170/0x3f0
[   19.872769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.872814]  kthread+0x328/0x630
[   19.872857]  ret_from_fork+0x10/0x20
[   19.872898] 
[   19.872928] The buggy address belongs to the object at fff00000c5b40680
[   19.872928]  which belongs to the cache kmalloc-64 of size 64
[   19.873339] The buggy address is located 0 bytes to the right of
[   19.873339]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.873672] 
[   19.873705] The buggy address belongs to the physical page:
[   19.873771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.874016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.874468] page_type: f5(slab)
[   19.874914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.875258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.875388] page dumped because: kasan: bad access detected
[   19.875740] 
[   19.876014] Memory state around the buggy address:
[   19.876222]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.876294]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.876565] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.876909]                                      ^
[   19.877206]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.877301]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.877352] ==================================================================
[   19.749949] ==================================================================
[   19.750359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.750573] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.750671] 
[   19.750819] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.750915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.751060] Hardware name: linux,dummy-virt (DT)
[   19.751103] Call trace:
[   19.751129]  show_stack+0x20/0x38 (C)
[   19.751190]  dump_stack_lvl+0x8c/0xd0
[   19.751447]  print_report+0x118/0x5d0
[   19.751531]  kasan_report+0xdc/0x128
[   19.752036]  kasan_check_range+0x100/0x1a8
[   19.752203]  __kasan_check_write+0x20/0x30
[   19.752255]  kasan_atomics_helper+0x1128/0x4858
[   19.752307]  kasan_atomics+0x198/0x2e0
[   19.752538]  kunit_try_run_case+0x170/0x3f0
[   19.752700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752945]  kthread+0x328/0x630
[   19.753205]  ret_from_fork+0x10/0x20
[   19.753366] 
[   19.753515] Allocated by task 265:
[   19.753555]  kasan_save_stack+0x3c/0x68
[   19.753602]  kasan_save_track+0x20/0x40
[   19.753654]  kasan_save_alloc_info+0x40/0x58
[   19.753698]  __kasan_kmalloc+0xd4/0xd8
[   19.753738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.753780]  kasan_atomics+0xb8/0x2e0
[   19.754066]  kunit_try_run_case+0x170/0x3f0
[   19.754166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.754218]  kthread+0x328/0x630
[   19.754254]  ret_from_fork+0x10/0x20
[   19.754302] 
[   19.754325] The buggy address belongs to the object at fff00000c5b40680
[   19.754325]  which belongs to the cache kmalloc-64 of size 64
[   19.754387] The buggy address is located 0 bytes to the right of
[   19.754387]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.754455] 
[   19.754477] The buggy address belongs to the physical page:
[   19.754521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.754577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.755122] page_type: f5(slab)
[   19.755214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.755447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.755758] page dumped because: kasan: bad access detected
[   19.756070] 
[   19.756119] Memory state around the buggy address:
[   19.756163]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.756890]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.757019] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.757113]                                      ^
[   19.757154]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.757208]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.757250] ==================================================================
[   19.807156] ==================================================================
[   19.807217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.807270] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.807324] 
[   19.807729] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.807833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.807924] Hardware name: linux,dummy-virt (DT)
[   19.807991] Call trace:
[   19.808019]  show_stack+0x20/0x38 (C)
[   19.808440]  dump_stack_lvl+0x8c/0xd0
[   19.808707]  print_report+0x118/0x5d0
[   19.808776]  kasan_report+0xdc/0x128
[   19.808907]  __asan_report_load8_noabort+0x20/0x30
[   19.809060]  kasan_atomics_helper+0x3f04/0x4858
[   19.809135]  kasan_atomics+0x198/0x2e0
[   19.809191]  kunit_try_run_case+0x170/0x3f0
[   19.809270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.809327]  kthread+0x328/0x630
[   19.809732]  ret_from_fork+0x10/0x20
[   19.810207] 
[   19.810252] Allocated by task 265:
[   19.810374]  kasan_save_stack+0x3c/0x68
[   19.810480]  kasan_save_track+0x20/0x40
[   19.810547]  kasan_save_alloc_info+0x40/0x58
[   19.810793]  __kasan_kmalloc+0xd4/0xd8
[   19.811009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.811482]  kasan_atomics+0xb8/0x2e0
[   19.811586]  kunit_try_run_case+0x170/0x3f0
[   19.812070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.812324]  kthread+0x328/0x630
[   19.812490]  ret_from_fork+0x10/0x20
[   19.812798] 
[   19.812948] The buggy address belongs to the object at fff00000c5b40680
[   19.812948]  which belongs to the cache kmalloc-64 of size 64
[   19.813209] The buggy address is located 0 bytes to the right of
[   19.813209]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.813311] 
[   19.813339] The buggy address belongs to the physical page:
[   19.813741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.814163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.814231] page_type: f5(slab)
[   19.814604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.814862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.815052] page dumped because: kasan: bad access detected
[   19.815391] 
[   19.815588] Memory state around the buggy address:
[   19.815715]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.815912]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.815990] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.816340]                                      ^
[   19.816602]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.816970]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817113] ==================================================================
[   19.718236] ==================================================================
[   19.718291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.718344] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.718397] 
[   19.718911] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.719069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.719104] Hardware name: linux,dummy-virt (DT)
[   19.719138] Call trace:
[   19.719164]  show_stack+0x20/0x38 (C)
[   19.719424]  dump_stack_lvl+0x8c/0xd0
[   19.719767]  print_report+0x118/0x5d0
[   19.719982]  kasan_report+0xdc/0x128
[   19.720138]  kasan_check_range+0x100/0x1a8
[   19.720198]  __kasan_check_write+0x20/0x30
[   19.720553]  kasan_atomics_helper+0xff0/0x4858
[   19.720693]  kasan_atomics+0x198/0x2e0
[   19.720854]  kunit_try_run_case+0x170/0x3f0
[   19.721026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.721187]  kthread+0x328/0x630
[   19.721319]  ret_from_fork+0x10/0x20
[   19.721542] 
[   19.721567] Allocated by task 265:
[   19.721764]  kasan_save_stack+0x3c/0x68
[   19.721885]  kasan_save_track+0x20/0x40
[   19.722058]  kasan_save_alloc_info+0x40/0x58
[   19.722449]  __kasan_kmalloc+0xd4/0xd8
[   19.722611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.722847]  kasan_atomics+0xb8/0x2e0
[   19.722917]  kunit_try_run_case+0x170/0x3f0
[   19.723107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.723276]  kthread+0x328/0x630
[   19.723592]  ret_from_fork+0x10/0x20
[   19.723824] 
[   19.724204] The buggy address belongs to the object at fff00000c5b40680
[   19.724204]  which belongs to the cache kmalloc-64 of size 64
[   19.724567] The buggy address is located 0 bytes to the right of
[   19.724567]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.724908] 
[   19.725049] The buggy address belongs to the physical page:
[   19.725259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.725380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.725442] page_type: f5(slab)
[   19.725485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.726008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.726297] page dumped because: kasan: bad access detected
[   19.726374] 
[   19.726395] Memory state around the buggy address:
[   19.726744]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.726956]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727406] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.727573]                                      ^
[   19.727631]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.728150]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.728245] ==================================================================
[   19.699929] ==================================================================
[   19.700100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.700159] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.700213] 
[   19.700481] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.700682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.700738] Hardware name: linux,dummy-virt (DT)
[   19.700773] Call trace:
[   19.700818]  show_stack+0x20/0x38 (C)
[   19.701033]  dump_stack_lvl+0x8c/0xd0
[   19.701280]  print_report+0x118/0x5d0
[   19.701391]  kasan_report+0xdc/0x128
[   19.701454]  kasan_check_range+0x100/0x1a8
[   19.701528]  __kasan_check_write+0x20/0x30
[   19.701654]  kasan_atomics_helper+0xf20/0x4858
[   19.702043]  kasan_atomics+0x198/0x2e0
[   19.702144]  kunit_try_run_case+0x170/0x3f0
[   19.702266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.702383]  kthread+0x328/0x630
[   19.702518]  ret_from_fork+0x10/0x20
[   19.702571] 
[   19.702592] Allocated by task 265:
[   19.702826]  kasan_save_stack+0x3c/0x68
[   19.703074]  kasan_save_track+0x20/0x40
[   19.703153]  kasan_save_alloc_info+0x40/0x58
[   19.703285]  __kasan_kmalloc+0xd4/0xd8
[   19.703361]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.703443]  kasan_atomics+0xb8/0x2e0
[   19.703645]  kunit_try_run_case+0x170/0x3f0
[   19.703859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704255]  kthread+0x328/0x630
[   19.704646]  ret_from_fork+0x10/0x20
[   19.704707] 
[   19.704731] The buggy address belongs to the object at fff00000c5b40680
[   19.704731]  which belongs to the cache kmalloc-64 of size 64
[   19.704796] The buggy address is located 0 bytes to the right of
[   19.704796]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.704863] 
[   19.704887] The buggy address belongs to the physical page:
[   19.704922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.705025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.705099] page_type: f5(slab)
[   19.705165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.705237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.705299] page dumped because: kasan: bad access detected
[   19.705362] 
[   19.705691] Memory state around the buggy address:
[   19.705940]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.706008]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.706229] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.706505]                                      ^
[   19.706775]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.706848]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.706905] ==================================================================
[   19.737843] ==================================================================
[   19.738416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.738665] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.738729] 
[   19.738914] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.739103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.739585] Hardware name: linux,dummy-virt (DT)
[   19.739653] Call trace:
[   19.739816]  show_stack+0x20/0x38 (C)
[   19.739901]  dump_stack_lvl+0x8c/0xd0
[   19.739961]  print_report+0x118/0x5d0
[   19.740009]  kasan_report+0xdc/0x128
[   19.740561]  kasan_check_range+0x100/0x1a8
[   19.740781]  __kasan_check_write+0x20/0x30
[   19.740871]  kasan_atomics_helper+0x10c0/0x4858
[   19.740955]  kasan_atomics+0x198/0x2e0
[   19.741106]  kunit_try_run_case+0x170/0x3f0
[   19.741454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.741644]  kthread+0x328/0x630
[   19.741868]  ret_from_fork+0x10/0x20
[   19.742221] 
[   19.742419] Allocated by task 265:
[   19.742508]  kasan_save_stack+0x3c/0x68
[   19.742799]  kasan_save_track+0x20/0x40
[   19.742967]  kasan_save_alloc_info+0x40/0x58
[   19.743037]  __kasan_kmalloc+0xd4/0xd8
[   19.743521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.743639]  kasan_atomics+0xb8/0x2e0
[   19.743914]  kunit_try_run_case+0x170/0x3f0
[   19.744004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.744093]  kthread+0x328/0x630
[   19.744428]  ret_from_fork+0x10/0x20
[   19.744543] 
[   19.744797] The buggy address belongs to the object at fff00000c5b40680
[   19.744797]  which belongs to the cache kmalloc-64 of size 64
[   19.745058] The buggy address is located 0 bytes to the right of
[   19.745058]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.745671] 
[   19.745711] The buggy address belongs to the physical page:
[   19.745762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.746005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.746185] page_type: f5(slab)
[   19.746279] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.746566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.746635] page dumped because: kasan: bad access detected
[   19.746843] 
[   19.746971] Memory state around the buggy address:
[   19.747074]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.747387]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.747447] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.747960]                                      ^
[   19.748065]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.748446]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.748672] ==================================================================
[   19.835415] ==================================================================
[   19.835499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.835639] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.835725] 
[   19.835764] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.836013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.836080] Hardware name: linux,dummy-virt (DT)
[   19.836564] Call trace:
[   19.836609]  show_stack+0x20/0x38 (C)
[   19.836679]  dump_stack_lvl+0x8c/0xd0
[   19.836732]  print_report+0x118/0x5d0
[   19.837063]  kasan_report+0xdc/0x128
[   19.837470]  kasan_check_range+0x100/0x1a8
[   19.837581]  __kasan_check_write+0x20/0x30
[   19.837649]  kasan_atomics_helper+0x14e4/0x4858
[   19.837707]  kasan_atomics+0x198/0x2e0
[   19.837767]  kunit_try_run_case+0x170/0x3f0
[   19.837816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.838167]  kthread+0x328/0x630
[   19.838237]  ret_from_fork+0x10/0x20
[   19.838472] 
[   19.838650] Allocated by task 265:
[   19.838764]  kasan_save_stack+0x3c/0x68
[   19.838860]  kasan_save_track+0x20/0x40
[   19.838929]  kasan_save_alloc_info+0x40/0x58
[   19.839077]  __kasan_kmalloc+0xd4/0xd8
[   19.839141]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.839182]  kasan_atomics+0xb8/0x2e0
[   19.839578]  kunit_try_run_case+0x170/0x3f0
[   19.839853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.840114]  kthread+0x328/0x630
[   19.840197]  ret_from_fork+0x10/0x20
[   19.840273] 
[   19.840468] The buggy address belongs to the object at fff00000c5b40680
[   19.840468]  which belongs to the cache kmalloc-64 of size 64
[   19.840610] The buggy address is located 0 bytes to the right of
[   19.840610]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.840996] 
[   19.841148] The buggy address belongs to the physical page:
[   19.841315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.841386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.841439] page_type: f5(slab)
[   19.841696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.841803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.842071] page dumped because: kasan: bad access detected
[   19.842529] 
[   19.842575] Memory state around the buggy address:
[   19.842671]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.842931]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843212] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.843590]                                      ^
[   19.843669]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843797]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843882] ==================================================================
[   19.661819] ==================================================================
[   19.661942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.662017] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.662070] 
[   19.662101] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.662202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.662259] Hardware name: linux,dummy-virt (DT)
[   19.662315] Call trace:
[   19.662359]  show_stack+0x20/0x38 (C)
[   19.662431]  dump_stack_lvl+0x8c/0xd0
[   19.662482]  print_report+0x118/0x5d0
[   19.662557]  kasan_report+0xdc/0x128
[   19.662847]  __asan_report_load8_noabort+0x20/0x30
[   19.663083]  kasan_atomics_helper+0x3f58/0x4858
[   19.663169]  kasan_atomics+0x198/0x2e0
[   19.663248]  kunit_try_run_case+0x170/0x3f0
[   19.663300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.663357]  kthread+0x328/0x630
[   19.663813]  ret_from_fork+0x10/0x20
[   19.664002] 
[   19.664075] Allocated by task 265:
[   19.664257]  kasan_save_stack+0x3c/0x68
[   19.664318]  kasan_save_track+0x20/0x40
[   19.664786]  kasan_save_alloc_info+0x40/0x58
[   19.664859]  __kasan_kmalloc+0xd4/0xd8
[   19.664901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.665100]  kasan_atomics+0xb8/0x2e0
[   19.665147]  kunit_try_run_case+0x170/0x3f0
[   19.665213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665533]  kthread+0x328/0x630
[   19.665787]  ret_from_fork+0x10/0x20
[   19.665885] 
[   19.665952] The buggy address belongs to the object at fff00000c5b40680
[   19.665952]  which belongs to the cache kmalloc-64 of size 64
[   19.666111] The buggy address is located 0 bytes to the right of
[   19.666111]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.666495] 
[   19.666682] The buggy address belongs to the physical page:
[   19.666771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.666922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.667028] page_type: f5(slab)
[   19.667085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.667503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.667579] page dumped because: kasan: bad access detected
[   19.667755] 
[   19.667823] Memory state around the buggy address:
[   19.667862]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.668270]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.668337] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.668479]                                      ^
[   19.668536]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.668602]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.668900] ==================================================================
[   19.844930] ==================================================================
[   19.845077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.845261] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.845338] 
[   19.845371] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.845861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.846092] Hardware name: linux,dummy-virt (DT)
[   19.846181] Call trace:
[   19.846366]  show_stack+0x20/0x38 (C)
[   19.846554]  dump_stack_lvl+0x8c/0xd0
[   19.846813]  print_report+0x118/0x5d0
[   19.846896]  kasan_report+0xdc/0x128
[   19.847232]  kasan_check_range+0x100/0x1a8
[   19.847413]  __kasan_check_write+0x20/0x30
[   19.847489]  kasan_atomics_helper+0x154c/0x4858
[   19.847568]  kasan_atomics+0x198/0x2e0
[   19.847628]  kunit_try_run_case+0x170/0x3f0
[   19.847678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.847734]  kthread+0x328/0x630
[   19.847785]  ret_from_fork+0x10/0x20
[   19.847844] 
[   19.847876] Allocated by task 265:
[   19.847917]  kasan_save_stack+0x3c/0x68
[   19.847970]  kasan_save_track+0x20/0x40
[   19.848012]  kasan_save_alloc_info+0x40/0x58
[   19.848056]  __kasan_kmalloc+0xd4/0xd8
[   19.848097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.848146]  kasan_atomics+0xb8/0x2e0
[   19.848186]  kunit_try_run_case+0x170/0x3f0
[   19.848225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.848270]  kthread+0x328/0x630
[   19.848305]  ret_from_fork+0x10/0x20
[   19.848344] 
[   19.848375] The buggy address belongs to the object at fff00000c5b40680
[   19.848375]  which belongs to the cache kmalloc-64 of size 64
[   19.848447] The buggy address is located 0 bytes to the right of
[   19.848447]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.848515] 
[   19.848551] The buggy address belongs to the physical page:
[   19.848584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.849343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.849425] page_type: f5(slab)
[   19.849533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.849671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.849818] page dumped because: kasan: bad access detected
[   19.850405] 
[   19.850687] Memory state around the buggy address:
[   19.851054]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.851479]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.851698] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.851799]                                      ^
[   19.851838]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.852093]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.852256] ==================================================================
[   19.778642] ==================================================================
[   19.778712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.778849] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.778925] 
[   19.778959] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.779144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.779176] Hardware name: linux,dummy-virt (DT)
[   19.779240] Call trace:
[   19.779266]  show_stack+0x20/0x38 (C)
[   19.779511]  dump_stack_lvl+0x8c/0xd0
[   19.779708]  print_report+0x118/0x5d0
[   19.779949]  kasan_report+0xdc/0x128
[   19.780015]  kasan_check_range+0x100/0x1a8
[   19.780075]  __kasan_check_write+0x20/0x30
[   19.780126]  kasan_atomics_helper+0x126c/0x4858
[   19.780181]  kasan_atomics+0x198/0x2e0
[   19.780231]  kunit_try_run_case+0x170/0x3f0
[   19.780280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.780333]  kthread+0x328/0x630
[   19.780378]  ret_from_fork+0x10/0x20
[   19.780426] 
[   19.780449] Allocated by task 265:
[   19.780482]  kasan_save_stack+0x3c/0x68
[   19.780526]  kasan_save_track+0x20/0x40
[   19.781423]  kasan_save_alloc_info+0x40/0x58
[   19.781565]  __kasan_kmalloc+0xd4/0xd8
[   19.781779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.781883]  kasan_atomics+0xb8/0x2e0
[   19.781935]  kunit_try_run_case+0x170/0x3f0
[   19.782314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.782629]  kthread+0x328/0x630
[   19.782816]  ret_from_fork+0x10/0x20
[   19.782877] 
[   19.782900] The buggy address belongs to the object at fff00000c5b40680
[   19.782900]  which belongs to the cache kmalloc-64 of size 64
[   19.782990] The buggy address is located 0 bytes to the right of
[   19.782990]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.783442] 
[   19.784152] The buggy address belongs to the physical page:
[   19.784468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.784822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.785032] page_type: f5(slab)
[   19.785089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.785339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.785431] page dumped because: kasan: bad access detected
[   19.785519] 
[   19.785542] Memory state around the buggy address:
[   19.785855]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.786151]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.786386] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.786435]                                      ^
[   19.786644]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.786873]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.786944] ==================================================================
[   19.644189] ==================================================================
[   19.644251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.644449] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265
[   19.644516] 
[   19.644550] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.644644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.644674] Hardware name: linux,dummy-virt (DT)
[   19.644708] Call trace:
[   19.644734]  show_stack+0x20/0x38 (C)
[   19.644784]  dump_stack_lvl+0x8c/0xd0
[   19.644862]  print_report+0x118/0x5d0
[   19.644962]  kasan_report+0xdc/0x128
[   19.645019]  kasan_check_range+0x100/0x1a8
[   19.645069]  __kasan_check_write+0x20/0x30
[   19.645117]  kasan_atomics_helper+0xd3c/0x4858
[   19.645737]  kasan_atomics+0x198/0x2e0
[   19.645821]  kunit_try_run_case+0x170/0x3f0
[   19.645875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.646314]  kthread+0x328/0x630
[   19.646389]  ret_from_fork+0x10/0x20
[   19.646604] 
[   19.646715] Allocated by task 265:
[   19.646789]  kasan_save_stack+0x3c/0x68
[   19.647102]  kasan_save_track+0x20/0x40
[   19.647350]  kasan_save_alloc_info+0x40/0x58
[   19.647440]  __kasan_kmalloc+0xd4/0xd8
[   19.647540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.647806]  kasan_atomics+0xb8/0x2e0
[   19.648002]  kunit_try_run_case+0x170/0x3f0
[   19.648348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.648630]  kthread+0x328/0x630
[   19.649108]  ret_from_fork+0x10/0x20
[   19.649174] 
[   19.649198] The buggy address belongs to the object at fff00000c5b40680
[   19.649198]  which belongs to the cache kmalloc-64 of size 64
[   19.649261] The buggy address is located 0 bytes to the right of
[   19.649261]  allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0)
[   19.649333] 
[   19.649355] The buggy address belongs to the physical page:
[   19.649391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40
[   19.649446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.649498] page_type: f5(slab)
[   19.649541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.649592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.649652] page dumped because: kasan: bad access detected
[   19.649684] 
[   19.649709] Memory state around the buggy address:
[   19.649770]  fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.649830]  fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.649876] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.649923]                                      ^
[   19.649959]  fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650013]  fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650061] ==================================================================

[   16.448141] ==================================================================
[   16.448495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.448846] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.449132] 
[   16.449240] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.449282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.449309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.449334] Call Trace:
[   16.449350]  <TASK>
[   16.449367]  dump_stack_lvl+0x73/0xb0
[   16.449408]  print_report+0xd1/0x610
[   16.449432]  ? __virt_addr_valid+0x1db/0x2d0
[   16.449456]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.449478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.449502]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.449526]  kasan_report+0x141/0x180
[   16.449550]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.449578]  kasan_check_range+0x10c/0x1c0
[   16.449604]  __kasan_check_write+0x18/0x20
[   16.449636]  kasan_atomics_helper+0x20c8/0x5450
[   16.449660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.449683]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.449710]  ? kasan_atomics+0x152/0x310
[   16.449738]  kasan_atomics+0x1dc/0x310
[   16.449762]  ? __pfx_kasan_atomics+0x10/0x10
[   16.449787]  ? __pfx_read_tsc+0x10/0x10
[   16.449809]  ? ktime_get_ts64+0x86/0x230
[   16.449836]  kunit_try_run_case+0x1a5/0x480
[   16.449862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.449886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.449912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.449938]  ? __kthread_parkme+0x82/0x180
[   16.449960]  ? preempt_count_sub+0x50/0x80
[   16.449985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.450011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.450037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.450062]  kthread+0x337/0x6f0
[   16.450083]  ? trace_preempt_on+0x20/0xc0
[   16.450107]  ? __pfx_kthread+0x10/0x10
[   16.450130]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.450153]  ? calculate_sigpending+0x7b/0xa0
[   16.450178]  ? __pfx_kthread+0x10/0x10
[   16.450202]  ret_from_fork+0x116/0x1d0
[   16.450222]  ? __pfx_kthread+0x10/0x10
[   16.450244]  ret_from_fork_asm+0x1a/0x30
[   16.450278]  </TASK>
[   16.450288] 
[   16.457478] Allocated by task 283:
[   16.457642]  kasan_save_stack+0x45/0x70
[   16.457843]  kasan_save_track+0x18/0x40
[   16.458038]  kasan_save_alloc_info+0x3b/0x50
[   16.458247]  __kasan_kmalloc+0xb7/0xc0
[   16.458448]  __kmalloc_cache_noprof+0x189/0x420
[   16.458761]  kasan_atomics+0x95/0x310
[   16.458911]  kunit_try_run_case+0x1a5/0x480
[   16.459122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.459346]  kthread+0x337/0x6f0
[   16.459516]  ret_from_fork+0x116/0x1d0
[   16.459681]  ret_from_fork_asm+0x1a/0x30
[   16.459867] 
[   16.459966] The buggy address belongs to the object at ffff88810394df80
[   16.459966]  which belongs to the cache kmalloc-64 of size 64
[   16.460448] The buggy address is located 0 bytes to the right of
[   16.460448]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.460971] 
[   16.461060] The buggy address belongs to the physical page:
[   16.461292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.461550] flags: 0x200000000000000(node=0|zone=2)
[   16.461936] page_type: f5(slab)
[   16.462144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.462437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.462729] page dumped because: kasan: bad access detected
[   16.462942] 
[   16.463036] Memory state around the buggy address:
[   16.463238]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.463532]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.463966] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.464184]                                      ^
[   16.464342]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.464682]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464996] ==================================================================
[   15.884768] ==================================================================
[   15.885241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.885585] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.885890] 
[   15.885998] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.886044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.886058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.886082] Call Trace:
[   15.886098]  <TASK>
[   15.886116]  dump_stack_lvl+0x73/0xb0
[   15.886145]  print_report+0xd1/0x610
[   15.886169]  ? __virt_addr_valid+0x1db/0x2d0
[   15.886194]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.886217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.886240]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.886264]  kasan_report+0x141/0x180
[   15.886287]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.886316]  kasan_check_range+0x10c/0x1c0
[   15.886340]  __kasan_check_write+0x18/0x20
[   15.886361]  kasan_atomics_helper+0x12e6/0x5450
[   15.886385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.886419]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.886445]  ? kasan_atomics+0x152/0x310
[   15.886474]  kasan_atomics+0x1dc/0x310
[   15.886498]  ? __pfx_kasan_atomics+0x10/0x10
[   15.886524]  ? __pfx_read_tsc+0x10/0x10
[   15.886546]  ? ktime_get_ts64+0x86/0x230
[   15.886572]  kunit_try_run_case+0x1a5/0x480
[   15.886599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.886622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.886648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.886673]  ? __kthread_parkme+0x82/0x180
[   15.886696]  ? preempt_count_sub+0x50/0x80
[   15.886721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.886748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.886773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.886808]  kthread+0x337/0x6f0
[   15.886830]  ? trace_preempt_on+0x20/0xc0
[   15.886854]  ? __pfx_kthread+0x10/0x10
[   15.886877]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.886899]  ? calculate_sigpending+0x7b/0xa0
[   15.886925]  ? __pfx_kthread+0x10/0x10
[   15.886947]  ret_from_fork+0x116/0x1d0
[   15.886968]  ? __pfx_kthread+0x10/0x10
[   15.886989]  ret_from_fork_asm+0x1a/0x30
[   15.887023]  </TASK>
[   15.887034] 
[   15.894821] Allocated by task 283:
[   15.894992]  kasan_save_stack+0x45/0x70
[   15.895137]  kasan_save_track+0x18/0x40
[   15.895271]  kasan_save_alloc_info+0x3b/0x50
[   15.895439]  __kasan_kmalloc+0xb7/0xc0
[   15.895622]  __kmalloc_cache_noprof+0x189/0x420
[   15.895865]  kasan_atomics+0x95/0x310
[   15.896052]  kunit_try_run_case+0x1a5/0x480
[   15.896260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.896442]  kthread+0x337/0x6f0
[   15.896562]  ret_from_fork+0x116/0x1d0
[   15.896754]  ret_from_fork_asm+0x1a/0x30
[   15.896953] 
[   15.897074] The buggy address belongs to the object at ffff88810394df80
[   15.897074]  which belongs to the cache kmalloc-64 of size 64
[   15.897613] The buggy address is located 0 bytes to the right of
[   15.897613]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.898083] 
[   15.898160] The buggy address belongs to the physical page:
[   15.898427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.898869] flags: 0x200000000000000(node=0|zone=2)
[   15.899071] page_type: f5(slab)
[   15.899245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.899571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.899887] page dumped because: kasan: bad access detected
[   15.900102] 
[   15.900198] Memory state around the buggy address:
[   15.900436]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.900806]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.901085] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.901414]                                      ^
[   15.901646]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.901969]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.902280] ==================================================================
[   15.744355] ==================================================================
[   15.744888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.745312] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.745832] 
[   15.745934] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.745980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.745994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.746125] Call Trace:
[   15.746145]  <TASK>
[   15.746163]  dump_stack_lvl+0x73/0xb0
[   15.746195]  print_report+0xd1/0x610
[   15.746219]  ? __virt_addr_valid+0x1db/0x2d0
[   15.746244]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.746267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.746291]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.746314]  kasan_report+0x141/0x180
[   15.746338]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.746367]  __asan_report_load4_noabort+0x18/0x20
[   15.746405]  kasan_atomics_helper+0x4a36/0x5450
[   15.746430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.746454]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.746481]  ? kasan_atomics+0x152/0x310
[   15.746510]  kasan_atomics+0x1dc/0x310
[   15.746535]  ? __pfx_kasan_atomics+0x10/0x10
[   15.746561]  ? __pfx_read_tsc+0x10/0x10
[   15.746583]  ? ktime_get_ts64+0x86/0x230
[   15.746610]  kunit_try_run_case+0x1a5/0x480
[   15.746638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.746663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.746688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.746714]  ? __kthread_parkme+0x82/0x180
[   15.746737]  ? preempt_count_sub+0x50/0x80
[   15.746762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.746789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.746814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.746840]  kthread+0x337/0x6f0
[   15.746861]  ? trace_preempt_on+0x20/0xc0
[   15.746886]  ? __pfx_kthread+0x10/0x10
[   15.746909]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.746933]  ? calculate_sigpending+0x7b/0xa0
[   15.746959]  ? __pfx_kthread+0x10/0x10
[   15.746983]  ret_from_fork+0x116/0x1d0
[   15.747003]  ? __pfx_kthread+0x10/0x10
[   15.747025]  ret_from_fork_asm+0x1a/0x30
[   15.747059]  </TASK>
[   15.747071] 
[   15.756513] Allocated by task 283:
[   15.756815]  kasan_save_stack+0x45/0x70
[   15.757192]  kasan_save_track+0x18/0x40
[   15.757347]  kasan_save_alloc_info+0x3b/0x50
[   15.757747]  __kasan_kmalloc+0xb7/0xc0
[   15.757943]  __kmalloc_cache_noprof+0x189/0x420
[   15.758162]  kasan_atomics+0x95/0x310
[   15.758339]  kunit_try_run_case+0x1a5/0x480
[   15.758554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.759005]  kthread+0x337/0x6f0
[   15.759161]  ret_from_fork+0x116/0x1d0
[   15.759478]  ret_from_fork_asm+0x1a/0x30
[   15.759771] 
[   15.759867] The buggy address belongs to the object at ffff88810394df80
[   15.759867]  which belongs to the cache kmalloc-64 of size 64
[   15.760512] The buggy address is located 0 bytes to the right of
[   15.760512]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.761239] 
[   15.761342] The buggy address belongs to the physical page:
[   15.761541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.762120] flags: 0x200000000000000(node=0|zone=2)
[   15.762460] page_type: f5(slab)
[   15.762592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.763040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.763391] page dumped because: kasan: bad access detected
[   15.763596] 
[   15.763769] Memory state around the buggy address:
[   15.764121]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.764413]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.764859] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.765226]                                      ^
[   15.765439]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.765896]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766261] ==================================================================
[   16.482823] ==================================================================
[   16.483169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.483620] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.483951] 
[   16.484080] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.484123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.484137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.484158] Call Trace:
[   16.484175]  <TASK>
[   16.484193]  dump_stack_lvl+0x73/0xb0
[   16.484221]  print_report+0xd1/0x610
[   16.484244]  ? __virt_addr_valid+0x1db/0x2d0
[   16.484268]  ? kasan_atomics_helper+0x218a/0x5450
[   16.484290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.484314]  ? kasan_atomics_helper+0x218a/0x5450
[   16.484336]  kasan_report+0x141/0x180
[   16.484359]  ? kasan_atomics_helper+0x218a/0x5450
[   16.484389]  kasan_check_range+0x10c/0x1c0
[   16.484426]  __kasan_check_write+0x18/0x20
[   16.484447]  kasan_atomics_helper+0x218a/0x5450
[   16.484471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.484495]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.484521]  ? kasan_atomics+0x152/0x310
[   16.484549]  kasan_atomics+0x1dc/0x310
[   16.484573]  ? __pfx_kasan_atomics+0x10/0x10
[   16.484600]  ? __pfx_read_tsc+0x10/0x10
[   16.484623]  ? ktime_get_ts64+0x86/0x230
[   16.484649]  kunit_try_run_case+0x1a5/0x480
[   16.484680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.484704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.484730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.484755]  ? __kthread_parkme+0x82/0x180
[   16.484777]  ? preempt_count_sub+0x50/0x80
[   16.484802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.484829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.484855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.484880]  kthread+0x337/0x6f0
[   16.484901]  ? trace_preempt_on+0x20/0xc0
[   16.484925]  ? __pfx_kthread+0x10/0x10
[   16.484948]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.484971]  ? calculate_sigpending+0x7b/0xa0
[   16.484996]  ? __pfx_kthread+0x10/0x10
[   16.485019]  ret_from_fork+0x116/0x1d0
[   16.485039]  ? __pfx_kthread+0x10/0x10
[   16.485061]  ret_from_fork_asm+0x1a/0x30
[   16.485095]  </TASK>
[   16.485106] 
[   16.492488] Allocated by task 283:
[   16.492760]  kasan_save_stack+0x45/0x70
[   16.492961]  kasan_save_track+0x18/0x40
[   16.493151]  kasan_save_alloc_info+0x3b/0x50
[   16.493361]  __kasan_kmalloc+0xb7/0xc0
[   16.493558]  __kmalloc_cache_noprof+0x189/0x420
[   16.493782]  kasan_atomics+0x95/0x310
[   16.493970]  kunit_try_run_case+0x1a5/0x480
[   16.494152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.494331]  kthread+0x337/0x6f0
[   16.494465]  ret_from_fork+0x116/0x1d0
[   16.494625]  ret_from_fork_asm+0x1a/0x30
[   16.494831] 
[   16.494931] The buggy address belongs to the object at ffff88810394df80
[   16.494931]  which belongs to the cache kmalloc-64 of size 64
[   16.495477] The buggy address is located 0 bytes to the right of
[   16.495477]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.496100] 
[   16.496180] The buggy address belongs to the physical page:
[   16.496421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.496776] flags: 0x200000000000000(node=0|zone=2)
[   16.496992] page_type: f5(slab)
[   16.497116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.497351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.497831] page dumped because: kasan: bad access detected
[   16.498096] 
[   16.498193] Memory state around the buggy address:
[   16.498424]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.498763]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.499043] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.499335]                                      ^
[   16.499536]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.499925]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500146] ==================================================================
[   15.921289] ==================================================================
[   15.922454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.923091] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.923422] 
[   15.923536] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.923582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.923594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.923619] Call Trace:
[   15.923634]  <TASK>
[   15.923651]  dump_stack_lvl+0x73/0xb0
[   15.923684]  print_report+0xd1/0x610
[   15.923729]  ? __virt_addr_valid+0x1db/0x2d0
[   15.923754]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.923790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.923828]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.923852]  kasan_report+0x141/0x180
[   15.923877]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.923905]  kasan_check_range+0x10c/0x1c0
[   15.923931]  __kasan_check_read+0x15/0x20
[   15.923951]  kasan_atomics_helper+0x13b5/0x5450
[   15.923975]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.923999]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.924026]  ? kasan_atomics+0x152/0x310
[   15.924055]  kasan_atomics+0x1dc/0x310
[   15.924078]  ? __pfx_kasan_atomics+0x10/0x10
[   15.924104]  ? __pfx_read_tsc+0x10/0x10
[   15.924127]  ? ktime_get_ts64+0x86/0x230
[   15.924153]  kunit_try_run_case+0x1a5/0x480
[   15.924196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.924221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.924260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.924299]  ? __kthread_parkme+0x82/0x180
[   15.924334]  ? preempt_count_sub+0x50/0x80
[   15.924373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.924409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.924448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.924488]  kthread+0x337/0x6f0
[   15.924522]  ? trace_preempt_on+0x20/0xc0
[   15.924559]  ? __pfx_kthread+0x10/0x10
[   15.924595]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.924618]  ? calculate_sigpending+0x7b/0xa0
[   15.924657]  ? __pfx_kthread+0x10/0x10
[   15.924698]  ret_from_fork+0x116/0x1d0
[   15.924732]  ? __pfx_kthread+0x10/0x10
[   15.924767]  ret_from_fork_asm+0x1a/0x30
[   15.924802]  </TASK>
[   15.924813] 
[   15.932809] Allocated by task 283:
[   15.933010]  kasan_save_stack+0x45/0x70
[   15.933181]  kasan_save_track+0x18/0x40
[   15.933374]  kasan_save_alloc_info+0x3b/0x50
[   15.933612]  __kasan_kmalloc+0xb7/0xc0
[   15.933788]  __kmalloc_cache_noprof+0x189/0x420
[   15.934018]  kasan_atomics+0x95/0x310
[   15.934198]  kunit_try_run_case+0x1a5/0x480
[   15.934440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.934699]  kthread+0x337/0x6f0
[   15.934886]  ret_from_fork+0x116/0x1d0
[   15.935039]  ret_from_fork_asm+0x1a/0x30
[   15.935259] 
[   15.935338] The buggy address belongs to the object at ffff88810394df80
[   15.935338]  which belongs to the cache kmalloc-64 of size 64
[   15.935848] The buggy address is located 0 bytes to the right of
[   15.935848]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.936364] 
[   15.936476] The buggy address belongs to the physical page:
[   15.936781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.937086] flags: 0x200000000000000(node=0|zone=2)
[   15.937338] page_type: f5(slab)
[   15.937536] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.937947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.938238] page dumped because: kasan: bad access detected
[   15.938520] 
[   15.938634] Memory state around the buggy address:
[   15.938851]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.939214]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.939553] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.939808]                                      ^
[   15.940031]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.940361]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.940710] ==================================================================
[   16.150486] ==================================================================
[   16.151232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.151989] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.152634] 
[   16.152812] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.152855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.152868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.152890] Call Trace:
[   16.152908]  <TASK>
[   16.152924]  dump_stack_lvl+0x73/0xb0
[   16.152953]  print_report+0xd1/0x610
[   16.152976]  ? __virt_addr_valid+0x1db/0x2d0
[   16.153001]  ? kasan_atomics_helper+0x194a/0x5450
[   16.153025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.153049]  ? kasan_atomics_helper+0x194a/0x5450
[   16.153074]  kasan_report+0x141/0x180
[   16.153097]  ? kasan_atomics_helper+0x194a/0x5450
[   16.153125]  kasan_check_range+0x10c/0x1c0
[   16.153151]  __kasan_check_write+0x18/0x20
[   16.153171]  kasan_atomics_helper+0x194a/0x5450
[   16.153195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.153219]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.153247]  ? kasan_atomics+0x152/0x310
[   16.153275]  kasan_atomics+0x1dc/0x310
[   16.153300]  ? __pfx_kasan_atomics+0x10/0x10
[   16.153326]  ? __pfx_read_tsc+0x10/0x10
[   16.153348]  ? ktime_get_ts64+0x86/0x230
[   16.153373]  kunit_try_run_case+0x1a5/0x480
[   16.153411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.153436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.153460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.153486]  ? __kthread_parkme+0x82/0x180
[   16.153507]  ? preempt_count_sub+0x50/0x80
[   16.153532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.153558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.153583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.153619]  kthread+0x337/0x6f0
[   16.153641]  ? trace_preempt_on+0x20/0xc0
[   16.153665]  ? __pfx_kthread+0x10/0x10
[   16.153687]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.153710]  ? calculate_sigpending+0x7b/0xa0
[   16.153735]  ? __pfx_kthread+0x10/0x10
[   16.153758]  ret_from_fork+0x116/0x1d0
[   16.153778]  ? __pfx_kthread+0x10/0x10
[   16.153799]  ret_from_fork_asm+0x1a/0x30
[   16.153834]  </TASK>
[   16.153844] 
[   16.164967] Allocated by task 283:
[   16.165144]  kasan_save_stack+0x45/0x70
[   16.165312]  kasan_save_track+0x18/0x40
[   16.165463]  kasan_save_alloc_info+0x3b/0x50
[   16.165616]  __kasan_kmalloc+0xb7/0xc0
[   16.165887]  __kmalloc_cache_noprof+0x189/0x420
[   16.166119]  kasan_atomics+0x95/0x310
[   16.166316]  kunit_try_run_case+0x1a5/0x480
[   16.166541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.166775]  kthread+0x337/0x6f0
[   16.166935]  ret_from_fork+0x116/0x1d0
[   16.167088]  ret_from_fork_asm+0x1a/0x30
[   16.167293] 
[   16.167389] The buggy address belongs to the object at ffff88810394df80
[   16.167389]  which belongs to the cache kmalloc-64 of size 64
[   16.167901] The buggy address is located 0 bytes to the right of
[   16.167901]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.168381] 
[   16.168467] The buggy address belongs to the physical page:
[   16.168676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.169042] flags: 0x200000000000000(node=0|zone=2)
[   16.169280] page_type: f5(slab)
[   16.169451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.169767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.170094] page dumped because: kasan: bad access detected
[   16.170309] 
[   16.170382] Memory state around the buggy address:
[   16.170551]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.170771]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.171126] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.171447]                                      ^
[   16.171667]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.171958]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.172261] ==================================================================
[   15.960560] ==================================================================
[   15.960899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.961437] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.961847] 
[   15.961959] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.962003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.962017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.962040] Call Trace:
[   15.962054]  <TASK>
[   15.962071]  dump_stack_lvl+0x73/0xb0
[   15.962100]  print_report+0xd1/0x610
[   15.962123]  ? __virt_addr_valid+0x1db/0x2d0
[   15.962150]  ? kasan_atomics_helper+0x1467/0x5450
[   15.962174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.962198]  ? kasan_atomics_helper+0x1467/0x5450
[   15.962222]  kasan_report+0x141/0x180
[   15.962246]  ? kasan_atomics_helper+0x1467/0x5450
[   15.962297]  kasan_check_range+0x10c/0x1c0
[   15.962323]  __kasan_check_write+0x18/0x20
[   15.962345]  kasan_atomics_helper+0x1467/0x5450
[   15.962386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.962421]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.962447]  ? kasan_atomics+0x152/0x310
[   15.962492]  kasan_atomics+0x1dc/0x310
[   15.962516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.962557]  ? __pfx_read_tsc+0x10/0x10
[   15.962603]  ? ktime_get_ts64+0x86/0x230
[   15.962629]  kunit_try_run_case+0x1a5/0x480
[   15.962656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.962682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.962707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.962733]  ? __kthread_parkme+0x82/0x180
[   15.962756]  ? preempt_count_sub+0x50/0x80
[   15.962782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.962809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.962835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.962861]  kthread+0x337/0x6f0
[   15.962882]  ? trace_preempt_on+0x20/0xc0
[   15.962908]  ? __pfx_kthread+0x10/0x10
[   15.962931]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.962971]  ? calculate_sigpending+0x7b/0xa0
[   15.962997]  ? __pfx_kthread+0x10/0x10
[   15.963021]  ret_from_fork+0x116/0x1d0
[   15.963041]  ? __pfx_kthread+0x10/0x10
[   15.963079]  ret_from_fork_asm+0x1a/0x30
[   15.963127]  </TASK>
[   15.963139] 
[   15.971085] Allocated by task 283:
[   15.971224]  kasan_save_stack+0x45/0x70
[   15.971431]  kasan_save_track+0x18/0x40
[   15.971621]  kasan_save_alloc_info+0x3b/0x50
[   15.971837]  __kasan_kmalloc+0xb7/0xc0
[   15.972039]  __kmalloc_cache_noprof+0x189/0x420
[   15.972265]  kasan_atomics+0x95/0x310
[   15.972472]  kunit_try_run_case+0x1a5/0x480
[   15.972698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972992]  kthread+0x337/0x6f0
[   15.973187]  ret_from_fork+0x116/0x1d0
[   15.973417]  ret_from_fork_asm+0x1a/0x30
[   15.973617] 
[   15.973717] The buggy address belongs to the object at ffff88810394df80
[   15.973717]  which belongs to the cache kmalloc-64 of size 64
[   15.974242] The buggy address is located 0 bytes to the right of
[   15.974242]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.974917] 
[   15.974993] The buggy address belongs to the physical page:
[   15.975168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.975423] flags: 0x200000000000000(node=0|zone=2)
[   15.975597] page_type: f5(slab)
[   15.975771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.976122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.976474] page dumped because: kasan: bad access detected
[   15.976925] 
[   15.977049] Memory state around the buggy address:
[   15.977275]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.977561]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.977877] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.978099]                                      ^
[   15.978257]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.978490]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978719] ==================================================================
[   15.941264] ==================================================================
[   15.941747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.941987] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.942462] 
[   15.942674] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.942719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.942733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.942755] Call Trace:
[   15.942773]  <TASK>
[   15.942790]  dump_stack_lvl+0x73/0xb0
[   15.942820]  print_report+0xd1/0x610
[   15.942842]  ? __virt_addr_valid+0x1db/0x2d0
[   15.942866]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.942889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.942931]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.942955]  kasan_report+0x141/0x180
[   15.942979]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.943008]  __asan_report_load8_noabort+0x18/0x20
[   15.943303]  kasan_atomics_helper+0x4eae/0x5450
[   15.943327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.943351]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.943377]  ? kasan_atomics+0x152/0x310
[   15.943416]  kasan_atomics+0x1dc/0x310
[   15.943441]  ? __pfx_kasan_atomics+0x10/0x10
[   15.943467]  ? __pfx_read_tsc+0x10/0x10
[   15.943489]  ? ktime_get_ts64+0x86/0x230
[   15.943515]  kunit_try_run_case+0x1a5/0x480
[   15.943542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.943566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.943614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.943640]  ? __kthread_parkme+0x82/0x180
[   15.943662]  ? preempt_count_sub+0x50/0x80
[   15.943687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.943714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.943739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.943765]  kthread+0x337/0x6f0
[   15.943785]  ? trace_preempt_on+0x20/0xc0
[   15.943810]  ? __pfx_kthread+0x10/0x10
[   15.943832]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.943856]  ? calculate_sigpending+0x7b/0xa0
[   15.943881]  ? __pfx_kthread+0x10/0x10
[   15.943904]  ret_from_fork+0x116/0x1d0
[   15.943925]  ? __pfx_kthread+0x10/0x10
[   15.943947]  ret_from_fork_asm+0x1a/0x30
[   15.944000]  </TASK>
[   15.944012] 
[   15.951936] Allocated by task 283:
[   15.952103]  kasan_save_stack+0x45/0x70
[   15.952295]  kasan_save_track+0x18/0x40
[   15.952494]  kasan_save_alloc_info+0x3b/0x50
[   15.952722]  __kasan_kmalloc+0xb7/0xc0
[   15.952893]  __kmalloc_cache_noprof+0x189/0x420
[   15.953108]  kasan_atomics+0x95/0x310
[   15.953273]  kunit_try_run_case+0x1a5/0x480
[   15.953432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.953606]  kthread+0x337/0x6f0
[   15.953726]  ret_from_fork+0x116/0x1d0
[   15.953858]  ret_from_fork_asm+0x1a/0x30
[   15.953997] 
[   15.954070] The buggy address belongs to the object at ffff88810394df80
[   15.954070]  which belongs to the cache kmalloc-64 of size 64
[   15.954479] The buggy address is located 0 bytes to the right of
[   15.954479]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.955143] 
[   15.955240] The buggy address belongs to the physical page:
[   15.955505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.955856] flags: 0x200000000000000(node=0|zone=2)
[   15.956085] page_type: f5(slab)
[   15.956251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.956939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.957267] page dumped because: kasan: bad access detected
[   15.957451] 
[   15.957523] Memory state around the buggy address:
[   15.957922]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.958239]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.958495] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.959025]                                      ^
[   15.959255]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.959533]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960021] ==================================================================
[   16.302148] ==================================================================
[   16.302730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.303058] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.303348] 
[   16.303465] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.303511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.303525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.303548] Call Trace:
[   16.303565]  <TASK>
[   16.303602]  dump_stack_lvl+0x73/0xb0
[   16.303632]  print_report+0xd1/0x610
[   16.303656]  ? __virt_addr_valid+0x1db/0x2d0
[   16.303680]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.303702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.303726]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.303749]  kasan_report+0x141/0x180
[   16.303773]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.303801]  kasan_check_range+0x10c/0x1c0
[   16.303826]  __kasan_check_write+0x18/0x20
[   16.303847]  kasan_atomics_helper+0x1d7a/0x5450
[   16.303871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.303895]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.303922]  ? kasan_atomics+0x152/0x310
[   16.303951]  kasan_atomics+0x1dc/0x310
[   16.303976]  ? __pfx_kasan_atomics+0x10/0x10
[   16.304002]  ? __pfx_read_tsc+0x10/0x10
[   16.304024]  ? ktime_get_ts64+0x86/0x230
[   16.304051]  kunit_try_run_case+0x1a5/0x480
[   16.304077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304101]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.304127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.304153]  ? __kthread_parkme+0x82/0x180
[   16.304174]  ? preempt_count_sub+0x50/0x80
[   16.304200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.304250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.304275]  kthread+0x337/0x6f0
[   16.304295]  ? trace_preempt_on+0x20/0xc0
[   16.304321]  ? __pfx_kthread+0x10/0x10
[   16.304343]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.304366]  ? calculate_sigpending+0x7b/0xa0
[   16.304391]  ? __pfx_kthread+0x10/0x10
[   16.304424]  ret_from_fork+0x116/0x1d0
[   16.304444]  ? __pfx_kthread+0x10/0x10
[   16.304466]  ret_from_fork_asm+0x1a/0x30
[   16.304499]  </TASK>
[   16.304511] 
[   16.311733] Allocated by task 283:
[   16.311921]  kasan_save_stack+0x45/0x70
[   16.312124]  kasan_save_track+0x18/0x40
[   16.312295]  kasan_save_alloc_info+0x3b/0x50
[   16.312509]  __kasan_kmalloc+0xb7/0xc0
[   16.312704]  __kmalloc_cache_noprof+0x189/0x420
[   16.312926]  kasan_atomics+0x95/0x310
[   16.313114]  kunit_try_run_case+0x1a5/0x480
[   16.313293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.313543]  kthread+0x337/0x6f0
[   16.313699]  ret_from_fork+0x116/0x1d0
[   16.313838]  ret_from_fork_asm+0x1a/0x30
[   16.313985] 
[   16.314061] The buggy address belongs to the object at ffff88810394df80
[   16.314061]  which belongs to the cache kmalloc-64 of size 64
[   16.315188] The buggy address is located 0 bytes to the right of
[   16.315188]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.316756] 
[   16.316866] The buggy address belongs to the physical page:
[   16.317136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.317458] flags: 0x200000000000000(node=0|zone=2)
[   16.317990] page_type: f5(slab)
[   16.318148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.318470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.319002] page dumped because: kasan: bad access detected
[   16.319341] 
[   16.319455] Memory state around the buggy address:
[   16.319829]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.320147]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.320609] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.321022]                                      ^
[   16.321339]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.321780]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322103] ==================================================================
[   15.242847] ==================================================================
[   15.243277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.243682] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.244145] 
[   15.244338] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.244414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.244429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.244453] Call Trace:
[   15.244469]  <TASK>
[   15.244484]  dump_stack_lvl+0x73/0xb0
[   15.244514]  print_report+0xd1/0x610
[   15.244536]  ? __virt_addr_valid+0x1db/0x2d0
[   15.244560]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.244582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.244615]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.244638]  kasan_report+0x141/0x180
[   15.244678]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.244707]  __asan_report_load4_noabort+0x18/0x20
[   15.244744]  kasan_atomics_helper+0x4b54/0x5450
[   15.244768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.244791]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.244817]  ? kasan_atomics+0x152/0x310
[   15.244855]  kasan_atomics+0x1dc/0x310
[   15.244879]  ? __pfx_kasan_atomics+0x10/0x10
[   15.244906]  ? __pfx_read_tsc+0x10/0x10
[   15.244937]  ? ktime_get_ts64+0x86/0x230
[   15.244963]  kunit_try_run_case+0x1a5/0x480
[   15.244990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.245013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.245048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.245073]  ? __kthread_parkme+0x82/0x180
[   15.245095]  ? preempt_count_sub+0x50/0x80
[   15.245145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.245171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.245196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.245221]  kthread+0x337/0x6f0
[   15.245242]  ? trace_preempt_on+0x20/0xc0
[   15.245266]  ? __pfx_kthread+0x10/0x10
[   15.245288]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.245313]  ? calculate_sigpending+0x7b/0xa0
[   15.245338]  ? __pfx_kthread+0x10/0x10
[   15.245362]  ret_from_fork+0x116/0x1d0
[   15.245381]  ? __pfx_kthread+0x10/0x10
[   15.245413]  ret_from_fork_asm+0x1a/0x30
[   15.245446]  </TASK>
[   15.245458] 
[   15.254507] Allocated by task 283:
[   15.254711]  kasan_save_stack+0x45/0x70
[   15.254887]  kasan_save_track+0x18/0x40
[   15.255129]  kasan_save_alloc_info+0x3b/0x50
[   15.255377]  __kasan_kmalloc+0xb7/0xc0
[   15.255579]  __kmalloc_cache_noprof+0x189/0x420
[   15.255817]  kasan_atomics+0x95/0x310
[   15.256012]  kunit_try_run_case+0x1a5/0x480
[   15.256275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.256484]  kthread+0x337/0x6f0
[   15.256718]  ret_from_fork+0x116/0x1d0
[   15.256919]  ret_from_fork_asm+0x1a/0x30
[   15.257193] 
[   15.257301] The buggy address belongs to the object at ffff88810394df80
[   15.257301]  which belongs to the cache kmalloc-64 of size 64
[   15.257676] The buggy address is located 0 bytes to the right of
[   15.257676]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.258048] 
[   15.258124] The buggy address belongs to the physical page:
[   15.258302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.258646] flags: 0x200000000000000(node=0|zone=2)
[   15.259119] page_type: f5(slab)
[   15.259502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.259853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.260190] page dumped because: kasan: bad access detected
[   15.260512] 
[   15.260589] Memory state around the buggy address:
[   15.260823]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.261207]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.261553] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.261846]                                      ^
[   15.262093]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.262431]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.262820] ==================================================================
[   16.131214] ==================================================================
[   16.131571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.131939] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.132406] 
[   16.132523] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.132568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.132583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.132606] Call Trace:
[   16.132621]  <TASK>
[   16.132637]  dump_stack_lvl+0x73/0xb0
[   16.132672]  print_report+0xd1/0x610
[   16.132696]  ? __virt_addr_valid+0x1db/0x2d0
[   16.132721]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.132744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.132767]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.132791]  kasan_report+0x141/0x180
[   16.132814]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.132842]  kasan_check_range+0x10c/0x1c0
[   16.132867]  __kasan_check_write+0x18/0x20
[   16.132888]  kasan_atomics_helper+0x18b1/0x5450
[   16.132912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.132936]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.132962]  ? kasan_atomics+0x152/0x310
[   16.132991]  kasan_atomics+0x1dc/0x310
[   16.133014]  ? __pfx_kasan_atomics+0x10/0x10
[   16.133040]  ? __pfx_read_tsc+0x10/0x10
[   16.133061]  ? ktime_get_ts64+0x86/0x230
[   16.133088]  kunit_try_run_case+0x1a5/0x480
[   16.133114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.133164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.133189]  ? __kthread_parkme+0x82/0x180
[   16.133210]  ? preempt_count_sub+0x50/0x80
[   16.133236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.133311]  kthread+0x337/0x6f0
[   16.133332]  ? trace_preempt_on+0x20/0xc0
[   16.133357]  ? __pfx_kthread+0x10/0x10
[   16.133378]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.133412]  ? calculate_sigpending+0x7b/0xa0
[   16.133436]  ? __pfx_kthread+0x10/0x10
[   16.133460]  ret_from_fork+0x116/0x1d0
[   16.133480]  ? __pfx_kthread+0x10/0x10
[   16.133502]  ret_from_fork_asm+0x1a/0x30
[   16.133536]  </TASK>
[   16.133547] 
[   16.140953] Allocated by task 283:
[   16.141084]  kasan_save_stack+0x45/0x70
[   16.141227]  kasan_save_track+0x18/0x40
[   16.141365]  kasan_save_alloc_info+0x3b/0x50
[   16.141550]  __kasan_kmalloc+0xb7/0xc0
[   16.141757]  __kmalloc_cache_noprof+0x189/0x420
[   16.141984]  kasan_atomics+0x95/0x310
[   16.142174]  kunit_try_run_case+0x1a5/0x480
[   16.142385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.142673]  kthread+0x337/0x6f0
[   16.142799]  ret_from_fork+0x116/0x1d0
[   16.142935]  ret_from_fork_asm+0x1a/0x30
[   16.143078] 
[   16.143153] The buggy address belongs to the object at ffff88810394df80
[   16.143153]  which belongs to the cache kmalloc-64 of size 64
[   16.143574] The buggy address is located 0 bytes to the right of
[   16.143574]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.144564] 
[   16.144746] The buggy address belongs to the physical page:
[   16.145210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.145877] flags: 0x200000000000000(node=0|zone=2)
[   16.146295] page_type: f5(slab)
[   16.146618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.147246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.147971] page dumped because: kasan: bad access detected
[   16.148340] 
[   16.148421] Memory state around the buggy address:
[   16.148582]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.148806]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.149026] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.149242]                                      ^
[   16.149443]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.149664]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.149883] ==================================================================
[   15.555231] ==================================================================
[   15.555664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.555977] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.556589] 
[   15.556732] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.556778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.556878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.556951] Call Trace:
[   15.556967]  <TASK>
[   15.557019]  dump_stack_lvl+0x73/0xb0
[   15.557052]  print_report+0xd1/0x610
[   15.557122]  ? __virt_addr_valid+0x1db/0x2d0
[   15.557147]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.557170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.557205]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.557229]  kasan_report+0x141/0x180
[   15.557252]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.557280]  kasan_check_range+0x10c/0x1c0
[   15.557305]  __kasan_check_write+0x18/0x20
[   15.557325]  kasan_atomics_helper+0xb6a/0x5450
[   15.557349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.557373]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.557408]  ? kasan_atomics+0x152/0x310
[   15.557436]  kasan_atomics+0x1dc/0x310
[   15.557508]  ? __pfx_kasan_atomics+0x10/0x10
[   15.557536]  ? __pfx_read_tsc+0x10/0x10
[   15.557569]  ? ktime_get_ts64+0x86/0x230
[   15.557610]  kunit_try_run_case+0x1a5/0x480
[   15.557671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.557695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.557740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.557766]  ? __kthread_parkme+0x82/0x180
[   15.557788]  ? preempt_count_sub+0x50/0x80
[   15.557824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.557851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.557876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.557901]  kthread+0x337/0x6f0
[   15.557922]  ? trace_preempt_on+0x20/0xc0
[   15.557947]  ? __pfx_kthread+0x10/0x10
[   15.557968]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.557991]  ? calculate_sigpending+0x7b/0xa0
[   15.558016]  ? __pfx_kthread+0x10/0x10
[   15.558039]  ret_from_fork+0x116/0x1d0
[   15.558059]  ? __pfx_kthread+0x10/0x10
[   15.558082]  ret_from_fork_asm+0x1a/0x30
[   15.558114]  </TASK>
[   15.558125] 
[   15.566958] Allocated by task 283:
[   15.567099]  kasan_save_stack+0x45/0x70
[   15.567349]  kasan_save_track+0x18/0x40
[   15.567560]  kasan_save_alloc_info+0x3b/0x50
[   15.568165]  __kasan_kmalloc+0xb7/0xc0
[   15.568418]  __kmalloc_cache_noprof+0x189/0x420
[   15.568584]  kasan_atomics+0x95/0x310
[   15.568769]  kunit_try_run_case+0x1a5/0x480
[   15.569136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.569517]  kthread+0x337/0x6f0
[   15.569794]  ret_from_fork+0x116/0x1d0
[   15.569942]  ret_from_fork_asm+0x1a/0x30
[   15.570104] 
[   15.570206] The buggy address belongs to the object at ffff88810394df80
[   15.570206]  which belongs to the cache kmalloc-64 of size 64
[   15.571158] The buggy address is located 0 bytes to the right of
[   15.571158]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.571767] 
[   15.571892] The buggy address belongs to the physical page:
[   15.572101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.572483] flags: 0x200000000000000(node=0|zone=2)
[   15.572880] page_type: f5(slab)
[   15.573009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.573365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.573843] page dumped because: kasan: bad access detected
[   15.574085] 
[   15.574178] Memory state around the buggy address:
[   15.574501]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.574875]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.575242] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.575604]                                      ^
[   15.575827]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.576128]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.576464] ==================================================================
[   16.048060] ==================================================================
[   16.048459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.049026] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.049351] 
[   16.049450] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.049495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.049508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.049531] Call Trace:
[   16.049569]  <TASK>
[   16.049586]  dump_stack_lvl+0x73/0xb0
[   16.049618]  print_report+0xd1/0x610
[   16.049641]  ? __virt_addr_valid+0x1db/0x2d0
[   16.049666]  ? kasan_atomics_helper+0x164f/0x5450
[   16.049689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.049713]  ? kasan_atomics_helper+0x164f/0x5450
[   16.049736]  kasan_report+0x141/0x180
[   16.049760]  ? kasan_atomics_helper+0x164f/0x5450
[   16.049788]  kasan_check_range+0x10c/0x1c0
[   16.049814]  __kasan_check_write+0x18/0x20
[   16.049835]  kasan_atomics_helper+0x164f/0x5450
[   16.049859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.049883]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.049909]  ? kasan_atomics+0x152/0x310
[   16.049956]  kasan_atomics+0x1dc/0x310
[   16.049982]  ? __pfx_kasan_atomics+0x10/0x10
[   16.050008]  ? __pfx_read_tsc+0x10/0x10
[   16.050031]  ? ktime_get_ts64+0x86/0x230
[   16.050058]  kunit_try_run_case+0x1a5/0x480
[   16.050086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.050129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.050169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.050196]  ? __kthread_parkme+0x82/0x180
[   16.050231]  ? preempt_count_sub+0x50/0x80
[   16.050271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.050311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.050350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.050376]  kthread+0x337/0x6f0
[   16.050406]  ? trace_preempt_on+0x20/0xc0
[   16.050433]  ? __pfx_kthread+0x10/0x10
[   16.050456]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.050480]  ? calculate_sigpending+0x7b/0xa0
[   16.050506]  ? __pfx_kthread+0x10/0x10
[   16.050530]  ret_from_fork+0x116/0x1d0
[   16.050550]  ? __pfx_kthread+0x10/0x10
[   16.050572]  ret_from_fork_asm+0x1a/0x30
[   16.050607]  </TASK>
[   16.050619] 
[   16.058715] Allocated by task 283:
[   16.058916]  kasan_save_stack+0x45/0x70
[   16.059137]  kasan_save_track+0x18/0x40
[   16.059295]  kasan_save_alloc_info+0x3b/0x50
[   16.059459]  __kasan_kmalloc+0xb7/0xc0
[   16.059617]  __kmalloc_cache_noprof+0x189/0x420
[   16.059851]  kasan_atomics+0x95/0x310
[   16.060044]  kunit_try_run_case+0x1a5/0x480
[   16.060252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.060515]  kthread+0x337/0x6f0
[   16.060684]  ret_from_fork+0x116/0x1d0
[   16.060895]  ret_from_fork_asm+0x1a/0x30
[   16.061092] 
[   16.061183] The buggy address belongs to the object at ffff88810394df80
[   16.061183]  which belongs to the cache kmalloc-64 of size 64
[   16.061659] The buggy address is located 0 bytes to the right of
[   16.061659]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.062259] 
[   16.062361] The buggy address belongs to the physical page:
[   16.062634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.063011] flags: 0x200000000000000(node=0|zone=2)
[   16.063261] page_type: f5(slab)
[   16.063434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.064019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.064306] page dumped because: kasan: bad access detected
[   16.064492] 
[   16.064565] Memory state around the buggy address:
[   16.064801]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.065124]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.065438] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.065840]                                      ^
[   16.066077]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.066364]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.066686] ==================================================================
[   16.262820] ==================================================================
[   16.263165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.263781] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.264209] 
[   16.264339] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.264386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.264411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.264434] Call Trace:
[   16.264451]  <TASK>
[   16.264469]  dump_stack_lvl+0x73/0xb0
[   16.264500]  print_report+0xd1/0x610
[   16.264524]  ? __virt_addr_valid+0x1db/0x2d0
[   16.264548]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.264593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.264618]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.264642]  kasan_report+0x141/0x180
[   16.264670]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.264701]  __asan_report_load8_noabort+0x18/0x20
[   16.264727]  kasan_atomics_helper+0x4f30/0x5450
[   16.264751]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.264775]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.264802]  ? kasan_atomics+0x152/0x310
[   16.264830]  kasan_atomics+0x1dc/0x310
[   16.264854]  ? __pfx_kasan_atomics+0x10/0x10
[   16.264880]  ? __pfx_read_tsc+0x10/0x10
[   16.264902]  ? ktime_get_ts64+0x86/0x230
[   16.264930]  kunit_try_run_case+0x1a5/0x480
[   16.264957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.264981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.265007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.265031]  ? __kthread_parkme+0x82/0x180
[   16.265053]  ? preempt_count_sub+0x50/0x80
[   16.265078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.265104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.265128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.265154]  kthread+0x337/0x6f0
[   16.265175]  ? trace_preempt_on+0x20/0xc0
[   16.265199]  ? __pfx_kthread+0x10/0x10
[   16.265221]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.265243]  ? calculate_sigpending+0x7b/0xa0
[   16.265268]  ? __pfx_kthread+0x10/0x10
[   16.265291]  ret_from_fork+0x116/0x1d0
[   16.265311]  ? __pfx_kthread+0x10/0x10
[   16.265333]  ret_from_fork_asm+0x1a/0x30
[   16.265366]  </TASK>
[   16.265377] 
[   16.272515] Allocated by task 283:
[   16.272715]  kasan_save_stack+0x45/0x70
[   16.272863]  kasan_save_track+0x18/0x40
[   16.273060]  kasan_save_alloc_info+0x3b/0x50
[   16.273279]  __kasan_kmalloc+0xb7/0xc0
[   16.273473]  __kmalloc_cache_noprof+0x189/0x420
[   16.273709]  kasan_atomics+0x95/0x310
[   16.273880]  kunit_try_run_case+0x1a5/0x480
[   16.274065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.274292]  kthread+0x337/0x6f0
[   16.274479]  ret_from_fork+0x116/0x1d0
[   16.274663]  ret_from_fork_asm+0x1a/0x30
[   16.274849] 
[   16.274948] The buggy address belongs to the object at ffff88810394df80
[   16.274948]  which belongs to the cache kmalloc-64 of size 64
[   16.275421] The buggy address is located 0 bytes to the right of
[   16.275421]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.275952] 
[   16.276052] The buggy address belongs to the physical page:
[   16.276272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.276622] flags: 0x200000000000000(node=0|zone=2)
[   16.276835] page_type: f5(slab)
[   16.276981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.277283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.277522] page dumped because: kasan: bad access detected
[   16.277723] 
[   16.277798] Memory state around the buggy address:
[   16.277955]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278174]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278500] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.278839]                                      ^
[   16.279065]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.279378]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279724] ==================================================================
[   16.371259] ==================================================================
[   16.371801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.372177] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.372706] 
[   16.372802] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.372952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.373023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.373047] Call Trace:
[   16.373120]  <TASK>
[   16.373140]  dump_stack_lvl+0x73/0xb0
[   16.373171]  print_report+0xd1/0x610
[   16.373194]  ? __virt_addr_valid+0x1db/0x2d0
[   16.373219]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.373242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.373265]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.373288]  kasan_report+0x141/0x180
[   16.373311]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.373340]  kasan_check_range+0x10c/0x1c0
[   16.373365]  __kasan_check_write+0x18/0x20
[   16.373385]  kasan_atomics_helper+0x1f43/0x5450
[   16.373423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.373447]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.373473]  ? kasan_atomics+0x152/0x310
[   16.373502]  kasan_atomics+0x1dc/0x310
[   16.373526]  ? __pfx_kasan_atomics+0x10/0x10
[   16.373552]  ? __pfx_read_tsc+0x10/0x10
[   16.373574]  ? ktime_get_ts64+0x86/0x230
[   16.373612]  kunit_try_run_case+0x1a5/0x480
[   16.373639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.373664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.373691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.373716]  ? __kthread_parkme+0x82/0x180
[   16.373739]  ? preempt_count_sub+0x50/0x80
[   16.373764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.373790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.373815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.373841]  kthread+0x337/0x6f0
[   16.373863]  ? trace_preempt_on+0x20/0xc0
[   16.373887]  ? __pfx_kthread+0x10/0x10
[   16.373909]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.373932]  ? calculate_sigpending+0x7b/0xa0
[   16.373960]  ? __pfx_kthread+0x10/0x10
[   16.373984]  ret_from_fork+0x116/0x1d0
[   16.374004]  ? __pfx_kthread+0x10/0x10
[   16.374026]  ret_from_fork_asm+0x1a/0x30
[   16.374059]  </TASK>
[   16.374070] 
[   16.383688] Allocated by task 283:
[   16.383989]  kasan_save_stack+0x45/0x70
[   16.384258]  kasan_save_track+0x18/0x40
[   16.384554]  kasan_save_alloc_info+0x3b/0x50
[   16.384826]  __kasan_kmalloc+0xb7/0xc0
[   16.385142]  __kmalloc_cache_noprof+0x189/0x420
[   16.385429]  kasan_atomics+0x95/0x310
[   16.385641]  kunit_try_run_case+0x1a5/0x480
[   16.385834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.386069]  kthread+0x337/0x6f0
[   16.386229]  ret_from_fork+0x116/0x1d0
[   16.386409]  ret_from_fork_asm+0x1a/0x30
[   16.386595] 
[   16.387067] The buggy address belongs to the object at ffff88810394df80
[   16.387067]  which belongs to the cache kmalloc-64 of size 64
[   16.387546] The buggy address is located 0 bytes to the right of
[   16.387546]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.388213] 
[   16.388314] The buggy address belongs to the physical page:
[   16.388629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.389118] flags: 0x200000000000000(node=0|zone=2)
[   16.389432] page_type: f5(slab)
[   16.389568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.389997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.390375] page dumped because: kasan: bad access detected
[   16.390736] 
[   16.390817] Memory state around the buggy address:
[   16.391041]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.391334]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.391880] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.392190]                                      ^
[   16.392425]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.392879]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.393238] ==================================================================
[   15.784924] ==================================================================
[   15.785482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.785859] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.786149] 
[   15.786249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.786294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.786307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.786330] Call Trace:
[   15.786345]  <TASK>
[   15.786361]  dump_stack_lvl+0x73/0xb0
[   15.786390]  print_report+0xd1/0x610
[   15.786425]  ? __virt_addr_valid+0x1db/0x2d0
[   15.786450]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.786471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.786495]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.786519]  kasan_report+0x141/0x180
[   15.786542]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.786572]  __asan_report_load4_noabort+0x18/0x20
[   15.786608]  kasan_atomics_helper+0x4a1c/0x5450
[   15.786633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.786656]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.786683]  ? kasan_atomics+0x152/0x310
[   15.786712]  kasan_atomics+0x1dc/0x310
[   15.786737]  ? __pfx_kasan_atomics+0x10/0x10
[   15.786762]  ? __pfx_read_tsc+0x10/0x10
[   15.786784]  ? ktime_get_ts64+0x86/0x230
[   15.786812]  kunit_try_run_case+0x1a5/0x480
[   15.786840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.786863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.786889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.786914]  ? __kthread_parkme+0x82/0x180
[   15.786936]  ? preempt_count_sub+0x50/0x80
[   15.786961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.786987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.787013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.787038]  kthread+0x337/0x6f0
[   15.787059]  ? trace_preempt_on+0x20/0xc0
[   15.787084]  ? __pfx_kthread+0x10/0x10
[   15.787106]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.787128]  ? calculate_sigpending+0x7b/0xa0
[   15.787154]  ? __pfx_kthread+0x10/0x10
[   15.787178]  ret_from_fork+0x116/0x1d0
[   15.787198]  ? __pfx_kthread+0x10/0x10
[   15.787220]  ret_from_fork_asm+0x1a/0x30
[   15.787254]  </TASK>
[   15.787266] 
[   15.794439] Allocated by task 283:
[   15.794622]  kasan_save_stack+0x45/0x70
[   15.794823]  kasan_save_track+0x18/0x40
[   15.795017]  kasan_save_alloc_info+0x3b/0x50
[   15.795211]  __kasan_kmalloc+0xb7/0xc0
[   15.795346]  __kmalloc_cache_noprof+0x189/0x420
[   15.795514]  kasan_atomics+0x95/0x310
[   15.795893]  kunit_try_run_case+0x1a5/0x480
[   15.796111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796364]  kthread+0x337/0x6f0
[   15.796516]  ret_from_fork+0x116/0x1d0
[   15.796712]  ret_from_fork_asm+0x1a/0x30
[   15.796913] 
[   15.796992] The buggy address belongs to the object at ffff88810394df80
[   15.796992]  which belongs to the cache kmalloc-64 of size 64
[   15.797468] The buggy address is located 0 bytes to the right of
[   15.797468]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.797988] 
[   15.798070] The buggy address belongs to the physical page:
[   15.798306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.798673] flags: 0x200000000000000(node=0|zone=2)
[   15.798878] page_type: f5(slab)
[   15.799027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.799296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.799548] page dumped because: kasan: bad access detected
[   15.799732] 
[   15.799805] Memory state around the buggy address:
[   15.799963]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.800183]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.800411] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.800754]                                      ^
[   15.800979]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.801293]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801650] ==================================================================
[   15.577357] ==================================================================
[   15.578184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.578956] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.579666] 
[   15.579931] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.579978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.579992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.580017] Call Trace:
[   15.580033]  <TASK>
[   15.580051]  dump_stack_lvl+0x73/0xb0
[   15.580081]  print_report+0xd1/0x610
[   15.580105]  ? __virt_addr_valid+0x1db/0x2d0
[   15.580129]  ? kasan_atomics_helper+0xc70/0x5450
[   15.580151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.580175]  ? kasan_atomics_helper+0xc70/0x5450
[   15.580198]  kasan_report+0x141/0x180
[   15.580222]  ? kasan_atomics_helper+0xc70/0x5450
[   15.580251]  kasan_check_range+0x10c/0x1c0
[   15.580277]  __kasan_check_write+0x18/0x20
[   15.580297]  kasan_atomics_helper+0xc70/0x5450
[   15.580322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.580346]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.580372]  ? kasan_atomics+0x152/0x310
[   15.580412]  kasan_atomics+0x1dc/0x310
[   15.580453]  ? __pfx_kasan_atomics+0x10/0x10
[   15.580479]  ? __pfx_read_tsc+0x10/0x10
[   15.580501]  ? ktime_get_ts64+0x86/0x230
[   15.580528]  kunit_try_run_case+0x1a5/0x480
[   15.580555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.580579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.580631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.580655]  ? __kthread_parkme+0x82/0x180
[   15.580692]  ? preempt_count_sub+0x50/0x80
[   15.580717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.580746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.580773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.580798]  kthread+0x337/0x6f0
[   15.580820]  ? trace_preempt_on+0x20/0xc0
[   15.580846]  ? __pfx_kthread+0x10/0x10
[   15.580868]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.580891]  ? calculate_sigpending+0x7b/0xa0
[   15.580917]  ? __pfx_kthread+0x10/0x10
[   15.580940]  ret_from_fork+0x116/0x1d0
[   15.580960]  ? __pfx_kthread+0x10/0x10
[   15.580983]  ret_from_fork_asm+0x1a/0x30
[   15.581016]  </TASK>
[   15.581027] 
[   15.592605] Allocated by task 283:
[   15.592825]  kasan_save_stack+0x45/0x70
[   15.593013]  kasan_save_track+0x18/0x40
[   15.593153]  kasan_save_alloc_info+0x3b/0x50
[   15.593368]  __kasan_kmalloc+0xb7/0xc0
[   15.593604]  __kmalloc_cache_noprof+0x189/0x420
[   15.593854]  kasan_atomics+0x95/0x310
[   15.594020]  kunit_try_run_case+0x1a5/0x480
[   15.594256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.594479]  kthread+0x337/0x6f0
[   15.594732]  ret_from_fork+0x116/0x1d0
[   15.594893]  ret_from_fork_asm+0x1a/0x30
[   15.595100] 
[   15.595196] The buggy address belongs to the object at ffff88810394df80
[   15.595196]  which belongs to the cache kmalloc-64 of size 64
[   15.595594] The buggy address is located 0 bytes to the right of
[   15.595594]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.596041] 
[   15.596253] The buggy address belongs to the physical page:
[   15.596530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.596807] flags: 0x200000000000000(node=0|zone=2)
[   15.596981] page_type: f5(slab)
[   15.597209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.597574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.597951] page dumped because: kasan: bad access detected
[   15.598231] 
[   15.598321] Memory state around the buggy address:
[   15.598533]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.598888]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.599113] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.599415]                                      ^
[   15.599696]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.600016]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.600267] ==================================================================
[   16.214330] ==================================================================
[   16.214777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.215498] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.216175] 
[   16.216357] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.216415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.216429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.216452] Call Trace:
[   16.216468]  <TASK>
[   16.216485]  dump_stack_lvl+0x73/0xb0
[   16.216515]  print_report+0xd1/0x610
[   16.216539]  ? __virt_addr_valid+0x1db/0x2d0
[   16.216565]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.216594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.216617]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.216641]  kasan_report+0x141/0x180
[   16.216670]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.216698]  kasan_check_range+0x10c/0x1c0
[   16.216723]  __kasan_check_write+0x18/0x20
[   16.216744]  kasan_atomics_helper+0x1b22/0x5450
[   16.216768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.216792]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.216818]  ? kasan_atomics+0x152/0x310
[   16.216847]  kasan_atomics+0x1dc/0x310
[   16.216870]  ? __pfx_kasan_atomics+0x10/0x10
[   16.216895]  ? __pfx_read_tsc+0x10/0x10
[   16.216917]  ? ktime_get_ts64+0x86/0x230
[   16.216945]  kunit_try_run_case+0x1a5/0x480
[   16.216973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.217022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.217048]  ? __kthread_parkme+0x82/0x180
[   16.217069]  ? preempt_count_sub+0x50/0x80
[   16.217096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.217122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.217146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.217172]  kthread+0x337/0x6f0
[   16.217194]  ? trace_preempt_on+0x20/0xc0
[   16.217219]  ? __pfx_kthread+0x10/0x10
[   16.217241]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.217264]  ? calculate_sigpending+0x7b/0xa0
[   16.217289]  ? __pfx_kthread+0x10/0x10
[   16.217312]  ret_from_fork+0x116/0x1d0
[   16.217331]  ? __pfx_kthread+0x10/0x10
[   16.217354]  ret_from_fork_asm+0x1a/0x30
[   16.217388]  </TASK>
[   16.217450] 
[   16.227238] Allocated by task 283:
[   16.227438]  kasan_save_stack+0x45/0x70
[   16.227656]  kasan_save_track+0x18/0x40
[   16.227901]  kasan_save_alloc_info+0x3b/0x50
[   16.228061]  __kasan_kmalloc+0xb7/0xc0
[   16.228258]  __kmalloc_cache_noprof+0x189/0x420
[   16.228540]  kasan_atomics+0x95/0x310
[   16.228744]  kunit_try_run_case+0x1a5/0x480
[   16.229266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.229552]  kthread+0x337/0x6f0
[   16.230181]  ret_from_fork+0x116/0x1d0
[   16.230372]  ret_from_fork_asm+0x1a/0x30
[   16.230624] 
[   16.230821] The buggy address belongs to the object at ffff88810394df80
[   16.230821]  which belongs to the cache kmalloc-64 of size 64
[   16.231320] The buggy address is located 0 bytes to the right of
[   16.231320]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.231972] 
[   16.232054] The buggy address belongs to the physical page:
[   16.232314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.232694] flags: 0x200000000000000(node=0|zone=2)
[   16.232988] page_type: f5(slab)
[   16.233183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.233545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.233965] page dumped because: kasan: bad access detected
[   16.234167] 
[   16.234278] Memory state around the buggy address:
[   16.234509]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.234891]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.235135] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.235493]                                      ^
[   16.235671]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.236130]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.236784] ==================================================================
[   15.638159] ==================================================================
[   15.638416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.638972] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.639516] 
[   15.639644] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.639690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.639702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.639837] Call Trace:
[   15.639855]  <TASK>
[   15.639869]  dump_stack_lvl+0x73/0xb0
[   15.639993]  print_report+0xd1/0x610
[   15.640019]  ? __virt_addr_valid+0x1db/0x2d0
[   15.640043]  ? kasan_atomics_helper+0xde0/0x5450
[   15.640065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.640091]  ? kasan_atomics_helper+0xde0/0x5450
[   15.640114]  kasan_report+0x141/0x180
[   15.640138]  ? kasan_atomics_helper+0xde0/0x5450
[   15.640167]  kasan_check_range+0x10c/0x1c0
[   15.640192]  __kasan_check_write+0x18/0x20
[   15.640213]  kasan_atomics_helper+0xde0/0x5450
[   15.640240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.640614]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.640658]  ? kasan_atomics+0x152/0x310
[   15.640794]  kasan_atomics+0x1dc/0x310
[   15.640910]  ? __pfx_kasan_atomics+0x10/0x10
[   15.640941]  ? __pfx_read_tsc+0x10/0x10
[   15.640965]  ? ktime_get_ts64+0x86/0x230
[   15.640992]  kunit_try_run_case+0x1a5/0x480
[   15.641019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.641043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.641068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.641094]  ? __kthread_parkme+0x82/0x180
[   15.641116]  ? preempt_count_sub+0x50/0x80
[   15.641143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.641169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.641195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.641220]  kthread+0x337/0x6f0
[   15.641241]  ? trace_preempt_on+0x20/0xc0
[   15.641266]  ? __pfx_kthread+0x10/0x10
[   15.641289]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.641312]  ? calculate_sigpending+0x7b/0xa0
[   15.641337]  ? __pfx_kthread+0x10/0x10
[   15.641361]  ret_from_fork+0x116/0x1d0
[   15.641381]  ? __pfx_kthread+0x10/0x10
[   15.641411]  ret_from_fork_asm+0x1a/0x30
[   15.641445]  </TASK>
[   15.641457] 
[   15.658254] Allocated by task 283:
[   15.658900]  kasan_save_stack+0x45/0x70
[   15.659367]  kasan_save_track+0x18/0x40
[   15.659933]  kasan_save_alloc_info+0x3b/0x50
[   15.660385]  __kasan_kmalloc+0xb7/0xc0
[   15.660550]  __kmalloc_cache_noprof+0x189/0x420
[   15.661229]  kasan_atomics+0x95/0x310
[   15.661783]  kunit_try_run_case+0x1a5/0x480
[   15.662204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662419]  kthread+0x337/0x6f0
[   15.662550]  ret_from_fork+0x116/0x1d0
[   15.663207]  ret_from_fork_asm+0x1a/0x30
[   15.663780] 
[   15.664090] The buggy address belongs to the object at ffff88810394df80
[   15.664090]  which belongs to the cache kmalloc-64 of size 64
[   15.665281] The buggy address is located 0 bytes to the right of
[   15.665281]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.666105] 
[   15.666479] The buggy address belongs to the physical page:
[   15.667280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.668012] flags: 0x200000000000000(node=0|zone=2)
[   15.668199] page_type: f5(slab)
[   15.668327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.668577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.668813] page dumped because: kasan: bad access detected
[   15.668990] 
[   15.669064] Memory state around the buggy address:
[   15.669223]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.670113]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.670755] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.671106]                                      ^
[   15.671347]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.671692]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.672026] ==================================================================
[   16.237300] ==================================================================
[   16.237625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.237971] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.238536] 
[   16.238631] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.238675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.238688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.238710] Call Trace:
[   16.238727]  <TASK>
[   16.238745]  dump_stack_lvl+0x73/0xb0
[   16.238775]  print_report+0xd1/0x610
[   16.238798]  ? __virt_addr_valid+0x1db/0x2d0
[   16.238822]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.238845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.238869]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.238892]  kasan_report+0x141/0x180
[   16.238945]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.238974]  kasan_check_range+0x10c/0x1c0
[   16.239011]  __kasan_check_write+0x18/0x20
[   16.239033]  kasan_atomics_helper+0x1c18/0x5450
[   16.239057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.239111]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.239138]  ? kasan_atomics+0x152/0x310
[   16.239178]  kasan_atomics+0x1dc/0x310
[   16.239203]  ? __pfx_kasan_atomics+0x10/0x10
[   16.239228]  ? __pfx_read_tsc+0x10/0x10
[   16.239249]  ? ktime_get_ts64+0x86/0x230
[   16.239275]  kunit_try_run_case+0x1a5/0x480
[   16.239302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.239325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.239351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.239376]  ? __kthread_parkme+0x82/0x180
[   16.239406]  ? preempt_count_sub+0x50/0x80
[   16.239431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.239457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.239483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.239509]  kthread+0x337/0x6f0
[   16.239529]  ? trace_preempt_on+0x20/0xc0
[   16.239554]  ? __pfx_kthread+0x10/0x10
[   16.239576]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.239614]  ? calculate_sigpending+0x7b/0xa0
[   16.239639]  ? __pfx_kthread+0x10/0x10
[   16.239662]  ret_from_fork+0x116/0x1d0
[   16.239683]  ? __pfx_kthread+0x10/0x10
[   16.239704]  ret_from_fork_asm+0x1a/0x30
[   16.239738]  </TASK>
[   16.239749] 
[   16.252596] Allocated by task 283:
[   16.252744]  kasan_save_stack+0x45/0x70
[   16.252899]  kasan_save_track+0x18/0x40
[   16.253039]  kasan_save_alloc_info+0x3b/0x50
[   16.253193]  __kasan_kmalloc+0xb7/0xc0
[   16.253329]  __kmalloc_cache_noprof+0x189/0x420
[   16.253533]  kasan_atomics+0x95/0x310
[   16.254324]  kunit_try_run_case+0x1a5/0x480
[   16.254719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.254911]  kthread+0x337/0x6f0
[   16.255038]  ret_from_fork+0x116/0x1d0
[   16.255176]  ret_from_fork_asm+0x1a/0x30
[   16.255317] 
[   16.255403] The buggy address belongs to the object at ffff88810394df80
[   16.255403]  which belongs to the cache kmalloc-64 of size 64
[   16.255946] The buggy address is located 0 bytes to the right of
[   16.255946]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.256511] 
[   16.257044] The buggy address belongs to the physical page:
[   16.257262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.257814] flags: 0x200000000000000(node=0|zone=2)
[   16.258133] page_type: f5(slab)
[   16.258271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.258769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.259182] page dumped because: kasan: bad access detected
[   16.259417] 
[   16.259610] Memory state around the buggy address:
[   16.259946]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.260253]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.260763] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.261071]                                      ^
[   16.261298]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.261759]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.262152] ==================================================================
[   15.362119] ==================================================================
[   15.362982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.363504] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.363993] 
[   15.364186] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.364390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.364469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.364494] Call Trace:
[   15.364512]  <TASK>
[   15.364531]  dump_stack_lvl+0x73/0xb0
[   15.364565]  print_report+0xd1/0x610
[   15.364591]  ? __virt_addr_valid+0x1db/0x2d0
[   15.364615]  ? kasan_atomics_helper+0x697/0x5450
[   15.364637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.364662]  ? kasan_atomics_helper+0x697/0x5450
[   15.364691]  kasan_report+0x141/0x180
[   15.364714]  ? kasan_atomics_helper+0x697/0x5450
[   15.364742]  kasan_check_range+0x10c/0x1c0
[   15.364767]  __kasan_check_write+0x18/0x20
[   15.364788]  kasan_atomics_helper+0x697/0x5450
[   15.364812]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.364836]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.364862]  ? kasan_atomics+0x152/0x310
[   15.364891]  kasan_atomics+0x1dc/0x310
[   15.364915]  ? __pfx_kasan_atomics+0x10/0x10
[   15.364941]  ? __pfx_read_tsc+0x10/0x10
[   15.364964]  ? ktime_get_ts64+0x86/0x230
[   15.364993]  kunit_try_run_case+0x1a5/0x480
[   15.365021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.365045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.365082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.365109]  ? __kthread_parkme+0x82/0x180
[   15.365130]  ? preempt_count_sub+0x50/0x80
[   15.365156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.365183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.365208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.365234]  kthread+0x337/0x6f0
[   15.365256]  ? trace_preempt_on+0x20/0xc0
[   15.365281]  ? __pfx_kthread+0x10/0x10
[   15.365303]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.365326]  ? calculate_sigpending+0x7b/0xa0
[   15.365351]  ? __pfx_kthread+0x10/0x10
[   15.365374]  ret_from_fork+0x116/0x1d0
[   15.365404]  ? __pfx_kthread+0x10/0x10
[   15.365427]  ret_from_fork_asm+0x1a/0x30
[   15.365461]  </TASK>
[   15.365472] 
[   15.377603] Allocated by task 283:
[   15.378118]  kasan_save_stack+0x45/0x70
[   15.378390]  kasan_save_track+0x18/0x40
[   15.378602]  kasan_save_alloc_info+0x3b/0x50
[   15.378981]  __kasan_kmalloc+0xb7/0xc0
[   15.379377]  __kmalloc_cache_noprof+0x189/0x420
[   15.379639]  kasan_atomics+0x95/0x310
[   15.379921]  kunit_try_run_case+0x1a5/0x480
[   15.380096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.380600]  kthread+0x337/0x6f0
[   15.380777]  ret_from_fork+0x116/0x1d0
[   15.381136]  ret_from_fork_asm+0x1a/0x30
[   15.381438] 
[   15.381550] The buggy address belongs to the object at ffff88810394df80
[   15.381550]  which belongs to the cache kmalloc-64 of size 64
[   15.382420] The buggy address is located 0 bytes to the right of
[   15.382420]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.383235] 
[   15.383445] The buggy address belongs to the physical page:
[   15.383813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.384287] flags: 0x200000000000000(node=0|zone=2)
[   15.384674] page_type: f5(slab)
[   15.384817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.385469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.385834] page dumped because: kasan: bad access detected
[   15.386317] 
[   15.386427] Memory state around the buggy address:
[   15.386781]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.387100]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.387760] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.388222]                                      ^
[   15.388597]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.388937]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389456] ==================================================================
[   15.390297] ==================================================================
[   15.390868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.391383] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.391972] 
[   15.392221] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.392271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.392285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.392309] Call Trace:
[   15.392327]  <TASK>
[   15.392482]  dump_stack_lvl+0x73/0xb0
[   15.392517]  print_report+0xd1/0x610
[   15.392541]  ? __virt_addr_valid+0x1db/0x2d0
[   15.392566]  ? kasan_atomics_helper+0x72f/0x5450
[   15.392589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.392612]  ? kasan_atomics_helper+0x72f/0x5450
[   15.392635]  kasan_report+0x141/0x180
[   15.392660]  ? kasan_atomics_helper+0x72f/0x5450
[   15.392697]  kasan_check_range+0x10c/0x1c0
[   15.392723]  __kasan_check_write+0x18/0x20
[   15.392743]  kasan_atomics_helper+0x72f/0x5450
[   15.392767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.392791]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.392817]  ? kasan_atomics+0x152/0x310
[   15.392846]  kasan_atomics+0x1dc/0x310
[   15.392870]  ? __pfx_kasan_atomics+0x10/0x10
[   15.392895]  ? __pfx_read_tsc+0x10/0x10
[   15.392918]  ? ktime_get_ts64+0x86/0x230
[   15.392947]  kunit_try_run_case+0x1a5/0x480
[   15.392975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.392999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.393072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.393100]  ? __kthread_parkme+0x82/0x180
[   15.393123]  ? preempt_count_sub+0x50/0x80
[   15.393149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.393176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.393202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.393227]  kthread+0x337/0x6f0
[   15.393248]  ? trace_preempt_on+0x20/0xc0
[   15.393273]  ? __pfx_kthread+0x10/0x10
[   15.393362]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.393385]  ? calculate_sigpending+0x7b/0xa0
[   15.393419]  ? __pfx_kthread+0x10/0x10
[   15.393442]  ret_from_fork+0x116/0x1d0
[   15.393463]  ? __pfx_kthread+0x10/0x10
[   15.393484]  ret_from_fork_asm+0x1a/0x30
[   15.393518]  </TASK>
[   15.393529] 
[   15.406059] Allocated by task 283:
[   15.406350]  kasan_save_stack+0x45/0x70
[   15.406830]  kasan_save_track+0x18/0x40
[   15.407014]  kasan_save_alloc_info+0x3b/0x50
[   15.407318]  __kasan_kmalloc+0xb7/0xc0
[   15.407721]  __kmalloc_cache_noprof+0x189/0x420
[   15.408091]  kasan_atomics+0x95/0x310
[   15.408368]  kunit_try_run_case+0x1a5/0x480
[   15.408754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.409000]  kthread+0x337/0x6f0
[   15.409306]  ret_from_fork+0x116/0x1d0
[   15.409517]  ret_from_fork_asm+0x1a/0x30
[   15.409887] 
[   15.409995] The buggy address belongs to the object at ffff88810394df80
[   15.409995]  which belongs to the cache kmalloc-64 of size 64
[   15.410861] The buggy address is located 0 bytes to the right of
[   15.410861]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.411747] 
[   15.411865] The buggy address belongs to the physical page:
[   15.412138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.412685] flags: 0x200000000000000(node=0|zone=2)
[   15.412915] page_type: f5(slab)
[   15.413076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.413416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.414008] page dumped because: kasan: bad access detected
[   15.414207] 
[   15.414521] Memory state around the buggy address:
[   15.414787]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.415320]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.415813] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.416291]                                      ^
[   15.416632]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.416951]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.417583] ==================================================================
[   16.067210] ==================================================================
[   16.067552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.067871] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.068263] 
[   16.068355] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.068411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.068425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.068446] Call Trace:
[   16.068464]  <TASK>
[   16.068481]  dump_stack_lvl+0x73/0xb0
[   16.068510]  print_report+0xd1/0x610
[   16.068554]  ? __virt_addr_valid+0x1db/0x2d0
[   16.068579]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.068611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.068635]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.068659]  kasan_report+0x141/0x180
[   16.068693]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.068721]  kasan_check_range+0x10c/0x1c0
[   16.068765]  __kasan_check_write+0x18/0x20
[   16.068787]  kasan_atomics_helper+0x16e7/0x5450
[   16.068811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.068836]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.068879]  ? kasan_atomics+0x152/0x310
[   16.068908]  kasan_atomics+0x1dc/0x310
[   16.068933]  ? __pfx_kasan_atomics+0x10/0x10
[   16.068958]  ? __pfx_read_tsc+0x10/0x10
[   16.068981]  ? ktime_get_ts64+0x86/0x230
[   16.069007]  kunit_try_run_case+0x1a5/0x480
[   16.069050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.069088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.069116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.069143]  ? __kthread_parkme+0x82/0x180
[   16.069166]  ? preempt_count_sub+0x50/0x80
[   16.069225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.069255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.069281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.069308]  kthread+0x337/0x6f0
[   16.069329]  ? trace_preempt_on+0x20/0xc0
[   16.069356]  ? __pfx_kthread+0x10/0x10
[   16.069380]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.069414]  ? calculate_sigpending+0x7b/0xa0
[   16.069558]  ? __pfx_kthread+0x10/0x10
[   16.069592]  ret_from_fork+0x116/0x1d0
[   16.069615]  ? __pfx_kthread+0x10/0x10
[   16.069639]  ret_from_fork_asm+0x1a/0x30
[   16.069673]  </TASK>
[   16.069685] 
[   16.080763] Allocated by task 283:
[   16.081040]  kasan_save_stack+0x45/0x70
[   16.081206]  kasan_save_track+0x18/0x40
[   16.081418]  kasan_save_alloc_info+0x3b/0x50
[   16.081598]  __kasan_kmalloc+0xb7/0xc0
[   16.082076]  __kmalloc_cache_noprof+0x189/0x420
[   16.082250]  kasan_atomics+0x95/0x310
[   16.082582]  kunit_try_run_case+0x1a5/0x480
[   16.082913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.083221]  kthread+0x337/0x6f0
[   16.083359]  ret_from_fork+0x116/0x1d0
[   16.083709]  ret_from_fork_asm+0x1a/0x30
[   16.084007] 
[   16.084089] The buggy address belongs to the object at ffff88810394df80
[   16.084089]  which belongs to the cache kmalloc-64 of size 64
[   16.084762] The buggy address is located 0 bytes to the right of
[   16.084762]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.085275] 
[   16.085366] The buggy address belongs to the physical page:
[   16.085993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.086318] flags: 0x200000000000000(node=0|zone=2)
[   16.086671] page_type: f5(slab)
[   16.086967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.087304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.087775] page dumped because: kasan: bad access detected
[   16.088098] 
[   16.088206] Memory state around the buggy address:
[   16.088623]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.088933]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.089315] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.089720]                                      ^
[   16.090036]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.090419]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.090819] ==================================================================
[   16.280286] ==================================================================
[   16.280851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.281176] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.281419] 
[   16.281532] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.281595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.281609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.281631] Call Trace:
[   16.281649]  <TASK>
[   16.281665]  dump_stack_lvl+0x73/0xb0
[   16.281695]  print_report+0xd1/0x610
[   16.281720]  ? __virt_addr_valid+0x1db/0x2d0
[   16.281744]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.281766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.281790]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.281814]  kasan_report+0x141/0x180
[   16.281838]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.281866]  kasan_check_range+0x10c/0x1c0
[   16.281892]  __kasan_check_write+0x18/0x20
[   16.281912]  kasan_atomics_helper+0x1ce1/0x5450
[   16.281937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.281960]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.281986]  ? kasan_atomics+0x152/0x310
[   16.282014]  kasan_atomics+0x1dc/0x310
[   16.282038]  ? __pfx_kasan_atomics+0x10/0x10
[   16.282064]  ? __pfx_read_tsc+0x10/0x10
[   16.282086]  ? ktime_get_ts64+0x86/0x230
[   16.282113]  kunit_try_run_case+0x1a5/0x480
[   16.282141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.282165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.282190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.282215]  ? __kthread_parkme+0x82/0x180
[   16.282236]  ? preempt_count_sub+0x50/0x80
[   16.282261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.282286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.282311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.282336]  kthread+0x337/0x6f0
[   16.282357]  ? trace_preempt_on+0x20/0xc0
[   16.282381]  ? __pfx_kthread+0x10/0x10
[   16.282413]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.282436]  ? calculate_sigpending+0x7b/0xa0
[   16.282461]  ? __pfx_kthread+0x10/0x10
[   16.282484]  ret_from_fork+0x116/0x1d0
[   16.282504]  ? __pfx_kthread+0x10/0x10
[   16.282526]  ret_from_fork_asm+0x1a/0x30
[   16.282560]  </TASK>
[   16.282589] 
[   16.293966] Allocated by task 283:
[   16.294273]  kasan_save_stack+0x45/0x70
[   16.294695]  kasan_save_track+0x18/0x40
[   16.294896]  kasan_save_alloc_info+0x3b/0x50
[   16.295096]  __kasan_kmalloc+0xb7/0xc0
[   16.295268]  __kmalloc_cache_noprof+0x189/0x420
[   16.295472]  kasan_atomics+0x95/0x310
[   16.295639]  kunit_try_run_case+0x1a5/0x480
[   16.295849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.296111]  kthread+0x337/0x6f0
[   16.296252]  ret_from_fork+0x116/0x1d0
[   16.296416]  ret_from_fork_asm+0x1a/0x30
[   16.296640] 
[   16.296747] The buggy address belongs to the object at ffff88810394df80
[   16.296747]  which belongs to the cache kmalloc-64 of size 64
[   16.297220] The buggy address is located 0 bytes to the right of
[   16.297220]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.297676] 
[   16.297759] The buggy address belongs to the physical page:
[   16.298021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.298373] flags: 0x200000000000000(node=0|zone=2)
[   16.298626] page_type: f5(slab)
[   16.298763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.299113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.299404] page dumped because: kasan: bad access detected
[   16.299650] 
[   16.299748] Memory state around the buggy address:
[   16.299972]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.300254]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.300544] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.300853]                                      ^
[   16.301040]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.301261]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.301552] ==================================================================
[   16.393890] ==================================================================
[   16.394970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.395458] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.395762] 
[   16.395867] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.395914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.395928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.395951] Call Trace:
[   16.395967]  <TASK>
[   16.395985]  dump_stack_lvl+0x73/0xb0
[   16.396016]  print_report+0xd1/0x610
[   16.396040]  ? __virt_addr_valid+0x1db/0x2d0
[   16.396065]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.396087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.396111]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.396134]  kasan_report+0x141/0x180
[   16.396158]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.396187]  __asan_report_load8_noabort+0x18/0x20
[   16.396213]  kasan_atomics_helper+0x4f71/0x5450
[   16.396237]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.396261]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.396287]  ? kasan_atomics+0x152/0x310
[   16.396316]  kasan_atomics+0x1dc/0x310
[   16.396340]  ? __pfx_kasan_atomics+0x10/0x10
[   16.396365]  ? __pfx_read_tsc+0x10/0x10
[   16.396387]  ? ktime_get_ts64+0x86/0x230
[   16.396426]  kunit_try_run_case+0x1a5/0x480
[   16.396453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.396477]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.396503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.396528]  ? __kthread_parkme+0x82/0x180
[   16.396550]  ? preempt_count_sub+0x50/0x80
[   16.396575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.396613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.396639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.396669]  kthread+0x337/0x6f0
[   16.396691]  ? trace_preempt_on+0x20/0xc0
[   16.396716]  ? __pfx_kthread+0x10/0x10
[   16.396739]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.396762]  ? calculate_sigpending+0x7b/0xa0
[   16.396787]  ? __pfx_kthread+0x10/0x10
[   16.396810]  ret_from_fork+0x116/0x1d0
[   16.396830]  ? __pfx_kthread+0x10/0x10
[   16.396852]  ret_from_fork_asm+0x1a/0x30
[   16.396886]  </TASK>
[   16.396898] 
[   16.404273] Allocated by task 283:
[   16.404442]  kasan_save_stack+0x45/0x70
[   16.404589]  kasan_save_track+0x18/0x40
[   16.404741]  kasan_save_alloc_info+0x3b/0x50
[   16.404942]  __kasan_kmalloc+0xb7/0xc0
[   16.405141]  __kmalloc_cache_noprof+0x189/0x420
[   16.405363]  kasan_atomics+0x95/0x310
[   16.405557]  kunit_try_run_case+0x1a5/0x480
[   16.405766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.405970]  kthread+0x337/0x6f0
[   16.406110]  ret_from_fork+0x116/0x1d0
[   16.406300]  ret_from_fork_asm+0x1a/0x30
[   16.406507] 
[   16.406618] The buggy address belongs to the object at ffff88810394df80
[   16.406618]  which belongs to the cache kmalloc-64 of size 64
[   16.407080] The buggy address is located 0 bytes to the right of
[   16.407080]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.407490] 
[   16.407566] The buggy address belongs to the physical page:
[   16.407742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.408002] flags: 0x200000000000000(node=0|zone=2)
[   16.408411] page_type: f5(slab)
[   16.408577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.409117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.409456] page dumped because: kasan: bad access detected
[   16.409738] 
[   16.409811] Memory state around the buggy address:
[   16.409966]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.410185]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.410839] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.411166]                                      ^
[   16.411407]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.411711]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.411928] ==================================================================
[   15.720933] ==================================================================
[   15.721499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.722043] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.722751] 
[   15.722857] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.722977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.722994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.723017] Call Trace:
[   15.723033]  <TASK>
[   15.723109]  dump_stack_lvl+0x73/0xb0
[   15.723145]  print_report+0xd1/0x610
[   15.723168]  ? __virt_addr_valid+0x1db/0x2d0
[   15.723193]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.723270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.723296]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.723320]  kasan_report+0x141/0x180
[   15.723406]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.723437]  kasan_check_range+0x10c/0x1c0
[   15.723463]  __kasan_check_write+0x18/0x20
[   15.723484]  kasan_atomics_helper+0xfa9/0x5450
[   15.723508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.723532]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.723560]  ? kasan_atomics+0x152/0x310
[   15.723588]  kasan_atomics+0x1dc/0x310
[   15.723612]  ? __pfx_kasan_atomics+0x10/0x10
[   15.723639]  ? __pfx_read_tsc+0x10/0x10
[   15.723661]  ? ktime_get_ts64+0x86/0x230
[   15.723690]  kunit_try_run_case+0x1a5/0x480
[   15.723717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723742]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.723767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.723793]  ? __kthread_parkme+0x82/0x180
[   15.723815]  ? preempt_count_sub+0x50/0x80
[   15.723841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.723893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.723918]  kthread+0x337/0x6f0
[   15.723940]  ? trace_preempt_on+0x20/0xc0
[   15.723964]  ? __pfx_kthread+0x10/0x10
[   15.723987]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.724010]  ? calculate_sigpending+0x7b/0xa0
[   15.724036]  ? __pfx_kthread+0x10/0x10
[   15.724061]  ret_from_fork+0x116/0x1d0
[   15.724081]  ? __pfx_kthread+0x10/0x10
[   15.724104]  ret_from_fork_asm+0x1a/0x30
[   15.724142]  </TASK>
[   15.724155] 
[   15.733798] Allocated by task 283:
[   15.734216]  kasan_save_stack+0x45/0x70
[   15.734414]  kasan_save_track+0x18/0x40
[   15.734778]  kasan_save_alloc_info+0x3b/0x50
[   15.734990]  __kasan_kmalloc+0xb7/0xc0
[   15.735168]  __kmalloc_cache_noprof+0x189/0x420
[   15.735378]  kasan_atomics+0x95/0x310
[   15.735565]  kunit_try_run_case+0x1a5/0x480
[   15.736017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.736315]  kthread+0x337/0x6f0
[   15.736540]  ret_from_fork+0x116/0x1d0
[   15.736770]  ret_from_fork_asm+0x1a/0x30
[   15.737067] 
[   15.737153] The buggy address belongs to the object at ffff88810394df80
[   15.737153]  which belongs to the cache kmalloc-64 of size 64
[   15.737854] The buggy address is located 0 bytes to the right of
[   15.737854]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.738364] 
[   15.738474] The buggy address belongs to the physical page:
[   15.738703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.739282] flags: 0x200000000000000(node=0|zone=2)
[   15.739599] page_type: f5(slab)
[   15.739743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.740169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.740576] page dumped because: kasan: bad access detected
[   15.740927] 
[   15.741013] Memory state around the buggy address:
[   15.741311]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.741813]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.742178] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.742556]                                      ^
[   15.742796]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.743099]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.743410] ==================================================================
[   16.192231] ==================================================================
[   16.192524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.192931] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.193226] 
[   16.193342] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.193386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.193410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.193434] Call Trace:
[   16.193452]  <TASK>
[   16.193469]  dump_stack_lvl+0x73/0xb0
[   16.193498]  print_report+0xd1/0x610
[   16.193523]  ? __virt_addr_valid+0x1db/0x2d0
[   16.193546]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.193569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.193604]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.193627]  kasan_report+0x141/0x180
[   16.193651]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.193679]  kasan_check_range+0x10c/0x1c0
[   16.193705]  __kasan_check_write+0x18/0x20
[   16.193726]  kasan_atomics_helper+0x1a7f/0x5450
[   16.193750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.193773]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.193799]  ? kasan_atomics+0x152/0x310
[   16.193827]  kasan_atomics+0x1dc/0x310
[   16.193851]  ? __pfx_kasan_atomics+0x10/0x10
[   16.193877]  ? __pfx_read_tsc+0x10/0x10
[   16.193899]  ? ktime_get_ts64+0x86/0x230
[   16.193925]  kunit_try_run_case+0x1a5/0x480
[   16.193951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.193975]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.194001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.194025]  ? __kthread_parkme+0x82/0x180
[   16.194047]  ? preempt_count_sub+0x50/0x80
[   16.194071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.194098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.194123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.194148]  kthread+0x337/0x6f0
[   16.194168]  ? trace_preempt_on+0x20/0xc0
[   16.194193]  ? __pfx_kthread+0x10/0x10
[   16.194215]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.194238]  ? calculate_sigpending+0x7b/0xa0
[   16.194263]  ? __pfx_kthread+0x10/0x10
[   16.194286]  ret_from_fork+0x116/0x1d0
[   16.194305]  ? __pfx_kthread+0x10/0x10
[   16.194327]  ret_from_fork_asm+0x1a/0x30
[   16.194360]  </TASK>
[   16.194371] 
[   16.201986] Allocated by task 283:
[   16.202146]  kasan_save_stack+0x45/0x70
[   16.202324]  kasan_save_track+0x18/0x40
[   16.202472]  kasan_save_alloc_info+0x3b/0x50
[   16.202813]  __kasan_kmalloc+0xb7/0xc0
[   16.202978]  __kmalloc_cache_noprof+0x189/0x420
[   16.203193]  kasan_atomics+0x95/0x310
[   16.203366]  kunit_try_run_case+0x1a5/0x480
[   16.203576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.203810]  kthread+0x337/0x6f0
[   16.203946]  ret_from_fork+0x116/0x1d0
[   16.204082]  ret_from_fork_asm+0x1a/0x30
[   16.204236] 
[   16.204335] The buggy address belongs to the object at ffff88810394df80
[   16.204335]  which belongs to the cache kmalloc-64 of size 64
[   16.204779] The buggy address is located 0 bytes to the right of
[   16.204779]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.205583] 
[   16.205658] The buggy address belongs to the physical page:
[   16.205914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.206211] flags: 0x200000000000000(node=0|zone=2)
[   16.206375] page_type: f5(slab)
[   16.207147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.207534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.208766] page dumped because: kasan: bad access detected
[   16.209446] 
[   16.209556] Memory state around the buggy address:
[   16.210528]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.211158]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.211405] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.211758]                                      ^
[   16.212223]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.212897]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.213543] ==================================================================
[   15.836924] ==================================================================
[   15.837682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.838025] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.838262] 
[   15.838354] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.838408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.838421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.838446] Call Trace:
[   15.838462]  <TASK>
[   15.838481]  dump_stack_lvl+0x73/0xb0
[   15.838512]  print_report+0xd1/0x610
[   15.838535]  ? __virt_addr_valid+0x1db/0x2d0
[   15.838559]  ? kasan_atomics_helper+0x1217/0x5450
[   15.838582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.838607]  ? kasan_atomics_helper+0x1217/0x5450
[   15.838632]  kasan_report+0x141/0x180
[   15.838656]  ? kasan_atomics_helper+0x1217/0x5450
[   15.838685]  kasan_check_range+0x10c/0x1c0
[   15.838711]  __kasan_check_write+0x18/0x20
[   15.838732]  kasan_atomics_helper+0x1217/0x5450
[   15.838757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.838782]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.838808]  ? kasan_atomics+0x152/0x310
[   15.838837]  kasan_atomics+0x1dc/0x310
[   15.838861]  ? __pfx_kasan_atomics+0x10/0x10
[   15.838887]  ? __pfx_read_tsc+0x10/0x10
[   15.838910]  ? ktime_get_ts64+0x86/0x230
[   15.838939]  kunit_try_run_case+0x1a5/0x480
[   15.838966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.839001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.839027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.839052]  ? __kthread_parkme+0x82/0x180
[   15.839073]  ? preempt_count_sub+0x50/0x80
[   15.839099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.839125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.839150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.839175]  kthread+0x337/0x6f0
[   15.839197]  ? trace_preempt_on+0x20/0xc0
[   15.839222]  ? __pfx_kthread+0x10/0x10
[   15.839245]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.839268]  ? calculate_sigpending+0x7b/0xa0
[   15.839293]  ? __pfx_kthread+0x10/0x10
[   15.839317]  ret_from_fork+0x116/0x1d0
[   15.839336]  ? __pfx_kthread+0x10/0x10
[   15.839358]  ret_from_fork_asm+0x1a/0x30
[   15.839401]  </TASK>
[   15.839414] 
[   15.847388] Allocated by task 283:
[   15.847530]  kasan_save_stack+0x45/0x70
[   15.847741]  kasan_save_track+0x18/0x40
[   15.847939]  kasan_save_alloc_info+0x3b/0x50
[   15.848162]  __kasan_kmalloc+0xb7/0xc0
[   15.848360]  __kmalloc_cache_noprof+0x189/0x420
[   15.848581]  kasan_atomics+0x95/0x310
[   15.848783]  kunit_try_run_case+0x1a5/0x480
[   15.848964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.849212]  kthread+0x337/0x6f0
[   15.849341]  ret_from_fork+0x116/0x1d0
[   15.849539]  ret_from_fork_asm+0x1a/0x30
[   15.849737] 
[   15.849838] The buggy address belongs to the object at ffff88810394df80
[   15.849838]  which belongs to the cache kmalloc-64 of size 64
[   15.850230] The buggy address is located 0 bytes to the right of
[   15.850230]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.850715] 
[   15.850812] The buggy address belongs to the physical page:
[   15.851068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.851405] flags: 0x200000000000000(node=0|zone=2)
[   15.851572] page_type: f5(slab)
[   15.851709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.852056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.852413] page dumped because: kasan: bad access detected
[   15.852689] 
[   15.852778] Memory state around the buggy address:
[   15.852969]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.853259]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.853560] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.853838]                                      ^
[   15.854053]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.854321]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.854564] ==================================================================
[   15.263385] ==================================================================
[   15.263720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.263998] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.264466] 
[   15.264589] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.264635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.264649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.264676] Call Trace:
[   15.264692]  <TASK>
[   15.264709]  dump_stack_lvl+0x73/0xb0
[   15.264738]  print_report+0xd1/0x610
[   15.264762]  ? __virt_addr_valid+0x1db/0x2d0
[   15.264786]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.264808]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.264832]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.264855]  kasan_report+0x141/0x180
[   15.264879]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.264907]  kasan_check_range+0x10c/0x1c0
[   15.264932]  __kasan_check_write+0x18/0x20
[   15.264952]  kasan_atomics_helper+0x4a0/0x5450
[   15.264976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.264999]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.265026]  ? kasan_atomics+0x152/0x310
[   15.265251]  kasan_atomics+0x1dc/0x310
[   15.265277]  ? __pfx_kasan_atomics+0x10/0x10
[   15.265327]  ? __pfx_read_tsc+0x10/0x10
[   15.265351]  ? ktime_get_ts64+0x86/0x230
[   15.265391]  kunit_try_run_case+0x1a5/0x480
[   15.265427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.265451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.265477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.265502]  ? __kthread_parkme+0x82/0x180
[   15.265523]  ? preempt_count_sub+0x50/0x80
[   15.265549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.265576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.265611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.265636]  kthread+0x337/0x6f0
[   15.265657]  ? trace_preempt_on+0x20/0xc0
[   15.265681]  ? __pfx_kthread+0x10/0x10
[   15.265704]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.265727]  ? calculate_sigpending+0x7b/0xa0
[   15.265753]  ? __pfx_kthread+0x10/0x10
[   15.265776]  ret_from_fork+0x116/0x1d0
[   15.265795]  ? __pfx_kthread+0x10/0x10
[   15.265817]  ret_from_fork_asm+0x1a/0x30
[   15.265851]  </TASK>
[   15.265863] 
[   15.274617] Allocated by task 283:
[   15.274757]  kasan_save_stack+0x45/0x70
[   15.274908]  kasan_save_track+0x18/0x40
[   15.275047]  kasan_save_alloc_info+0x3b/0x50
[   15.275199]  __kasan_kmalloc+0xb7/0xc0
[   15.275335]  __kmalloc_cache_noprof+0x189/0x420
[   15.275592]  kasan_atomics+0x95/0x310
[   15.275883]  kunit_try_run_case+0x1a5/0x480
[   15.276197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.276464]  kthread+0x337/0x6f0
[   15.276633]  ret_from_fork+0x116/0x1d0
[   15.276825]  ret_from_fork_asm+0x1a/0x30
[   15.277024] 
[   15.277122] The buggy address belongs to the object at ffff88810394df80
[   15.277122]  which belongs to the cache kmalloc-64 of size 64
[   15.277810] The buggy address is located 0 bytes to the right of
[   15.277810]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.278867] 
[   15.278959] The buggy address belongs to the physical page:
[   15.279319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.279763] flags: 0x200000000000000(node=0|zone=2)
[   15.279951] page_type: f5(slab)
[   15.280309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.280783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.281026] page dumped because: kasan: bad access detected
[   15.281336] 
[   15.281467] Memory state around the buggy address:
[   15.281713]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.281976]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.282373] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.282741]                                      ^
[   15.282968]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.283321]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283577] ==================================================================
[   15.855104] ==================================================================
[   15.855416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.855808] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.856124] 
[   15.856235] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.856280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.856293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.856314] Call Trace:
[   15.856333]  <TASK>
[   15.856349]  dump_stack_lvl+0x73/0xb0
[   15.856378]  print_report+0xd1/0x610
[   15.856412]  ? __virt_addr_valid+0x1db/0x2d0
[   15.856437]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.856459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.856483]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.856507]  kasan_report+0x141/0x180
[   15.856531]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.856560]  __asan_report_load4_noabort+0x18/0x20
[   15.856586]  kasan_atomics_helper+0x49e8/0x5450
[   15.856610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.856633]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.856660]  ? kasan_atomics+0x152/0x310
[   15.856691]  kasan_atomics+0x1dc/0x310
[   15.856716]  ? __pfx_kasan_atomics+0x10/0x10
[   15.856742]  ? __pfx_read_tsc+0x10/0x10
[   15.856763]  ? ktime_get_ts64+0x86/0x230
[   15.856789]  kunit_try_run_case+0x1a5/0x480
[   15.856815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.856839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.856865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.856889]  ? __kthread_parkme+0x82/0x180
[   15.856911]  ? preempt_count_sub+0x50/0x80
[   15.856935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.856961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.856986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.857012]  kthread+0x337/0x6f0
[   15.857032]  ? trace_preempt_on+0x20/0xc0
[   15.857056]  ? __pfx_kthread+0x10/0x10
[   15.857078]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.857101]  ? calculate_sigpending+0x7b/0xa0
[   15.857126]  ? __pfx_kthread+0x10/0x10
[   15.857149]  ret_from_fork+0x116/0x1d0
[   15.857169]  ? __pfx_kthread+0x10/0x10
[   15.857191]  ret_from_fork_asm+0x1a/0x30
[   15.857224]  </TASK>
[   15.857235] 
[   15.871325] Allocated by task 283:
[   15.871709]  kasan_save_stack+0x45/0x70
[   15.871927]  kasan_save_track+0x18/0x40
[   15.872112]  kasan_save_alloc_info+0x3b/0x50
[   15.872314]  __kasan_kmalloc+0xb7/0xc0
[   15.872502]  __kmalloc_cache_noprof+0x189/0x420
[   15.873051]  kasan_atomics+0x95/0x310
[   15.873380]  kunit_try_run_case+0x1a5/0x480
[   15.873942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.874309]  kthread+0x337/0x6f0
[   15.874691]  ret_from_fork+0x116/0x1d0
[   15.875009]  ret_from_fork_asm+0x1a/0x30
[   15.875348] 
[   15.875462] The buggy address belongs to the object at ffff88810394df80
[   15.875462]  which belongs to the cache kmalloc-64 of size 64
[   15.876513] The buggy address is located 0 bytes to the right of
[   15.876513]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.877348] 
[   15.877589] The buggy address belongs to the physical page:
[   15.877994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.878335] flags: 0x200000000000000(node=0|zone=2)
[   15.878569] page_type: f5(slab)
[   15.878734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.879048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.879345] page dumped because: kasan: bad access detected
[   15.880049] 
[   15.880290] Memory state around the buggy address:
[   15.880815]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881248]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881780] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.882275]                                      ^
[   15.882714]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.883033]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.883334] ==================================================================
[   16.348173] ==================================================================
[   16.348476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.348950] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.349764] 
[   16.349868] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.349986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.350002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.350079] Call Trace:
[   16.350097]  <TASK>
[   16.350116]  dump_stack_lvl+0x73/0xb0
[   16.350149]  print_report+0xd1/0x610
[   16.350173]  ? __virt_addr_valid+0x1db/0x2d0
[   16.350197]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.350219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.350243]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.350266]  kasan_report+0x141/0x180
[   16.350289]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.350319]  kasan_check_range+0x10c/0x1c0
[   16.350344]  __kasan_check_write+0x18/0x20
[   16.350365]  kasan_atomics_helper+0x1eaa/0x5450
[   16.350388]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.350425]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.350452]  ? kasan_atomics+0x152/0x310
[   16.350481]  kasan_atomics+0x1dc/0x310
[   16.350505]  ? __pfx_kasan_atomics+0x10/0x10
[   16.350532]  ? __pfx_read_tsc+0x10/0x10
[   16.350554]  ? ktime_get_ts64+0x86/0x230
[   16.350581]  kunit_try_run_case+0x1a5/0x480
[   16.350607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.350633]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.350659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.350684]  ? __kthread_parkme+0x82/0x180
[   16.350705]  ? preempt_count_sub+0x50/0x80
[   16.350731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.350757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.350782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.350808]  kthread+0x337/0x6f0
[   16.350830]  ? trace_preempt_on+0x20/0xc0
[   16.350855]  ? __pfx_kthread+0x10/0x10
[   16.350878]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.350901]  ? calculate_sigpending+0x7b/0xa0
[   16.350926]  ? __pfx_kthread+0x10/0x10
[   16.350949]  ret_from_fork+0x116/0x1d0
[   16.350969]  ? __pfx_kthread+0x10/0x10
[   16.350991]  ret_from_fork_asm+0x1a/0x30
[   16.351024]  </TASK>
[   16.351036] 
[   16.360956] Allocated by task 283:
[   16.361236]  kasan_save_stack+0x45/0x70
[   16.361530]  kasan_save_track+0x18/0x40
[   16.361719]  kasan_save_alloc_info+0x3b/0x50
[   16.362022]  __kasan_kmalloc+0xb7/0xc0
[   16.362188]  __kmalloc_cache_noprof+0x189/0x420
[   16.362426]  kasan_atomics+0x95/0x310
[   16.362775]  kunit_try_run_case+0x1a5/0x480
[   16.363031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363332]  kthread+0x337/0x6f0
[   16.363477]  ret_from_fork+0x116/0x1d0
[   16.363757]  ret_from_fork_asm+0x1a/0x30
[   16.364116] 
[   16.364222] The buggy address belongs to the object at ffff88810394df80
[   16.364222]  which belongs to the cache kmalloc-64 of size 64
[   16.364911] The buggy address is located 0 bytes to the right of
[   16.364911]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.365542] 
[   16.365763] The buggy address belongs to the physical page:
[   16.366082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.366410] flags: 0x200000000000000(node=0|zone=2)
[   16.366760] page_type: f5(slab)
[   16.366900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.367250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.367568] page dumped because: kasan: bad access detected
[   16.368093] 
[   16.368191] Memory state around the buggy address:
[   16.368461]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.368854]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.369235] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.369541]                                      ^
[   16.369889]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.370264]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.370596] ==================================================================
[   16.430541] ==================================================================
[   16.431129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.431533] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.431771] 
[   16.431923] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.431971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.431985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.432009] Call Trace:
[   16.432023]  <TASK>
[   16.432040]  dump_stack_lvl+0x73/0xb0
[   16.432069]  print_report+0xd1/0x610
[   16.432093]  ? __virt_addr_valid+0x1db/0x2d0
[   16.432117]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.432138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.432163]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.432186]  kasan_report+0x141/0x180
[   16.432209]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.432238]  __asan_report_load8_noabort+0x18/0x20
[   16.432263]  kasan_atomics_helper+0x4f98/0x5450
[   16.432287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.432311]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.432337]  ? kasan_atomics+0x152/0x310
[   16.432365]  kasan_atomics+0x1dc/0x310
[   16.432390]  ? __pfx_kasan_atomics+0x10/0x10
[   16.432427]  ? __pfx_read_tsc+0x10/0x10
[   16.432450]  ? ktime_get_ts64+0x86/0x230
[   16.432475]  kunit_try_run_case+0x1a5/0x480
[   16.432502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.432526]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.432552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.432578]  ? __kthread_parkme+0x82/0x180
[   16.432609]  ? preempt_count_sub+0x50/0x80
[   16.432635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.432662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.432693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.432718]  kthread+0x337/0x6f0
[   16.432739]  ? trace_preempt_on+0x20/0xc0
[   16.432764]  ? __pfx_kthread+0x10/0x10
[   16.432786]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.432810]  ? calculate_sigpending+0x7b/0xa0
[   16.432835]  ? __pfx_kthread+0x10/0x10
[   16.432858]  ret_from_fork+0x116/0x1d0
[   16.432878]  ? __pfx_kthread+0x10/0x10
[   16.432900]  ret_from_fork_asm+0x1a/0x30
[   16.432933]  </TASK>
[   16.432945] 
[   16.440164] Allocated by task 283:
[   16.440343]  kasan_save_stack+0x45/0x70
[   16.440518]  kasan_save_track+0x18/0x40
[   16.440803]  kasan_save_alloc_info+0x3b/0x50
[   16.440971]  __kasan_kmalloc+0xb7/0xc0
[   16.441110]  __kmalloc_cache_noprof+0x189/0x420
[   16.441269]  kasan_atomics+0x95/0x310
[   16.441416]  kunit_try_run_case+0x1a5/0x480
[   16.441582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.441845]  kthread+0x337/0x6f0
[   16.442019]  ret_from_fork+0x116/0x1d0
[   16.442212]  ret_from_fork_asm+0x1a/0x30
[   16.442420] 
[   16.442517] The buggy address belongs to the object at ffff88810394df80
[   16.442517]  which belongs to the cache kmalloc-64 of size 64
[   16.443161] The buggy address is located 0 bytes to the right of
[   16.443161]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.443649] 
[   16.443749] The buggy address belongs to the physical page:
[   16.444003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.444296] flags: 0x200000000000000(node=0|zone=2)
[   16.444515] page_type: f5(slab)
[   16.444792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.445102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.445384] page dumped because: kasan: bad access detected
[   16.445654] 
[   16.445737] Memory state around the buggy address:
[   16.445947]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.446235]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.446541] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.446820]                                      ^
[   16.447021]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.447325]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.447613] ==================================================================
[   15.221552] ==================================================================
[   15.221961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.222499] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.222910] 
[   15.223002] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.223046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.223060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.223083] Call Trace:
[   15.223099]  <TASK>
[   15.223117]  dump_stack_lvl+0x73/0xb0
[   15.223147]  print_report+0xd1/0x610
[   15.223171]  ? __virt_addr_valid+0x1db/0x2d0
[   15.223195]  ? kasan_atomics_helper+0x3df/0x5450
[   15.223217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.223240]  ? kasan_atomics_helper+0x3df/0x5450
[   15.223264]  kasan_report+0x141/0x180
[   15.223288]  ? kasan_atomics_helper+0x3df/0x5450
[   15.223329]  kasan_check_range+0x10c/0x1c0
[   15.223354]  __kasan_check_read+0x15/0x20
[   15.223375]  kasan_atomics_helper+0x3df/0x5450
[   15.223407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.223431]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.223458]  ? kasan_atomics+0x152/0x310
[   15.223486]  kasan_atomics+0x1dc/0x310
[   15.223511]  ? __pfx_kasan_atomics+0x10/0x10
[   15.223536]  ? __pfx_read_tsc+0x10/0x10
[   15.223558]  ? ktime_get_ts64+0x86/0x230
[   15.223584]  kunit_try_run_case+0x1a5/0x480
[   15.223693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.223721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.223759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.223786]  ? __kthread_parkme+0x82/0x180
[   15.223808]  ? preempt_count_sub+0x50/0x80
[   15.223856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.223882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.223919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.223946]  kthread+0x337/0x6f0
[   15.223968]  ? trace_preempt_on+0x20/0xc0
[   15.223993]  ? __pfx_kthread+0x10/0x10
[   15.224015]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.224038]  ? calculate_sigpending+0x7b/0xa0
[   15.224064]  ? __pfx_kthread+0x10/0x10
[   15.224128]  ret_from_fork+0x116/0x1d0
[   15.224151]  ? __pfx_kthread+0x10/0x10
[   15.224173]  ret_from_fork_asm+0x1a/0x30
[   15.224206]  </TASK>
[   15.224218] 
[   15.233180] Allocated by task 283:
[   15.233374]  kasan_save_stack+0x45/0x70
[   15.233589]  kasan_save_track+0x18/0x40
[   15.233781]  kasan_save_alloc_info+0x3b/0x50
[   15.233962]  __kasan_kmalloc+0xb7/0xc0
[   15.234219]  __kmalloc_cache_noprof+0x189/0x420
[   15.234385]  kasan_atomics+0x95/0x310
[   15.234534]  kunit_try_run_case+0x1a5/0x480
[   15.234720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.235143]  kthread+0x337/0x6f0
[   15.235313]  ret_from_fork+0x116/0x1d0
[   15.235556]  ret_from_fork_asm+0x1a/0x30
[   15.235698] 
[   15.235772] The buggy address belongs to the object at ffff88810394df80
[   15.235772]  which belongs to the cache kmalloc-64 of size 64
[   15.236605] The buggy address is located 0 bytes to the right of
[   15.236605]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.237173] 
[   15.237277] The buggy address belongs to the physical page:
[   15.237760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.238260] flags: 0x200000000000000(node=0|zone=2)
[   15.238519] page_type: f5(slab)
[   15.238701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.239038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.239517] page dumped because: kasan: bad access detected
[   15.239815] 
[   15.239891] Memory state around the buggy address:
[   15.240053]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.240276]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.240661] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.241101]                                      ^
[   15.241409]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.241868]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.242240] ==================================================================
[   15.485056] ==================================================================
[   15.485355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.485643] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.485975] 
[   15.486083] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.486159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.486172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.486195] Call Trace:
[   15.486211]  <TASK>
[   15.486227]  dump_stack_lvl+0x73/0xb0
[   15.486257]  print_report+0xd1/0x610
[   15.486312]  ? __virt_addr_valid+0x1db/0x2d0
[   15.486338]  ? kasan_atomics_helper+0x992/0x5450
[   15.486361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.486385]  ? kasan_atomics_helper+0x992/0x5450
[   15.486421]  kasan_report+0x141/0x180
[   15.486445]  ? kasan_atomics_helper+0x992/0x5450
[   15.486473]  kasan_check_range+0x10c/0x1c0
[   15.486498]  __kasan_check_write+0x18/0x20
[   15.486519]  kasan_atomics_helper+0x992/0x5450
[   15.486572]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.486620]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.486693]  ? kasan_atomics+0x152/0x310
[   15.486745]  kasan_atomics+0x1dc/0x310
[   15.486814]  ? __pfx_kasan_atomics+0x10/0x10
[   15.486885]  ? __pfx_read_tsc+0x10/0x10
[   15.486952]  ? ktime_get_ts64+0x86/0x230
[   15.487026]  kunit_try_run_case+0x1a5/0x480
[   15.487099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.487169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.487217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.487261]  ? __kthread_parkme+0x82/0x180
[   15.487283]  ? preempt_count_sub+0x50/0x80
[   15.487308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.487333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.487357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.487382]  kthread+0x337/0x6f0
[   15.487412]  ? trace_preempt_on+0x20/0xc0
[   15.487436]  ? __pfx_kthread+0x10/0x10
[   15.487458]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.487481]  ? calculate_sigpending+0x7b/0xa0
[   15.487506]  ? __pfx_kthread+0x10/0x10
[   15.487530]  ret_from_fork+0x116/0x1d0
[   15.487549]  ? __pfx_kthread+0x10/0x10
[   15.487571]  ret_from_fork_asm+0x1a/0x30
[   15.487604]  </TASK>
[   15.487617] 
[   15.496384] Allocated by task 283:
[   15.496575]  kasan_save_stack+0x45/0x70
[   15.496775]  kasan_save_track+0x18/0x40
[   15.496919]  kasan_save_alloc_info+0x3b/0x50
[   15.497730]  __kasan_kmalloc+0xb7/0xc0
[   15.498164]  __kmalloc_cache_noprof+0x189/0x420
[   15.498599]  kasan_atomics+0x95/0x310
[   15.498779]  kunit_try_run_case+0x1a5/0x480
[   15.498935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.500963]  kthread+0x337/0x6f0
[   15.501252]  ret_from_fork+0x116/0x1d0
[   15.501867]  ret_from_fork_asm+0x1a/0x30
[   15.502651] 
[   15.502921] The buggy address belongs to the object at ffff88810394df80
[   15.502921]  which belongs to the cache kmalloc-64 of size 64
[   15.504341] The buggy address is located 0 bytes to the right of
[   15.504341]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.505465] 
[   15.505760] The buggy address belongs to the physical page:
[   15.506456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.507133] flags: 0x200000000000000(node=0|zone=2)
[   15.507471] page_type: f5(slab)
[   15.507664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.507975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.508911] page dumped because: kasan: bad access detected
[   15.509578] 
[   15.509755] Memory state around the buggy address:
[   15.510159]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.510851]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.511524] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.511946]                                      ^
[   15.512427]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.513069]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.513573] ==================================================================
[   15.902763] ==================================================================
[   15.903167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.903512] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.903893] 
[   15.903986] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.904049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.904063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.904086] Call Trace:
[   15.904101]  <TASK>
[   15.904119]  dump_stack_lvl+0x73/0xb0
[   15.904148]  print_report+0xd1/0x610
[   15.904171]  ? __virt_addr_valid+0x1db/0x2d0
[   15.904194]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.904217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.904258]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.904282]  kasan_report+0x141/0x180
[   15.904305]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.904334]  __asan_report_load4_noabort+0x18/0x20
[   15.904359]  kasan_atomics_helper+0x49ce/0x5450
[   15.904385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.904419]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.904464]  ? kasan_atomics+0x152/0x310
[   15.904492]  kasan_atomics+0x1dc/0x310
[   15.904516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.904543]  ? __pfx_read_tsc+0x10/0x10
[   15.904564]  ? ktime_get_ts64+0x86/0x230
[   15.904591]  kunit_try_run_case+0x1a5/0x480
[   15.904616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.904656]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.904685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.904710]  ? __kthread_parkme+0x82/0x180
[   15.904732]  ? preempt_count_sub+0x50/0x80
[   15.904756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.904783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.904808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.904851]  kthread+0x337/0x6f0
[   15.904871]  ? trace_preempt_on+0x20/0xc0
[   15.904896]  ? __pfx_kthread+0x10/0x10
[   15.904919]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.904943]  ? calculate_sigpending+0x7b/0xa0
[   15.904968]  ? __pfx_kthread+0x10/0x10
[   15.904992]  ret_from_fork+0x116/0x1d0
[   15.905027]  ? __pfx_kthread+0x10/0x10
[   15.905050]  ret_from_fork_asm+0x1a/0x30
[   15.905097]  </TASK>
[   15.905120] 
[   15.912675] Allocated by task 283:
[   15.912873]  kasan_save_stack+0x45/0x70
[   15.913048]  kasan_save_track+0x18/0x40
[   15.913242]  kasan_save_alloc_info+0x3b/0x50
[   15.913477]  __kasan_kmalloc+0xb7/0xc0
[   15.913662]  __kmalloc_cache_noprof+0x189/0x420
[   15.913899]  kasan_atomics+0x95/0x310
[   15.914084]  kunit_try_run_case+0x1a5/0x480
[   15.914253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.914497]  kthread+0x337/0x6f0
[   15.914758]  ret_from_fork+0x116/0x1d0
[   15.914936]  ret_from_fork_asm+0x1a/0x30
[   15.915078] 
[   15.915193] The buggy address belongs to the object at ffff88810394df80
[   15.915193]  which belongs to the cache kmalloc-64 of size 64
[   15.915761] The buggy address is located 0 bytes to the right of
[   15.915761]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.916279] 
[   15.916369] The buggy address belongs to the physical page:
[   15.916614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.916973] flags: 0x200000000000000(node=0|zone=2)
[   15.917200] page_type: f5(slab)
[   15.917364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.917767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.918060] page dumped because: kasan: bad access detected
[   15.918318] 
[   15.918409] Memory state around the buggy address:
[   15.918598]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.918922]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.919239] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.919571]                                      ^
[   15.919794]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.920104]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920437] ==================================================================
[   16.547638] ==================================================================
[   16.547975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.548449] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.548885] 
[   16.549001] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.549058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.549072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.549095] Call Trace:
[   16.549110]  <TASK>
[   16.549126]  dump_stack_lvl+0x73/0xb0
[   16.549156]  print_report+0xd1/0x610
[   16.549179]  ? __virt_addr_valid+0x1db/0x2d0
[   16.549205]  ? kasan_atomics_helper+0x5115/0x5450
[   16.549228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.549251]  ? kasan_atomics_helper+0x5115/0x5450
[   16.549274]  kasan_report+0x141/0x180
[   16.549298]  ? kasan_atomics_helper+0x5115/0x5450
[   16.549327]  __asan_report_load8_noabort+0x18/0x20
[   16.549352]  kasan_atomics_helper+0x5115/0x5450
[   16.549377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.549412]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.549438]  ? kasan_atomics+0x152/0x310
[   16.549489]  kasan_atomics+0x1dc/0x310
[   16.549516]  ? __pfx_kasan_atomics+0x10/0x10
[   16.549542]  ? __pfx_read_tsc+0x10/0x10
[   16.549565]  ? ktime_get_ts64+0x86/0x230
[   16.549600]  kunit_try_run_case+0x1a5/0x480
[   16.549626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.549650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.549694]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.549719]  ? __kthread_parkme+0x82/0x180
[   16.549741]  ? preempt_count_sub+0x50/0x80
[   16.549767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.549793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.549818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.549843]  kthread+0x337/0x6f0
[   16.549864]  ? trace_preempt_on+0x20/0xc0
[   16.549907]  ? __pfx_kthread+0x10/0x10
[   16.549929]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.549952]  ? calculate_sigpending+0x7b/0xa0
[   16.549977]  ? __pfx_kthread+0x10/0x10
[   16.550000]  ret_from_fork+0x116/0x1d0
[   16.550020]  ? __pfx_kthread+0x10/0x10
[   16.550059]  ret_from_fork_asm+0x1a/0x30
[   16.550095]  </TASK>
[   16.550108] 
[   16.557730] Allocated by task 283:
[   16.557933]  kasan_save_stack+0x45/0x70
[   16.558116]  kasan_save_track+0x18/0x40
[   16.558250]  kasan_save_alloc_info+0x3b/0x50
[   16.558408]  __kasan_kmalloc+0xb7/0xc0
[   16.558591]  __kmalloc_cache_noprof+0x189/0x420
[   16.558814]  kasan_atomics+0x95/0x310
[   16.559002]  kunit_try_run_case+0x1a5/0x480
[   16.559210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.559489]  kthread+0x337/0x6f0
[   16.559654]  ret_from_fork+0x116/0x1d0
[   16.559850]  ret_from_fork_asm+0x1a/0x30
[   16.560044] 
[   16.560116] The buggy address belongs to the object at ffff88810394df80
[   16.560116]  which belongs to the cache kmalloc-64 of size 64
[   16.560482] The buggy address is located 0 bytes to the right of
[   16.560482]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.561488] 
[   16.561584] The buggy address belongs to the physical page:
[   16.561830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.562157] flags: 0x200000000000000(node=0|zone=2)
[   16.562365] page_type: f5(slab)
[   16.562502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.562876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.563208] page dumped because: kasan: bad access detected
[   16.563472] 
[   16.563572] Memory state around the buggy address:
[   16.563800]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.564062]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.564385] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.564755]                                      ^
[   16.564933]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.565270]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565605] ==================================================================
[   15.191211] ==================================================================
[   15.191995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.192625] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.192999] 
[   15.193254] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.193304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.193318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.193341] Call Trace:
[   15.193356]  <TASK>
[   15.193373]  dump_stack_lvl+0x73/0xb0
[   15.193415]  print_report+0xd1/0x610
[   15.193439]  ? __virt_addr_valid+0x1db/0x2d0
[   15.193464]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.193486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.193509]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.193533]  kasan_report+0x141/0x180
[   15.193556]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.193584]  __asan_report_store4_noabort+0x1b/0x30
[   15.193610]  kasan_atomics_helper+0x4b6e/0x5450
[   15.193634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.193657]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.193684]  ? kasan_atomics+0x152/0x310
[   15.193713]  kasan_atomics+0x1dc/0x310
[   15.193738]  ? __pfx_kasan_atomics+0x10/0x10
[   15.193765]  ? __pfx_read_tsc+0x10/0x10
[   15.193798]  ? ktime_get_ts64+0x86/0x230
[   15.193826]  kunit_try_run_case+0x1a5/0x480
[   15.193865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.193889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.193914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.193940]  ? __kthread_parkme+0x82/0x180
[   15.193962]  ? preempt_count_sub+0x50/0x80
[   15.193986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.194012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.194063]  kthread+0x337/0x6f0
[   15.194084]  ? trace_preempt_on+0x20/0xc0
[   15.194108]  ? __pfx_kthread+0x10/0x10
[   15.194131]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.194153]  ? calculate_sigpending+0x7b/0xa0
[   15.194179]  ? __pfx_kthread+0x10/0x10
[   15.194203]  ret_from_fork+0x116/0x1d0
[   15.194223]  ? __pfx_kthread+0x10/0x10
[   15.194245]  ret_from_fork_asm+0x1a/0x30
[   15.194278]  </TASK>
[   15.194290] 
[   15.208860] Allocated by task 283:
[   15.209292]  kasan_save_stack+0x45/0x70
[   15.209658]  kasan_save_track+0x18/0x40
[   15.209806]  kasan_save_alloc_info+0x3b/0x50
[   15.209960]  __kasan_kmalloc+0xb7/0xc0
[   15.210264]  __kmalloc_cache_noprof+0x189/0x420
[   15.210702]  kasan_atomics+0x95/0x310
[   15.211060]  kunit_try_run_case+0x1a5/0x480
[   15.211702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.212253]  kthread+0x337/0x6f0
[   15.212676]  ret_from_fork+0x116/0x1d0
[   15.213163]  ret_from_fork_asm+0x1a/0x30
[   15.213313] 
[   15.213389] The buggy address belongs to the object at ffff88810394df80
[   15.213389]  which belongs to the cache kmalloc-64 of size 64
[   15.214123] The buggy address is located 0 bytes to the right of
[   15.214123]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.215347] 
[   15.215525] The buggy address belongs to the physical page:
[   15.216107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.216707] flags: 0x200000000000000(node=0|zone=2)
[   15.217390] page_type: f5(slab)
[   15.217556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.218240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.218497] page dumped because: kasan: bad access detected
[   15.218732] 
[   15.218857] Memory state around the buggy address:
[   15.219063]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.219449]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.219797] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.220174]                                      ^
[   15.220392]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.220753]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221039] ==================================================================
[   15.158541] ==================================================================
[   15.159174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.159521] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.159745] 
[   15.159831] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.159874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.159885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.159907] Call Trace:
[   15.159920]  <TASK>
[   15.159934]  dump_stack_lvl+0x73/0xb0
[   15.159962]  print_report+0xd1/0x610
[   15.159983]  ? __virt_addr_valid+0x1db/0x2d0
[   15.160005]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.160026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.160049]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.160070]  kasan_report+0x141/0x180
[   15.160093]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.160120]  __asan_report_load4_noabort+0x18/0x20
[   15.160144]  kasan_atomics_helper+0x4b88/0x5450
[   15.160166]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.160188]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.160213]  ? kasan_atomics+0x152/0x310
[   15.160240]  kasan_atomics+0x1dc/0x310
[   15.160262]  ? __pfx_kasan_atomics+0x10/0x10
[   15.160287]  ? __pfx_read_tsc+0x10/0x10
[   15.160307]  ? ktime_get_ts64+0x86/0x230
[   15.160332]  kunit_try_run_case+0x1a5/0x480
[   15.160357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.160405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.160429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.160453]  ? __kthread_parkme+0x82/0x180
[   15.160474]  ? preempt_count_sub+0x50/0x80
[   15.160499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.160627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.160654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.160734]  kthread+0x337/0x6f0
[   15.160757]  ? trace_preempt_on+0x20/0xc0
[   15.160782]  ? __pfx_kthread+0x10/0x10
[   15.160822]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.160846]  ? calculate_sigpending+0x7b/0xa0
[   15.160871]  ? __pfx_kthread+0x10/0x10
[   15.160909]  ret_from_fork+0x116/0x1d0
[   15.160942]  ? __pfx_kthread+0x10/0x10
[   15.160977]  ret_from_fork_asm+0x1a/0x30
[   15.161024]  </TASK>
[   15.161036] 
[   15.175182] Allocated by task 283:
[   15.175327]  kasan_save_stack+0x45/0x70
[   15.175492]  kasan_save_track+0x18/0x40
[   15.175635]  kasan_save_alloc_info+0x3b/0x50
[   15.175788]  __kasan_kmalloc+0xb7/0xc0
[   15.175923]  __kmalloc_cache_noprof+0x189/0x420
[   15.176081]  kasan_atomics+0x95/0x310
[   15.176219]  kunit_try_run_case+0x1a5/0x480
[   15.176368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.176845]  kthread+0x337/0x6f0
[   15.177146]  ret_from_fork+0x116/0x1d0
[   15.177563]  ret_from_fork_asm+0x1a/0x30
[   15.177935] 
[   15.178096] The buggy address belongs to the object at ffff88810394df80
[   15.178096]  which belongs to the cache kmalloc-64 of size 64
[   15.179429] The buggy address is located 0 bytes to the right of
[   15.179429]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.180942] 
[   15.181221] The buggy address belongs to the physical page:
[   15.181767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.182530] flags: 0x200000000000000(node=0|zone=2)
[   15.183043] page_type: f5(slab)
[   15.183457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.184368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.185265] page dumped because: kasan: bad access detected
[   15.185809] 
[   15.185988] Memory state around the buggy address:
[   15.186647]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.187485]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.187927] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.188421]                                      ^
[   15.188892]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.189686]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190370] ==================================================================
[   15.138691] ==================================================================
[   15.139256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.139519] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.139999] 
[   15.140142] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.140186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.140197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.140219] Call Trace:
[   15.140233]  <TASK>
[   15.140249]  dump_stack_lvl+0x73/0xb0
[   15.140277]  print_report+0xd1/0x610
[   15.140322]  ? __virt_addr_valid+0x1db/0x2d0
[   15.140345]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.140366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.140388]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.140441]  kasan_report+0x141/0x180
[   15.140464]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.140491]  __asan_report_store4_noabort+0x1b/0x30
[   15.140515]  kasan_atomics_helper+0x4ba2/0x5450
[   15.140538]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.140560]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.140585]  ? kasan_atomics+0x152/0x310
[   15.140613]  kasan_atomics+0x1dc/0x310
[   15.140635]  ? __pfx_kasan_atomics+0x10/0x10
[   15.140659]  ? __pfx_read_tsc+0x10/0x10
[   15.140683]  ? ktime_get_ts64+0x86/0x230
[   15.140708]  kunit_try_run_case+0x1a5/0x480
[   15.140732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.140773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.140797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.140821]  ? __kthread_parkme+0x82/0x180
[   15.140842]  ? preempt_count_sub+0x50/0x80
[   15.140865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.140890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.140915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.140956]  kthread+0x337/0x6f0
[   15.140975]  ? trace_preempt_on+0x20/0xc0
[   15.141000]  ? __pfx_kthread+0x10/0x10
[   15.141021]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.141061]  ? calculate_sigpending+0x7b/0xa0
[   15.141085]  ? __pfx_kthread+0x10/0x10
[   15.141107]  ret_from_fork+0x116/0x1d0
[   15.141125]  ? __pfx_kthread+0x10/0x10
[   15.141146]  ret_from_fork_asm+0x1a/0x30
[   15.141196]  </TASK>
[   15.141206] 
[   15.149648] Allocated by task 283:
[   15.149848]  kasan_save_stack+0x45/0x70
[   15.150070]  kasan_save_track+0x18/0x40
[   15.150293]  kasan_save_alloc_info+0x3b/0x50
[   15.150535]  __kasan_kmalloc+0xb7/0xc0
[   15.150690]  __kmalloc_cache_noprof+0x189/0x420
[   15.150943]  kasan_atomics+0x95/0x310
[   15.151163]  kunit_try_run_case+0x1a5/0x480
[   15.151426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.151681]  kthread+0x337/0x6f0
[   15.151807]  ret_from_fork+0x116/0x1d0
[   15.151941]  ret_from_fork_asm+0x1a/0x30
[   15.152083] 
[   15.152155] The buggy address belongs to the object at ffff88810394df80
[   15.152155]  which belongs to the cache kmalloc-64 of size 64
[   15.153003] The buggy address is located 0 bytes to the right of
[   15.153003]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.153491] 
[   15.153585] The buggy address belongs to the physical page:
[   15.153787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.154031] flags: 0x200000000000000(node=0|zone=2)
[   15.154195] page_type: f5(slab)
[   15.154317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.154845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.155878] page dumped because: kasan: bad access detected
[   15.156269] 
[   15.156339] Memory state around the buggy address:
[   15.156501]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.156717]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.156926] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.157131]                                      ^
[   15.157282]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.157751]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.158059] ==================================================================
[   15.999139] ==================================================================
[   15.999502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.999870] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.000180] 
[   16.000270] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.000312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.000325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.000348] Call Trace:
[   16.000363]  <TASK>
[   16.000380]  dump_stack_lvl+0x73/0xb0
[   16.000420]  print_report+0xd1/0x610
[   16.000444]  ? __virt_addr_valid+0x1db/0x2d0
[   16.000468]  ? kasan_atomics_helper+0x151d/0x5450
[   16.000490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.000515]  ? kasan_atomics_helper+0x151d/0x5450
[   16.000538]  kasan_report+0x141/0x180
[   16.000562]  ? kasan_atomics_helper+0x151d/0x5450
[   16.000591]  kasan_check_range+0x10c/0x1c0
[   16.000615]  __kasan_check_write+0x18/0x20
[   16.000637]  kasan_atomics_helper+0x151d/0x5450
[   16.000661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.000707]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.000734]  ? kasan_atomics+0x152/0x310
[   16.000784]  kasan_atomics+0x1dc/0x310
[   16.000809]  ? __pfx_kasan_atomics+0x10/0x10
[   16.000835]  ? __pfx_read_tsc+0x10/0x10
[   16.000860]  ? ktime_get_ts64+0x86/0x230
[   16.000903]  kunit_try_run_case+0x1a5/0x480
[   16.000931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.000970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.000997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.001037]  ? __kthread_parkme+0x82/0x180
[   16.001072]  ? preempt_count_sub+0x50/0x80
[   16.001112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.001190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.001230]  kthread+0x337/0x6f0
[   16.001264]  ? trace_preempt_on+0x20/0xc0
[   16.001302]  ? __pfx_kthread+0x10/0x10
[   16.001338]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.001376]  ? calculate_sigpending+0x7b/0xa0
[   16.001425]  ? __pfx_kthread+0x10/0x10
[   16.001463]  ret_from_fork+0x116/0x1d0
[   16.001497]  ? __pfx_kthread+0x10/0x10
[   16.001532]  ret_from_fork_asm+0x1a/0x30
[   16.001580]  </TASK>
[   16.001605] 
[   16.009803] Allocated by task 283:
[   16.009981]  kasan_save_stack+0x45/0x70
[   16.010180]  kasan_save_track+0x18/0x40
[   16.010344]  kasan_save_alloc_info+0x3b/0x50
[   16.010502]  __kasan_kmalloc+0xb7/0xc0
[   16.010636]  __kmalloc_cache_noprof+0x189/0x420
[   16.010789]  kasan_atomics+0x95/0x310
[   16.010924]  kunit_try_run_case+0x1a5/0x480
[   16.011068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.011514]  kthread+0x337/0x6f0
[   16.011799]  ret_from_fork+0x116/0x1d0
[   16.011989]  ret_from_fork_asm+0x1a/0x30
[   16.012215] 
[   16.012345] The buggy address belongs to the object at ffff88810394df80
[   16.012345]  which belongs to the cache kmalloc-64 of size 64
[   16.013327] The buggy address is located 0 bytes to the right of
[   16.013327]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.013984] 
[   16.014059] The buggy address belongs to the physical page:
[   16.014319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.014879] flags: 0x200000000000000(node=0|zone=2)
[   16.015300] page_type: f5(slab)
[   16.015675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.016329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.016578] page dumped because: kasan: bad access detected
[   16.016755] 
[   16.016827] Memory state around the buggy address:
[   16.016977]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.017189]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.017412] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.018141]                                      ^
[   16.018696]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.019590]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.020450] ==================================================================
[   15.766927] ==================================================================
[   15.767293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.767820] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.768288] 
[   15.768480] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.768530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.768544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.768568] Call Trace:
[   15.768584]  <TASK>
[   15.768601]  dump_stack_lvl+0x73/0xb0
[   15.768632]  print_report+0xd1/0x610
[   15.768655]  ? __virt_addr_valid+0x1db/0x2d0
[   15.768696]  ? kasan_atomics_helper+0x1079/0x5450
[   15.768719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.768743]  ? kasan_atomics_helper+0x1079/0x5450
[   15.768765]  kasan_report+0x141/0x180
[   15.768789]  ? kasan_atomics_helper+0x1079/0x5450
[   15.768818]  kasan_check_range+0x10c/0x1c0
[   15.768843]  __kasan_check_write+0x18/0x20
[   15.768863]  kasan_atomics_helper+0x1079/0x5450
[   15.768887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.768911]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.768936]  ? kasan_atomics+0x152/0x310
[   15.768966]  kasan_atomics+0x1dc/0x310
[   15.768990]  ? __pfx_kasan_atomics+0x10/0x10
[   15.769015]  ? __pfx_read_tsc+0x10/0x10
[   15.769038]  ? ktime_get_ts64+0x86/0x230
[   15.769064]  kunit_try_run_case+0x1a5/0x480
[   15.769090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.769113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.769140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.769165]  ? __kthread_parkme+0x82/0x180
[   15.769187]  ? preempt_count_sub+0x50/0x80
[   15.769213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.769239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.769264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.769290]  kthread+0x337/0x6f0
[   15.769311]  ? trace_preempt_on+0x20/0xc0
[   15.769335]  ? __pfx_kthread+0x10/0x10
[   15.769357]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.769380]  ? calculate_sigpending+0x7b/0xa0
[   15.769418]  ? __pfx_kthread+0x10/0x10
[   15.769441]  ret_from_fork+0x116/0x1d0
[   15.769461]  ? __pfx_kthread+0x10/0x10
[   15.769483]  ret_from_fork_asm+0x1a/0x30
[   15.769517]  </TASK>
[   15.769529] 
[   15.776602] Allocated by task 283:
[   15.776803]  kasan_save_stack+0x45/0x70
[   15.777007]  kasan_save_track+0x18/0x40
[   15.777203]  kasan_save_alloc_info+0x3b/0x50
[   15.777441]  __kasan_kmalloc+0xb7/0xc0
[   15.777688]  __kmalloc_cache_noprof+0x189/0x420
[   15.777890]  kasan_atomics+0x95/0x310
[   15.778077]  kunit_try_run_case+0x1a5/0x480
[   15.778228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778494]  kthread+0x337/0x6f0
[   15.778734]  ret_from_fork+0x116/0x1d0
[   15.778890]  ret_from_fork_asm+0x1a/0x30
[   15.779092] 
[   15.779169] The buggy address belongs to the object at ffff88810394df80
[   15.779169]  which belongs to the cache kmalloc-64 of size 64
[   15.779654] The buggy address is located 0 bytes to the right of
[   15.779654]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.780131] 
[   15.780230] The buggy address belongs to the physical page:
[   15.780463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.780711] flags: 0x200000000000000(node=0|zone=2)
[   15.780879] page_type: f5(slab)
[   15.781006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.781242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.781579] page dumped because: kasan: bad access detected
[   15.782139] 
[   15.782234] Memory state around the buggy address:
[   15.782469]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.782785]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.783099] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.783362]                                      ^
[   15.783531]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.784197]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.784489] ==================================================================
[   15.979152] ==================================================================
[   15.979670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.980019] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.980379] 
[   15.980499] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.980542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.980555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.980576] Call Trace:
[   15.980594]  <TASK>
[   15.980612]  dump_stack_lvl+0x73/0xb0
[   15.980642]  print_report+0xd1/0x610
[   15.980669]  ? __virt_addr_valid+0x1db/0x2d0
[   15.980694]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.980731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.980757]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.980783]  kasan_report+0x141/0x180
[   15.980807]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.980836]  __asan_report_store8_noabort+0x1b/0x30
[   15.980862]  kasan_atomics_helper+0x50d4/0x5450
[   15.980887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.980911]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.980938]  ? kasan_atomics+0x152/0x310
[   15.980967]  kasan_atomics+0x1dc/0x310
[   15.980992]  ? __pfx_kasan_atomics+0x10/0x10
[   15.981018]  ? __pfx_read_tsc+0x10/0x10
[   15.981039]  ? ktime_get_ts64+0x86/0x230
[   15.981066]  kunit_try_run_case+0x1a5/0x480
[   15.981093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.981118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.981143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.981169]  ? __kthread_parkme+0x82/0x180
[   15.981191]  ? preempt_count_sub+0x50/0x80
[   15.981217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.981244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.981269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.981294]  kthread+0x337/0x6f0
[   15.981316]  ? trace_preempt_on+0x20/0xc0
[   15.981340]  ? __pfx_kthread+0x10/0x10
[   15.981363]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.981387]  ? calculate_sigpending+0x7b/0xa0
[   15.981423]  ? __pfx_kthread+0x10/0x10
[   15.981447]  ret_from_fork+0x116/0x1d0
[   15.981467]  ? __pfx_kthread+0x10/0x10
[   15.981489]  ret_from_fork_asm+0x1a/0x30
[   15.981523]  </TASK>
[   15.981534] 
[   15.989982] Allocated by task 283:
[   15.990198]  kasan_save_stack+0x45/0x70
[   15.990424]  kasan_save_track+0x18/0x40
[   15.990621]  kasan_save_alloc_info+0x3b/0x50
[   15.990833]  __kasan_kmalloc+0xb7/0xc0
[   15.991125]  __kmalloc_cache_noprof+0x189/0x420
[   15.991353]  kasan_atomics+0x95/0x310
[   15.991552]  kunit_try_run_case+0x1a5/0x480
[   15.991719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.991898]  kthread+0x337/0x6f0
[   15.992021]  ret_from_fork+0x116/0x1d0
[   15.992156]  ret_from_fork_asm+0x1a/0x30
[   15.992297] 
[   15.992371] The buggy address belongs to the object at ffff88810394df80
[   15.992371]  which belongs to the cache kmalloc-64 of size 64
[   15.993435] The buggy address is located 0 bytes to the right of
[   15.993435]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.994497] 
[   15.994604] The buggy address belongs to the physical page:
[   15.994847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.995185] flags: 0x200000000000000(node=0|zone=2)
[   15.995382] page_type: f5(slab)
[   15.995556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.995930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.996272] page dumped because: kasan: bad access detected
[   15.996530] 
[   15.996624] Memory state around the buggy address:
[   15.996876]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.997163]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.997415] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.997626]                                      ^
[   15.997869]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.998207]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998536] ==================================================================
[   15.698210] ==================================================================
[   15.698512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.699128] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.699662] 
[   15.699784] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.699831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.699844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.699978] Call Trace:
[   15.699997]  <TASK>
[   15.700014]  dump_stack_lvl+0x73/0xb0
[   15.700047]  print_report+0xd1/0x610
[   15.700070]  ? __virt_addr_valid+0x1db/0x2d0
[   15.700094]  ? kasan_atomics_helper+0xf10/0x5450
[   15.700116]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.700140]  ? kasan_atomics_helper+0xf10/0x5450
[   15.700163]  kasan_report+0x141/0x180
[   15.700187]  ? kasan_atomics_helper+0xf10/0x5450
[   15.700214]  kasan_check_range+0x10c/0x1c0
[   15.700239]  __kasan_check_write+0x18/0x20
[   15.700260]  kasan_atomics_helper+0xf10/0x5450
[   15.700284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.700308]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.700334]  ? kasan_atomics+0x152/0x310
[   15.700362]  kasan_atomics+0x1dc/0x310
[   15.700387]  ? __pfx_kasan_atomics+0x10/0x10
[   15.700424]  ? __pfx_read_tsc+0x10/0x10
[   15.700446]  ? ktime_get_ts64+0x86/0x230
[   15.700474]  kunit_try_run_case+0x1a5/0x480
[   15.700502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.700527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.700553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.700601]  ? __kthread_parkme+0x82/0x180
[   15.700623]  ? preempt_count_sub+0x50/0x80
[   15.700649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.700681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.700707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.700732]  kthread+0x337/0x6f0
[   15.700754]  ? trace_preempt_on+0x20/0xc0
[   15.700779]  ? __pfx_kthread+0x10/0x10
[   15.700801]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.700825]  ? calculate_sigpending+0x7b/0xa0
[   15.700850]  ? __pfx_kthread+0x10/0x10
[   15.700874]  ret_from_fork+0x116/0x1d0
[   15.700894]  ? __pfx_kthread+0x10/0x10
[   15.700919]  ret_from_fork_asm+0x1a/0x30
[   15.700956]  </TASK>
[   15.700969] 
[   15.710820] Allocated by task 283:
[   15.710995]  kasan_save_stack+0x45/0x70
[   15.711188]  kasan_save_track+0x18/0x40
[   15.711360]  kasan_save_alloc_info+0x3b/0x50
[   15.711806]  __kasan_kmalloc+0xb7/0xc0
[   15.711997]  __kmalloc_cache_noprof+0x189/0x420
[   15.712323]  kasan_atomics+0x95/0x310
[   15.712528]  kunit_try_run_case+0x1a5/0x480
[   15.712913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.713220]  kthread+0x337/0x6f0
[   15.713387]  ret_from_fork+0x116/0x1d0
[   15.713665]  ret_from_fork_asm+0x1a/0x30
[   15.713841] 
[   15.713944] The buggy address belongs to the object at ffff88810394df80
[   15.713944]  which belongs to the cache kmalloc-64 of size 64
[   15.714432] The buggy address is located 0 bytes to the right of
[   15.714432]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.715214] 
[   15.715388] The buggy address belongs to the physical page:
[   15.715821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.716227] flags: 0x200000000000000(node=0|zone=2)
[   15.716541] page_type: f5(slab)
[   15.716817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.717203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.717541] page dumped because: kasan: bad access detected
[   15.717928] 
[   15.718033] Memory state around the buggy address:
[   15.718338]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.718677]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.718975] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.719282]                                      ^
[   15.719507]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.720008]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720402] ==================================================================
[   16.091515] ==================================================================
[   16.091781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.092697] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.093150] 
[   16.093269] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.093385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.093410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.093434] Call Trace:
[   16.093450]  <TASK>
[   16.093467]  dump_stack_lvl+0x73/0xb0
[   16.093500]  print_report+0xd1/0x610
[   16.093524]  ? __virt_addr_valid+0x1db/0x2d0
[   16.093549]  ? kasan_atomics_helper+0x177f/0x5450
[   16.093572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.093596]  ? kasan_atomics_helper+0x177f/0x5450
[   16.093620]  kasan_report+0x141/0x180
[   16.093643]  ? kasan_atomics_helper+0x177f/0x5450
[   16.093673]  kasan_check_range+0x10c/0x1c0
[   16.093698]  __kasan_check_write+0x18/0x20
[   16.093719]  kasan_atomics_helper+0x177f/0x5450
[   16.093744]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.093768]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.093794]  ? kasan_atomics+0x152/0x310
[   16.093824]  kasan_atomics+0x1dc/0x310
[   16.093848]  ? __pfx_kasan_atomics+0x10/0x10
[   16.093874]  ? __pfx_read_tsc+0x10/0x10
[   16.093898]  ? ktime_get_ts64+0x86/0x230
[   16.093925]  kunit_try_run_case+0x1a5/0x480
[   16.093953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.093977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.094004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.094030]  ? __kthread_parkme+0x82/0x180
[   16.094052]  ? preempt_count_sub+0x50/0x80
[   16.094077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.094156]  kthread+0x337/0x6f0
[   16.094177]  ? trace_preempt_on+0x20/0xc0
[   16.094202]  ? __pfx_kthread+0x10/0x10
[   16.094226]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.094251]  ? calculate_sigpending+0x7b/0xa0
[   16.094277]  ? __pfx_kthread+0x10/0x10
[   16.094301]  ret_from_fork+0x116/0x1d0
[   16.094322]  ? __pfx_kthread+0x10/0x10
[   16.094344]  ret_from_fork_asm+0x1a/0x30
[   16.094379]  </TASK>
[   16.094391] 
[   16.104420] Allocated by task 283:
[   16.104810]  kasan_save_stack+0x45/0x70
[   16.104982]  kasan_save_track+0x18/0x40
[   16.105289]  kasan_save_alloc_info+0x3b/0x50
[   16.105501]  __kasan_kmalloc+0xb7/0xc0
[   16.105759]  __kmalloc_cache_noprof+0x189/0x420
[   16.106086]  kasan_atomics+0x95/0x310
[   16.106333]  kunit_try_run_case+0x1a5/0x480
[   16.106542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.106914]  kthread+0x337/0x6f0
[   16.107049]  ret_from_fork+0x116/0x1d0
[   16.107313]  ret_from_fork_asm+0x1a/0x30
[   16.107565] 
[   16.107650] The buggy address belongs to the object at ffff88810394df80
[   16.107650]  which belongs to the cache kmalloc-64 of size 64
[   16.108009] The buggy address is located 0 bytes to the right of
[   16.108009]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.108384] 
[   16.108476] The buggy address belongs to the physical page:
[   16.108656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.109159] flags: 0x200000000000000(node=0|zone=2)
[   16.109411] page_type: f5(slab)
[   16.109550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.109822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.110318] page dumped because: kasan: bad access detected
[   16.110650] 
[   16.110725] Memory state around the buggy address:
[   16.110886]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.111173]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.111503] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.111802]                                      ^
[   16.112009]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.112293]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.112547] ==================================================================
[   15.533268] ==================================================================
[   15.533714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.534295] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.534676] 
[   15.534789] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.534836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.534849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.534871] Call Trace:
[   15.534888]  <TASK>
[   15.534904]  dump_stack_lvl+0x73/0xb0
[   15.534934]  print_report+0xd1/0x610
[   15.534957]  ? __virt_addr_valid+0x1db/0x2d0
[   15.534981]  ? kasan_atomics_helper+0xac7/0x5450
[   15.535003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.535028]  ? kasan_atomics_helper+0xac7/0x5450
[   15.535051]  kasan_report+0x141/0x180
[   15.535074]  ? kasan_atomics_helper+0xac7/0x5450
[   15.535101]  kasan_check_range+0x10c/0x1c0
[   15.535127]  __kasan_check_write+0x18/0x20
[   15.535202]  kasan_atomics_helper+0xac7/0x5450
[   15.535265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.535306]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.535333]  ? kasan_atomics+0x152/0x310
[   15.535361]  kasan_atomics+0x1dc/0x310
[   15.535385]  ? __pfx_kasan_atomics+0x10/0x10
[   15.535421]  ? __pfx_read_tsc+0x10/0x10
[   15.535444]  ? ktime_get_ts64+0x86/0x230
[   15.535471]  kunit_try_run_case+0x1a5/0x480
[   15.535498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.535521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.535546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.535572]  ? __kthread_parkme+0x82/0x180
[   15.535645]  ? preempt_count_sub+0x50/0x80
[   15.535671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.535709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.535734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.535800]  kthread+0x337/0x6f0
[   15.535842]  ? trace_preempt_on+0x20/0xc0
[   15.535886]  ? __pfx_kthread+0x10/0x10
[   15.535908]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.535933]  ? calculate_sigpending+0x7b/0xa0
[   15.535960]  ? __pfx_kthread+0x10/0x10
[   15.535985]  ret_from_fork+0x116/0x1d0
[   15.536006]  ? __pfx_kthread+0x10/0x10
[   15.536028]  ret_from_fork_asm+0x1a/0x30
[   15.536063]  </TASK>
[   15.536074] 
[   15.545048] Allocated by task 283:
[   15.545198]  kasan_save_stack+0x45/0x70
[   15.545391]  kasan_save_track+0x18/0x40
[   15.545601]  kasan_save_alloc_info+0x3b/0x50
[   15.546023]  __kasan_kmalloc+0xb7/0xc0
[   15.546276]  __kmalloc_cache_noprof+0x189/0x420
[   15.546513]  kasan_atomics+0x95/0x310
[   15.546734]  kunit_try_run_case+0x1a5/0x480
[   15.546926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.547111]  kthread+0x337/0x6f0
[   15.547357]  ret_from_fork+0x116/0x1d0
[   15.547569]  ret_from_fork_asm+0x1a/0x30
[   15.547785] 
[   15.548005] The buggy address belongs to the object at ffff88810394df80
[   15.548005]  which belongs to the cache kmalloc-64 of size 64
[   15.548554] The buggy address is located 0 bytes to the right of
[   15.548554]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.549212] 
[   15.549313] The buggy address belongs to the physical page:
[   15.549533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.550079] flags: 0x200000000000000(node=0|zone=2)
[   15.550506] page_type: f5(slab)
[   15.550797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.551045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.551493] page dumped because: kasan: bad access detected
[   15.551978] 
[   15.552068] Memory state around the buggy address:
[   15.552338]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.552603]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.552984] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.553495]                                      ^
[   15.553783]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.554057]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.554527] ==================================================================
[   15.326925] ==================================================================
[   15.328320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.328805] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.329683] 
[   15.329786] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.329834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.329848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.329871] Call Trace:
[   15.329885]  <TASK>
[   15.329902]  dump_stack_lvl+0x73/0xb0
[   15.329934]  print_report+0xd1/0x610
[   15.329958]  ? __virt_addr_valid+0x1db/0x2d0
[   15.329982]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.330005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.330103]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.330127]  kasan_report+0x141/0x180
[   15.330152]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.330333]  kasan_check_range+0x10c/0x1c0
[   15.330368]  __kasan_check_write+0x18/0x20
[   15.330390]  kasan_atomics_helper+0x5fe/0x5450
[   15.330427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.330452]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.330479]  ? kasan_atomics+0x152/0x310
[   15.330508]  kasan_atomics+0x1dc/0x310
[   15.330532]  ? __pfx_kasan_atomics+0x10/0x10
[   15.330558]  ? __pfx_read_tsc+0x10/0x10
[   15.330603]  ? ktime_get_ts64+0x86/0x230
[   15.330632]  kunit_try_run_case+0x1a5/0x480
[   15.330660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.330685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.330712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.330738]  ? __kthread_parkme+0x82/0x180
[   15.330760]  ? preempt_count_sub+0x50/0x80
[   15.330786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.330813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.330839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.330864]  kthread+0x337/0x6f0
[   15.330885]  ? trace_preempt_on+0x20/0xc0
[   15.330911]  ? __pfx_kthread+0x10/0x10
[   15.330933]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.330956]  ? calculate_sigpending+0x7b/0xa0
[   15.330981]  ? __pfx_kthread+0x10/0x10
[   15.331004]  ret_from_fork+0x116/0x1d0
[   15.331084]  ? __pfx_kthread+0x10/0x10
[   15.331107]  ret_from_fork_asm+0x1a/0x30
[   15.331141]  </TASK>
[   15.331153] 
[   15.348052] Allocated by task 283:
[   15.348656]  kasan_save_stack+0x45/0x70
[   15.348826]  kasan_save_track+0x18/0x40
[   15.348968]  kasan_save_alloc_info+0x3b/0x50
[   15.349163]  __kasan_kmalloc+0xb7/0xc0
[   15.349581]  __kmalloc_cache_noprof+0x189/0x420
[   15.350385]  kasan_atomics+0x95/0x310
[   15.350794]  kunit_try_run_case+0x1a5/0x480
[   15.351406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352165]  kthread+0x337/0x6f0
[   15.352614]  ret_from_fork+0x116/0x1d0
[   15.352951]  ret_from_fork_asm+0x1a/0x30
[   15.353656] 
[   15.353905] The buggy address belongs to the object at ffff88810394df80
[   15.353905]  which belongs to the cache kmalloc-64 of size 64
[   15.354508] The buggy address is located 0 bytes to the right of
[   15.354508]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.355889] 
[   15.355977] The buggy address belongs to the physical page:
[   15.356157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.356419] flags: 0x200000000000000(node=0|zone=2)
[   15.356594] page_type: f5(slab)
[   15.357015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.357351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.357956] page dumped because: kasan: bad access detected
[   15.358157] 
[   15.358258] Memory state around the buggy address:
[   15.358677]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359243]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359549] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.359930]                                      ^
[   15.360322]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.360858]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361354] ==================================================================
[   16.323028] ==================================================================
[   16.323384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.323962] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.324720] 
[   16.324833] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.324903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.324985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.325009] Call Trace:
[   16.325027]  <TASK>
[   16.325045]  dump_stack_lvl+0x73/0xb0
[   16.325078]  print_report+0xd1/0x610
[   16.325101]  ? __virt_addr_valid+0x1db/0x2d0
[   16.325125]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.325148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.325173]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.325195]  kasan_report+0x141/0x180
[   16.325219]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.325248]  kasan_check_range+0x10c/0x1c0
[   16.325273]  __kasan_check_write+0x18/0x20
[   16.325293]  kasan_atomics_helper+0x1e12/0x5450
[   16.325318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.325342]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.325369]  ? kasan_atomics+0x152/0x310
[   16.325410]  kasan_atomics+0x1dc/0x310
[   16.325435]  ? __pfx_kasan_atomics+0x10/0x10
[   16.325462]  ? __pfx_read_tsc+0x10/0x10
[   16.325484]  ? ktime_get_ts64+0x86/0x230
[   16.325512]  kunit_try_run_case+0x1a5/0x480
[   16.325540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.325565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.325615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.325640]  ? __kthread_parkme+0x82/0x180
[   16.325661]  ? preempt_count_sub+0x50/0x80
[   16.325686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.325713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.325740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.325766]  kthread+0x337/0x6f0
[   16.325787]  ? trace_preempt_on+0x20/0xc0
[   16.325812]  ? __pfx_kthread+0x10/0x10
[   16.325834]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.325857]  ? calculate_sigpending+0x7b/0xa0
[   16.325883]  ? __pfx_kthread+0x10/0x10
[   16.325907]  ret_from_fork+0x116/0x1d0
[   16.325927]  ? __pfx_kthread+0x10/0x10
[   16.325949]  ret_from_fork_asm+0x1a/0x30
[   16.325983]  </TASK>
[   16.325994] 
[   16.336443] Allocated by task 283:
[   16.336919]  kasan_save_stack+0x45/0x70
[   16.337185]  kasan_save_track+0x18/0x40
[   16.337544]  kasan_save_alloc_info+0x3b/0x50
[   16.337780]  __kasan_kmalloc+0xb7/0xc0
[   16.337967]  __kmalloc_cache_noprof+0x189/0x420
[   16.338194]  kasan_atomics+0x95/0x310
[   16.338388]  kunit_try_run_case+0x1a5/0x480
[   16.338972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.339222]  kthread+0x337/0x6f0
[   16.339499]  ret_from_fork+0x116/0x1d0
[   16.339710]  ret_from_fork_asm+0x1a/0x30
[   16.340075] 
[   16.340185] The buggy address belongs to the object at ffff88810394df80
[   16.340185]  which belongs to the cache kmalloc-64 of size 64
[   16.341023] The buggy address is located 0 bytes to the right of
[   16.341023]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.341564] 
[   16.341894] The buggy address belongs to the physical page:
[   16.342233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.342689] flags: 0x200000000000000(node=0|zone=2)
[   16.342940] page_type: f5(slab)
[   16.343301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.343677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.344084] page dumped because: kasan: bad access detected
[   16.344425] 
[   16.344553] Memory state around the buggy address:
[   16.345018]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.345355]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.345884] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.346312]                                      ^
[   16.346630]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.347058]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.347414] ==================================================================
[   15.820087] ==================================================================
[   15.820415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.820777] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.821040] 
[   15.821150] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.821192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.821205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.821227] Call Trace:
[   15.821243]  <TASK>
[   15.821260]  dump_stack_lvl+0x73/0xb0
[   15.821288]  print_report+0xd1/0x610
[   15.821311]  ? __virt_addr_valid+0x1db/0x2d0
[   15.821335]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.821357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.821381]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.821416]  kasan_report+0x141/0x180
[   15.821439]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.821468]  __asan_report_load4_noabort+0x18/0x20
[   15.821493]  kasan_atomics_helper+0x4a02/0x5450
[   15.821517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.821542]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.821568]  ? kasan_atomics+0x152/0x310
[   15.821596]  kasan_atomics+0x1dc/0x310
[   15.821621]  ? __pfx_kasan_atomics+0x10/0x10
[   15.821647]  ? __pfx_read_tsc+0x10/0x10
[   15.821669]  ? ktime_get_ts64+0x86/0x230
[   15.821695]  kunit_try_run_case+0x1a5/0x480
[   15.821721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.821771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.821797]  ? __kthread_parkme+0x82/0x180
[   15.821819]  ? preempt_count_sub+0x50/0x80
[   15.821843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.821894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.821919]  kthread+0x337/0x6f0
[   15.821941]  ? trace_preempt_on+0x20/0xc0
[   15.821965]  ? __pfx_kthread+0x10/0x10
[   15.821987]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.822010]  ? calculate_sigpending+0x7b/0xa0
[   15.822035]  ? __pfx_kthread+0x10/0x10
[   15.822058]  ret_from_fork+0x116/0x1d0
[   15.822078]  ? __pfx_kthread+0x10/0x10
[   15.822101]  ret_from_fork_asm+0x1a/0x30
[   15.822136]  </TASK>
[   15.822146] 
[   15.829305] Allocated by task 283:
[   15.829496]  kasan_save_stack+0x45/0x70
[   15.829692]  kasan_save_track+0x18/0x40
[   15.830015]  kasan_save_alloc_info+0x3b/0x50
[   15.830228]  __kasan_kmalloc+0xb7/0xc0
[   15.830432]  __kmalloc_cache_noprof+0x189/0x420
[   15.830626]  kasan_atomics+0x95/0x310
[   15.830814]  kunit_try_run_case+0x1a5/0x480
[   15.830966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.831182]  kthread+0x337/0x6f0
[   15.831358]  ret_from_fork+0x116/0x1d0
[   15.831551]  ret_from_fork_asm+0x1a/0x30
[   15.831763] 
[   15.831861] The buggy address belongs to the object at ffff88810394df80
[   15.831861]  which belongs to the cache kmalloc-64 of size 64
[   15.832313] The buggy address is located 0 bytes to the right of
[   15.832313]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.832834] 
[   15.832935] The buggy address belongs to the physical page:
[   15.833160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.833469] flags: 0x200000000000000(node=0|zone=2)
[   15.833736] page_type: f5(slab)
[   15.833875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.834182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.834494] page dumped because: kasan: bad access detected
[   15.834752] 
[   15.834829] Memory state around the buggy address:
[   15.835054]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.835300]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.835532] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.835751]                                      ^
[   15.835909]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.836129]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.836347] ==================================================================
[   15.304336] ==================================================================
[   15.304869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.305521] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.305870] 
[   15.306012] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.306060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.306073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.306096] Call Trace:
[   15.306110]  <TASK>
[   15.306126]  dump_stack_lvl+0x73/0xb0
[   15.306204]  print_report+0xd1/0x610
[   15.306245]  ? __virt_addr_valid+0x1db/0x2d0
[   15.306270]  ? kasan_atomics_helper+0x565/0x5450
[   15.306292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.306317]  ? kasan_atomics_helper+0x565/0x5450
[   15.306340]  kasan_report+0x141/0x180
[   15.306364]  ? kasan_atomics_helper+0x565/0x5450
[   15.306392]  kasan_check_range+0x10c/0x1c0
[   15.306430]  __kasan_check_write+0x18/0x20
[   15.306450]  kasan_atomics_helper+0x565/0x5450
[   15.306474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.306498]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.306524]  ? kasan_atomics+0x152/0x310
[   15.306554]  kasan_atomics+0x1dc/0x310
[   15.306578]  ? __pfx_kasan_atomics+0x10/0x10
[   15.306613]  ? __pfx_read_tsc+0x10/0x10
[   15.306636]  ? ktime_get_ts64+0x86/0x230
[   15.306664]  kunit_try_run_case+0x1a5/0x480
[   15.306702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.306727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.306753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.306778]  ? __kthread_parkme+0x82/0x180
[   15.306800]  ? preempt_count_sub+0x50/0x80
[   15.306826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.306852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.306903]  kthread+0x337/0x6f0
[   15.306923]  ? trace_preempt_on+0x20/0xc0
[   15.306948]  ? __pfx_kthread+0x10/0x10
[   15.306982]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.307005]  ? calculate_sigpending+0x7b/0xa0
[   15.307067]  ? __pfx_kthread+0x10/0x10
[   15.307103]  ret_from_fork+0x116/0x1d0
[   15.307124]  ? __pfx_kthread+0x10/0x10
[   15.307146]  ret_from_fork_asm+0x1a/0x30
[   15.307191]  </TASK>
[   15.307204] 
[   15.315933] Allocated by task 283:
[   15.316145]  kasan_save_stack+0x45/0x70
[   15.316460]  kasan_save_track+0x18/0x40
[   15.316737]  kasan_save_alloc_info+0x3b/0x50
[   15.316961]  __kasan_kmalloc+0xb7/0xc0
[   15.317201]  __kmalloc_cache_noprof+0x189/0x420
[   15.317456]  kasan_atomics+0x95/0x310
[   15.317607]  kunit_try_run_case+0x1a5/0x480
[   15.317819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.318127]  kthread+0x337/0x6f0
[   15.318278]  ret_from_fork+0x116/0x1d0
[   15.318425]  ret_from_fork_asm+0x1a/0x30
[   15.318568] 
[   15.318809] The buggy address belongs to the object at ffff88810394df80
[   15.318809]  which belongs to the cache kmalloc-64 of size 64
[   15.319447] The buggy address is located 0 bytes to the right of
[   15.319447]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.320248] 
[   15.320332] The buggy address belongs to the physical page:
[   15.320525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.320780] flags: 0x200000000000000(node=0|zone=2)
[   15.320946] page_type: f5(slab)
[   15.321070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.321384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.321988] page dumped because: kasan: bad access detected
[   15.322622] 
[   15.322725] Memory state around the buggy address:
[   15.322953]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.323259]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.323496] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.323885]                                      ^
[   15.324133]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.324516]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.325345] ==================================================================
[   16.412414] ==================================================================
[   16.412977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.413318] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.413572] 
[   16.413684] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.413728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.413743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.413766] Call Trace:
[   16.413782]  <TASK>
[   16.413798]  dump_stack_lvl+0x73/0xb0
[   16.413829]  print_report+0xd1/0x610
[   16.413852]  ? __virt_addr_valid+0x1db/0x2d0
[   16.413875]  ? kasan_atomics_helper+0x2006/0x5450
[   16.413897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.413921]  ? kasan_atomics_helper+0x2006/0x5450
[   16.413944]  kasan_report+0x141/0x180
[   16.413968]  ? kasan_atomics_helper+0x2006/0x5450
[   16.413996]  kasan_check_range+0x10c/0x1c0
[   16.414022]  __kasan_check_write+0x18/0x20
[   16.414042]  kasan_atomics_helper+0x2006/0x5450
[   16.414067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.414091]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.414128]  ? kasan_atomics+0x152/0x310
[   16.414156]  kasan_atomics+0x1dc/0x310
[   16.414181]  ? __pfx_kasan_atomics+0x10/0x10
[   16.414207]  ? __pfx_read_tsc+0x10/0x10
[   16.414229]  ? ktime_get_ts64+0x86/0x230
[   16.414255]  kunit_try_run_case+0x1a5/0x480
[   16.414281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.414305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.414331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.414356]  ? __kthread_parkme+0x82/0x180
[   16.414378]  ? preempt_count_sub+0x50/0x80
[   16.414414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.414440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.414465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.414492]  kthread+0x337/0x6f0
[   16.414513]  ? trace_preempt_on+0x20/0xc0
[   16.414538]  ? __pfx_kthread+0x10/0x10
[   16.414561]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.414585]  ? calculate_sigpending+0x7b/0xa0
[   16.414610]  ? __pfx_kthread+0x10/0x10
[   16.414634]  ret_from_fork+0x116/0x1d0
[   16.414654]  ? __pfx_kthread+0x10/0x10
[   16.414676]  ret_from_fork_asm+0x1a/0x30
[   16.414710]  </TASK>
[   16.414721] 
[   16.422494] Allocated by task 283:
[   16.422729]  kasan_save_stack+0x45/0x70
[   16.422904]  kasan_save_track+0x18/0x40
[   16.423044]  kasan_save_alloc_info+0x3b/0x50
[   16.423197]  __kasan_kmalloc+0xb7/0xc0
[   16.423337]  __kmalloc_cache_noprof+0x189/0x420
[   16.423568]  kasan_atomics+0x95/0x310
[   16.423758]  kunit_try_run_case+0x1a5/0x480
[   16.423964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.424143]  kthread+0x337/0x6f0
[   16.424267]  ret_from_fork+0x116/0x1d0
[   16.424412]  ret_from_fork_asm+0x1a/0x30
[   16.424661] 
[   16.424763] The buggy address belongs to the object at ffff88810394df80
[   16.424763]  which belongs to the cache kmalloc-64 of size 64
[   16.425292] The buggy address is located 0 bytes to the right of
[   16.425292]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.425788] 
[   16.425866] The buggy address belongs to the physical page:
[   16.426046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.426292] flags: 0x200000000000000(node=0|zone=2)
[   16.426471] page_type: f5(slab)
[   16.426622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.426962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.427293] page dumped because: kasan: bad access detected
[   16.427556] 
[   16.427654] Memory state around the buggy address:
[   16.428094]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.428317]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.428546] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.428767]                                      ^
[   16.428924]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.429462]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.430042] ==================================================================
[   15.283996] ==================================================================
[   15.284342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.284787] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.285179] 
[   15.285315] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.285363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.285377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.285410] Call Trace:
[   15.285426]  <TASK>
[   15.285443]  dump_stack_lvl+0x73/0xb0
[   15.285483]  print_report+0xd1/0x610
[   15.285507]  ? __virt_addr_valid+0x1db/0x2d0
[   15.285543]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.285565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.285590]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.285613]  kasan_report+0x141/0x180
[   15.285637]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.285666]  __asan_report_store4_noabort+0x1b/0x30
[   15.285701]  kasan_atomics_helper+0x4b3a/0x5450
[   15.285725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.285749]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.285788]  ? kasan_atomics+0x152/0x310
[   15.285817]  kasan_atomics+0x1dc/0x310
[   15.285842]  ? __pfx_kasan_atomics+0x10/0x10
[   15.285868]  ? __pfx_read_tsc+0x10/0x10
[   15.285889]  ? ktime_get_ts64+0x86/0x230
[   15.285916]  kunit_try_run_case+0x1a5/0x480
[   15.285944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.285968]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.285993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.286017]  ? __kthread_parkme+0x82/0x180
[   15.286089]  ? preempt_count_sub+0x50/0x80
[   15.286115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.286212]  kthread+0x337/0x6f0
[   15.286233]  ? trace_preempt_on+0x20/0xc0
[   15.286258]  ? __pfx_kthread+0x10/0x10
[   15.286281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.286304]  ? calculate_sigpending+0x7b/0xa0
[   15.286330]  ? __pfx_kthread+0x10/0x10
[   15.286353]  ret_from_fork+0x116/0x1d0
[   15.286373]  ? __pfx_kthread+0x10/0x10
[   15.286405]  ret_from_fork_asm+0x1a/0x30
[   15.286439]  </TASK>
[   15.286450] 
[   15.294577] Allocated by task 283:
[   15.294715]  kasan_save_stack+0x45/0x70
[   15.294860]  kasan_save_track+0x18/0x40
[   15.294998]  kasan_save_alloc_info+0x3b/0x50
[   15.295181]  __kasan_kmalloc+0xb7/0xc0
[   15.295370]  __kmalloc_cache_noprof+0x189/0x420
[   15.295892]  kasan_atomics+0x95/0x310
[   15.296096]  kunit_try_run_case+0x1a5/0x480
[   15.296316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.296584]  kthread+0x337/0x6f0
[   15.296760]  ret_from_fork+0x116/0x1d0
[   15.296949]  ret_from_fork_asm+0x1a/0x30
[   15.297438] 
[   15.297549] The buggy address belongs to the object at ffff88810394df80
[   15.297549]  which belongs to the cache kmalloc-64 of size 64
[   15.298172] The buggy address is located 0 bytes to the right of
[   15.298172]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.298749] 
[   15.298828] The buggy address belongs to the physical page:
[   15.299005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.299421] flags: 0x200000000000000(node=0|zone=2)
[   15.299817] page_type: f5(slab)
[   15.299977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.300332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.300788] page dumped because: kasan: bad access detected
[   15.301177] 
[   15.301306] Memory state around the buggy address:
[   15.301521]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.302003]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.302305] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.302758]                                      ^
[   15.302941]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.303368]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.303709] ==================================================================
[   15.464361] ==================================================================
[   15.464752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.465150] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.465516] 
[   15.465608] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.465654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.465668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.465692] Call Trace:
[   15.465707]  <TASK>
[   15.465723]  dump_stack_lvl+0x73/0xb0
[   15.465752]  print_report+0xd1/0x610
[   15.465775]  ? __virt_addr_valid+0x1db/0x2d0
[   15.465799]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.465822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.465846]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.465869]  kasan_report+0x141/0x180
[   15.465892]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.465920]  kasan_check_range+0x10c/0x1c0
[   15.465944]  __kasan_check_write+0x18/0x20
[   15.465965]  kasan_atomics_helper+0x8f9/0x5450
[   15.466086]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.466135]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.466208]  ? kasan_atomics+0x152/0x310
[   15.466283]  kasan_atomics+0x1dc/0x310
[   15.466351]  ? __pfx_kasan_atomics+0x10/0x10
[   15.466435]  ? __pfx_read_tsc+0x10/0x10
[   15.466482]  ? ktime_get_ts64+0x86/0x230
[   15.466511]  kunit_try_run_case+0x1a5/0x480
[   15.466539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.466564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.466590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.466615]  ? __kthread_parkme+0x82/0x180
[   15.466637]  ? preempt_count_sub+0x50/0x80
[   15.466664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.466691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.466716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.466741]  kthread+0x337/0x6f0
[   15.466763]  ? trace_preempt_on+0x20/0xc0
[   15.466788]  ? __pfx_kthread+0x10/0x10
[   15.466810]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.466833]  ? calculate_sigpending+0x7b/0xa0
[   15.466858]  ? __pfx_kthread+0x10/0x10
[   15.466882]  ret_from_fork+0x116/0x1d0
[   15.466902]  ? __pfx_kthread+0x10/0x10
[   15.466924]  ret_from_fork_asm+0x1a/0x30
[   15.466958]  </TASK>
[   15.466970] 
[   15.475671] Allocated by task 283:
[   15.475899]  kasan_save_stack+0x45/0x70
[   15.476140]  kasan_save_track+0x18/0x40
[   15.476372]  kasan_save_alloc_info+0x3b/0x50
[   15.476650]  __kasan_kmalloc+0xb7/0xc0
[   15.476886]  __kmalloc_cache_noprof+0x189/0x420
[   15.477078]  kasan_atomics+0x95/0x310
[   15.477304]  kunit_try_run_case+0x1a5/0x480
[   15.477549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.477771]  kthread+0x337/0x6f0
[   15.477934]  ret_from_fork+0x116/0x1d0
[   15.478165]  ret_from_fork_asm+0x1a/0x30
[   15.478420] 
[   15.478495] The buggy address belongs to the object at ffff88810394df80
[   15.478495]  which belongs to the cache kmalloc-64 of size 64
[   15.479119] The buggy address is located 0 bytes to the right of
[   15.479119]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.479712] 
[   15.479825] The buggy address belongs to the physical page:
[   15.480064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.480496] flags: 0x200000000000000(node=0|zone=2)
[   15.480786] page_type: f5(slab)
[   15.480945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.481364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.481735] page dumped because: kasan: bad access detected
[   15.481988] 
[   15.482089] Memory state around the buggy address:
[   15.482360]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.482632]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.483110] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.483424]                                      ^
[   15.483663]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.484003]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.484417] ==================================================================
[   15.619511] ==================================================================
[   15.619856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.620360] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.620774] 
[   15.620864] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.620907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.620920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.620942] Call Trace:
[   15.620957]  <TASK>
[   15.620974]  dump_stack_lvl+0x73/0xb0
[   15.621002]  print_report+0xd1/0x610
[   15.621026]  ? __virt_addr_valid+0x1db/0x2d0
[   15.621052]  ? kasan_atomics_helper+0xd47/0x5450
[   15.621074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.621098]  ? kasan_atomics_helper+0xd47/0x5450
[   15.621121]  kasan_report+0x141/0x180
[   15.621158]  ? kasan_atomics_helper+0xd47/0x5450
[   15.621187]  kasan_check_range+0x10c/0x1c0
[   15.621213]  __kasan_check_write+0x18/0x20
[   15.621245]  kasan_atomics_helper+0xd47/0x5450
[   15.621269]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.621293]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.621328]  ? kasan_atomics+0x152/0x310
[   15.621357]  kasan_atomics+0x1dc/0x310
[   15.621381]  ? __pfx_kasan_atomics+0x10/0x10
[   15.621422]  ? __pfx_read_tsc+0x10/0x10
[   15.621445]  ? ktime_get_ts64+0x86/0x230
[   15.621471]  kunit_try_run_case+0x1a5/0x480
[   15.621498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.621532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.621558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.621583]  ? __kthread_parkme+0x82/0x180
[   15.621615]  ? preempt_count_sub+0x50/0x80
[   15.621642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.621669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.621694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.621728]  kthread+0x337/0x6f0
[   15.621750]  ? trace_preempt_on+0x20/0xc0
[   15.621774]  ? __pfx_kthread+0x10/0x10
[   15.621807]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.621832]  ? calculate_sigpending+0x7b/0xa0
[   15.621857]  ? __pfx_kthread+0x10/0x10
[   15.621881]  ret_from_fork+0x116/0x1d0
[   15.621910]  ? __pfx_kthread+0x10/0x10
[   15.621932]  ret_from_fork_asm+0x1a/0x30
[   15.621977]  </TASK>
[   15.621988] 
[   15.629593] Allocated by task 283:
[   15.629796]  kasan_save_stack+0x45/0x70
[   15.630025]  kasan_save_track+0x18/0x40
[   15.630423]  kasan_save_alloc_info+0x3b/0x50
[   15.630696]  __kasan_kmalloc+0xb7/0xc0
[   15.630909]  __kmalloc_cache_noprof+0x189/0x420
[   15.631082]  kasan_atomics+0x95/0x310
[   15.631219]  kunit_try_run_case+0x1a5/0x480
[   15.631440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.631847]  kthread+0x337/0x6f0
[   15.632039]  ret_from_fork+0x116/0x1d0
[   15.632220]  ret_from_fork_asm+0x1a/0x30
[   15.632429] 
[   15.632519] The buggy address belongs to the object at ffff88810394df80
[   15.632519]  which belongs to the cache kmalloc-64 of size 64
[   15.632897] The buggy address is located 0 bytes to the right of
[   15.632897]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.633266] 
[   15.633339] The buggy address belongs to the physical page:
[   15.633524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.633767] flags: 0x200000000000000(node=0|zone=2)
[   15.633930] page_type: f5(slab)
[   15.634052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.634374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.634981] page dumped because: kasan: bad access detected
[   15.635237] 
[   15.635332] Memory state around the buggy address:
[   15.635564]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.636128]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.636450] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.636765]                                      ^
[   15.637018]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.637336]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.637736] ==================================================================
[   15.802184] ==================================================================
[   15.802617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.802953] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.803223] 
[   15.803313] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.803357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.803371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.803404] Call Trace:
[   15.803420]  <TASK>
[   15.803436]  dump_stack_lvl+0x73/0xb0
[   15.803465]  print_report+0xd1/0x610
[   15.803488]  ? __virt_addr_valid+0x1db/0x2d0
[   15.803512]  ? kasan_atomics_helper+0x1148/0x5450
[   15.803535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.803558]  ? kasan_atomics_helper+0x1148/0x5450
[   15.803583]  kasan_report+0x141/0x180
[   15.803617]  ? kasan_atomics_helper+0x1148/0x5450
[   15.803646]  kasan_check_range+0x10c/0x1c0
[   15.803671]  __kasan_check_write+0x18/0x20
[   15.803691]  kasan_atomics_helper+0x1148/0x5450
[   15.803715]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.803738]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.803765]  ? kasan_atomics+0x152/0x310
[   15.803794]  kasan_atomics+0x1dc/0x310
[   15.803818]  ? __pfx_kasan_atomics+0x10/0x10
[   15.803844]  ? __pfx_read_tsc+0x10/0x10
[   15.803866]  ? ktime_get_ts64+0x86/0x230
[   15.803892]  kunit_try_run_case+0x1a5/0x480
[   15.803920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.803943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.803969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.803994]  ? __kthread_parkme+0x82/0x180
[   15.804017]  ? preempt_count_sub+0x50/0x80
[   15.804043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.804069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.804119]  kthread+0x337/0x6f0
[   15.804140]  ? trace_preempt_on+0x20/0xc0
[   15.804164]  ? __pfx_kthread+0x10/0x10
[   15.804187]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.804210]  ? calculate_sigpending+0x7b/0xa0
[   15.804235]  ? __pfx_kthread+0x10/0x10
[   15.804258]  ret_from_fork+0x116/0x1d0
[   15.804278]  ? __pfx_kthread+0x10/0x10
[   15.804300]  ret_from_fork_asm+0x1a/0x30
[   15.804333]  </TASK>
[   15.804345] 
[   15.812124] Allocated by task 283:
[   15.812295]  kasan_save_stack+0x45/0x70
[   15.812503]  kasan_save_track+0x18/0x40
[   15.812697]  kasan_save_alloc_info+0x3b/0x50
[   15.812850]  __kasan_kmalloc+0xb7/0xc0
[   15.812987]  __kmalloc_cache_noprof+0x189/0x420
[   15.813146]  kasan_atomics+0x95/0x310
[   15.813282]  kunit_try_run_case+0x1a5/0x480
[   15.813500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.813958]  kthread+0x337/0x6f0
[   15.814133]  ret_from_fork+0x116/0x1d0
[   15.814322]  ret_from_fork_asm+0x1a/0x30
[   15.814544] 
[   15.814708] The buggy address belongs to the object at ffff88810394df80
[   15.814708]  which belongs to the cache kmalloc-64 of size 64
[   15.815188] The buggy address is located 0 bytes to the right of
[   15.815188]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.815569] 
[   15.815683] The buggy address belongs to the physical page:
[   15.815934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.816284] flags: 0x200000000000000(node=0|zone=2)
[   15.816525] page_type: f5(slab)
[   15.816725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.816964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.817310] page dumped because: kasan: bad access detected
[   15.817579] 
[   15.817675] Memory state around the buggy address:
[   15.817884]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.818176]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.818474] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.818775]                                      ^
[   15.818991]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.819251]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819535] ==================================================================
[   16.172869] ==================================================================
[   16.173225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.173479] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.173709] 
[   16.173797] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.173841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.173855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.173879] Call Trace:
[   16.173893]  <TASK>
[   16.173910]  dump_stack_lvl+0x73/0xb0
[   16.173941]  print_report+0xd1/0x610
[   16.173967]  ? __virt_addr_valid+0x1db/0x2d0
[   16.173993]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.174018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.174042]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.174066]  kasan_report+0x141/0x180
[   16.174089]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.174133]  kasan_check_range+0x10c/0x1c0
[   16.174157]  __kasan_check_write+0x18/0x20
[   16.174178]  kasan_atomics_helper+0x19e3/0x5450
[   16.174203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.174226]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.174253]  ? kasan_atomics+0x152/0x310
[   16.174282]  kasan_atomics+0x1dc/0x310
[   16.174307]  ? __pfx_kasan_atomics+0x10/0x10
[   16.174332]  ? __pfx_read_tsc+0x10/0x10
[   16.174355]  ? ktime_get_ts64+0x86/0x230
[   16.174381]  kunit_try_run_case+0x1a5/0x480
[   16.174419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.174442]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.174468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.174493]  ? __kthread_parkme+0x82/0x180
[   16.174514]  ? preempt_count_sub+0x50/0x80
[   16.174541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.174566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.174590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.174616]  kthread+0x337/0x6f0
[   16.174637]  ? trace_preempt_on+0x20/0xc0
[   16.174661]  ? __pfx_kthread+0x10/0x10
[   16.174683]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.174706]  ? calculate_sigpending+0x7b/0xa0
[   16.174732]  ? __pfx_kthread+0x10/0x10
[   16.174754]  ret_from_fork+0x116/0x1d0
[   16.174775]  ? __pfx_kthread+0x10/0x10
[   16.174796]  ret_from_fork_asm+0x1a/0x30
[   16.174830]  </TASK>
[   16.174841] 
[   16.184066] Allocated by task 283:
[   16.184229]  kasan_save_stack+0x45/0x70
[   16.184379]  kasan_save_track+0x18/0x40
[   16.184531]  kasan_save_alloc_info+0x3b/0x50
[   16.184687]  __kasan_kmalloc+0xb7/0xc0
[   16.184822]  __kmalloc_cache_noprof+0x189/0x420
[   16.185013]  kasan_atomics+0x95/0x310
[   16.185207]  kunit_try_run_case+0x1a5/0x480
[   16.185438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.185844]  kthread+0x337/0x6f0
[   16.186013]  ret_from_fork+0x116/0x1d0
[   16.186199]  ret_from_fork_asm+0x1a/0x30
[   16.186403] 
[   16.186505] The buggy address belongs to the object at ffff88810394df80
[   16.186505]  which belongs to the cache kmalloc-64 of size 64
[   16.186949] The buggy address is located 0 bytes to the right of
[   16.186949]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.187440] 
[   16.187540] The buggy address belongs to the physical page:
[   16.187859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.188155] flags: 0x200000000000000(node=0|zone=2)
[   16.188404] page_type: f5(slab)
[   16.188566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.188869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.189155] page dumped because: kasan: bad access detected
[   16.189330] 
[   16.189412] Memory state around the buggy address:
[   16.189571]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.189791]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.190336] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.190757]                                      ^
[   16.190985]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.191308]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.191668] ==================================================================
[   16.500741] ==================================================================
[   16.501299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.502863] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.503104] 
[   16.503223] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.503269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.503282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.503305] Call Trace:
[   16.503319]  <TASK>
[   16.503335]  dump_stack_lvl+0x73/0xb0
[   16.503368]  print_report+0xd1/0x610
[   16.503403]  ? __virt_addr_valid+0x1db/0x2d0
[   16.503427]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.503450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.503474]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.503497]  kasan_report+0x141/0x180
[   16.503522]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.503551]  __asan_report_load8_noabort+0x18/0x20
[   16.503577]  kasan_atomics_helper+0x4fa5/0x5450
[   16.503602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.503627]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.503654]  ? kasan_atomics+0x152/0x310
[   16.503683]  kasan_atomics+0x1dc/0x310
[   16.503707]  ? __pfx_kasan_atomics+0x10/0x10
[   16.503734]  ? __pfx_read_tsc+0x10/0x10
[   16.503757]  ? ktime_get_ts64+0x86/0x230
[   16.503783]  kunit_try_run_case+0x1a5/0x480
[   16.503809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.503833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.503859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.503885]  ? __kthread_parkme+0x82/0x180
[   16.503907]  ? preempt_count_sub+0x50/0x80
[   16.503933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.503960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.503985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.504010]  kthread+0x337/0x6f0
[   16.504031]  ? trace_preempt_on+0x20/0xc0
[   16.504056]  ? __pfx_kthread+0x10/0x10
[   16.504079]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.504103]  ? calculate_sigpending+0x7b/0xa0
[   16.504128]  ? __pfx_kthread+0x10/0x10
[   16.504151]  ret_from_fork+0x116/0x1d0
[   16.504171]  ? __pfx_kthread+0x10/0x10
[   16.504193]  ret_from_fork_asm+0x1a/0x30
[   16.504228]  </TASK>
[   16.504240] 
[   16.517076] Allocated by task 283:
[   16.517402]  kasan_save_stack+0x45/0x70
[   16.517781]  kasan_save_track+0x18/0x40
[   16.518006]  kasan_save_alloc_info+0x3b/0x50
[   16.518159]  __kasan_kmalloc+0xb7/0xc0
[   16.518295]  __kmalloc_cache_noprof+0x189/0x420
[   16.518465]  kasan_atomics+0x95/0x310
[   16.518638]  kunit_try_run_case+0x1a5/0x480
[   16.519017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.519605]  kthread+0x337/0x6f0
[   16.519909]  ret_from_fork+0x116/0x1d0
[   16.520258]  ret_from_fork_asm+0x1a/0x30
[   16.520634] 
[   16.520800] The buggy address belongs to the object at ffff88810394df80
[   16.520800]  which belongs to the cache kmalloc-64 of size 64
[   16.521835] The buggy address is located 0 bytes to the right of
[   16.521835]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.522973] 
[   16.523135] The buggy address belongs to the physical page:
[   16.523629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.524505] flags: 0x200000000000000(node=0|zone=2)
[   16.524755] page_type: f5(slab)
[   16.525047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.525528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.526061] page dumped because: kasan: bad access detected
[   16.526322] 
[   16.526431] Memory state around the buggy address:
[   16.526667]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.526902]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.527387] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.527674]                                      ^
[   16.527874]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.528129]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.528458] ==================================================================
[   16.528951] ==================================================================
[   16.529475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.529899] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.530281] 
[   16.530415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.530460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.530473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.530496] Call Trace:
[   16.530513]  <TASK>
[   16.530531]  dump_stack_lvl+0x73/0xb0
[   16.530562]  print_report+0xd1/0x610
[   16.530585]  ? __virt_addr_valid+0x1db/0x2d0
[   16.530608]  ? kasan_atomics_helper+0x224c/0x5450
[   16.530641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.530666]  ? kasan_atomics_helper+0x224c/0x5450
[   16.530690]  kasan_report+0x141/0x180
[   16.530714]  ? kasan_atomics_helper+0x224c/0x5450
[   16.530744]  kasan_check_range+0x10c/0x1c0
[   16.530769]  __kasan_check_write+0x18/0x20
[   16.530790]  kasan_atomics_helper+0x224c/0x5450
[   16.530815]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.530838]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.530864]  ? kasan_atomics+0x152/0x310
[   16.530893]  kasan_atomics+0x1dc/0x310
[   16.530917]  ? __pfx_kasan_atomics+0x10/0x10
[   16.530943]  ? __pfx_read_tsc+0x10/0x10
[   16.530966]  ? ktime_get_ts64+0x86/0x230
[   16.530992]  kunit_try_run_case+0x1a5/0x480
[   16.531017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.531041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.531068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.531093]  ? __kthread_parkme+0x82/0x180
[   16.531115]  ? preempt_count_sub+0x50/0x80
[   16.531140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.531166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.531192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.531217]  kthread+0x337/0x6f0
[   16.531239]  ? trace_preempt_on+0x20/0xc0
[   16.531263]  ? __pfx_kthread+0x10/0x10
[   16.531285]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.531309]  ? calculate_sigpending+0x7b/0xa0
[   16.531335]  ? __pfx_kthread+0x10/0x10
[   16.531359]  ret_from_fork+0x116/0x1d0
[   16.531378]  ? __pfx_kthread+0x10/0x10
[   16.531410]  ret_from_fork_asm+0x1a/0x30
[   16.531444]  </TASK>
[   16.531456] 
[   16.539185] Allocated by task 283:
[   16.539372]  kasan_save_stack+0x45/0x70
[   16.539565]  kasan_save_track+0x18/0x40
[   16.539775]  kasan_save_alloc_info+0x3b/0x50
[   16.539964]  __kasan_kmalloc+0xb7/0xc0
[   16.540179]  __kmalloc_cache_noprof+0x189/0x420
[   16.540377]  kasan_atomics+0x95/0x310
[   16.540599]  kunit_try_run_case+0x1a5/0x480
[   16.540781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.541055]  kthread+0x337/0x6f0
[   16.541240]  ret_from_fork+0x116/0x1d0
[   16.541439]  ret_from_fork_asm+0x1a/0x30
[   16.541686] 
[   16.541785] The buggy address belongs to the object at ffff88810394df80
[   16.541785]  which belongs to the cache kmalloc-64 of size 64
[   16.542300] The buggy address is located 0 bytes to the right of
[   16.542300]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.542979] 
[   16.543088] The buggy address belongs to the physical page:
[   16.543338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.543715] flags: 0x200000000000000(node=0|zone=2)
[   16.543926] page_type: f5(slab)
[   16.544098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.544421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.544784] page dumped because: kasan: bad access detected
[   16.545050] 
[   16.545142] Memory state around the buggy address:
[   16.545376]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.545684]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.545954] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.546245]                                      ^
[   16.546481]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.546794]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547097] ==================================================================
[   15.418389] ==================================================================
[   15.418783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.419607] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.419997] 
[   15.420441] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.420500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.420522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.420547] Call Trace:
[   15.420564]  <TASK>
[   15.420630]  dump_stack_lvl+0x73/0xb0
[   15.420672]  print_report+0xd1/0x610
[   15.420696]  ? __virt_addr_valid+0x1db/0x2d0
[   15.420722]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.420745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.420769]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.420791]  kasan_report+0x141/0x180
[   15.420815]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.420844]  kasan_check_range+0x10c/0x1c0
[   15.420869]  __kasan_check_write+0x18/0x20
[   15.420890]  kasan_atomics_helper+0x7c7/0x5450
[   15.420914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.420938]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.420964]  ? kasan_atomics+0x152/0x310
[   15.420993]  kasan_atomics+0x1dc/0x310
[   15.421024]  ? __pfx_kasan_atomics+0x10/0x10
[   15.421051]  ? __pfx_read_tsc+0x10/0x10
[   15.421074]  ? ktime_get_ts64+0x86/0x230
[   15.421103]  kunit_try_run_case+0x1a5/0x480
[   15.421130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.421181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.421206]  ? __kthread_parkme+0x82/0x180
[   15.421228]  ? preempt_count_sub+0x50/0x80
[   15.421254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.421306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.421331]  kthread+0x337/0x6f0
[   15.421352]  ? trace_preempt_on+0x20/0xc0
[   15.421377]  ? __pfx_kthread+0x10/0x10
[   15.421408]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.421445]  ? calculate_sigpending+0x7b/0xa0
[   15.421471]  ? __pfx_kthread+0x10/0x10
[   15.421494]  ret_from_fork+0x116/0x1d0
[   15.421514]  ? __pfx_kthread+0x10/0x10
[   15.421536]  ret_from_fork_asm+0x1a/0x30
[   15.421570]  </TASK>
[   15.421583] 
[   15.433789] Allocated by task 283:
[   15.434102]  kasan_save_stack+0x45/0x70
[   15.434307]  kasan_save_track+0x18/0x40
[   15.434512]  kasan_save_alloc_info+0x3b/0x50
[   15.434840]  __kasan_kmalloc+0xb7/0xc0
[   15.435123]  __kmalloc_cache_noprof+0x189/0x420
[   15.435302]  kasan_atomics+0x95/0x310
[   15.435517]  kunit_try_run_case+0x1a5/0x480
[   15.435678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.435994]  kthread+0x337/0x6f0
[   15.436222]  ret_from_fork+0x116/0x1d0
[   15.436509]  ret_from_fork_asm+0x1a/0x30
[   15.436739] 
[   15.436841] The buggy address belongs to the object at ffff88810394df80
[   15.436841]  which belongs to the cache kmalloc-64 of size 64
[   15.437496] The buggy address is located 0 bytes to the right of
[   15.437496]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.438332] 
[   15.438431] The buggy address belongs to the physical page:
[   15.438745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.439099] flags: 0x200000000000000(node=0|zone=2)
[   15.439345] page_type: f5(slab)
[   15.439542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.439896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.440278] page dumped because: kasan: bad access detected
[   15.440527] 
[   15.440650] Memory state around the buggy address:
[   15.440895]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441238]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441554] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.441942]                                      ^
[   15.442240]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.442656]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.442976] ==================================================================
[   15.673354] ==================================================================
[   15.673831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.674473] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.674928] 
[   15.675228] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.675280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.675294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.675318] Call Trace:
[   15.675337]  <TASK>
[   15.675355]  dump_stack_lvl+0x73/0xb0
[   15.675387]  print_report+0xd1/0x610
[   15.675420]  ? __virt_addr_valid+0x1db/0x2d0
[   15.675444]  ? kasan_atomics_helper+0xe78/0x5450
[   15.675467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.675490]  ? kasan_atomics_helper+0xe78/0x5450
[   15.675514]  kasan_report+0x141/0x180
[   15.675536]  ? kasan_atomics_helper+0xe78/0x5450
[   15.675564]  kasan_check_range+0x10c/0x1c0
[   15.675613]  __kasan_check_write+0x18/0x20
[   15.675634]  kasan_atomics_helper+0xe78/0x5450
[   15.675657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.675681]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.675708]  ? kasan_atomics+0x152/0x310
[   15.675737]  kasan_atomics+0x1dc/0x310
[   15.675761]  ? __pfx_kasan_atomics+0x10/0x10
[   15.675786]  ? __pfx_read_tsc+0x10/0x10
[   15.675809]  ? ktime_get_ts64+0x86/0x230
[   15.675838]  kunit_try_run_case+0x1a5/0x480
[   15.675865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.675890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.675917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.675944]  ? __kthread_parkme+0x82/0x180
[   15.675966]  ? preempt_count_sub+0x50/0x80
[   15.675992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.676018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.676044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.676069]  kthread+0x337/0x6f0
[   15.676090]  ? trace_preempt_on+0x20/0xc0
[   15.676117]  ? __pfx_kthread+0x10/0x10
[   15.676140]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.676163]  ? calculate_sigpending+0x7b/0xa0
[   15.676190]  ? __pfx_kthread+0x10/0x10
[   15.676213]  ret_from_fork+0x116/0x1d0
[   15.676233]  ? __pfx_kthread+0x10/0x10
[   15.676256]  ret_from_fork_asm+0x1a/0x30
[   15.676290]  </TASK>
[   15.676302] 
[   15.687485] Allocated by task 283:
[   15.687848]  kasan_save_stack+0x45/0x70
[   15.688031]  kasan_save_track+0x18/0x40
[   15.688232]  kasan_save_alloc_info+0x3b/0x50
[   15.688457]  __kasan_kmalloc+0xb7/0xc0
[   15.688919]  __kmalloc_cache_noprof+0x189/0x420
[   15.689115]  kasan_atomics+0x95/0x310
[   15.689540]  kunit_try_run_case+0x1a5/0x480
[   15.689775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.690185]  kthread+0x337/0x6f0
[   15.690449]  ret_from_fork+0x116/0x1d0
[   15.690757]  ret_from_fork_asm+0x1a/0x30
[   15.690936] 
[   15.691215] The buggy address belongs to the object at ffff88810394df80
[   15.691215]  which belongs to the cache kmalloc-64 of size 64
[   15.691844] The buggy address is located 0 bytes to the right of
[   15.691844]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.692477] 
[   15.692616] The buggy address belongs to the physical page:
[   15.692862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.693212] flags: 0x200000000000000(node=0|zone=2)
[   15.693655] page_type: f5(slab)
[   15.693837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.694246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.694681] page dumped because: kasan: bad access detected
[   15.694996] 
[   15.695075] Memory state around the buggy address:
[   15.695297]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.695777]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.696081] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.696378]                                      ^
[   15.696780]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.697156]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.697426] ==================================================================
[   16.021470] ==================================================================
[   16.022347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.023295] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.024110] 
[   16.024290] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.024338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.024351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.024374] Call Trace:
[   16.024404]  <TASK>
[   16.024423]  dump_stack_lvl+0x73/0xb0
[   16.024455]  print_report+0xd1/0x610
[   16.024478]  ? __virt_addr_valid+0x1db/0x2d0
[   16.024502]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.024525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.024549]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.024573]  kasan_report+0x141/0x180
[   16.024605]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.024635]  kasan_check_range+0x10c/0x1c0
[   16.024660]  __kasan_check_write+0x18/0x20
[   16.024684]  kasan_atomics_helper+0x15b6/0x5450
[   16.024730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.024755]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.024796]  ? kasan_atomics+0x152/0x310
[   16.024840]  kasan_atomics+0x1dc/0x310
[   16.024877]  ? __pfx_kasan_atomics+0x10/0x10
[   16.024904]  ? __pfx_read_tsc+0x10/0x10
[   16.024927]  ? ktime_get_ts64+0x86/0x230
[   16.024968]  kunit_try_run_case+0x1a5/0x480
[   16.025008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.025033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.025073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.025113]  ? __kthread_parkme+0x82/0x180
[   16.025136]  ? preempt_count_sub+0x50/0x80
[   16.025162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.025189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.025214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.025240]  kthread+0x337/0x6f0
[   16.025261]  ? trace_preempt_on+0x20/0xc0
[   16.025286]  ? __pfx_kthread+0x10/0x10
[   16.025309]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.025332]  ? calculate_sigpending+0x7b/0xa0
[   16.025358]  ? __pfx_kthread+0x10/0x10
[   16.025382]  ret_from_fork+0x116/0x1d0
[   16.025413]  ? __pfx_kthread+0x10/0x10
[   16.025436]  ret_from_fork_asm+0x1a/0x30
[   16.025470]  </TASK>
[   16.025481] 
[   16.040016] Allocated by task 283:
[   16.040152]  kasan_save_stack+0x45/0x70
[   16.040300]  kasan_save_track+0x18/0x40
[   16.040446]  kasan_save_alloc_info+0x3b/0x50
[   16.040597]  __kasan_kmalloc+0xb7/0xc0
[   16.040814]  __kmalloc_cache_noprof+0x189/0x420
[   16.040972]  kasan_atomics+0x95/0x310
[   16.041165]  kunit_try_run_case+0x1a5/0x480
[   16.041381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.041623]  kthread+0x337/0x6f0
[   16.041842]  ret_from_fork+0x116/0x1d0
[   16.042011]  ret_from_fork_asm+0x1a/0x30
[   16.042213] 
[   16.042309] The buggy address belongs to the object at ffff88810394df80
[   16.042309]  which belongs to the cache kmalloc-64 of size 64
[   16.042794] The buggy address is located 0 bytes to the right of
[   16.042794]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.043193] 
[   16.043289] The buggy address belongs to the physical page:
[   16.043576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.043944] flags: 0x200000000000000(node=0|zone=2)
[   16.044185] page_type: f5(slab)
[   16.044358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.044752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.044978] page dumped because: kasan: bad access detected
[   16.045234] 
[   16.045332] Memory state around the buggy address:
[   16.045606]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.045943]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.046207] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.046537]                                      ^
[   16.046805]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.047122]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.047362] ==================================================================
[   16.465413] ==================================================================
[   16.465797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.466146] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.466372] 
[   16.466471] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.466516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.466529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.466551] Call Trace:
[   16.466566]  <TASK>
[   16.466581]  dump_stack_lvl+0x73/0xb0
[   16.466610]  print_report+0xd1/0x610
[   16.466634]  ? __virt_addr_valid+0x1db/0x2d0
[   16.466659]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.466682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.466707]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.466731]  kasan_report+0x141/0x180
[   16.466755]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.466784]  __asan_report_load8_noabort+0x18/0x20
[   16.466810]  kasan_atomics_helper+0x4fb2/0x5450
[   16.466834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.466858]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.466884]  ? kasan_atomics+0x152/0x310
[   16.466913]  kasan_atomics+0x1dc/0x310
[   16.466937]  ? __pfx_kasan_atomics+0x10/0x10
[   16.466962]  ? __pfx_read_tsc+0x10/0x10
[   16.466985]  ? ktime_get_ts64+0x86/0x230
[   16.467011]  kunit_try_run_case+0x1a5/0x480
[   16.467039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.467089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.467114]  ? __kthread_parkme+0x82/0x180
[   16.467137]  ? preempt_count_sub+0x50/0x80
[   16.467163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.467214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.467241]  kthread+0x337/0x6f0
[   16.467261]  ? trace_preempt_on+0x20/0xc0
[   16.467286]  ? __pfx_kthread+0x10/0x10
[   16.467308]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.467332]  ? calculate_sigpending+0x7b/0xa0
[   16.467357]  ? __pfx_kthread+0x10/0x10
[   16.467380]  ret_from_fork+0x116/0x1d0
[   16.467410]  ? __pfx_kthread+0x10/0x10
[   16.467433]  ret_from_fork_asm+0x1a/0x30
[   16.467468]  </TASK>
[   16.467480] 
[   16.474953] Allocated by task 283:
[   16.475131]  kasan_save_stack+0x45/0x70
[   16.475330]  kasan_save_track+0x18/0x40
[   16.475534]  kasan_save_alloc_info+0x3b/0x50
[   16.475957]  __kasan_kmalloc+0xb7/0xc0
[   16.476146]  __kmalloc_cache_noprof+0x189/0x420
[   16.476311]  kasan_atomics+0x95/0x310
[   16.476483]  kunit_try_run_case+0x1a5/0x480
[   16.476816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.477049]  kthread+0x337/0x6f0
[   16.477174]  ret_from_fork+0x116/0x1d0
[   16.477312]  ret_from_fork_asm+0x1a/0x30
[   16.477466] 
[   16.477540] The buggy address belongs to the object at ffff88810394df80
[   16.477540]  which belongs to the cache kmalloc-64 of size 64
[   16.478150] The buggy address is located 0 bytes to the right of
[   16.478150]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.478711] 
[   16.478811] The buggy address belongs to the physical page:
[   16.479070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.479486] flags: 0x200000000000000(node=0|zone=2)
[   16.479655] page_type: f5(slab)
[   16.479776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.480011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.480238] page dumped because: kasan: bad access detected
[   16.480422] 
[   16.480495] Memory state around the buggy address:
[   16.480650]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.480878]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.481095] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.481375]                                      ^
[   16.481620]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.481937]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.482263] ==================================================================
[   16.113168] ==================================================================
[   16.113712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.113962] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   16.114316] 
[   16.114446] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.114490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.114504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.114527] Call Trace:
[   16.114546]  <TASK>
[   16.114565]  dump_stack_lvl+0x73/0xb0
[   16.114595]  print_report+0xd1/0x610
[   16.114618]  ? __virt_addr_valid+0x1db/0x2d0
[   16.114643]  ? kasan_atomics_helper+0x1818/0x5450
[   16.114665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.114689]  ? kasan_atomics_helper+0x1818/0x5450
[   16.114713]  kasan_report+0x141/0x180
[   16.114736]  ? kasan_atomics_helper+0x1818/0x5450
[   16.114764]  kasan_check_range+0x10c/0x1c0
[   16.114790]  __kasan_check_write+0x18/0x20
[   16.114811]  kasan_atomics_helper+0x1818/0x5450
[   16.114836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.114860]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.114886]  ? kasan_atomics+0x152/0x310
[   16.114915]  kasan_atomics+0x1dc/0x310
[   16.114939]  ? __pfx_kasan_atomics+0x10/0x10
[   16.114965]  ? __pfx_read_tsc+0x10/0x10
[   16.114988]  ? ktime_get_ts64+0x86/0x230
[   16.115014]  kunit_try_run_case+0x1a5/0x480
[   16.115041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.115065]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.115091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.115116]  ? __kthread_parkme+0x82/0x180
[   16.115139]  ? preempt_count_sub+0x50/0x80
[   16.115164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.115191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.115216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.115242]  kthread+0x337/0x6f0
[   16.115262]  ? trace_preempt_on+0x20/0xc0
[   16.115287]  ? __pfx_kthread+0x10/0x10
[   16.115310]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.115332]  ? calculate_sigpending+0x7b/0xa0
[   16.115358]  ? __pfx_kthread+0x10/0x10
[   16.115381]  ret_from_fork+0x116/0x1d0
[   16.115413]  ? __pfx_kthread+0x10/0x10
[   16.115435]  ret_from_fork_asm+0x1a/0x30
[   16.115469]  </TASK>
[   16.115481] 
[   16.122937] Allocated by task 283:
[   16.123069]  kasan_save_stack+0x45/0x70
[   16.123222]  kasan_save_track+0x18/0x40
[   16.123449]  kasan_save_alloc_info+0x3b/0x50
[   16.123662]  __kasan_kmalloc+0xb7/0xc0
[   16.123986]  __kmalloc_cache_noprof+0x189/0x420
[   16.124208]  kasan_atomics+0x95/0x310
[   16.124405]  kunit_try_run_case+0x1a5/0x480
[   16.124612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.124866]  kthread+0x337/0x6f0
[   16.124991]  ret_from_fork+0x116/0x1d0
[   16.125126]  ret_from_fork_asm+0x1a/0x30
[   16.125269] 
[   16.125374] The buggy address belongs to the object at ffff88810394df80
[   16.125374]  which belongs to the cache kmalloc-64 of size 64
[   16.126353] The buggy address is located 0 bytes to the right of
[   16.126353]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   16.126866] 
[   16.126972] The buggy address belongs to the physical page:
[   16.127200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   16.127474] flags: 0x200000000000000(node=0|zone=2)
[   16.127642] page_type: f5(slab)
[   16.127764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.127999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.128261] page dumped because: kasan: bad access detected
[   16.128522] 
[   16.128618] Memory state around the buggy address:
[   16.128853]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.129169]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.129494] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.130017]                                      ^
[   16.130177]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.130406]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.130732] ==================================================================
[   15.600899] ==================================================================
[   15.601789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.602064] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.602410] 
[   15.602522] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.602566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.602579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.602602] Call Trace:
[   15.602619]  <TASK>
[   15.602635]  dump_stack_lvl+0x73/0xb0
[   15.602665]  print_report+0xd1/0x610
[   15.602688]  ? __virt_addr_valid+0x1db/0x2d0
[   15.602712]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.602736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.602759]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.602782]  kasan_report+0x141/0x180
[   15.602806]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.602835]  __asan_report_load4_noabort+0x18/0x20
[   15.602860]  kasan_atomics_helper+0x4a84/0x5450
[   15.602885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.602909]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.602935]  ? kasan_atomics+0x152/0x310
[   15.602964]  kasan_atomics+0x1dc/0x310
[   15.602988]  ? __pfx_kasan_atomics+0x10/0x10
[   15.603013]  ? __pfx_read_tsc+0x10/0x10
[   15.603036]  ? ktime_get_ts64+0x86/0x230
[   15.603063]  kunit_try_run_case+0x1a5/0x480
[   15.603089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.603116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.603141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.603168]  ? __kthread_parkme+0x82/0x180
[   15.603190]  ? preempt_count_sub+0x50/0x80
[   15.603215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.603242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.603279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.603305]  kthread+0x337/0x6f0
[   15.603326]  ? trace_preempt_on+0x20/0xc0
[   15.603363]  ? __pfx_kthread+0x10/0x10
[   15.603385]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.603417]  ? calculate_sigpending+0x7b/0xa0
[   15.603442]  ? __pfx_kthread+0x10/0x10
[   15.603466]  ret_from_fork+0x116/0x1d0
[   15.603486]  ? __pfx_kthread+0x10/0x10
[   15.603508]  ret_from_fork_asm+0x1a/0x30
[   15.603541]  </TASK>
[   15.603553] 
[   15.611132] Allocated by task 283:
[   15.611313]  kasan_save_stack+0x45/0x70
[   15.611525]  kasan_save_track+0x18/0x40
[   15.611740]  kasan_save_alloc_info+0x3b/0x50
[   15.611945]  __kasan_kmalloc+0xb7/0xc0
[   15.612154]  __kmalloc_cache_noprof+0x189/0x420
[   15.612313]  kasan_atomics+0x95/0x310
[   15.612459]  kunit_try_run_case+0x1a5/0x480
[   15.612609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.612843]  kthread+0x337/0x6f0
[   15.613017]  ret_from_fork+0x116/0x1d0
[   15.613234]  ret_from_fork_asm+0x1a/0x30
[   15.613468] 
[   15.613583] The buggy address belongs to the object at ffff88810394df80
[   15.613583]  which belongs to the cache kmalloc-64 of size 64
[   15.614254] The buggy address is located 0 bytes to the right of
[   15.614254]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.614873] 
[   15.614996] The buggy address belongs to the physical page:
[   15.615195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.615522] flags: 0x200000000000000(node=0|zone=2)
[   15.615929] page_type: f5(slab)
[   15.616094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.616433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.616783] page dumped because: kasan: bad access detected
[   15.617026] 
[   15.617120] Memory state around the buggy address:
[   15.617341]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.617714]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.618006] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.618291]                                      ^
[   15.618539]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.618839]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.619055] ==================================================================
[   15.514188] ==================================================================
[   15.514567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.514917] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.515328] 
[   15.515466] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.515526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.515540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.515563] Call Trace:
[   15.515577]  <TASK>
[   15.515595]  dump_stack_lvl+0x73/0xb0
[   15.515625]  print_report+0xd1/0x610
[   15.515662]  ? __virt_addr_valid+0x1db/0x2d0
[   15.515686]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.515708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.515731]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.515755]  kasan_report+0x141/0x180
[   15.515778]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.515806]  kasan_check_range+0x10c/0x1c0
[   15.515830]  __kasan_check_write+0x18/0x20
[   15.515850]  kasan_atomics_helper+0xa2b/0x5450
[   15.515874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.515898]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.515925]  ? kasan_atomics+0x152/0x310
[   15.515985]  kasan_atomics+0x1dc/0x310
[   15.516010]  ? __pfx_kasan_atomics+0x10/0x10
[   15.516061]  ? __pfx_read_tsc+0x10/0x10
[   15.516085]  ? ktime_get_ts64+0x86/0x230
[   15.516113]  kunit_try_run_case+0x1a5/0x480
[   15.516151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.516176]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.516201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.516226]  ? __kthread_parkme+0x82/0x180
[   15.516248]  ? preempt_count_sub+0x50/0x80
[   15.516275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.516300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.516325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.516378]  kthread+0x337/0x6f0
[   15.516415]  ? trace_preempt_on+0x20/0xc0
[   15.516467]  ? __pfx_kthread+0x10/0x10
[   15.516490]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.516514]  ? calculate_sigpending+0x7b/0xa0
[   15.516550]  ? __pfx_kthread+0x10/0x10
[   15.516573]  ret_from_fork+0x116/0x1d0
[   15.516603]  ? __pfx_kthread+0x10/0x10
[   15.516625]  ret_from_fork_asm+0x1a/0x30
[   15.516659]  </TASK>
[   15.516675] 
[   15.524843] Allocated by task 283:
[   15.525056]  kasan_save_stack+0x45/0x70
[   15.525240]  kasan_save_track+0x18/0x40
[   15.525380]  kasan_save_alloc_info+0x3b/0x50
[   15.525628]  __kasan_kmalloc+0xb7/0xc0
[   15.525847]  __kmalloc_cache_noprof+0x189/0x420
[   15.526036]  kasan_atomics+0x95/0x310
[   15.526175]  kunit_try_run_case+0x1a5/0x480
[   15.526431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526718]  kthread+0x337/0x6f0
[   15.526872]  ret_from_fork+0x116/0x1d0
[   15.527057]  ret_from_fork_asm+0x1a/0x30
[   15.527240] 
[   15.527330] The buggy address belongs to the object at ffff88810394df80
[   15.527330]  which belongs to the cache kmalloc-64 of size 64
[   15.527863] The buggy address is located 0 bytes to the right of
[   15.527863]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.528413] 
[   15.528528] The buggy address belongs to the physical page:
[   15.528813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.529151] flags: 0x200000000000000(node=0|zone=2)
[   15.529442] page_type: f5(slab)
[   15.529727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.529991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.530315] page dumped because: kasan: bad access detected
[   15.530550] 
[   15.530715] Memory state around the buggy address:
[   15.530946]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.531171]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.531489] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.531819]                                      ^
[   15.532045]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.532283]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532510] ==================================================================
[   15.117011] ==================================================================
[   15.117981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.118529] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.119129] 
[   15.119410] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.119463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.119477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.119498] Call Trace:
[   15.119512]  <TASK>
[   15.119530]  dump_stack_lvl+0x73/0xb0
[   15.119562]  print_report+0xd1/0x610
[   15.119586]  ? __virt_addr_valid+0x1db/0x2d0
[   15.119610]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.119632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.119654]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.119676]  kasan_report+0x141/0x180
[   15.119698]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.119726]  __asan_report_load4_noabort+0x18/0x20
[   15.119749]  kasan_atomics_helper+0x4bbc/0x5450
[   15.119772]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.119795]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.119820]  ? kasan_atomics+0x152/0x310
[   15.119847]  kasan_atomics+0x1dc/0x310
[   15.119871]  ? __pfx_kasan_atomics+0x10/0x10
[   15.119894]  ? __pfx_read_tsc+0x10/0x10
[   15.119915]  ? ktime_get_ts64+0x86/0x230
[   15.119941]  kunit_try_run_case+0x1a5/0x480
[   15.119968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.119992]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.120016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.120040]  ? __kthread_parkme+0x82/0x180
[   15.120061]  ? preempt_count_sub+0x50/0x80
[   15.120086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.120111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.120137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.120162]  kthread+0x337/0x6f0
[   15.120206]  ? trace_preempt_on+0x20/0xc0
[   15.120230]  ? __pfx_kthread+0x10/0x10
[   15.120252]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.120273]  ? calculate_sigpending+0x7b/0xa0
[   15.120298]  ? __pfx_kthread+0x10/0x10
[   15.120320]  ret_from_fork+0x116/0x1d0
[   15.120339]  ? __pfx_kthread+0x10/0x10
[   15.120360]  ret_from_fork_asm+0x1a/0x30
[   15.120403]  </TASK>
[   15.120415] 
[   15.129205] Allocated by task 283:
[   15.129340]  kasan_save_stack+0x45/0x70
[   15.129496]  kasan_save_track+0x18/0x40
[   15.129749]  kasan_save_alloc_info+0x3b/0x50
[   15.129960]  __kasan_kmalloc+0xb7/0xc0
[   15.130284]  __kmalloc_cache_noprof+0x189/0x420
[   15.130526]  kasan_atomics+0x95/0x310
[   15.130673]  kunit_try_run_case+0x1a5/0x480
[   15.130823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.131154]  kthread+0x337/0x6f0
[   15.131325]  ret_from_fork+0x116/0x1d0
[   15.131524]  ret_from_fork_asm+0x1a/0x30
[   15.131803] 
[   15.131915] The buggy address belongs to the object at ffff88810394df80
[   15.131915]  which belongs to the cache kmalloc-64 of size 64
[   15.132600] The buggy address is located 0 bytes to the right of
[   15.132600]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.133139] 
[   15.133243] The buggy address belongs to the physical page:
[   15.133722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.134003] flags: 0x200000000000000(node=0|zone=2)
[   15.134251] page_type: f5(slab)
[   15.134415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.134657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.135085] page dumped because: kasan: bad access detected
[   15.135355] 
[   15.135475] Memory state around the buggy address:
[   15.135830]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.136060]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.136572] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.136876]                                      ^
[   15.137137]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.137519]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.137839] ==================================================================
[   15.443569] ==================================================================
[   15.443905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.444339] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283
[   15.444750] 
[   15.444906] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.444951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.444964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.444987] Call Trace:
[   15.445004]  <TASK>
[   15.445022]  dump_stack_lvl+0x73/0xb0
[   15.445088]  print_report+0xd1/0x610
[   15.445113]  ? __virt_addr_valid+0x1db/0x2d0
[   15.445137]  ? kasan_atomics_helper+0x860/0x5450
[   15.445159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.445183]  ? kasan_atomics_helper+0x860/0x5450
[   15.445234]  kasan_report+0x141/0x180
[   15.445259]  ? kasan_atomics_helper+0x860/0x5450
[   15.445287]  kasan_check_range+0x10c/0x1c0
[   15.445312]  __kasan_check_write+0x18/0x20
[   15.445333]  kasan_atomics_helper+0x860/0x5450
[   15.445357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.445380]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.445421]  ? kasan_atomics+0x152/0x310
[   15.445481]  kasan_atomics+0x1dc/0x310
[   15.445507]  ? __pfx_kasan_atomics+0x10/0x10
[   15.445532]  ? __pfx_read_tsc+0x10/0x10
[   15.445555]  ? ktime_get_ts64+0x86/0x230
[   15.445582]  kunit_try_run_case+0x1a5/0x480
[   15.445610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.445676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.445702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.445727]  ? __kthread_parkme+0x82/0x180
[   15.445749]  ? preempt_count_sub+0x50/0x80
[   15.445805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.445832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.445883]  kthread+0x337/0x6f0
[   15.445904]  ? trace_preempt_on+0x20/0xc0
[   15.445956]  ? __pfx_kthread+0x10/0x10
[   15.445980]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.446003]  ? calculate_sigpending+0x7b/0xa0
[   15.446029]  ? __pfx_kthread+0x10/0x10
[   15.446052]  ret_from_fork+0x116/0x1d0
[   15.446072]  ? __pfx_kthread+0x10/0x10
[   15.446094]  ret_from_fork_asm+0x1a/0x30
[   15.446176]  </TASK>
[   15.446188] 
[   15.454872] Allocated by task 283:
[   15.455002]  kasan_save_stack+0x45/0x70
[   15.455146]  kasan_save_track+0x18/0x40
[   15.455543]  kasan_save_alloc_info+0x3b/0x50
[   15.455760]  __kasan_kmalloc+0xb7/0xc0
[   15.456004]  __kmalloc_cache_noprof+0x189/0x420
[   15.456232]  kasan_atomics+0x95/0x310
[   15.456377]  kunit_try_run_case+0x1a5/0x480
[   15.456598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.456868]  kthread+0x337/0x6f0
[   15.456991]  ret_from_fork+0x116/0x1d0
[   15.457123]  ret_from_fork_asm+0x1a/0x30
[   15.457421] 
[   15.457576] The buggy address belongs to the object at ffff88810394df80
[   15.457576]  which belongs to the cache kmalloc-64 of size 64
[   15.458224] The buggy address is located 0 bytes to the right of
[   15.458224]  allocated 48-byte region [ffff88810394df80, ffff88810394dfb0)
[   15.458878] 
[   15.458980] The buggy address belongs to the physical page:
[   15.459286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d
[   15.459674] flags: 0x200000000000000(node=0|zone=2)
[   15.459840] page_type: f5(slab)
[   15.460014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.460508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.460904] page dumped because: kasan: bad access detected
[   15.461157] 
[   15.461282] Memory state around the buggy address:
[   15.461464]  ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.461813]  ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.462190] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.462689]                                      ^
[   15.462947]  ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.463388]  ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.463734] ==================================================================

[   16.016244] ==================================================================
[   16.016994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   16.017343] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.017670] 
[   16.017779] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.017823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.017837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.017860] Call Trace:
[   16.017876]  <TASK>
[   16.017891]  dump_stack_lvl+0x73/0xb0
[   16.017918]  print_report+0xd1/0x610
[   16.017941]  ? __virt_addr_valid+0x1db/0x2d0
[   16.017964]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.017987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.018010]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.018033]  kasan_report+0x141/0x180
[   16.018056]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.018083]  kasan_check_range+0x10c/0x1c0
[   16.018108]  __kasan_check_read+0x15/0x20
[   16.018128]  kasan_atomics_helper+0x13b5/0x5450
[   16.018162]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.018185]  ? kasan_save_alloc_info+0x3b/0x50
[   16.018209]  ? kasan_save_stack+0x45/0x70
[   16.018233]  kasan_atomics+0x1dc/0x310
[   16.018257]  ? __pfx_kasan_atomics+0x10/0x10
[   16.018281]  ? __pfx_read_tsc+0x10/0x10
[   16.018303]  ? ktime_get_ts64+0x86/0x230
[   16.018327]  kunit_try_run_case+0x1a5/0x480
[   16.018352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.018375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.018400]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.018424]  ? __kthread_parkme+0x82/0x180
[   16.018445]  ? preempt_count_sub+0x50/0x80
[   16.018469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.018494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.018518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.018543]  kthread+0x337/0x6f0
[   16.018572]  ? trace_preempt_on+0x20/0xc0
[   16.018595]  ? __pfx_kthread+0x10/0x10
[   16.018617]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.018639]  ? calculate_sigpending+0x7b/0xa0
[   16.018664]  ? __pfx_kthread+0x10/0x10
[   16.018686]  ret_from_fork+0x116/0x1d0
[   16.018705]  ? __pfx_kthread+0x10/0x10
[   16.018726]  ret_from_fork_asm+0x1a/0x30
[   16.018758]  </TASK>
[   16.018769] 
[   16.025978] Allocated by task 283:
[   16.026137]  kasan_save_stack+0x45/0x70
[   16.026389]  kasan_save_track+0x18/0x40
[   16.026587]  kasan_save_alloc_info+0x3b/0x50
[   16.026805]  __kasan_kmalloc+0xb7/0xc0
[   16.026996]  __kmalloc_cache_noprof+0x189/0x420
[   16.027235]  kasan_atomics+0x95/0x310
[   16.027561]  kunit_try_run_case+0x1a5/0x480
[   16.027774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.028002]  kthread+0x337/0x6f0
[   16.028161]  ret_from_fork+0x116/0x1d0
[   16.028375]  ret_from_fork_asm+0x1a/0x30
[   16.028560] 
[   16.028649] The buggy address belongs to the object at ffff8881027c5180
[   16.028649]  which belongs to the cache kmalloc-64 of size 64
[   16.029100] The buggy address is located 0 bytes to the right of
[   16.029100]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.029657] 
[   16.029750] The buggy address belongs to the physical page:
[   16.029983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.030307] flags: 0x200000000000000(node=0|zone=2)
[   16.030524] page_type: f5(slab)
[   16.030694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.030978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.031301] page dumped because: kasan: bad access detected
[   16.031523] 
[   16.031620] Memory state around the buggy address:
[   16.031816]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.032099]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.032470] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.032761]                                      ^
[   16.032969]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.033243]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.033613] ==================================================================
[   15.435336] ==================================================================
[   15.435810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.436450] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.436842] 
[   15.437057] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.437105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.437121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.437156] Call Trace:
[   15.437173]  <TASK>
[   15.437189]  dump_stack_lvl+0x73/0xb0
[   15.437218]  print_report+0xd1/0x610
[   15.437360]  ? __virt_addr_valid+0x1db/0x2d0
[   15.437392]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.437414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.437437]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.437459]  kasan_report+0x141/0x180
[   15.437482]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.437509]  kasan_check_range+0x10c/0x1c0
[   15.437533]  __kasan_check_write+0x18/0x20
[   15.437564]  kasan_atomics_helper+0x5fe/0x5450
[   15.437587]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.437706]  ? kasan_save_alloc_info+0x3b/0x50
[   15.437731]  ? kasan_save_stack+0x45/0x70
[   15.437755]  kasan_atomics+0x1dc/0x310
[   15.437779]  ? __pfx_kasan_atomics+0x10/0x10
[   15.437803]  ? __pfx_read_tsc+0x10/0x10
[   15.437824]  ? ktime_get_ts64+0x86/0x230
[   15.437849]  kunit_try_run_case+0x1a5/0x480
[   15.437877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.437901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.437925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.437949]  ? __kthread_parkme+0x82/0x180
[   15.437970]  ? preempt_count_sub+0x50/0x80
[   15.437994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.438019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.438043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.438068]  kthread+0x337/0x6f0
[   15.438087]  ? trace_preempt_on+0x20/0xc0
[   15.438111]  ? __pfx_kthread+0x10/0x10
[   15.438133]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.438166]  ? calculate_sigpending+0x7b/0xa0
[   15.438191]  ? __pfx_kthread+0x10/0x10
[   15.438213]  ret_from_fork+0x116/0x1d0
[   15.438233]  ? __pfx_kthread+0x10/0x10
[   15.438254]  ret_from_fork_asm+0x1a/0x30
[   15.438285]  </TASK>
[   15.438296] 
[   15.448482] Allocated by task 283:
[   15.448773]  kasan_save_stack+0x45/0x70
[   15.449088]  kasan_save_track+0x18/0x40
[   15.449272]  kasan_save_alloc_info+0x3b/0x50
[   15.449726]  __kasan_kmalloc+0xb7/0xc0
[   15.449994]  __kmalloc_cache_noprof+0x189/0x420
[   15.450172]  kasan_atomics+0x95/0x310
[   15.450373]  kunit_try_run_case+0x1a5/0x480
[   15.450663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.450862]  kthread+0x337/0x6f0
[   15.451282]  ret_from_fork+0x116/0x1d0
[   15.451538]  ret_from_fork_asm+0x1a/0x30
[   15.451775] 
[   15.451911] The buggy address belongs to the object at ffff8881027c5180
[   15.451911]  which belongs to the cache kmalloc-64 of size 64
[   15.452578] The buggy address is located 0 bytes to the right of
[   15.452578]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.453209] 
[   15.453315] The buggy address belongs to the physical page:
[   15.453547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.454004] flags: 0x200000000000000(node=0|zone=2)
[   15.454364] page_type: f5(slab)
[   15.454510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.454979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.455438] page dumped because: kasan: bad access detected
[   15.455760] 
[   15.455832] Memory state around the buggy address:
[   15.456227]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.456778]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.457205] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.457510]                                      ^
[   15.457857]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.458231]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.458696] ==================================================================
[   15.550763] ==================================================================
[   15.551454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.552138] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.552504] 
[   15.552618] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.552663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.552677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.552700] Call Trace:
[   15.552720]  <TASK>
[   15.552756]  dump_stack_lvl+0x73/0xb0
[   15.552787]  print_report+0xd1/0x610
[   15.552825]  ? __virt_addr_valid+0x1db/0x2d0
[   15.552849]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.552871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.552895]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.552917]  kasan_report+0x141/0x180
[   15.552940]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.552967]  kasan_check_range+0x10c/0x1c0
[   15.552992]  __kasan_check_write+0x18/0x20
[   15.553012]  kasan_atomics_helper+0x8f9/0x5450
[   15.553035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.553120]  ? kasan_save_alloc_info+0x3b/0x50
[   15.553178]  ? kasan_save_stack+0x45/0x70
[   15.553204]  kasan_atomics+0x1dc/0x310
[   15.553227]  ? __pfx_kasan_atomics+0x10/0x10
[   15.553252]  ? __pfx_read_tsc+0x10/0x10
[   15.553276]  ? ktime_get_ts64+0x86/0x230
[   15.553301]  kunit_try_run_case+0x1a5/0x480
[   15.553326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.553350]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.553376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.553399]  ? __kthread_parkme+0x82/0x180
[   15.553421]  ? preempt_count_sub+0x50/0x80
[   15.553464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.553489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.553513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.553538]  kthread+0x337/0x6f0
[   15.553558]  ? trace_preempt_on+0x20/0xc0
[   15.553583]  ? __pfx_kthread+0x10/0x10
[   15.553604]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.553626]  ? calculate_sigpending+0x7b/0xa0
[   15.553668]  ? __pfx_kthread+0x10/0x10
[   15.553690]  ret_from_fork+0x116/0x1d0
[   15.553710]  ? __pfx_kthread+0x10/0x10
[   15.553731]  ret_from_fork_asm+0x1a/0x30
[   15.553780]  </TASK>
[   15.553791] 
[   15.562705] Allocated by task 283:
[   15.562895]  kasan_save_stack+0x45/0x70
[   15.563098]  kasan_save_track+0x18/0x40
[   15.563343]  kasan_save_alloc_info+0x3b/0x50
[   15.563619]  __kasan_kmalloc+0xb7/0xc0
[   15.563834]  __kmalloc_cache_noprof+0x189/0x420
[   15.564347]  kasan_atomics+0x95/0x310
[   15.564710]  kunit_try_run_case+0x1a5/0x480
[   15.564922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.565440]  kthread+0x337/0x6f0
[   15.565618]  ret_from_fork+0x116/0x1d0
[   15.565808]  ret_from_fork_asm+0x1a/0x30
[   15.566242] 
[   15.566366] The buggy address belongs to the object at ffff8881027c5180
[   15.566366]  which belongs to the cache kmalloc-64 of size 64
[   15.566752] The buggy address is located 0 bytes to the right of
[   15.566752]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.567606] 
[   15.567714] The buggy address belongs to the physical page:
[   15.568032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.568417] flags: 0x200000000000000(node=0|zone=2)
[   15.568665] page_type: f5(slab)
[   15.568838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.569366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.569697] page dumped because: kasan: bad access detected
[   15.570029] 
[   15.570107] Memory state around the buggy address:
[   15.570347]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.570645]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.570946] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.571342]                                      ^
[   15.571638]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.572006]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.572232] ==================================================================
[   15.530767] ==================================================================
[   15.531018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.531706] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.532016] 
[   15.532279] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.532331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.532346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.532370] Call Trace:
[   15.532388]  <TASK>
[   15.532404]  dump_stack_lvl+0x73/0xb0
[   15.532436]  print_report+0xd1/0x610
[   15.532459]  ? __virt_addr_valid+0x1db/0x2d0
[   15.532483]  ? kasan_atomics_helper+0x860/0x5450
[   15.532506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.532530]  ? kasan_atomics_helper+0x860/0x5450
[   15.532552]  kasan_report+0x141/0x180
[   15.532575]  ? kasan_atomics_helper+0x860/0x5450
[   15.532602]  kasan_check_range+0x10c/0x1c0
[   15.532627]  __kasan_check_write+0x18/0x20
[   15.532647]  kasan_atomics_helper+0x860/0x5450
[   15.532669]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.532693]  ? kasan_save_alloc_info+0x3b/0x50
[   15.532717]  ? kasan_save_stack+0x45/0x70
[   15.532741]  kasan_atomics+0x1dc/0x310
[   15.532766]  ? __pfx_kasan_atomics+0x10/0x10
[   15.532790]  ? __pfx_read_tsc+0x10/0x10
[   15.532813]  ? ktime_get_ts64+0x86/0x230
[   15.532838]  kunit_try_run_case+0x1a5/0x480
[   15.532915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.532940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.532965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.532989]  ? __kthread_parkme+0x82/0x180
[   15.533010]  ? preempt_count_sub+0x50/0x80
[   15.533035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.533061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.533085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.533110]  kthread+0x337/0x6f0
[   15.533129]  ? trace_preempt_on+0x20/0xc0
[   15.533165]  ? __pfx_kthread+0x10/0x10
[   15.533186]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.533209]  ? calculate_sigpending+0x7b/0xa0
[   15.533234]  ? __pfx_kthread+0x10/0x10
[   15.533255]  ret_from_fork+0x116/0x1d0
[   15.533275]  ? __pfx_kthread+0x10/0x10
[   15.533296]  ret_from_fork_asm+0x1a/0x30
[   15.533329]  </TASK>
[   15.533341] 
[   15.541456] Allocated by task 283:
[   15.541600]  kasan_save_stack+0x45/0x70
[   15.541752]  kasan_save_track+0x18/0x40
[   15.542092]  kasan_save_alloc_info+0x3b/0x50
[   15.542318]  __kasan_kmalloc+0xb7/0xc0
[   15.542600]  __kmalloc_cache_noprof+0x189/0x420
[   15.542836]  kasan_atomics+0x95/0x310
[   15.543079]  kunit_try_run_case+0x1a5/0x480
[   15.543309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.543601]  kthread+0x337/0x6f0
[   15.543746]  ret_from_fork+0x116/0x1d0
[   15.543931]  ret_from_fork_asm+0x1a/0x30
[   15.544126] 
[   15.544293] The buggy address belongs to the object at ffff8881027c5180
[   15.544293]  which belongs to the cache kmalloc-64 of size 64
[   15.544822] The buggy address is located 0 bytes to the right of
[   15.544822]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.545252] 
[   15.545342] The buggy address belongs to the physical page:
[   15.545600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.546151] flags: 0x200000000000000(node=0|zone=2)
[   15.546598] page_type: f5(slab)
[   15.546744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.547312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.547613] page dumped because: kasan: bad access detected
[   15.547805] 
[   15.547989] Memory state around the buggy address:
[   15.548234]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.548607]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.548932] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.549302]                                      ^
[   15.549540]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.549852]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.550376] ==================================================================
[   15.573285] ==================================================================
[   15.573602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.573829] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.574194] 
[   15.574309] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.574425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.574439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.574463] Call Trace:
[   15.574482]  <TASK>
[   15.574500]  dump_stack_lvl+0x73/0xb0
[   15.574530]  print_report+0xd1/0x610
[   15.574573]  ? __virt_addr_valid+0x1db/0x2d0
[   15.574611]  ? kasan_atomics_helper+0x992/0x5450
[   15.574633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.574670]  ? kasan_atomics_helper+0x992/0x5450
[   15.574706]  kasan_report+0x141/0x180
[   15.574742]  ? kasan_atomics_helper+0x992/0x5450
[   15.574785]  kasan_check_range+0x10c/0x1c0
[   15.574810]  __kasan_check_write+0x18/0x20
[   15.574844]  kasan_atomics_helper+0x992/0x5450
[   15.574909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.574933]  ? kasan_save_alloc_info+0x3b/0x50
[   15.574958]  ? kasan_save_stack+0x45/0x70
[   15.574982]  kasan_atomics+0x1dc/0x310
[   15.575006]  ? __pfx_kasan_atomics+0x10/0x10
[   15.575031]  ? __pfx_read_tsc+0x10/0x10
[   15.575053]  ? ktime_get_ts64+0x86/0x230
[   15.575079]  kunit_try_run_case+0x1a5/0x480
[   15.575105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.575128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.575163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.575187]  ? __kthread_parkme+0x82/0x180
[   15.575208]  ? preempt_count_sub+0x50/0x80
[   15.575233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.575258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.575282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.575306]  kthread+0x337/0x6f0
[   15.575327]  ? trace_preempt_on+0x20/0xc0
[   15.575350]  ? __pfx_kthread+0x10/0x10
[   15.575371]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.575416]  ? calculate_sigpending+0x7b/0xa0
[   15.575441]  ? __pfx_kthread+0x10/0x10
[   15.575463]  ret_from_fork+0x116/0x1d0
[   15.575499]  ? __pfx_kthread+0x10/0x10
[   15.575521]  ret_from_fork_asm+0x1a/0x30
[   15.575552]  </TASK>
[   15.575578] 
[   15.584132] Allocated by task 283:
[   15.584356]  kasan_save_stack+0x45/0x70
[   15.584570]  kasan_save_track+0x18/0x40
[   15.584763]  kasan_save_alloc_info+0x3b/0x50
[   15.584980]  __kasan_kmalloc+0xb7/0xc0
[   15.585175]  __kmalloc_cache_noprof+0x189/0x420
[   15.585502]  kasan_atomics+0x95/0x310
[   15.585693]  kunit_try_run_case+0x1a5/0x480
[   15.585961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.586184]  kthread+0x337/0x6f0
[   15.586306]  ret_from_fork+0x116/0x1d0
[   15.586438]  ret_from_fork_asm+0x1a/0x30
[   15.586576] 
[   15.586650] The buggy address belongs to the object at ffff8881027c5180
[   15.586650]  which belongs to the cache kmalloc-64 of size 64
[   15.587121] The buggy address is located 0 bytes to the right of
[   15.587121]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.587674] 
[   15.587907] The buggy address belongs to the physical page:
[   15.588094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.588629] flags: 0x200000000000000(node=0|zone=2)
[   15.588799] page_type: f5(slab)
[   15.589123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.589509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.589785] page dumped because: kasan: bad access detected
[   15.590331] 
[   15.590537] Memory state around the buggy address:
[   15.590747]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.591308]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.591547] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.591763]                                      ^
[   15.592141]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.592614]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.593052] ==================================================================
[   15.817769] ==================================================================
[   15.818383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.818750] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.819062] 
[   15.819164] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.819209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.819224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.819247] Call Trace:
[   15.819264]  <TASK>
[   15.819280]  dump_stack_lvl+0x73/0xb0
[   15.819309]  print_report+0xd1/0x610
[   15.819332]  ? __virt_addr_valid+0x1db/0x2d0
[   15.819355]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.819703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.819739]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.819763]  kasan_report+0x141/0x180
[   15.819786]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.819812]  __asan_report_load4_noabort+0x18/0x20
[   15.819837]  kasan_atomics_helper+0x4a36/0x5450
[   15.819861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.819885]  ? kasan_save_alloc_info+0x3b/0x50
[   15.819909]  ? kasan_save_stack+0x45/0x70
[   15.819933]  kasan_atomics+0x1dc/0x310
[   15.819956]  ? __pfx_kasan_atomics+0x10/0x10
[   15.819993]  ? __pfx_read_tsc+0x10/0x10
[   15.820014]  ? ktime_get_ts64+0x86/0x230
[   15.820038]  kunit_try_run_case+0x1a5/0x480
[   15.820063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.820226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.820251]  ? __kthread_parkme+0x82/0x180
[   15.820273]  ? preempt_count_sub+0x50/0x80
[   15.820297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.820352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.820376]  kthread+0x337/0x6f0
[   15.820409]  ? trace_preempt_on+0x20/0xc0
[   15.820434]  ? __pfx_kthread+0x10/0x10
[   15.820456]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.820479]  ? calculate_sigpending+0x7b/0xa0
[   15.820503]  ? __pfx_kthread+0x10/0x10
[   15.820526]  ret_from_fork+0x116/0x1d0
[   15.820545]  ? __pfx_kthread+0x10/0x10
[   15.820566]  ret_from_fork_asm+0x1a/0x30
[   15.820598]  </TASK>
[   15.820609] 
[   15.831330] Allocated by task 283:
[   15.831805]  kasan_save_stack+0x45/0x70
[   15.832063]  kasan_save_track+0x18/0x40
[   15.832384]  kasan_save_alloc_info+0x3b/0x50
[   15.832825]  __kasan_kmalloc+0xb7/0xc0
[   15.833011]  __kmalloc_cache_noprof+0x189/0x420
[   15.833358]  kasan_atomics+0x95/0x310
[   15.833507]  kunit_try_run_case+0x1a5/0x480
[   15.833729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833949]  kthread+0x337/0x6f0
[   15.834419]  ret_from_fork+0x116/0x1d0
[   15.834692]  ret_from_fork_asm+0x1a/0x30
[   15.834845] 
[   15.834966] The buggy address belongs to the object at ffff8881027c5180
[   15.834966]  which belongs to the cache kmalloc-64 of size 64
[   15.835674] The buggy address is located 0 bytes to the right of
[   15.835674]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.836581] 
[   15.836852] The buggy address belongs to the physical page:
[   15.837172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.837727] flags: 0x200000000000000(node=0|zone=2)
[   15.838105] page_type: f5(slab)
[   15.838298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.838578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.838920] page dumped because: kasan: bad access detected
[   15.839194] 
[   15.839272] Memory state around the buggy address:
[   15.839954]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840447]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840820] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.841338]                                      ^
[   15.841641]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842017]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842466] ==================================================================
[   16.300872] ==================================================================
[   16.301166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.301808] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.302192] 
[   16.302327] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.302376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.302390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.302414] Call Trace:
[   16.302434]  <TASK>
[   16.302452]  dump_stack_lvl+0x73/0xb0
[   16.302484]  print_report+0xd1/0x610
[   16.302507]  ? __virt_addr_valid+0x1db/0x2d0
[   16.302530]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.302553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.302577]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.302599]  kasan_report+0x141/0x180
[   16.302622]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.302649]  kasan_check_range+0x10c/0x1c0
[   16.302673]  __kasan_check_write+0x18/0x20
[   16.302694]  kasan_atomics_helper+0x1b22/0x5450
[   16.302718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.302742]  ? kasan_save_alloc_info+0x3b/0x50
[   16.302766]  ? kasan_save_stack+0x45/0x70
[   16.302791]  kasan_atomics+0x1dc/0x310
[   16.302814]  ? __pfx_kasan_atomics+0x10/0x10
[   16.302838]  ? __pfx_read_tsc+0x10/0x10
[   16.302861]  ? ktime_get_ts64+0x86/0x230
[   16.302897]  kunit_try_run_case+0x1a5/0x480
[   16.302922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.302946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.302990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.303014]  ? __kthread_parkme+0x82/0x180
[   16.303035]  ? preempt_count_sub+0x50/0x80
[   16.303070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.303095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.303119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.303151]  kthread+0x337/0x6f0
[   16.303172]  ? trace_preempt_on+0x20/0xc0
[   16.303196]  ? __pfx_kthread+0x10/0x10
[   16.303218]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.303240]  ? calculate_sigpending+0x7b/0xa0
[   16.303264]  ? __pfx_kthread+0x10/0x10
[   16.303286]  ret_from_fork+0x116/0x1d0
[   16.303324]  ? __pfx_kthread+0x10/0x10
[   16.303346]  ret_from_fork_asm+0x1a/0x30
[   16.303377]  </TASK>
[   16.303388] 
[   16.311196] Allocated by task 283:
[   16.311412]  kasan_save_stack+0x45/0x70
[   16.311588]  kasan_save_track+0x18/0x40
[   16.311728]  kasan_save_alloc_info+0x3b/0x50
[   16.311880]  __kasan_kmalloc+0xb7/0xc0
[   16.312024]  __kmalloc_cache_noprof+0x189/0x420
[   16.312288]  kasan_atomics+0x95/0x310
[   16.312505]  kunit_try_run_case+0x1a5/0x480
[   16.312740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.312998]  kthread+0x337/0x6f0
[   16.313196]  ret_from_fork+0x116/0x1d0
[   16.313397]  ret_from_fork_asm+0x1a/0x30
[   16.313600] 
[   16.313700] The buggy address belongs to the object at ffff8881027c5180
[   16.313700]  which belongs to the cache kmalloc-64 of size 64
[   16.314196] The buggy address is located 0 bytes to the right of
[   16.314196]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.314762] 
[   16.314863] The buggy address belongs to the physical page:
[   16.315106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.315495] flags: 0x200000000000000(node=0|zone=2)
[   16.315675] page_type: f5(slab)
[   16.315802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.316038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.316281] page dumped because: kasan: bad access detected
[   16.316481] 
[   16.316554] Memory state around the buggy address:
[   16.316746]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.317082]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.317443] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.317766]                                      ^
[   16.317997]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.318372]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.318699] ==================================================================
[   16.524292] ==================================================================
[   16.524600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.524953] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.525664] 
[   16.525964] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.526016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.526030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.526218] Call Trace:
[   16.526240]  <TASK>
[   16.526257]  dump_stack_lvl+0x73/0xb0
[   16.526287]  print_report+0xd1/0x610
[   16.526310]  ? __virt_addr_valid+0x1db/0x2d0
[   16.526334]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.526355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.526378]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.526401]  kasan_report+0x141/0x180
[   16.526424]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.526451]  __asan_report_load8_noabort+0x18/0x20
[   16.526476]  kasan_atomics_helper+0x4f98/0x5450
[   16.526510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.526535]  ? kasan_save_alloc_info+0x3b/0x50
[   16.526558]  ? kasan_save_stack+0x45/0x70
[   16.526596]  kasan_atomics+0x1dc/0x310
[   16.526620]  ? __pfx_kasan_atomics+0x10/0x10
[   16.526645]  ? __pfx_read_tsc+0x10/0x10
[   16.526666]  ? ktime_get_ts64+0x86/0x230
[   16.526692]  kunit_try_run_case+0x1a5/0x480
[   16.526717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.526742]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.526766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.526790]  ? __kthread_parkme+0x82/0x180
[   16.526810]  ? preempt_count_sub+0x50/0x80
[   16.526835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.526859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.526883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.526907]  kthread+0x337/0x6f0
[   16.526927]  ? trace_preempt_on+0x20/0xc0
[   16.526952]  ? __pfx_kthread+0x10/0x10
[   16.526974]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.526996]  ? calculate_sigpending+0x7b/0xa0
[   16.527020]  ? __pfx_kthread+0x10/0x10
[   16.527042]  ret_from_fork+0x116/0x1d0
[   16.527061]  ? __pfx_kthread+0x10/0x10
[   16.527083]  ret_from_fork_asm+0x1a/0x30
[   16.527115]  </TASK>
[   16.527126] 
[   16.534828] Allocated by task 283:
[   16.534993]  kasan_save_stack+0x45/0x70
[   16.535200]  kasan_save_track+0x18/0x40
[   16.535429]  kasan_save_alloc_info+0x3b/0x50
[   16.535629]  __kasan_kmalloc+0xb7/0xc0
[   16.535823]  __kmalloc_cache_noprof+0x189/0x420
[   16.536031]  kasan_atomics+0x95/0x310
[   16.536243]  kunit_try_run_case+0x1a5/0x480
[   16.536481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.536775]  kthread+0x337/0x6f0
[   16.536958]  ret_from_fork+0x116/0x1d0
[   16.537150]  ret_from_fork_asm+0x1a/0x30
[   16.537348] 
[   16.537448] The buggy address belongs to the object at ffff8881027c5180
[   16.537448]  which belongs to the cache kmalloc-64 of size 64
[   16.537944] The buggy address is located 0 bytes to the right of
[   16.537944]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.538450] 
[   16.538549] The buggy address belongs to the physical page:
[   16.538801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.539138] flags: 0x200000000000000(node=0|zone=2)
[   16.539378] page_type: f5(slab)
[   16.539599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.539836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.540067] page dumped because: kasan: bad access detected
[   16.540256] 
[   16.540334] Memory state around the buggy address:
[   16.540538]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.541092]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.541431] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.541755]                                      ^
[   16.541998]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.542329]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.542624] ==================================================================
[   15.411349] ==================================================================
[   15.411641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.412332] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.412638] 
[   15.412920] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.412967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.412980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.413004] Call Trace:
[   15.413022]  <TASK>
[   15.413039]  dump_stack_lvl+0x73/0xb0
[   15.413067]  print_report+0xd1/0x610
[   15.413090]  ? __virt_addr_valid+0x1db/0x2d0
[   15.413114]  ? kasan_atomics_helper+0x565/0x5450
[   15.413136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.413172]  ? kasan_atomics_helper+0x565/0x5450
[   15.413194]  kasan_report+0x141/0x180
[   15.413217]  ? kasan_atomics_helper+0x565/0x5450
[   15.413243]  kasan_check_range+0x10c/0x1c0
[   15.413267]  __kasan_check_write+0x18/0x20
[   15.413287]  kasan_atomics_helper+0x565/0x5450
[   15.413310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.413335]  ? kasan_save_alloc_info+0x3b/0x50
[   15.413360]  ? kasan_save_stack+0x45/0x70
[   15.413383]  kasan_atomics+0x1dc/0x310
[   15.413407]  ? __pfx_kasan_atomics+0x10/0x10
[   15.413431]  ? __pfx_read_tsc+0x10/0x10
[   15.413453]  ? ktime_get_ts64+0x86/0x230
[   15.413478]  kunit_try_run_case+0x1a5/0x480
[   15.413503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.413527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.413553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.413576]  ? __kthread_parkme+0x82/0x180
[   15.413598]  ? preempt_count_sub+0x50/0x80
[   15.413622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.413647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.413671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.413695]  kthread+0x337/0x6f0
[   15.413715]  ? trace_preempt_on+0x20/0xc0
[   15.413742]  ? __pfx_kthread+0x10/0x10
[   15.413763]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.413785]  ? calculate_sigpending+0x7b/0xa0
[   15.413810]  ? __pfx_kthread+0x10/0x10
[   15.413833]  ret_from_fork+0x116/0x1d0
[   15.413965]  ? __pfx_kthread+0x10/0x10
[   15.413990]  ret_from_fork_asm+0x1a/0x30
[   15.414021]  </TASK>
[   15.414033] 
[   15.424067] Allocated by task 283:
[   15.424269]  kasan_save_stack+0x45/0x70
[   15.424881]  kasan_save_track+0x18/0x40
[   15.425106]  kasan_save_alloc_info+0x3b/0x50
[   15.425419]  __kasan_kmalloc+0xb7/0xc0
[   15.425732]  __kmalloc_cache_noprof+0x189/0x420
[   15.426120]  kasan_atomics+0x95/0x310
[   15.426283]  kunit_try_run_case+0x1a5/0x480
[   15.426600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.426959]  kthread+0x337/0x6f0
[   15.427112]  ret_from_fork+0x116/0x1d0
[   15.427307]  ret_from_fork_asm+0x1a/0x30
[   15.427623] 
[   15.427704] The buggy address belongs to the object at ffff8881027c5180
[   15.427704]  which belongs to the cache kmalloc-64 of size 64
[   15.428472] The buggy address is located 0 bytes to the right of
[   15.428472]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.429052] 
[   15.429234] The buggy address belongs to the physical page:
[   15.429481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.430192] flags: 0x200000000000000(node=0|zone=2)
[   15.430452] page_type: f5(slab)
[   15.430705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.431231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.431705] page dumped because: kasan: bad access detected
[   15.431997] 
[   15.432271] Memory state around the buggy address:
[   15.432505]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.432794]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.433321] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.433745]                                      ^
[   15.434003]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.434523]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.434819] ==================================================================
[   16.635714] ==================================================================
[   16.636091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.636412] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.636787] 
[   16.636914] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.636958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.636970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.636993] Call Trace:
[   16.637011]  <TASK>
[   16.637027]  dump_stack_lvl+0x73/0xb0
[   16.637055]  print_report+0xd1/0x610
[   16.637077]  ? __virt_addr_valid+0x1db/0x2d0
[   16.637100]  ? kasan_atomics_helper+0x5115/0x5450
[   16.637122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.637156]  ? kasan_atomics_helper+0x5115/0x5450
[   16.637179]  kasan_report+0x141/0x180
[   16.637202]  ? kasan_atomics_helper+0x5115/0x5450
[   16.637231]  __asan_report_load8_noabort+0x18/0x20
[   16.637266]  kasan_atomics_helper+0x5115/0x5450
[   16.637290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.637325]  ? kasan_save_alloc_info+0x3b/0x50
[   16.637350]  ? kasan_save_stack+0x45/0x70
[   16.637375]  kasan_atomics+0x1dc/0x310
[   16.637399]  ? __pfx_kasan_atomics+0x10/0x10
[   16.637424]  ? __pfx_read_tsc+0x10/0x10
[   16.637445]  ? ktime_get_ts64+0x86/0x230
[   16.637470]  kunit_try_run_case+0x1a5/0x480
[   16.637496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.637519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.637544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.637569]  ? __kthread_parkme+0x82/0x180
[   16.637590]  ? preempt_count_sub+0x50/0x80
[   16.637614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.637639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.637663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.637697]  kthread+0x337/0x6f0
[   16.637717]  ? trace_preempt_on+0x20/0xc0
[   16.637740]  ? __pfx_kthread+0x10/0x10
[   16.637780]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.637803]  ? calculate_sigpending+0x7b/0xa0
[   16.637827]  ? __pfx_kthread+0x10/0x10
[   16.637859]  ret_from_fork+0x116/0x1d0
[   16.637878]  ? __pfx_kthread+0x10/0x10
[   16.637900]  ret_from_fork_asm+0x1a/0x30
[   16.637931]  </TASK>
[   16.637943] 
[   16.645636] Allocated by task 283:
[   16.645777]  kasan_save_stack+0x45/0x70
[   16.645924]  kasan_save_track+0x18/0x40
[   16.646065]  kasan_save_alloc_info+0x3b/0x50
[   16.646229]  __kasan_kmalloc+0xb7/0xc0
[   16.646458]  __kmalloc_cache_noprof+0x189/0x420
[   16.646696]  kasan_atomics+0x95/0x310
[   16.646886]  kunit_try_run_case+0x1a5/0x480
[   16.647098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.647513]  kthread+0x337/0x6f0
[   16.647845]  ret_from_fork+0x116/0x1d0
[   16.647983]  ret_from_fork_asm+0x1a/0x30
[   16.648128] 
[   16.648211] The buggy address belongs to the object at ffff8881027c5180
[   16.648211]  which belongs to the cache kmalloc-64 of size 64
[   16.649178] The buggy address is located 0 bytes to the right of
[   16.649178]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.649722] 
[   16.649822] The buggy address belongs to the physical page:
[   16.650003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.650345] flags: 0x200000000000000(node=0|zone=2)
[   16.650601] page_type: f5(slab)
[   16.650782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.651105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.651490] page dumped because: kasan: bad access detected
[   16.651731] 
[   16.651832] Memory state around the buggy address:
[   16.652074]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.652424]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.652731] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.653036]                                      ^
[   16.653279]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.653595]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.653908] ==================================================================
[   15.843008] ==================================================================
[   15.843366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.843674] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.843894] 
[   15.844464] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.844534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.844550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.844575] Call Trace:
[   15.844595]  <TASK>
[   15.844613]  dump_stack_lvl+0x73/0xb0
[   15.844776]  print_report+0xd1/0x610
[   15.844819]  ? __virt_addr_valid+0x1db/0x2d0
[   15.844843]  ? kasan_atomics_helper+0x1079/0x5450
[   15.844878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.844902]  ? kasan_atomics_helper+0x1079/0x5450
[   15.844924]  kasan_report+0x141/0x180
[   15.844947]  ? kasan_atomics_helper+0x1079/0x5450
[   15.844974]  kasan_check_range+0x10c/0x1c0
[   15.844998]  __kasan_check_write+0x18/0x20
[   15.845018]  kasan_atomics_helper+0x1079/0x5450
[   15.845042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.845065]  ? kasan_save_alloc_info+0x3b/0x50
[   15.845090]  ? kasan_save_stack+0x45/0x70
[   15.845115]  kasan_atomics+0x1dc/0x310
[   15.845137]  ? __pfx_kasan_atomics+0x10/0x10
[   15.845172]  ? __pfx_read_tsc+0x10/0x10
[   15.845193]  ? ktime_get_ts64+0x86/0x230
[   15.845219]  kunit_try_run_case+0x1a5/0x480
[   15.845245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.845295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.845319]  ? __kthread_parkme+0x82/0x180
[   15.845342]  ? preempt_count_sub+0x50/0x80
[   15.845366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.845415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.845440]  kthread+0x337/0x6f0
[   15.845460]  ? trace_preempt_on+0x20/0xc0
[   15.845484]  ? __pfx_kthread+0x10/0x10
[   15.845506]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.845527]  ? calculate_sigpending+0x7b/0xa0
[   15.845553]  ? __pfx_kthread+0x10/0x10
[   15.845575]  ret_from_fork+0x116/0x1d0
[   15.845594]  ? __pfx_kthread+0x10/0x10
[   15.845615]  ret_from_fork_asm+0x1a/0x30
[   15.845647]  </TASK>
[   15.845659] 
[   15.856939] Allocated by task 283:
[   15.857107]  kasan_save_stack+0x45/0x70
[   15.857481]  kasan_save_track+0x18/0x40
[   15.857764]  kasan_save_alloc_info+0x3b/0x50
[   15.857927]  __kasan_kmalloc+0xb7/0xc0
[   15.858251]  __kmalloc_cache_noprof+0x189/0x420
[   15.858637]  kasan_atomics+0x95/0x310
[   15.858786]  kunit_try_run_case+0x1a5/0x480
[   15.859154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.859429]  kthread+0x337/0x6f0
[   15.859837]  ret_from_fork+0x116/0x1d0
[   15.860092]  ret_from_fork_asm+0x1a/0x30
[   15.860296] 
[   15.860419] The buggy address belongs to the object at ffff8881027c5180
[   15.860419]  which belongs to the cache kmalloc-64 of size 64
[   15.860989] The buggy address is located 0 bytes to the right of
[   15.860989]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.861845] 
[   15.861969] The buggy address belongs to the physical page:
[   15.862475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.862928] flags: 0x200000000000000(node=0|zone=2)
[   15.863219] page_type: f5(slab)
[   15.863560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.864024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.864363] page dumped because: kasan: bad access detected
[   15.864725] 
[   15.864821] Memory state around the buggy address:
[   15.865345]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.865862]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.866172] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.866569]                                      ^
[   15.867011]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.867568]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.867975] ==================================================================
[   16.580743] ==================================================================
[   16.581085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.581388] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.581619] 
[   16.581706] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.581751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.581764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.581788] Call Trace:
[   16.581806]  <TASK>
[   16.581821]  dump_stack_lvl+0x73/0xb0
[   16.581848]  print_report+0xd1/0x610
[   16.581871]  ? __virt_addr_valid+0x1db/0x2d0
[   16.581894]  ? kasan_atomics_helper+0x218a/0x5450
[   16.581916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.581938]  ? kasan_atomics_helper+0x218a/0x5450
[   16.581960]  kasan_report+0x141/0x180
[   16.581983]  ? kasan_atomics_helper+0x218a/0x5450
[   16.582019]  kasan_check_range+0x10c/0x1c0
[   16.582044]  __kasan_check_write+0x18/0x20
[   16.582075]  kasan_atomics_helper+0x218a/0x5450
[   16.582101]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.582125]  ? kasan_save_alloc_info+0x3b/0x50
[   16.582171]  ? kasan_save_stack+0x45/0x70
[   16.582195]  kasan_atomics+0x1dc/0x310
[   16.582219]  ? __pfx_kasan_atomics+0x10/0x10
[   16.582244]  ? __pfx_read_tsc+0x10/0x10
[   16.582265]  ? ktime_get_ts64+0x86/0x230
[   16.582290]  kunit_try_run_case+0x1a5/0x480
[   16.582315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.582338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.582363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.582388]  ? __kthread_parkme+0x82/0x180
[   16.582409]  ? preempt_count_sub+0x50/0x80
[   16.582434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.582458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.582482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.582507]  kthread+0x337/0x6f0
[   16.582527]  ? trace_preempt_on+0x20/0xc0
[   16.582551]  ? __pfx_kthread+0x10/0x10
[   16.582573]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.582595]  ? calculate_sigpending+0x7b/0xa0
[   16.582619]  ? __pfx_kthread+0x10/0x10
[   16.582642]  ret_from_fork+0x116/0x1d0
[   16.582660]  ? __pfx_kthread+0x10/0x10
[   16.582682]  ret_from_fork_asm+0x1a/0x30
[   16.582713]  </TASK>
[   16.582724] 
[   16.590910] Allocated by task 283:
[   16.591118]  kasan_save_stack+0x45/0x70
[   16.591341]  kasan_save_track+0x18/0x40
[   16.591535]  kasan_save_alloc_info+0x3b/0x50
[   16.591758]  __kasan_kmalloc+0xb7/0xc0
[   16.591932]  __kmalloc_cache_noprof+0x189/0x420
[   16.592172]  kasan_atomics+0x95/0x310
[   16.592346]  kunit_try_run_case+0x1a5/0x480
[   16.592496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.592675]  kthread+0x337/0x6f0
[   16.592798]  ret_from_fork+0x116/0x1d0
[   16.592934]  ret_from_fork_asm+0x1a/0x30
[   16.593075] 
[   16.593157] The buggy address belongs to the object at ffff8881027c5180
[   16.593157]  which belongs to the cache kmalloc-64 of size 64
[   16.593514] The buggy address is located 0 bytes to the right of
[   16.593514]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.593884] 
[   16.593971] The buggy address belongs to the physical page:
[   16.594262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.594628] flags: 0x200000000000000(node=0|zone=2)
[   16.594867] page_type: f5(slab)
[   16.595037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.595386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.595725] page dumped because: kasan: bad access detected
[   16.595977] 
[   16.596076] Memory state around the buggy address:
[   16.596287]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.596512]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.596733] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.596951]                                      ^
[   16.597110]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.597747]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.598065] ==================================================================
[   15.360600] ==================================================================
[   15.361062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.361682] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.362273] 
[   15.362405] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.362453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.362467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.362580] Call Trace:
[   15.362675]  <TASK>
[   15.362695]  dump_stack_lvl+0x73/0xb0
[   15.362727]  print_report+0xd1/0x610
[   15.362750]  ? __virt_addr_valid+0x1db/0x2d0
[   15.362774]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.362796]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.362820]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.362843]  kasan_report+0x141/0x180
[   15.362881]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.362908]  kasan_check_range+0x10c/0x1c0
[   15.362933]  __kasan_check_write+0x18/0x20
[   15.362953]  kasan_atomics_helper+0x4a0/0x5450
[   15.362976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.363001]  ? kasan_save_alloc_info+0x3b/0x50
[   15.363026]  ? kasan_save_stack+0x45/0x70
[   15.363051]  kasan_atomics+0x1dc/0x310
[   15.363075]  ? __pfx_kasan_atomics+0x10/0x10
[   15.363100]  ? __pfx_read_tsc+0x10/0x10
[   15.363122]  ? ktime_get_ts64+0x86/0x230
[   15.363160]  kunit_try_run_case+0x1a5/0x480
[   15.363185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363209]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.363234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.363259]  ? __kthread_parkme+0x82/0x180
[   15.363280]  ? preempt_count_sub+0x50/0x80
[   15.363304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.363379]  kthread+0x337/0x6f0
[   15.363400]  ? trace_preempt_on+0x20/0xc0
[   15.363425]  ? __pfx_kthread+0x10/0x10
[   15.363446]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.363469]  ? calculate_sigpending+0x7b/0xa0
[   15.363494]  ? __pfx_kthread+0x10/0x10
[   15.363517]  ret_from_fork+0x116/0x1d0
[   15.363536]  ? __pfx_kthread+0x10/0x10
[   15.363562]  ret_from_fork_asm+0x1a/0x30
[   15.363593]  </TASK>
[   15.363605] 
[   15.375383] Allocated by task 283:
[   15.375806]  kasan_save_stack+0x45/0x70
[   15.376127]  kasan_save_track+0x18/0x40
[   15.376323]  kasan_save_alloc_info+0x3b/0x50
[   15.376624]  __kasan_kmalloc+0xb7/0xc0
[   15.376801]  __kmalloc_cache_noprof+0x189/0x420
[   15.377209]  kasan_atomics+0x95/0x310
[   15.377451]  kunit_try_run_case+0x1a5/0x480
[   15.378003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.378345]  kthread+0x337/0x6f0
[   15.378614]  ret_from_fork+0x116/0x1d0
[   15.378885]  ret_from_fork_asm+0x1a/0x30
[   15.379077] 
[   15.379180] The buggy address belongs to the object at ffff8881027c5180
[   15.379180]  which belongs to the cache kmalloc-64 of size 64
[   15.379825] The buggy address is located 0 bytes to the right of
[   15.379825]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.380675] 
[   15.380769] The buggy address belongs to the physical page:
[   15.381188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.381773] flags: 0x200000000000000(node=0|zone=2)
[   15.382102] page_type: f5(slab)
[   15.382421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.382738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.383289] page dumped because: kasan: bad access detected
[   15.383645] 
[   15.383839] Memory state around the buggy address:
[   15.384219]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.384699]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.385121] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.385612]                                      ^
[   15.385834]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.386332]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.386730] ==================================================================
[   16.429348] ==================================================================
[   16.429771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.430058] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.430301] 
[   16.430390] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.430434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.430448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.430472] Call Trace:
[   16.430488]  <TASK>
[   16.430505]  dump_stack_lvl+0x73/0xb0
[   16.430534]  print_report+0xd1/0x610
[   16.430557]  ? __virt_addr_valid+0x1db/0x2d0
[   16.430582]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.430603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.430626]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.430648]  kasan_report+0x141/0x180
[   16.430671]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.430697]  kasan_check_range+0x10c/0x1c0
[   16.430721]  __kasan_check_write+0x18/0x20
[   16.430741]  kasan_atomics_helper+0x1eaa/0x5450
[   16.430764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.430788]  ? kasan_save_alloc_info+0x3b/0x50
[   16.430812]  ? kasan_save_stack+0x45/0x70
[   16.430836]  kasan_atomics+0x1dc/0x310
[   16.430859]  ? __pfx_kasan_atomics+0x10/0x10
[   16.430883]  ? __pfx_read_tsc+0x10/0x10
[   16.430905]  ? ktime_get_ts64+0x86/0x230
[   16.430930]  kunit_try_run_case+0x1a5/0x480
[   16.430955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.430978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.431003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.431027]  ? __kthread_parkme+0x82/0x180
[   16.431048]  ? preempt_count_sub+0x50/0x80
[   16.431073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.431097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.431121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.431159]  kthread+0x337/0x6f0
[   16.431179]  ? trace_preempt_on+0x20/0xc0
[   16.431203]  ? __pfx_kthread+0x10/0x10
[   16.431225]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.431249]  ? calculate_sigpending+0x7b/0xa0
[   16.431273]  ? __pfx_kthread+0x10/0x10
[   16.431295]  ret_from_fork+0x116/0x1d0
[   16.431314]  ? __pfx_kthread+0x10/0x10
[   16.431335]  ret_from_fork_asm+0x1a/0x30
[   16.431365]  </TASK>
[   16.431376] 
[   16.439267] Allocated by task 283:
[   16.439619]  kasan_save_stack+0x45/0x70
[   16.439879]  kasan_save_track+0x18/0x40
[   16.440056]  kasan_save_alloc_info+0x3b/0x50
[   16.440254]  __kasan_kmalloc+0xb7/0xc0
[   16.440549]  __kmalloc_cache_noprof+0x189/0x420
[   16.440713]  kasan_atomics+0x95/0x310
[   16.440849]  kunit_try_run_case+0x1a5/0x480
[   16.441015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.441278]  kthread+0x337/0x6f0
[   16.441457]  ret_from_fork+0x116/0x1d0
[   16.441648]  ret_from_fork_asm+0x1a/0x30
[   16.441838] 
[   16.441911] The buggy address belongs to the object at ffff8881027c5180
[   16.441911]  which belongs to the cache kmalloc-64 of size 64
[   16.442281] The buggy address is located 0 bytes to the right of
[   16.442281]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.442836] 
[   16.442938] The buggy address belongs to the physical page:
[   16.443202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.443615] flags: 0x200000000000000(node=0|zone=2)
[   16.443786] page_type: f5(slab)
[   16.443910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.444860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.445768] page dumped because: kasan: bad access detected
[   16.446614] 
[   16.446968] Memory state around the buggy address:
[   16.447587]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448603]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448860] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.449081]                                      ^
[   16.449256]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.449891]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.450544] ==================================================================
[   16.617268] ==================================================================
[   16.617888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.618230] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.618595] 
[   16.618692] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.618733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.618747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.618778] Call Trace:
[   16.618793]  <TASK>
[   16.618807]  dump_stack_lvl+0x73/0xb0
[   16.618834]  print_report+0xd1/0x610
[   16.618868]  ? __virt_addr_valid+0x1db/0x2d0
[   16.618891]  ? kasan_atomics_helper+0x224c/0x5450
[   16.618913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.618936]  ? kasan_atomics_helper+0x224c/0x5450
[   16.618967]  kasan_report+0x141/0x180
[   16.618991]  ? kasan_atomics_helper+0x224c/0x5450
[   16.619028]  kasan_check_range+0x10c/0x1c0
[   16.619052]  __kasan_check_write+0x18/0x20
[   16.619072]  kasan_atomics_helper+0x224c/0x5450
[   16.619096]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.619126]  ? kasan_save_alloc_info+0x3b/0x50
[   16.619165]  ? kasan_save_stack+0x45/0x70
[   16.619190]  kasan_atomics+0x1dc/0x310
[   16.619213]  ? __pfx_kasan_atomics+0x10/0x10
[   16.619237]  ? __pfx_read_tsc+0x10/0x10
[   16.619258]  ? ktime_get_ts64+0x86/0x230
[   16.619283]  kunit_try_run_case+0x1a5/0x480
[   16.619307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.619339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.619363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.619398]  ? __kthread_parkme+0x82/0x180
[   16.619431]  ? preempt_count_sub+0x50/0x80
[   16.619455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.619480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.619504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.619537]  kthread+0x337/0x6f0
[   16.619557]  ? trace_preempt_on+0x20/0xc0
[   16.619590]  ? __pfx_kthread+0x10/0x10
[   16.619612]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.619634]  ? calculate_sigpending+0x7b/0xa0
[   16.619659]  ? __pfx_kthread+0x10/0x10
[   16.619689]  ret_from_fork+0x116/0x1d0
[   16.619708]  ? __pfx_kthread+0x10/0x10
[   16.619730]  ret_from_fork_asm+0x1a/0x30
[   16.619771]  </TASK>
[   16.619781] 
[   16.627284] Allocated by task 283:
[   16.627498]  kasan_save_stack+0x45/0x70
[   16.627703]  kasan_save_track+0x18/0x40
[   16.627895]  kasan_save_alloc_info+0x3b/0x50
[   16.628114]  __kasan_kmalloc+0xb7/0xc0
[   16.628315]  __kmalloc_cache_noprof+0x189/0x420
[   16.628543]  kasan_atomics+0x95/0x310
[   16.628732]  kunit_try_run_case+0x1a5/0x480
[   16.628941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.629348]  kthread+0x337/0x6f0
[   16.629520]  ret_from_fork+0x116/0x1d0
[   16.629707]  ret_from_fork_asm+0x1a/0x30
[   16.629877] 
[   16.629950] The buggy address belongs to the object at ffff8881027c5180
[   16.629950]  which belongs to the cache kmalloc-64 of size 64
[   16.630454] The buggy address is located 0 bytes to the right of
[   16.630454]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.631000] 
[   16.631095] The buggy address belongs to the physical page:
[   16.631282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.631680] flags: 0x200000000000000(node=0|zone=2)
[   16.631910] page_type: f5(slab)
[   16.632085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.632491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.632768] page dumped because: kasan: bad access detected
[   16.633038] 
[   16.633116] Memory state around the buggy address:
[   16.633341]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.633647]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.633928] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.634222]                                      ^
[   16.634500]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.634792]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.635097] ==================================================================
[   15.938829] ==================================================================
[   15.939278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.939859] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.940231] 
[   15.940506] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.940557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.940571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.940595] Call Trace:
[   15.940613]  <TASK>
[   15.940630]  dump_stack_lvl+0x73/0xb0
[   15.940660]  print_report+0xd1/0x610
[   15.940683]  ? __virt_addr_valid+0x1db/0x2d0
[   15.940707]  ? kasan_atomics_helper+0x1217/0x5450
[   15.940729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.940753]  ? kasan_atomics_helper+0x1217/0x5450
[   15.940776]  kasan_report+0x141/0x180
[   15.940799]  ? kasan_atomics_helper+0x1217/0x5450
[   15.940826]  kasan_check_range+0x10c/0x1c0
[   15.940850]  __kasan_check_write+0x18/0x20
[   15.940870]  kasan_atomics_helper+0x1217/0x5450
[   15.940894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.940917]  ? kasan_save_alloc_info+0x3b/0x50
[   15.940944]  ? kasan_save_stack+0x45/0x70
[   15.940969]  kasan_atomics+0x1dc/0x310
[   15.940992]  ? __pfx_kasan_atomics+0x10/0x10
[   15.941017]  ? __pfx_read_tsc+0x10/0x10
[   15.941039]  ? ktime_get_ts64+0x86/0x230
[   15.941065]  kunit_try_run_case+0x1a5/0x480
[   15.941089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.941112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.941137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.941172]  ? __kthread_parkme+0x82/0x180
[   15.941195]  ? preempt_count_sub+0x50/0x80
[   15.941219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.941243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.941268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.941293]  kthread+0x337/0x6f0
[   15.941466]  ? trace_preempt_on+0x20/0xc0
[   15.941492]  ? __pfx_kthread+0x10/0x10
[   15.941513]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.941536]  ? calculate_sigpending+0x7b/0xa0
[   15.941561]  ? __pfx_kthread+0x10/0x10
[   15.941584]  ret_from_fork+0x116/0x1d0
[   15.941603]  ? __pfx_kthread+0x10/0x10
[   15.941624]  ret_from_fork_asm+0x1a/0x30
[   15.941655]  </TASK>
[   15.941667] 
[   15.951721] Allocated by task 283:
[   15.951915]  kasan_save_stack+0x45/0x70
[   15.952101]  kasan_save_track+0x18/0x40
[   15.952292]  kasan_save_alloc_info+0x3b/0x50
[   15.952768]  __kasan_kmalloc+0xb7/0xc0
[   15.953016]  __kmalloc_cache_noprof+0x189/0x420
[   15.953208]  kasan_atomics+0x95/0x310
[   15.953553]  kunit_try_run_case+0x1a5/0x480
[   15.953751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.954108]  kthread+0x337/0x6f0
[   15.954405]  ret_from_fork+0x116/0x1d0
[   15.954567]  ret_from_fork_asm+0x1a/0x30
[   15.954836] 
[   15.954922] The buggy address belongs to the object at ffff8881027c5180
[   15.954922]  which belongs to the cache kmalloc-64 of size 64
[   15.955417] The buggy address is located 0 bytes to the right of
[   15.955417]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.956134] 
[   15.956333] The buggy address belongs to the physical page:
[   15.956628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.957031] flags: 0x200000000000000(node=0|zone=2)
[   15.957358] page_type: f5(slab)
[   15.957492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.957907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.958295] page dumped because: kasan: bad access detected
[   15.958668] 
[   15.958760] Memory state around the buggy address:
[   15.958960]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.959279]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.959774] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.960182]                                      ^
[   15.960405]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960711]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960999] ==================================================================
[   15.312078] ==================================================================
[   15.312639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.313082] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.313351] 
[   15.313468] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.313517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.313530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.313554] Call Trace:
[   15.313575]  <TASK>
[   15.313614]  dump_stack_lvl+0x73/0xb0
[   15.313644]  print_report+0xd1/0x610
[   15.313667]  ? __virt_addr_valid+0x1db/0x2d0
[   15.313692]  ? kasan_atomics_helper+0x3df/0x5450
[   15.313713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.313737]  ? kasan_atomics_helper+0x3df/0x5450
[   15.313759]  kasan_report+0x141/0x180
[   15.313782]  ? kasan_atomics_helper+0x3df/0x5450
[   15.313809]  kasan_check_range+0x10c/0x1c0
[   15.313833]  __kasan_check_read+0x15/0x20
[   15.313885]  kasan_atomics_helper+0x3df/0x5450
[   15.313909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.313933]  ? kasan_save_alloc_info+0x3b/0x50
[   15.313957]  ? kasan_save_stack+0x45/0x70
[   15.313982]  kasan_atomics+0x1dc/0x310
[   15.314005]  ? __pfx_kasan_atomics+0x10/0x10
[   15.314030]  ? __pfx_read_tsc+0x10/0x10
[   15.314052]  ? ktime_get_ts64+0x86/0x230
[   15.314080]  kunit_try_run_case+0x1a5/0x480
[   15.314105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.314165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.314189]  ? __kthread_parkme+0x82/0x180
[   15.314211]  ? preempt_count_sub+0x50/0x80
[   15.314236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.314286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.314311]  kthread+0x337/0x6f0
[   15.314402]  ? trace_preempt_on+0x20/0xc0
[   15.314427]  ? __pfx_kthread+0x10/0x10
[   15.314450]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.314472]  ? calculate_sigpending+0x7b/0xa0
[   15.314498]  ? __pfx_kthread+0x10/0x10
[   15.314520]  ret_from_fork+0x116/0x1d0
[   15.314540]  ? __pfx_kthread+0x10/0x10
[   15.314562]  ret_from_fork_asm+0x1a/0x30
[   15.314593]  </TASK>
[   15.314605] 
[   15.323391] Allocated by task 283:
[   15.323581]  kasan_save_stack+0x45/0x70
[   15.323925]  kasan_save_track+0x18/0x40
[   15.324076]  kasan_save_alloc_info+0x3b/0x50
[   15.324243]  __kasan_kmalloc+0xb7/0xc0
[   15.324386]  __kmalloc_cache_noprof+0x189/0x420
[   15.324592]  kasan_atomics+0x95/0x310
[   15.324785]  kunit_try_run_case+0x1a5/0x480
[   15.324994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325292]  kthread+0x337/0x6f0
[   15.325512]  ret_from_fork+0x116/0x1d0
[   15.325705]  ret_from_fork_asm+0x1a/0x30
[   15.325959] 
[   15.326050] The buggy address belongs to the object at ffff8881027c5180
[   15.326050]  which belongs to the cache kmalloc-64 of size 64
[   15.326664] The buggy address is located 0 bytes to the right of
[   15.326664]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.327637] 
[   15.327749] The buggy address belongs to the physical page:
[   15.328323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.328855] flags: 0x200000000000000(node=0|zone=2)
[   15.329226] page_type: f5(slab)
[   15.329958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.330221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.330900] page dumped because: kasan: bad access detected
[   15.331637] 
[   15.331925] Memory state around the buggy address:
[   15.332607]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.333546]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.333773] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.334581]                                      ^
[   15.335166]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336069]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336597] ==================================================================
[   16.051701] ==================================================================
[   16.052163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.052646] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.053007] 
[   16.053167] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.053211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.053223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.053248] Call Trace:
[   16.053266]  <TASK>
[   16.053283]  dump_stack_lvl+0x73/0xb0
[   16.054073]  print_report+0xd1/0x610
[   16.054096]  ? __virt_addr_valid+0x1db/0x2d0
[   16.054119]  ? kasan_atomics_helper+0x1467/0x5450
[   16.054141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.054172]  ? kasan_atomics_helper+0x1467/0x5450
[   16.054195]  kasan_report+0x141/0x180
[   16.054217]  ? kasan_atomics_helper+0x1467/0x5450
[   16.054244]  kasan_check_range+0x10c/0x1c0
[   16.054268]  __kasan_check_write+0x18/0x20
[   16.054288]  kasan_atomics_helper+0x1467/0x5450
[   16.054312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.054335]  ? kasan_save_alloc_info+0x3b/0x50
[   16.054359]  ? kasan_save_stack+0x45/0x70
[   16.054384]  kasan_atomics+0x1dc/0x310
[   16.054407]  ? __pfx_kasan_atomics+0x10/0x10
[   16.054432]  ? __pfx_read_tsc+0x10/0x10
[   16.054453]  ? ktime_get_ts64+0x86/0x230
[   16.054478]  kunit_try_run_case+0x1a5/0x480
[   16.054504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.054528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.054552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.054577]  ? __kthread_parkme+0x82/0x180
[   16.054598]  ? preempt_count_sub+0x50/0x80
[   16.054623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.054649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.054675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.054699]  kthread+0x337/0x6f0
[   16.054720]  ? trace_preempt_on+0x20/0xc0
[   16.054744]  ? __pfx_kthread+0x10/0x10
[   16.054766]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.054788]  ? calculate_sigpending+0x7b/0xa0
[   16.054812]  ? __pfx_kthread+0x10/0x10
[   16.054835]  ret_from_fork+0x116/0x1d0
[   16.054854]  ? __pfx_kthread+0x10/0x10
[   16.054876]  ret_from_fork_asm+0x1a/0x30
[   16.054907]  </TASK>
[   16.054918] 
[   16.068962] Allocated by task 283:
[   16.069118]  kasan_save_stack+0x45/0x70
[   16.069617]  kasan_save_track+0x18/0x40
[   16.070067]  kasan_save_alloc_info+0x3b/0x50
[   16.070676]  __kasan_kmalloc+0xb7/0xc0
[   16.071368]  __kmalloc_cache_noprof+0x189/0x420
[   16.072028]  kasan_atomics+0x95/0x310
[   16.072482]  kunit_try_run_case+0x1a5/0x480
[   16.072971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.073680]  kthread+0x337/0x6f0
[   16.074125]  ret_from_fork+0x116/0x1d0
[   16.074693]  ret_from_fork_asm+0x1a/0x30
[   16.075245] 
[   16.075713] The buggy address belongs to the object at ffff8881027c5180
[   16.075713]  which belongs to the cache kmalloc-64 of size 64
[   16.076558] The buggy address is located 0 bytes to the right of
[   16.076558]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.076944] 
[   16.077025] The buggy address belongs to the physical page:
[   16.077345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.078034] flags: 0x200000000000000(node=0|zone=2)
[   16.078511] page_type: f5(slab)
[   16.078828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.079498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.080150] page dumped because: kasan: bad access detected
[   16.080458] 
[   16.080534] Memory state around the buggy address:
[   16.080695]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.080918]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.081139] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.081393]                                      ^
[   16.081819]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.082475]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.083082] ==================================================================
[   16.319484] ==================================================================
[   16.319850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.320114] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.320452] 
[   16.320540] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.320585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.320599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.320622] Call Trace:
[   16.320640]  <TASK>
[   16.320656]  dump_stack_lvl+0x73/0xb0
[   16.320684]  print_report+0xd1/0x610
[   16.320706]  ? __virt_addr_valid+0x1db/0x2d0
[   16.320730]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.320752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.320776]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.320798]  kasan_report+0x141/0x180
[   16.320821]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.320847]  kasan_check_range+0x10c/0x1c0
[   16.320872]  __kasan_check_write+0x18/0x20
[   16.320892]  kasan_atomics_helper+0x1c18/0x5450
[   16.320915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.320938]  ? kasan_save_alloc_info+0x3b/0x50
[   16.320962]  ? kasan_save_stack+0x45/0x70
[   16.320987]  kasan_atomics+0x1dc/0x310
[   16.321010]  ? __pfx_kasan_atomics+0x10/0x10
[   16.321035]  ? __pfx_read_tsc+0x10/0x10
[   16.321056]  ? ktime_get_ts64+0x86/0x230
[   16.321081]  kunit_try_run_case+0x1a5/0x480
[   16.321105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.321129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.321221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.321247]  ? __kthread_parkme+0x82/0x180
[   16.321281]  ? preempt_count_sub+0x50/0x80
[   16.321324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.321349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.321373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.321398]  kthread+0x337/0x6f0
[   16.321429]  ? trace_preempt_on+0x20/0xc0
[   16.321453]  ? __pfx_kthread+0x10/0x10
[   16.321475]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.321508]  ? calculate_sigpending+0x7b/0xa0
[   16.321536]  ? __pfx_kthread+0x10/0x10
[   16.321560]  ret_from_fork+0x116/0x1d0
[   16.321579]  ? __pfx_kthread+0x10/0x10
[   16.321610]  ret_from_fork_asm+0x1a/0x30
[   16.321641]  </TASK>
[   16.321653] 
[   16.329650] Allocated by task 283:
[   16.329809]  kasan_save_stack+0x45/0x70
[   16.329988]  kasan_save_track+0x18/0x40
[   16.330194]  kasan_save_alloc_info+0x3b/0x50
[   16.330423]  __kasan_kmalloc+0xb7/0xc0
[   16.330640]  __kmalloc_cache_noprof+0x189/0x420
[   16.330845]  kasan_atomics+0x95/0x310
[   16.331046]  kunit_try_run_case+0x1a5/0x480
[   16.331258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.331498]  kthread+0x337/0x6f0
[   16.331694]  ret_from_fork+0x116/0x1d0
[   16.331855]  ret_from_fork_asm+0x1a/0x30
[   16.332062] 
[   16.332138] The buggy address belongs to the object at ffff8881027c5180
[   16.332138]  which belongs to the cache kmalloc-64 of size 64
[   16.332531] The buggy address is located 0 bytes to the right of
[   16.332531]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.332906] 
[   16.332981] The buggy address belongs to the physical page:
[   16.333166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.333564] flags: 0x200000000000000(node=0|zone=2)
[   16.333800] page_type: f5(slab)
[   16.333969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.334358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.334701] page dumped because: kasan: bad access detected
[   16.334953] 
[   16.335048] Memory state around the buggy address:
[   16.335285]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.335621]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.335906] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.336193]                                      ^
[   16.336384]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.336614]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.336946] ==================================================================
[   15.336973] ==================================================================
[   15.337250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.337739] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.338293] 
[   15.338459] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.338506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.338519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.338543] Call Trace:
[   15.338562]  <TASK>
[   15.338579]  dump_stack_lvl+0x73/0xb0
[   15.338609]  print_report+0xd1/0x610
[   15.338632]  ? __virt_addr_valid+0x1db/0x2d0
[   15.338655]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.338677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.338700]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.338723]  kasan_report+0x141/0x180
[   15.338746]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.338774]  __asan_report_load4_noabort+0x18/0x20
[   15.338799]  kasan_atomics_helper+0x4b54/0x5450
[   15.338823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.338847]  ? kasan_save_alloc_info+0x3b/0x50
[   15.338872]  ? kasan_save_stack+0x45/0x70
[   15.338896]  kasan_atomics+0x1dc/0x310
[   15.338920]  ? __pfx_kasan_atomics+0x10/0x10
[   15.338945]  ? __pfx_read_tsc+0x10/0x10
[   15.338966]  ? ktime_get_ts64+0x86/0x230
[   15.339365]  kunit_try_run_case+0x1a5/0x480
[   15.339394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.339443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.339467]  ? __kthread_parkme+0x82/0x180
[   15.339488]  ? preempt_count_sub+0x50/0x80
[   15.339513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.339563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.339587]  kthread+0x337/0x6f0
[   15.339608]  ? trace_preempt_on+0x20/0xc0
[   15.339631]  ? __pfx_kthread+0x10/0x10
[   15.339654]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.339676]  ? calculate_sigpending+0x7b/0xa0
[   15.339701]  ? __pfx_kthread+0x10/0x10
[   15.339724]  ret_from_fork+0x116/0x1d0
[   15.339743]  ? __pfx_kthread+0x10/0x10
[   15.339765]  ret_from_fork_asm+0x1a/0x30
[   15.339796]  </TASK>
[   15.339808] 
[   15.349836] Allocated by task 283:
[   15.350141]  kasan_save_stack+0x45/0x70
[   15.350455]  kasan_save_track+0x18/0x40
[   15.350633]  kasan_save_alloc_info+0x3b/0x50
[   15.350821]  __kasan_kmalloc+0xb7/0xc0
[   15.350999]  __kmalloc_cache_noprof+0x189/0x420
[   15.351459]  kasan_atomics+0x95/0x310
[   15.351764]  kunit_try_run_case+0x1a5/0x480
[   15.352078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352572]  kthread+0x337/0x6f0
[   15.352749]  ret_from_fork+0x116/0x1d0
[   15.352920]  ret_from_fork_asm+0x1a/0x30
[   15.353249] 
[   15.353447] The buggy address belongs to the object at ffff8881027c5180
[   15.353447]  which belongs to the cache kmalloc-64 of size 64
[   15.353913] The buggy address is located 0 bytes to the right of
[   15.353913]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.354725] 
[   15.354809] The buggy address belongs to the physical page:
[   15.355189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.355488] flags: 0x200000000000000(node=0|zone=2)
[   15.355917] page_type: f5(slab)
[   15.356158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.356563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.356987] page dumped because: kasan: bad access detected
[   15.357212] 
[   15.357309] Memory state around the buggy address:
[   15.357587]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.357952]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358522] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.358799]                                      ^
[   15.359111]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359591]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359841] ==================================================================
[   16.280463] ==================================================================
[   16.280807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.281184] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.281457] 
[   16.283222] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.283280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.283319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.283344] Call Trace:
[   16.283362]  <TASK>
[   16.283379]  dump_stack_lvl+0x73/0xb0
[   16.283411]  print_report+0xd1/0x610
[   16.283434]  ? __virt_addr_valid+0x1db/0x2d0
[   16.283458]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.283480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.283503]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.283526]  kasan_report+0x141/0x180
[   16.283548]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.283575]  kasan_check_range+0x10c/0x1c0
[   16.283599]  __kasan_check_write+0x18/0x20
[   16.283619]  kasan_atomics_helper+0x1a7f/0x5450
[   16.283642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.283666]  ? kasan_save_alloc_info+0x3b/0x50
[   16.283689]  ? kasan_save_stack+0x45/0x70
[   16.283713]  kasan_atomics+0x1dc/0x310
[   16.283736]  ? __pfx_kasan_atomics+0x10/0x10
[   16.283759]  ? __pfx_read_tsc+0x10/0x10
[   16.283781]  ? ktime_get_ts64+0x86/0x230
[   16.283806]  kunit_try_run_case+0x1a5/0x480
[   16.283832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.283854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.283878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.283902]  ? __kthread_parkme+0x82/0x180
[   16.283923]  ? preempt_count_sub+0x50/0x80
[   16.283947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.283972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.283995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.284020]  kthread+0x337/0x6f0
[   16.284040]  ? trace_preempt_on+0x20/0xc0
[   16.284064]  ? __pfx_kthread+0x10/0x10
[   16.284085]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.284106]  ? calculate_sigpending+0x7b/0xa0
[   16.284133]  ? __pfx_kthread+0x10/0x10
[   16.284167]  ret_from_fork+0x116/0x1d0
[   16.284186]  ? __pfx_kthread+0x10/0x10
[   16.284219]  ret_from_fork_asm+0x1a/0x30
[   16.284249]  </TASK>
[   16.284261] 
[   16.291821] Allocated by task 283:
[   16.291958]  kasan_save_stack+0x45/0x70
[   16.292110]  kasan_save_track+0x18/0x40
[   16.292257]  kasan_save_alloc_info+0x3b/0x50
[   16.292481]  __kasan_kmalloc+0xb7/0xc0
[   16.292684]  __kmalloc_cache_noprof+0x189/0x420
[   16.292945]  kasan_atomics+0x95/0x310
[   16.293157]  kunit_try_run_case+0x1a5/0x480
[   16.293409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.293668]  kthread+0x337/0x6f0
[   16.293841]  ret_from_fork+0x116/0x1d0
[   16.294055]  ret_from_fork_asm+0x1a/0x30
[   16.294267] 
[   16.294405] The buggy address belongs to the object at ffff8881027c5180
[   16.294405]  which belongs to the cache kmalloc-64 of size 64
[   16.294814] The buggy address is located 0 bytes to the right of
[   16.294814]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.295197] 
[   16.295272] The buggy address belongs to the physical page:
[   16.295467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.295714] flags: 0x200000000000000(node=0|zone=2)
[   16.295884] page_type: f5(slab)
[   16.296008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.296411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.296750] page dumped because: kasan: bad access detected
[   16.297003] 
[   16.297098] Memory state around the buggy address:
[   16.297897]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.298257]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.298607] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.298922]                                      ^
[   16.299158]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299505]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299823] ==================================================================
[   15.998920] ==================================================================
[   15.999322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.999716] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.000185] 
[   16.000279] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.000329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.000343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.000367] Call Trace:
[   16.000384]  <TASK>
[   16.000400]  dump_stack_lvl+0x73/0xb0
[   16.000428]  print_report+0xd1/0x610
[   16.000452]  ? __virt_addr_valid+0x1db/0x2d0
[   16.000475]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.000497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.000522]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.000547]  kasan_report+0x141/0x180
[   16.000570]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.000597]  __asan_report_load4_noabort+0x18/0x20
[   16.000623]  kasan_atomics_helper+0x49ce/0x5450
[   16.000646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.000670]  ? kasan_save_alloc_info+0x3b/0x50
[   16.000695]  ? kasan_save_stack+0x45/0x70
[   16.000720]  kasan_atomics+0x1dc/0x310
[   16.000743]  ? __pfx_kasan_atomics+0x10/0x10
[   16.000767]  ? __pfx_read_tsc+0x10/0x10
[   16.000789]  ? ktime_get_ts64+0x86/0x230
[   16.000813]  kunit_try_run_case+0x1a5/0x480
[   16.000839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.000884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.000909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.000933]  ? __kthread_parkme+0x82/0x180
[   16.000955]  ? preempt_count_sub+0x50/0x80
[   16.000980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.001029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.001053]  kthread+0x337/0x6f0
[   16.001073]  ? trace_preempt_on+0x20/0xc0
[   16.001099]  ? __pfx_kthread+0x10/0x10
[   16.001121]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.001152]  ? calculate_sigpending+0x7b/0xa0
[   16.001177]  ? __pfx_kthread+0x10/0x10
[   16.001200]  ret_from_fork+0x116/0x1d0
[   16.001219]  ? __pfx_kthread+0x10/0x10
[   16.001241]  ret_from_fork_asm+0x1a/0x30
[   16.001272]  </TASK>
[   16.001284] 
[   16.008553] Allocated by task 283:
[   16.008686]  kasan_save_stack+0x45/0x70
[   16.008882]  kasan_save_track+0x18/0x40
[   16.009075]  kasan_save_alloc_info+0x3b/0x50
[   16.009297]  __kasan_kmalloc+0xb7/0xc0
[   16.009524]  __kmalloc_cache_noprof+0x189/0x420
[   16.009749]  kasan_atomics+0x95/0x310
[   16.009936]  kunit_try_run_case+0x1a5/0x480
[   16.010134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.010410]  kthread+0x337/0x6f0
[   16.010591]  ret_from_fork+0x116/0x1d0
[   16.010736]  ret_from_fork_asm+0x1a/0x30
[   16.010893] 
[   16.010992] The buggy address belongs to the object at ffff8881027c5180
[   16.010992]  which belongs to the cache kmalloc-64 of size 64
[   16.011535] The buggy address is located 0 bytes to the right of
[   16.011535]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.012035] 
[   16.012134] The buggy address belongs to the physical page:
[   16.012420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.012725] flags: 0x200000000000000(node=0|zone=2)
[   16.012921] page_type: f5(slab)
[   16.013093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.013402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.013713] page dumped because: kasan: bad access detected
[   16.013946] 
[   16.014033] Memory state around the buggy address:
[   16.014230]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.014556]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.014848] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.015118]                                      ^
[   16.015308]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.015529]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.015748] ==================================================================
[   15.768832] ==================================================================
[   15.769568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.770219] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.770656] 
[   15.770756] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.770864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.770879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.770903] Call Trace:
[   15.770921]  <TASK>
[   15.770939]  dump_stack_lvl+0x73/0xb0
[   15.770968]  print_report+0xd1/0x610
[   15.770991]  ? __virt_addr_valid+0x1db/0x2d0
[   15.771014]  ? kasan_atomics_helper+0xf10/0x5450
[   15.771036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.771058]  ? kasan_atomics_helper+0xf10/0x5450
[   15.771081]  kasan_report+0x141/0x180
[   15.771259]  ? kasan_atomics_helper+0xf10/0x5450
[   15.771288]  kasan_check_range+0x10c/0x1c0
[   15.771312]  __kasan_check_write+0x18/0x20
[   15.771332]  kasan_atomics_helper+0xf10/0x5450
[   15.771355]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.771379]  ? kasan_save_alloc_info+0x3b/0x50
[   15.771403]  ? kasan_save_stack+0x45/0x70
[   15.771428]  kasan_atomics+0x1dc/0x310
[   15.771450]  ? __pfx_kasan_atomics+0x10/0x10
[   15.771475]  ? __pfx_read_tsc+0x10/0x10
[   15.771496]  ? ktime_get_ts64+0x86/0x230
[   15.771521]  kunit_try_run_case+0x1a5/0x480
[   15.771546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.771595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.771621]  ? __kthread_parkme+0x82/0x180
[   15.771645]  ? preempt_count_sub+0x50/0x80
[   15.771669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.771719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.771743]  kthread+0x337/0x6f0
[   15.771763]  ? trace_preempt_on+0x20/0xc0
[   15.771787]  ? __pfx_kthread+0x10/0x10
[   15.771809]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.771831]  ? calculate_sigpending+0x7b/0xa0
[   15.771857]  ? __pfx_kthread+0x10/0x10
[   15.771879]  ret_from_fork+0x116/0x1d0
[   15.771899]  ? __pfx_kthread+0x10/0x10
[   15.771920]  ret_from_fork_asm+0x1a/0x30
[   15.771951]  </TASK>
[   15.771963] 
[   15.781965] Allocated by task 283:
[   15.782265]  kasan_save_stack+0x45/0x70
[   15.782640]  kasan_save_track+0x18/0x40
[   15.782966]  kasan_save_alloc_info+0x3b/0x50
[   15.783182]  __kasan_kmalloc+0xb7/0xc0
[   15.783554]  __kmalloc_cache_noprof+0x189/0x420
[   15.783754]  kasan_atomics+0x95/0x310
[   15.784051]  kunit_try_run_case+0x1a5/0x480
[   15.784226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.784561]  kthread+0x337/0x6f0
[   15.784785]  ret_from_fork+0x116/0x1d0
[   15.785132]  ret_from_fork_asm+0x1a/0x30
[   15.785300] 
[   15.785404] The buggy address belongs to the object at ffff8881027c5180
[   15.785404]  which belongs to the cache kmalloc-64 of size 64
[   15.786138] The buggy address is located 0 bytes to the right of
[   15.786138]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.786844] 
[   15.786958] The buggy address belongs to the physical page:
[   15.787311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.787814] flags: 0x200000000000000(node=0|zone=2)
[   15.788071] page_type: f5(slab)
[   15.788361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.788695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.789197] page dumped because: kasan: bad access detected
[   15.789428] 
[   15.789599] Memory state around the buggy address:
[   15.789787]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.790471]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.790898] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.791325]                                      ^
[   15.791504]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.791981]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.792355] ==================================================================
[   16.543092] ==================================================================
[   16.543602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.543983] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.544371] 
[   16.544489] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.544535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.544547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.544572] Call Trace:
[   16.544600]  <TASK>
[   16.544616]  dump_stack_lvl+0x73/0xb0
[   16.544644]  print_report+0xd1/0x610
[   16.544687]  ? __virt_addr_valid+0x1db/0x2d0
[   16.544709]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.544731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.544765]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.544787]  kasan_report+0x141/0x180
[   16.544810]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.544837]  kasan_check_range+0x10c/0x1c0
[   16.544861]  __kasan_check_write+0x18/0x20
[   16.544881]  kasan_atomics_helper+0x20c8/0x5450
[   16.544903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.544927]  ? kasan_save_alloc_info+0x3b/0x50
[   16.544951]  ? kasan_save_stack+0x45/0x70
[   16.544975]  kasan_atomics+0x1dc/0x310
[   16.544999]  ? __pfx_kasan_atomics+0x10/0x10
[   16.545023]  ? __pfx_read_tsc+0x10/0x10
[   16.545055]  ? ktime_get_ts64+0x86/0x230
[   16.545080]  kunit_try_run_case+0x1a5/0x480
[   16.545105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.545139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.545174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.545198]  ? __kthread_parkme+0x82/0x180
[   16.545219]  ? preempt_count_sub+0x50/0x80
[   16.545252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.545276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.545301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.545335]  kthread+0x337/0x6f0
[   16.545357]  ? trace_preempt_on+0x20/0xc0
[   16.545381]  ? __pfx_kthread+0x10/0x10
[   16.545404]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.545427]  ? calculate_sigpending+0x7b/0xa0
[   16.545460]  ? __pfx_kthread+0x10/0x10
[   16.545482]  ret_from_fork+0x116/0x1d0
[   16.545501]  ? __pfx_kthread+0x10/0x10
[   16.545533]  ret_from_fork_asm+0x1a/0x30
[   16.545564]  </TASK>
[   16.545576] 
[   16.553964] Allocated by task 283:
[   16.554159]  kasan_save_stack+0x45/0x70
[   16.554421]  kasan_save_track+0x18/0x40
[   16.554563]  kasan_save_alloc_info+0x3b/0x50
[   16.554800]  __kasan_kmalloc+0xb7/0xc0
[   16.554947]  __kmalloc_cache_noprof+0x189/0x420
[   16.555107]  kasan_atomics+0x95/0x310
[   16.555305]  kunit_try_run_case+0x1a5/0x480
[   16.555527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.555805]  kthread+0x337/0x6f0
[   16.555974]  ret_from_fork+0x116/0x1d0
[   16.556138]  ret_from_fork_asm+0x1a/0x30
[   16.556368] 
[   16.556562] The buggy address belongs to the object at ffff8881027c5180
[   16.556562]  which belongs to the cache kmalloc-64 of size 64
[   16.557033] The buggy address is located 0 bytes to the right of
[   16.557033]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.557541] 
[   16.557659] The buggy address belongs to the physical page:
[   16.557909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.558234] flags: 0x200000000000000(node=0|zone=2)
[   16.558453] page_type: f5(slab)
[   16.558624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.558923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.559169] page dumped because: kasan: bad access detected
[   16.559374] 
[   16.559485] Memory state around the buggy address:
[   16.559711]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.560031]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.560410] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.560660]                                      ^
[   16.560889]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561224]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561637] ==================================================================
[   15.893981] ==================================================================
[   15.894253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.894599] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.895349] 
[   15.895473] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.895589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.895657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.895682] Call Trace:
[   15.895698]  <TASK>
[   15.895766]  dump_stack_lvl+0x73/0xb0
[   15.895799]  print_report+0xd1/0x610
[   15.895823]  ? __virt_addr_valid+0x1db/0x2d0
[   15.895848]  ? kasan_atomics_helper+0x1148/0x5450
[   15.895870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.895894]  ? kasan_atomics_helper+0x1148/0x5450
[   15.895916]  kasan_report+0x141/0x180
[   15.895939]  ? kasan_atomics_helper+0x1148/0x5450
[   15.896019]  kasan_check_range+0x10c/0x1c0
[   15.896048]  __kasan_check_write+0x18/0x20
[   15.896069]  kasan_atomics_helper+0x1148/0x5450
[   15.896092]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.896177]  ? kasan_save_alloc_info+0x3b/0x50
[   15.896203]  ? kasan_save_stack+0x45/0x70
[   15.896227]  kasan_atomics+0x1dc/0x310
[   15.896252]  ? __pfx_kasan_atomics+0x10/0x10
[   15.896276]  ? __pfx_read_tsc+0x10/0x10
[   15.896298]  ? ktime_get_ts64+0x86/0x230
[   15.896339]  kunit_try_run_case+0x1a5/0x480
[   15.896366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.896390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.896415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.896439]  ? __kthread_parkme+0x82/0x180
[   15.896460]  ? preempt_count_sub+0x50/0x80
[   15.896485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.896510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.896535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.896559]  kthread+0x337/0x6f0
[   15.896579]  ? trace_preempt_on+0x20/0xc0
[   15.896603]  ? __pfx_kthread+0x10/0x10
[   15.896625]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.896647]  ? calculate_sigpending+0x7b/0xa0
[   15.896672]  ? __pfx_kthread+0x10/0x10
[   15.896694]  ret_from_fork+0x116/0x1d0
[   15.896713]  ? __pfx_kthread+0x10/0x10
[   15.896734]  ret_from_fork_asm+0x1a/0x30
[   15.896766]  </TASK>
[   15.896778] 
[   15.906451] Allocated by task 283:
[   15.906801]  kasan_save_stack+0x45/0x70
[   15.906994]  kasan_save_track+0x18/0x40
[   15.907177]  kasan_save_alloc_info+0x3b/0x50
[   15.907381]  __kasan_kmalloc+0xb7/0xc0
[   15.907737]  __kmalloc_cache_noprof+0x189/0x420
[   15.908023]  kasan_atomics+0x95/0x310
[   15.908191]  kunit_try_run_case+0x1a5/0x480
[   15.908523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908836]  kthread+0x337/0x6f0
[   15.908985]  ret_from_fork+0x116/0x1d0
[   15.909170]  ret_from_fork_asm+0x1a/0x30
[   15.909360] 
[   15.909485] The buggy address belongs to the object at ffff8881027c5180
[   15.909485]  which belongs to the cache kmalloc-64 of size 64
[   15.910275] The buggy address is located 0 bytes to the right of
[   15.910275]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.910864] 
[   15.911071] The buggy address belongs to the physical page:
[   15.911457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.911864] flags: 0x200000000000000(node=0|zone=2)
[   15.912078] page_type: f5(slab)
[   15.912367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.912673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.912970] page dumped because: kasan: bad access detected
[   15.913214] 
[   15.913287] Memory state around the buggy address:
[   15.913730]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.914105]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.914398] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.914800]                                      ^
[   15.915092]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915366]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915772] ==================================================================
[   15.289797] ==================================================================
[   15.290229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.290818] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.291284] 
[   15.291424] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.291472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.291484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.291509] Call Trace:
[   15.291527]  <TASK>
[   15.291545]  dump_stack_lvl+0x73/0xb0
[   15.291573]  print_report+0xd1/0x610
[   15.291595]  ? __virt_addr_valid+0x1db/0x2d0
[   15.291617]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.291638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.291660]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.291682]  kasan_report+0x141/0x180
[   15.291703]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.291730]  __asan_report_store4_noabort+0x1b/0x30
[   15.291754]  kasan_atomics_helper+0x4b6e/0x5450
[   15.291777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.291800]  ? kasan_save_alloc_info+0x3b/0x50
[   15.291823]  ? kasan_save_stack+0x45/0x70
[   15.291846]  kasan_atomics+0x1dc/0x310
[   15.291952]  ? __pfx_kasan_atomics+0x10/0x10
[   15.291977]  ? __pfx_read_tsc+0x10/0x10
[   15.291998]  ? ktime_get_ts64+0x86/0x230
[   15.292022]  kunit_try_run_case+0x1a5/0x480
[   15.292046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.292093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.292116]  ? __kthread_parkme+0x82/0x180
[   15.292137]  ? preempt_count_sub+0x50/0x80
[   15.292172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.292243]  kthread+0x337/0x6f0
[   15.292263]  ? trace_preempt_on+0x20/0xc0
[   15.292287]  ? __pfx_kthread+0x10/0x10
[   15.292471]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.292496]  ? calculate_sigpending+0x7b/0xa0
[   15.292577]  ? __pfx_kthread+0x10/0x10
[   15.292602]  ret_from_fork+0x116/0x1d0
[   15.292623]  ? __pfx_kthread+0x10/0x10
[   15.292645]  ret_from_fork_asm+0x1a/0x30
[   15.292701]  </TASK>
[   15.292713] 
[   15.301995] Allocated by task 283:
[   15.302237]  kasan_save_stack+0x45/0x70
[   15.302413]  kasan_save_track+0x18/0x40
[   15.302651]  kasan_save_alloc_info+0x3b/0x50
[   15.302945]  __kasan_kmalloc+0xb7/0xc0
[   15.303169]  __kmalloc_cache_noprof+0x189/0x420
[   15.303490]  kasan_atomics+0x95/0x310
[   15.303707]  kunit_try_run_case+0x1a5/0x480
[   15.303997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.304309]  kthread+0x337/0x6f0
[   15.304492]  ret_from_fork+0x116/0x1d0
[   15.304794]  ret_from_fork_asm+0x1a/0x30
[   15.305026] 
[   15.305388] The buggy address belongs to the object at ffff8881027c5180
[   15.305388]  which belongs to the cache kmalloc-64 of size 64
[   15.305780] The buggy address is located 0 bytes to the right of
[   15.305780]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.306778] 
[   15.306892] The buggy address belongs to the physical page:
[   15.307071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.307322] flags: 0x200000000000000(node=0|zone=2)
[   15.307629] page_type: f5(slab)
[   15.307834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.308433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.308903] page dumped because: kasan: bad access detected
[   15.309222] 
[   15.309331] Memory state around the buggy address:
[   15.309512]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.309737]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.310314] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.310644]                                      ^
[   15.310849]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.311110]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.311626] ==================================================================
[   15.478863] ==================================================================
[   15.479105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.480779] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.481581] 
[   15.481682] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.481731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.481745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.481769] Call Trace:
[   15.481788]  <TASK>
[   15.481806]  dump_stack_lvl+0x73/0xb0
[   15.481847]  print_report+0xd1/0x610
[   15.481871]  ? __virt_addr_valid+0x1db/0x2d0
[   15.481895]  ? kasan_atomics_helper+0x72f/0x5450
[   15.481916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.481939]  ? kasan_atomics_helper+0x72f/0x5450
[   15.481961]  kasan_report+0x141/0x180
[   15.481983]  ? kasan_atomics_helper+0x72f/0x5450
[   15.482010]  kasan_check_range+0x10c/0x1c0
[   15.482034]  __kasan_check_write+0x18/0x20
[   15.482054]  kasan_atomics_helper+0x72f/0x5450
[   15.482077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.482101]  ? kasan_save_alloc_info+0x3b/0x50
[   15.482125]  ? kasan_save_stack+0x45/0x70
[   15.482157]  kasan_atomics+0x1dc/0x310
[   15.482181]  ? __pfx_kasan_atomics+0x10/0x10
[   15.482205]  ? __pfx_read_tsc+0x10/0x10
[   15.482226]  ? ktime_get_ts64+0x86/0x230
[   15.482252]  kunit_try_run_case+0x1a5/0x480
[   15.482278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.482302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.482326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.482350]  ? __kthread_parkme+0x82/0x180
[   15.482372]  ? preempt_count_sub+0x50/0x80
[   15.482396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.482422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.482446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.482471]  kthread+0x337/0x6f0
[   15.482491]  ? trace_preempt_on+0x20/0xc0
[   15.482515]  ? __pfx_kthread+0x10/0x10
[   15.482537]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.482560]  ? calculate_sigpending+0x7b/0xa0
[   15.482585]  ? __pfx_kthread+0x10/0x10
[   15.482607]  ret_from_fork+0x116/0x1d0
[   15.482627]  ? __pfx_kthread+0x10/0x10
[   15.482649]  ret_from_fork_asm+0x1a/0x30
[   15.482683]  </TASK>
[   15.482695] 
[   15.493802] Allocated by task 283:
[   15.494229]  kasan_save_stack+0x45/0x70
[   15.494527]  kasan_save_track+0x18/0x40
[   15.494707]  kasan_save_alloc_info+0x3b/0x50
[   15.494910]  __kasan_kmalloc+0xb7/0xc0
[   15.495088]  __kmalloc_cache_noprof+0x189/0x420
[   15.495306]  kasan_atomics+0x95/0x310
[   15.495480]  kunit_try_run_case+0x1a5/0x480
[   15.495675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.495915]  kthread+0x337/0x6f0
[   15.496070]  ret_from_fork+0x116/0x1d0
[   15.496811]  ret_from_fork_asm+0x1a/0x30
[   15.496979] 
[   15.497080] The buggy address belongs to the object at ffff8881027c5180
[   15.497080]  which belongs to the cache kmalloc-64 of size 64
[   15.497795] The buggy address is located 0 bytes to the right of
[   15.497795]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.498688] 
[   15.498806] The buggy address belongs to the physical page:
[   15.499306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.499819] flags: 0x200000000000000(node=0|zone=2)
[   15.500197] page_type: f5(slab)
[   15.500372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.500841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.501337] page dumped because: kasan: bad access detected
[   15.501572] 
[   15.501673] Memory state around the buggy address:
[   15.501976]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.502293]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.502808] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.503254]                                      ^
[   15.503432]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.503893]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504369] ==================================================================
[   16.187534] ==================================================================
[   16.187986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.188424] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.188776] 
[   16.188880] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.188927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.188940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.188962] Call Trace:
[   16.188980]  <TASK>
[   16.188997]  dump_stack_lvl+0x73/0xb0
[   16.189027]  print_report+0xd1/0x610
[   16.189059]  ? __virt_addr_valid+0x1db/0x2d0
[   16.189083]  ? kasan_atomics_helper+0x177f/0x5450
[   16.189105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.189139]  ? kasan_atomics_helper+0x177f/0x5450
[   16.189190]  kasan_report+0x141/0x180
[   16.189213]  ? kasan_atomics_helper+0x177f/0x5450
[   16.189240]  kasan_check_range+0x10c/0x1c0
[   16.189264]  __kasan_check_write+0x18/0x20
[   16.189284]  kasan_atomics_helper+0x177f/0x5450
[   16.189782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.189806]  ? kasan_save_alloc_info+0x3b/0x50
[   16.189829]  ? kasan_save_stack+0x45/0x70
[   16.189854]  kasan_atomics+0x1dc/0x310
[   16.189877]  ? __pfx_kasan_atomics+0x10/0x10
[   16.189901]  ? __pfx_read_tsc+0x10/0x10
[   16.189923]  ? ktime_get_ts64+0x86/0x230
[   16.189948]  kunit_try_run_case+0x1a5/0x480
[   16.189974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.189997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.190022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.190045]  ? __kthread_parkme+0x82/0x180
[   16.190066]  ? preempt_count_sub+0x50/0x80
[   16.190090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.190115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.190139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.190172]  kthread+0x337/0x6f0
[   16.190192]  ? trace_preempt_on+0x20/0xc0
[   16.190216]  ? __pfx_kthread+0x10/0x10
[   16.190237]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.190260]  ? calculate_sigpending+0x7b/0xa0
[   16.190284]  ? __pfx_kthread+0x10/0x10
[   16.190307]  ret_from_fork+0x116/0x1d0
[   16.190336]  ? __pfx_kthread+0x10/0x10
[   16.190358]  ret_from_fork_asm+0x1a/0x30
[   16.190390]  </TASK>
[   16.190412] 
[   16.198006] Allocated by task 283:
[   16.198137]  kasan_save_stack+0x45/0x70
[   16.198286]  kasan_save_track+0x18/0x40
[   16.198421]  kasan_save_alloc_info+0x3b/0x50
[   16.198771]  __kasan_kmalloc+0xb7/0xc0
[   16.198989]  __kmalloc_cache_noprof+0x189/0x420
[   16.199246]  kasan_atomics+0x95/0x310
[   16.199485]  kunit_try_run_case+0x1a5/0x480
[   16.199718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.199947]  kthread+0x337/0x6f0
[   16.200093]  ret_from_fork+0x116/0x1d0
[   16.200291]  ret_from_fork_asm+0x1a/0x30
[   16.200531] 
[   16.200630] The buggy address belongs to the object at ffff8881027c5180
[   16.200630]  which belongs to the cache kmalloc-64 of size 64
[   16.201161] The buggy address is located 0 bytes to the right of
[   16.201161]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.201737] 
[   16.201832] The buggy address belongs to the physical page:
[   16.202084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.202425] flags: 0x200000000000000(node=0|zone=2)
[   16.202677] page_type: f5(slab)
[   16.202837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.203179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.203517] page dumped because: kasan: bad access detected
[   16.203771] 
[   16.203871] Memory state around the buggy address:
[   16.204049]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.204284]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.204512] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.204732]                                      ^
[   16.204897]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205371]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205703] ==================================================================
[   16.480098] ==================================================================
[   16.480763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.481561] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.482197] 
[   16.482383] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.482439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.482452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.482475] Call Trace:
[   16.482505]  <TASK>
[   16.482524]  dump_stack_lvl+0x73/0xb0
[   16.482554]  print_report+0xd1/0x610
[   16.482577]  ? __virt_addr_valid+0x1db/0x2d0
[   16.482600]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.482631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.482654]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.482676]  kasan_report+0x141/0x180
[   16.482710]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.482736]  __asan_report_load8_noabort+0x18/0x20
[   16.482761]  kasan_atomics_helper+0x4f71/0x5450
[   16.482784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.482808]  ? kasan_save_alloc_info+0x3b/0x50
[   16.482832]  ? kasan_save_stack+0x45/0x70
[   16.482856]  kasan_atomics+0x1dc/0x310
[   16.482879]  ? __pfx_kasan_atomics+0x10/0x10
[   16.482903]  ? __pfx_read_tsc+0x10/0x10
[   16.482925]  ? ktime_get_ts64+0x86/0x230
[   16.482950]  kunit_try_run_case+0x1a5/0x480
[   16.482975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.482999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.483024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.483048]  ? __kthread_parkme+0x82/0x180
[   16.483070]  ? preempt_count_sub+0x50/0x80
[   16.483094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.483119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.483154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.483180]  kthread+0x337/0x6f0
[   16.483200]  ? trace_preempt_on+0x20/0xc0
[   16.483224]  ? __pfx_kthread+0x10/0x10
[   16.483245]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.483267]  ? calculate_sigpending+0x7b/0xa0
[   16.483294]  ? __pfx_kthread+0x10/0x10
[   16.483325]  ret_from_fork+0x116/0x1d0
[   16.483345]  ? __pfx_kthread+0x10/0x10
[   16.483366]  ret_from_fork_asm+0x1a/0x30
[   16.483397]  </TASK>
[   16.483409] 
[   16.494459] Allocated by task 283:
[   16.494672]  kasan_save_stack+0x45/0x70
[   16.494866]  kasan_save_track+0x18/0x40
[   16.495035]  kasan_save_alloc_info+0x3b/0x50
[   16.495259]  __kasan_kmalloc+0xb7/0xc0
[   16.495498]  __kmalloc_cache_noprof+0x189/0x420
[   16.495733]  kasan_atomics+0x95/0x310
[   16.495920]  kunit_try_run_case+0x1a5/0x480
[   16.496112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.496382]  kthread+0x337/0x6f0
[   16.496509]  ret_from_fork+0x116/0x1d0
[   16.496644]  ret_from_fork_asm+0x1a/0x30
[   16.496784] 
[   16.496882] The buggy address belongs to the object at ffff8881027c5180
[   16.496882]  which belongs to the cache kmalloc-64 of size 64
[   16.497420] The buggy address is located 0 bytes to the right of
[   16.497420]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.497832] 
[   16.497953] The buggy address belongs to the physical page:
[   16.498224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.498789] flags: 0x200000000000000(node=0|zone=2)
[   16.498978] page_type: f5(slab)
[   16.499183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.499534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.499854] page dumped because: kasan: bad access detected
[   16.500076] 
[   16.500197] Memory state around the buggy address:
[   16.500431]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.500761]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.500993] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.501259]                                      ^
[   16.501493]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.501770]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.502258] ==================================================================
[   15.720850] ==================================================================
[   15.721238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.721871] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.722158] 
[   15.722280] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.722328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.722342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.722367] Call Trace:
[   15.722385]  <TASK>
[   15.722403]  dump_stack_lvl+0x73/0xb0
[   15.722433]  print_report+0xd1/0x610
[   15.722456]  ? __virt_addr_valid+0x1db/0x2d0
[   15.722481]  ? kasan_atomics_helper+0xde0/0x5450
[   15.722503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.722526]  ? kasan_atomics_helper+0xde0/0x5450
[   15.722548]  kasan_report+0x141/0x180
[   15.722571]  ? kasan_atomics_helper+0xde0/0x5450
[   15.722598]  kasan_check_range+0x10c/0x1c0
[   15.722623]  __kasan_check_write+0x18/0x20
[   15.722643]  kasan_atomics_helper+0xde0/0x5450
[   15.722666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.722690]  ? kasan_save_alloc_info+0x3b/0x50
[   15.722714]  ? kasan_save_stack+0x45/0x70
[   15.722738]  kasan_atomics+0x1dc/0x310
[   15.722761]  ? __pfx_kasan_atomics+0x10/0x10
[   15.722786]  ? __pfx_read_tsc+0x10/0x10
[   15.722808]  ? ktime_get_ts64+0x86/0x230
[   15.722833]  kunit_try_run_case+0x1a5/0x480
[   15.722859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.722883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.722910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.722937]  ? __kthread_parkme+0x82/0x180
[   15.722959]  ? preempt_count_sub+0x50/0x80
[   15.722985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.723035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.723061]  kthread+0x337/0x6f0
[   15.723082]  ? trace_preempt_on+0x20/0xc0
[   15.723106]  ? __pfx_kthread+0x10/0x10
[   15.723128]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.723160]  ? calculate_sigpending+0x7b/0xa0
[   15.723187]  ? __pfx_kthread+0x10/0x10
[   15.723210]  ret_from_fork+0x116/0x1d0
[   15.723230]  ? __pfx_kthread+0x10/0x10
[   15.723311]  ret_from_fork_asm+0x1a/0x30
[   15.723348]  </TASK>
[   15.723361] 
[   15.733430] Allocated by task 283:
[   15.733593]  kasan_save_stack+0x45/0x70
[   15.733931]  kasan_save_track+0x18/0x40
[   15.734253]  kasan_save_alloc_info+0x3b/0x50
[   15.734542]  __kasan_kmalloc+0xb7/0xc0
[   15.734747]  __kmalloc_cache_noprof+0x189/0x420
[   15.734944]  kasan_atomics+0x95/0x310
[   15.735233]  kunit_try_run_case+0x1a5/0x480
[   15.735738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.736100]  kthread+0x337/0x6f0
[   15.736289]  ret_from_fork+0x116/0x1d0
[   15.736614]  ret_from_fork_asm+0x1a/0x30
[   15.736810] 
[   15.737022] The buggy address belongs to the object at ffff8881027c5180
[   15.737022]  which belongs to the cache kmalloc-64 of size 64
[   15.737621] The buggy address is located 0 bytes to the right of
[   15.737621]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.738437] 
[   15.738521] The buggy address belongs to the physical page:
[   15.738772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.739136] flags: 0x200000000000000(node=0|zone=2)
[   15.739719] page_type: f5(slab)
[   15.739968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.740434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.740751] page dumped because: kasan: bad access detected
[   15.740979] 
[   15.741236] Memory state around the buggy address:
[   15.741551]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.742013]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.742449] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.742735]                                      ^
[   15.743092]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.743469]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.743726] ==================================================================
[   16.140086] ==================================================================
[   16.140484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.140830] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.141168] 
[   16.141271] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.141316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.141329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.141351] Call Trace:
[   16.141367]  <TASK>
[   16.141383]  dump_stack_lvl+0x73/0xb0
[   16.141409]  print_report+0xd1/0x610
[   16.141442]  ? __virt_addr_valid+0x1db/0x2d0
[   16.141465]  ? kasan_atomics_helper+0x164f/0x5450
[   16.141487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.141521]  ? kasan_atomics_helper+0x164f/0x5450
[   16.141543]  kasan_report+0x141/0x180
[   16.141567]  ? kasan_atomics_helper+0x164f/0x5450
[   16.141595]  kasan_check_range+0x10c/0x1c0
[   16.141620]  __kasan_check_write+0x18/0x20
[   16.141651]  kasan_atomics_helper+0x164f/0x5450
[   16.141676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.141700]  ? kasan_save_alloc_info+0x3b/0x50
[   16.141744]  ? kasan_save_stack+0x45/0x70
[   16.141768]  kasan_atomics+0x1dc/0x310
[   16.141792]  ? __pfx_kasan_atomics+0x10/0x10
[   16.141826]  ? __pfx_read_tsc+0x10/0x10
[   16.141848]  ? ktime_get_ts64+0x86/0x230
[   16.141873]  kunit_try_run_case+0x1a5/0x480
[   16.141900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.141924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.141957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.141981]  ? __kthread_parkme+0x82/0x180
[   16.142003]  ? preempt_count_sub+0x50/0x80
[   16.142037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.142062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.142086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.142118]  kthread+0x337/0x6f0
[   16.142138]  ? trace_preempt_on+0x20/0xc0
[   16.142176]  ? __pfx_kthread+0x10/0x10
[   16.142198]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.142220]  ? calculate_sigpending+0x7b/0xa0
[   16.142245]  ? __pfx_kthread+0x10/0x10
[   16.142267]  ret_from_fork+0x116/0x1d0
[   16.142287]  ? __pfx_kthread+0x10/0x10
[   16.142309]  ret_from_fork_asm+0x1a/0x30
[   16.142341]  </TASK>
[   16.142355] 
[   16.150305] Allocated by task 283:
[   16.150519]  kasan_save_stack+0x45/0x70
[   16.150714]  kasan_save_track+0x18/0x40
[   16.150902]  kasan_save_alloc_info+0x3b/0x50
[   16.151152]  __kasan_kmalloc+0xb7/0xc0
[   16.151362]  __kmalloc_cache_noprof+0x189/0x420
[   16.151576]  kasan_atomics+0x95/0x310
[   16.151772]  kunit_try_run_case+0x1a5/0x480
[   16.151983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.152238]  kthread+0x337/0x6f0
[   16.152483]  ret_from_fork+0x116/0x1d0
[   16.152620]  ret_from_fork_asm+0x1a/0x30
[   16.152763] 
[   16.152837] The buggy address belongs to the object at ffff8881027c5180
[   16.152837]  which belongs to the cache kmalloc-64 of size 64
[   16.153242] The buggy address is located 0 bytes to the right of
[   16.153242]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.153816] 
[   16.153918] The buggy address belongs to the physical page:
[   16.154446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.154800] flags: 0x200000000000000(node=0|zone=2)
[   16.155029] page_type: f5(slab)
[   16.155222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.155573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.155893] page dumped because: kasan: bad access detected
[   16.156071] 
[   16.156515] Memory state around the buggy address:
[   16.157174]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.157918]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.158451] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.158670]                                      ^
[   16.158829]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.159050]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.159683] ==================================================================
[   16.034039] ==================================================================
[   16.034377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.034667] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.034993] 
[   16.035090] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.035134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.035157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.035180] Call Trace:
[   16.035194]  <TASK>
[   16.035210]  dump_stack_lvl+0x73/0xb0
[   16.035238]  print_report+0xd1/0x610
[   16.035261]  ? __virt_addr_valid+0x1db/0x2d0
[   16.035284]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.035306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.035340]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.035362]  kasan_report+0x141/0x180
[   16.035385]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.035411]  __asan_report_load8_noabort+0x18/0x20
[   16.035437]  kasan_atomics_helper+0x4eae/0x5450
[   16.035460]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.035485]  ? kasan_save_alloc_info+0x3b/0x50
[   16.035509]  ? kasan_save_stack+0x45/0x70
[   16.035533]  kasan_atomics+0x1dc/0x310
[   16.035557]  ? __pfx_kasan_atomics+0x10/0x10
[   16.035581]  ? __pfx_read_tsc+0x10/0x10
[   16.035603]  ? ktime_get_ts64+0x86/0x230
[   16.035628]  kunit_try_run_case+0x1a5/0x480
[   16.035653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.035677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.035701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.035724]  ? __kthread_parkme+0x82/0x180
[   16.035746]  ? preempt_count_sub+0x50/0x80
[   16.035771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.035796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.035819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.035845]  kthread+0x337/0x6f0
[   16.035865]  ? trace_preempt_on+0x20/0xc0
[   16.035889]  ? __pfx_kthread+0x10/0x10
[   16.035911]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.035933]  ? calculate_sigpending+0x7b/0xa0
[   16.035957]  ? __pfx_kthread+0x10/0x10
[   16.035979]  ret_from_fork+0x116/0x1d0
[   16.035999]  ? __pfx_kthread+0x10/0x10
[   16.036020]  ret_from_fork_asm+0x1a/0x30
[   16.036051]  </TASK>
[   16.036064] 
[   16.043302] Allocated by task 283:
[   16.043441]  kasan_save_stack+0x45/0x70
[   16.043589]  kasan_save_track+0x18/0x40
[   16.043728]  kasan_save_alloc_info+0x3b/0x50
[   16.043879]  __kasan_kmalloc+0xb7/0xc0
[   16.044071]  __kmalloc_cache_noprof+0x189/0x420
[   16.044336]  kasan_atomics+0x95/0x310
[   16.044525]  kunit_try_run_case+0x1a5/0x480
[   16.044975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.045237]  kthread+0x337/0x6f0
[   16.045404]  ret_from_fork+0x116/0x1d0
[   16.045592]  ret_from_fork_asm+0x1a/0x30
[   16.045790] 
[   16.045888] The buggy address belongs to the object at ffff8881027c5180
[   16.045888]  which belongs to the cache kmalloc-64 of size 64
[   16.046374] The buggy address is located 0 bytes to the right of
[   16.046374]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.046754] 
[   16.046906] The buggy address belongs to the physical page:
[   16.047169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.047798] flags: 0x200000000000000(node=0|zone=2)
[   16.048020] page_type: f5(slab)
[   16.048154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.048397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.048628] page dumped because: kasan: bad access detected
[   16.048804] 
[   16.048876] Memory state around the buggy address:
[   16.049035]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049266]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049487] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.049960]                                      ^
[   16.050195]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.050796]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.051111] ==================================================================
[   16.405615] ==================================================================
[   16.406536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.407291] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.407984] 
[   16.408236] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.408283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.408315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.408343] Call Trace:
[   16.408365]  <TASK>
[   16.408385]  dump_stack_lvl+0x73/0xb0
[   16.408414]  print_report+0xd1/0x610
[   16.408437]  ? __virt_addr_valid+0x1db/0x2d0
[   16.408461]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.408483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.408506]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.408528]  kasan_report+0x141/0x180
[   16.408551]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.408577]  kasan_check_range+0x10c/0x1c0
[   16.408601]  __kasan_check_write+0x18/0x20
[   16.408621]  kasan_atomics_helper+0x1e12/0x5450
[   16.408644]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.408669]  ? kasan_save_alloc_info+0x3b/0x50
[   16.408693]  ? kasan_save_stack+0x45/0x70
[   16.408717]  kasan_atomics+0x1dc/0x310
[   16.408740]  ? __pfx_kasan_atomics+0x10/0x10
[   16.408765]  ? __pfx_read_tsc+0x10/0x10
[   16.408787]  ? ktime_get_ts64+0x86/0x230
[   16.408812]  kunit_try_run_case+0x1a5/0x480
[   16.408838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.408862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.408886]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.408910]  ? __kthread_parkme+0x82/0x180
[   16.408931]  ? preempt_count_sub+0x50/0x80
[   16.408956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.408980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.409005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.409030]  kthread+0x337/0x6f0
[   16.409049]  ? trace_preempt_on+0x20/0xc0
[   16.409073]  ? __pfx_kthread+0x10/0x10
[   16.409094]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.409116]  ? calculate_sigpending+0x7b/0xa0
[   16.409140]  ? __pfx_kthread+0x10/0x10
[   16.409175]  ret_from_fork+0x116/0x1d0
[   16.409194]  ? __pfx_kthread+0x10/0x10
[   16.409217]  ret_from_fork_asm+0x1a/0x30
[   16.409247]  </TASK>
[   16.409259] 
[   16.421209] Allocated by task 283:
[   16.421342]  kasan_save_stack+0x45/0x70
[   16.421489]  kasan_save_track+0x18/0x40
[   16.421799]  kasan_save_alloc_info+0x3b/0x50
[   16.422016]  __kasan_kmalloc+0xb7/0xc0
[   16.422219]  __kmalloc_cache_noprof+0x189/0x420
[   16.422537]  kasan_atomics+0x95/0x310
[   16.422672]  kunit_try_run_case+0x1a5/0x480
[   16.423018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.423282]  kthread+0x337/0x6f0
[   16.423446]  ret_from_fork+0x116/0x1d0
[   16.423610]  ret_from_fork_asm+0x1a/0x30
[   16.423781] 
[   16.423855] The buggy address belongs to the object at ffff8881027c5180
[   16.423855]  which belongs to the cache kmalloc-64 of size 64
[   16.424375] The buggy address is located 0 bytes to the right of
[   16.424375]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.424855] 
[   16.424949] The buggy address belongs to the physical page:
[   16.425127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.425381] flags: 0x200000000000000(node=0|zone=2)
[   16.425715] page_type: f5(slab)
[   16.425884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.426238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.426629] page dumped because: kasan: bad access detected
[   16.426855] 
[   16.426957] Memory state around the buggy address:
[   16.427154]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.427375]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.427665] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.427989]                                      ^
[   16.428225]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.428553]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.428841] ==================================================================
[   16.451716] ==================================================================
[   16.452485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.452958] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.453302] 
[   16.453508] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.453556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.453581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.453606] Call Trace:
[   16.453626]  <TASK>
[   16.453645]  dump_stack_lvl+0x73/0xb0
[   16.453676]  print_report+0xd1/0x610
[   16.453699]  ? __virt_addr_valid+0x1db/0x2d0
[   16.453724]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.453756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.453780]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.453803]  kasan_report+0x141/0x180
[   16.453836]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.453863]  kasan_check_range+0x10c/0x1c0
[   16.453887]  __kasan_check_write+0x18/0x20
[   16.453907]  kasan_atomics_helper+0x1f43/0x5450
[   16.453930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.453953]  ? kasan_save_alloc_info+0x3b/0x50
[   16.453977]  ? kasan_save_stack+0x45/0x70
[   16.454001]  kasan_atomics+0x1dc/0x310
[   16.454024]  ? __pfx_kasan_atomics+0x10/0x10
[   16.454049]  ? __pfx_read_tsc+0x10/0x10
[   16.454074]  ? ktime_get_ts64+0x86/0x230
[   16.454099]  kunit_try_run_case+0x1a5/0x480
[   16.454125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.454157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.454181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.454206]  ? __kthread_parkme+0x82/0x180
[   16.454227]  ? preempt_count_sub+0x50/0x80
[   16.454253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.454278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.454320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.454346]  kthread+0x337/0x6f0
[   16.454365]  ? trace_preempt_on+0x20/0xc0
[   16.454389]  ? __pfx_kthread+0x10/0x10
[   16.454411]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.454434]  ? calculate_sigpending+0x7b/0xa0
[   16.454460]  ? __pfx_kthread+0x10/0x10
[   16.454482]  ret_from_fork+0x116/0x1d0
[   16.454502]  ? __pfx_kthread+0x10/0x10
[   16.454524]  ret_from_fork_asm+0x1a/0x30
[   16.454555]  </TASK>
[   16.454567] 
[   16.467220] Allocated by task 283:
[   16.467507]  kasan_save_stack+0x45/0x70
[   16.467880]  kasan_save_track+0x18/0x40
[   16.468265]  kasan_save_alloc_info+0x3b/0x50
[   16.468689]  __kasan_kmalloc+0xb7/0xc0
[   16.469047]  __kmalloc_cache_noprof+0x189/0x420
[   16.469493]  kasan_atomics+0x95/0x310
[   16.469638]  kunit_try_run_case+0x1a5/0x480
[   16.469975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.470482]  kthread+0x337/0x6f0
[   16.470726]  ret_from_fork+0x116/0x1d0
[   16.470863]  ret_from_fork_asm+0x1a/0x30
[   16.471006] 
[   16.471081] The buggy address belongs to the object at ffff8881027c5180
[   16.471081]  which belongs to the cache kmalloc-64 of size 64
[   16.471789] The buggy address is located 0 bytes to the right of
[   16.471789]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.472905] 
[   16.473088] The buggy address belongs to the physical page:
[   16.473787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.474520] flags: 0x200000000000000(node=0|zone=2)
[   16.474941] page_type: f5(slab)
[   16.475067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.475328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.475797] page dumped because: kasan: bad access detected
[   16.476229] 
[   16.476303] Memory state around the buggy address:
[   16.476469]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.476690]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.476911] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.477130]                                      ^
[   16.477592]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478400]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.479013] ==================================================================
[   15.634752] ==================================================================
[   15.635036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.635275] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.635630] 
[   15.635742] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.636167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.636182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.636228] Call Trace:
[   15.636245]  <TASK>
[   15.636263]  dump_stack_lvl+0x73/0xb0
[   15.636295]  print_report+0xd1/0x610
[   15.636330]  ? __virt_addr_valid+0x1db/0x2d0
[   15.636352]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.636373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.636397]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.636437]  kasan_report+0x141/0x180
[   15.636461]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.636487]  kasan_check_range+0x10c/0x1c0
[   15.636511]  __kasan_check_write+0x18/0x20
[   15.636530]  kasan_atomics_helper+0xb6a/0x5450
[   15.636553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.636577]  ? kasan_save_alloc_info+0x3b/0x50
[   15.636602]  ? kasan_save_stack+0x45/0x70
[   15.636626]  kasan_atomics+0x1dc/0x310
[   15.636666]  ? __pfx_kasan_atomics+0x10/0x10
[   15.636691]  ? __pfx_read_tsc+0x10/0x10
[   15.636713]  ? ktime_get_ts64+0x86/0x230
[   15.636739]  kunit_try_run_case+0x1a5/0x480
[   15.636765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.636789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.636813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.636913]  ? __kthread_parkme+0x82/0x180
[   15.636939]  ? preempt_count_sub+0x50/0x80
[   15.636964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.636988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.637013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.637037]  kthread+0x337/0x6f0
[   15.637100]  ? trace_preempt_on+0x20/0xc0
[   15.637152]  ? __pfx_kthread+0x10/0x10
[   15.637189]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.637214]  ? calculate_sigpending+0x7b/0xa0
[   15.637253]  ? __pfx_kthread+0x10/0x10
[   15.637288]  ret_from_fork+0x116/0x1d0
[   15.637308]  ? __pfx_kthread+0x10/0x10
[   15.637330]  ret_from_fork_asm+0x1a/0x30
[   15.637361]  </TASK>
[   15.637373] 
[   15.646678] Allocated by task 283:
[   15.646948]  kasan_save_stack+0x45/0x70
[   15.647180]  kasan_save_track+0x18/0x40
[   15.647375]  kasan_save_alloc_info+0x3b/0x50
[   15.647634]  __kasan_kmalloc+0xb7/0xc0
[   15.647832]  __kmalloc_cache_noprof+0x189/0x420
[   15.648124]  kasan_atomics+0x95/0x310
[   15.648314]  kunit_try_run_case+0x1a5/0x480
[   15.648532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.648772]  kthread+0x337/0x6f0
[   15.648990]  ret_from_fork+0x116/0x1d0
[   15.649212]  ret_from_fork_asm+0x1a/0x30
[   15.649428] 
[   15.649526] The buggy address belongs to the object at ffff8881027c5180
[   15.649526]  which belongs to the cache kmalloc-64 of size 64
[   15.650010] The buggy address is located 0 bytes to the right of
[   15.650010]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.650610] 
[   15.650729] The buggy address belongs to the physical page:
[   15.651079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.651719] flags: 0x200000000000000(node=0|zone=2)
[   15.652101] page_type: f5(slab)
[   15.652276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.652928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.653279] page dumped because: kasan: bad access detected
[   15.653551] 
[   15.653624] Memory state around the buggy address:
[   15.653781]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.654192]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.654663] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.655045]                                      ^
[   15.655265]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.655691]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656073] ==================================================================
[   15.677976] ==================================================================
[   15.678391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.678799] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.679182] 
[   15.679300] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.679347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.679361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.679385] Call Trace:
[   15.679403]  <TASK>
[   15.679421]  dump_stack_lvl+0x73/0xb0
[   15.679450]  print_report+0xd1/0x610
[   15.679473]  ? __virt_addr_valid+0x1db/0x2d0
[   15.679496]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.679519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.679542]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.679565]  kasan_report+0x141/0x180
[   15.679587]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.679614]  __asan_report_load4_noabort+0x18/0x20
[   15.679640]  kasan_atomics_helper+0x4a84/0x5450
[   15.679663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.679687]  ? kasan_save_alloc_info+0x3b/0x50
[   15.679713]  ? kasan_save_stack+0x45/0x70
[   15.679739]  kasan_atomics+0x1dc/0x310
[   15.679762]  ? __pfx_kasan_atomics+0x10/0x10
[   15.679787]  ? __pfx_read_tsc+0x10/0x10
[   15.679809]  ? ktime_get_ts64+0x86/0x230
[   15.679835]  kunit_try_run_case+0x1a5/0x480
[   15.679861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.679884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.679909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.679933]  ? __kthread_parkme+0x82/0x180
[   15.679954]  ? preempt_count_sub+0x50/0x80
[   15.679979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.680026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.680063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.680101]  kthread+0x337/0x6f0
[   15.680121]  ? trace_preempt_on+0x20/0xc0
[   15.680167]  ? __pfx_kthread+0x10/0x10
[   15.680202]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.680237]  ? calculate_sigpending+0x7b/0xa0
[   15.680275]  ? __pfx_kthread+0x10/0x10
[   15.680297]  ret_from_fork+0x116/0x1d0
[   15.680334]  ? __pfx_kthread+0x10/0x10
[   15.680368]  ret_from_fork_asm+0x1a/0x30
[   15.680412]  </TASK>
[   15.680436] 
[   15.689221] Allocated by task 283:
[   15.689413]  kasan_save_stack+0x45/0x70
[   15.689618]  kasan_save_track+0x18/0x40
[   15.689805]  kasan_save_alloc_info+0x3b/0x50
[   15.690268]  __kasan_kmalloc+0xb7/0xc0
[   15.690704]  __kmalloc_cache_noprof+0x189/0x420
[   15.690937]  kasan_atomics+0x95/0x310
[   15.691224]  kunit_try_run_case+0x1a5/0x480
[   15.691565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.691741]  kthread+0x337/0x6f0
[   15.691908]  ret_from_fork+0x116/0x1d0
[   15.692105]  ret_from_fork_asm+0x1a/0x30
[   15.692369] 
[   15.692470] The buggy address belongs to the object at ffff8881027c5180
[   15.692470]  which belongs to the cache kmalloc-64 of size 64
[   15.693027] The buggy address is located 0 bytes to the right of
[   15.693027]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.693626] 
[   15.693750] The buggy address belongs to the physical page:
[   15.694206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.694627] flags: 0x200000000000000(node=0|zone=2)
[   15.694923] page_type: f5(slab)
[   15.695100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.695831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.696082] page dumped because: kasan: bad access detected
[   15.696399] 
[   15.696505] Memory state around the buggy address:
[   15.696759]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697184]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697403] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.697612]                                      ^
[   15.698025]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698382]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698720] ==================================================================
[   15.268390] ==================================================================
[   15.268736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.269117] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.269449] 
[   15.269655] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.269698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.269710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.269732] Call Trace:
[   15.269751]  <TASK>
[   15.269767]  dump_stack_lvl+0x73/0xb0
[   15.269796]  print_report+0xd1/0x610
[   15.269818]  ? __virt_addr_valid+0x1db/0x2d0
[   15.269840]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.269861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.269904]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.270186]  kasan_report+0x141/0x180
[   15.270208]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.270235]  __asan_report_load4_noabort+0x18/0x20
[   15.270259]  kasan_atomics_helper+0x4b88/0x5450
[   15.270282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.270340]  ? kasan_save_alloc_info+0x3b/0x50
[   15.270363]  ? kasan_save_stack+0x45/0x70
[   15.270387]  kasan_atomics+0x1dc/0x310
[   15.270409]  ? __pfx_kasan_atomics+0x10/0x10
[   15.270434]  ? __pfx_read_tsc+0x10/0x10
[   15.270454]  ? ktime_get_ts64+0x86/0x230
[   15.270478]  kunit_try_run_case+0x1a5/0x480
[   15.270520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.270543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.270568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.270591]  ? __kthread_parkme+0x82/0x180
[   15.270611]  ? preempt_count_sub+0x50/0x80
[   15.270635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.270659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.270682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.270706]  kthread+0x337/0x6f0
[   15.270725]  ? trace_preempt_on+0x20/0xc0
[   15.270748]  ? __pfx_kthread+0x10/0x10
[   15.270768]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.270790]  ? calculate_sigpending+0x7b/0xa0
[   15.270814]  ? __pfx_kthread+0x10/0x10
[   15.270835]  ret_from_fork+0x116/0x1d0
[   15.270900]  ? __pfx_kthread+0x10/0x10
[   15.270924]  ret_from_fork_asm+0x1a/0x30
[   15.270954]  </TASK>
[   15.270964] 
[   15.279488] Allocated by task 283:
[   15.279660]  kasan_save_stack+0x45/0x70
[   15.279891]  kasan_save_track+0x18/0x40
[   15.280114]  kasan_save_alloc_info+0x3b/0x50
[   15.280305]  __kasan_kmalloc+0xb7/0xc0
[   15.280516]  __kmalloc_cache_noprof+0x189/0x420
[   15.280737]  kasan_atomics+0x95/0x310
[   15.280918]  kunit_try_run_case+0x1a5/0x480
[   15.281131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.281698]  kthread+0x337/0x6f0
[   15.281898]  ret_from_fork+0x116/0x1d0
[   15.282081]  ret_from_fork_asm+0x1a/0x30
[   15.282330] 
[   15.282422] The buggy address belongs to the object at ffff8881027c5180
[   15.282422]  which belongs to the cache kmalloc-64 of size 64
[   15.283234] The buggy address is located 0 bytes to the right of
[   15.283234]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.283827] 
[   15.283984] The buggy address belongs to the physical page:
[   15.284311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.284684] flags: 0x200000000000000(node=0|zone=2)
[   15.285003] page_type: f5(slab)
[   15.285230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.285624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.285959] page dumped because: kasan: bad access detected
[   15.286631] 
[   15.286713] Memory state around the buggy address:
[   15.286876]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.287098]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.287429] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.288042]                                      ^
[   15.288226]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288781]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289224] ==================================================================
[   16.160581] ==================================================================
[   16.161392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.162036] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.162779] 
[   16.162964] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.163008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.163034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.163058] Call Trace:
[   16.163076]  <TASK>
[   16.163104]  dump_stack_lvl+0x73/0xb0
[   16.163132]  print_report+0xd1/0x610
[   16.163171]  ? __virt_addr_valid+0x1db/0x2d0
[   16.163193]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.163216]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.163253]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.163276]  kasan_report+0x141/0x180
[   16.163298]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.163335]  kasan_check_range+0x10c/0x1c0
[   16.163360]  __kasan_check_write+0x18/0x20
[   16.163380]  kasan_atomics_helper+0x16e7/0x5450
[   16.163402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.163426]  ? kasan_save_alloc_info+0x3b/0x50
[   16.163450]  ? kasan_save_stack+0x45/0x70
[   16.163474]  kasan_atomics+0x1dc/0x310
[   16.163506]  ? __pfx_kasan_atomics+0x10/0x10
[   16.163530]  ? __pfx_read_tsc+0x10/0x10
[   16.163552]  ? ktime_get_ts64+0x86/0x230
[   16.163586]  kunit_try_run_case+0x1a5/0x480
[   16.163611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.163667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.163691]  ? __kthread_parkme+0x82/0x180
[   16.163712]  ? preempt_count_sub+0x50/0x80
[   16.163747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.163796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.163820]  kthread+0x337/0x6f0
[   16.163841]  ? trace_preempt_on+0x20/0xc0
[   16.163874]  ? __pfx_kthread+0x10/0x10
[   16.163895]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.163918]  ? calculate_sigpending+0x7b/0xa0
[   16.163952]  ? __pfx_kthread+0x10/0x10
[   16.163975]  ret_from_fork+0x116/0x1d0
[   16.163994]  ? __pfx_kthread+0x10/0x10
[   16.164016]  ret_from_fork_asm+0x1a/0x30
[   16.164056]  </TASK>
[   16.164068] 
[   16.177129] Allocated by task 283:
[   16.177517]  kasan_save_stack+0x45/0x70
[   16.177685]  kasan_save_track+0x18/0x40
[   16.177824]  kasan_save_alloc_info+0x3b/0x50
[   16.177978]  __kasan_kmalloc+0xb7/0xc0
[   16.178115]  __kmalloc_cache_noprof+0x189/0x420
[   16.178450]  kasan_atomics+0x95/0x310
[   16.178752]  kunit_try_run_case+0x1a5/0x480
[   16.179055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.179501]  kthread+0x337/0x6f0
[   16.179706]  ret_from_fork+0x116/0x1d0
[   16.180067]  ret_from_fork_asm+0x1a/0x30
[   16.180288] 
[   16.180480] The buggy address belongs to the object at ffff8881027c5180
[   16.180480]  which belongs to the cache kmalloc-64 of size 64
[   16.181105] The buggy address is located 0 bytes to the right of
[   16.181105]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.181689] 
[   16.181851] The buggy address belongs to the physical page:
[   16.182236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.182665] flags: 0x200000000000000(node=0|zone=2)
[   16.183113] page_type: f5(slab)
[   16.183248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.183548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.184228] page dumped because: kasan: bad access detected
[   16.184661] 
[   16.184737] Memory state around the buggy address:
[   16.185113]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.185673]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.185896] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.186115]                                      ^
[   16.186288]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186646]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186949] ==================================================================
[   16.337654] ==================================================================
[   16.338064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.338504] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.338852] 
[   16.338987] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.339031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.339044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.339076] Call Trace:
[   16.339093]  <TASK>
[   16.339108]  dump_stack_lvl+0x73/0xb0
[   16.339159]  print_report+0xd1/0x610
[   16.339182]  ? __virt_addr_valid+0x1db/0x2d0
[   16.339206]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.339240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.339264]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.339287]  kasan_report+0x141/0x180
[   16.339331]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.339358]  __asan_report_load8_noabort+0x18/0x20
[   16.339383]  kasan_atomics_helper+0x4f30/0x5450
[   16.339407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.339431]  ? kasan_save_alloc_info+0x3b/0x50
[   16.339455]  ? kasan_save_stack+0x45/0x70
[   16.339479]  kasan_atomics+0x1dc/0x310
[   16.339512]  ? __pfx_kasan_atomics+0x10/0x10
[   16.339537]  ? __pfx_read_tsc+0x10/0x10
[   16.339559]  ? ktime_get_ts64+0x86/0x230
[   16.339596]  kunit_try_run_case+0x1a5/0x480
[   16.339622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.339646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.339681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.339705]  ? __kthread_parkme+0x82/0x180
[   16.339737]  ? preempt_count_sub+0x50/0x80
[   16.339761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.339786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.339821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.339846]  kthread+0x337/0x6f0
[   16.339866]  ? trace_preempt_on+0x20/0xc0
[   16.339902]  ? __pfx_kthread+0x10/0x10
[   16.339924]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.339947]  ? calculate_sigpending+0x7b/0xa0
[   16.339982]  ? __pfx_kthread+0x10/0x10
[   16.340004]  ret_from_fork+0x116/0x1d0
[   16.340023]  ? __pfx_kthread+0x10/0x10
[   16.340057]  ret_from_fork_asm+0x1a/0x30
[   16.340088]  </TASK>
[   16.340099] 
[   16.347230] Allocated by task 283:
[   16.347445]  kasan_save_stack+0x45/0x70
[   16.347650]  kasan_save_track+0x18/0x40
[   16.347842]  kasan_save_alloc_info+0x3b/0x50
[   16.348055]  __kasan_kmalloc+0xb7/0xc0
[   16.348256]  __kmalloc_cache_noprof+0x189/0x420
[   16.348540]  kasan_atomics+0x95/0x310
[   16.348755]  kunit_try_run_case+0x1a5/0x480
[   16.348970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.349227]  kthread+0x337/0x6f0
[   16.349423]  ret_from_fork+0x116/0x1d0
[   16.349564]  ret_from_fork_asm+0x1a/0x30
[   16.349709] 
[   16.349783] The buggy address belongs to the object at ffff8881027c5180
[   16.349783]  which belongs to the cache kmalloc-64 of size 64
[   16.350157] The buggy address is located 0 bytes to the right of
[   16.350157]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.350754] 
[   16.350855] The buggy address belongs to the physical page:
[   16.351115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.351531] flags: 0x200000000000000(node=0|zone=2)
[   16.351776] page_type: f5(slab)
[   16.351983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.352337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.352689] page dumped because: kasan: bad access detected
[   16.352952] 
[   16.353027] Memory state around the buggy address:
[   16.353197]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.353444]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.353701] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.354039]                                      ^
[   16.354327]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.354672]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.355010] ==================================================================
[   15.213086] ==================================================================
[   15.214138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.214584] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.215016] 
[   15.215111] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.215391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.215583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.215608] Call Trace:
[   15.215622]  <TASK>
[   15.215640]  dump_stack_lvl+0x73/0xb0
[   15.215673]  print_report+0xd1/0x610
[   15.215697]  ? __virt_addr_valid+0x1db/0x2d0
[   15.215720]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.215742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.215766]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.215787]  kasan_report+0x141/0x180
[   15.215809]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.215834]  __asan_report_load4_noabort+0x18/0x20
[   15.215923]  kasan_atomics_helper+0x4bbc/0x5450
[   15.215946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.215968]  ? kasan_save_alloc_info+0x3b/0x50
[   15.215991]  ? kasan_save_stack+0x45/0x70
[   15.216015]  kasan_atomics+0x1dc/0x310
[   15.216037]  ? __pfx_kasan_atomics+0x10/0x10
[   15.216060]  ? __pfx_read_tsc+0x10/0x10
[   15.216081]  ? ktime_get_ts64+0x86/0x230
[   15.216106]  kunit_try_run_case+0x1a5/0x480
[   15.216131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.216166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.216190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.216212]  ? __kthread_parkme+0x82/0x180
[   15.216232]  ? preempt_count_sub+0x50/0x80
[   15.216255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.216278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.216301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.216338]  kthread+0x337/0x6f0
[   15.216357]  ? trace_preempt_on+0x20/0xc0
[   15.216380]  ? __pfx_kthread+0x10/0x10
[   15.216400]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.216422]  ? calculate_sigpending+0x7b/0xa0
[   15.216445]  ? __pfx_kthread+0x10/0x10
[   15.216467]  ret_from_fork+0x116/0x1d0
[   15.216486]  ? __pfx_kthread+0x10/0x10
[   15.216506]  ret_from_fork_asm+0x1a/0x30
[   15.216537]  </TASK>
[   15.216548] 
[   15.227849] Allocated by task 283:
[   15.228269]  kasan_save_stack+0x45/0x70
[   15.228656]  kasan_save_track+0x18/0x40
[   15.228829]  kasan_save_alloc_info+0x3b/0x50
[   15.229276]  __kasan_kmalloc+0xb7/0xc0
[   15.229611]  __kmalloc_cache_noprof+0x189/0x420
[   15.229837]  kasan_atomics+0x95/0x310
[   15.230224]  kunit_try_run_case+0x1a5/0x480
[   15.230483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.231109]  kthread+0x337/0x6f0
[   15.231432]  ret_from_fork+0x116/0x1d0
[   15.231723]  ret_from_fork_asm+0x1a/0x30
[   15.231977] 
[   15.232257] The buggy address belongs to the object at ffff8881027c5180
[   15.232257]  which belongs to the cache kmalloc-64 of size 64
[   15.232878] The buggy address is located 0 bytes to the right of
[   15.232878]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.233761] 
[   15.233913] The buggy address belongs to the physical page:
[   15.234269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.234662] flags: 0x200000000000000(node=0|zone=2)
[   15.235172] page_type: f5(slab)
[   15.235479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.235815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.236334] page dumped because: kasan: bad access detected
[   15.236708] 
[   15.236810] Memory state around the buggy address:
[   15.237346]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.237648]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.238155] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.238534]                                      ^
[   15.238831]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.239365]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.239785] ==================================================================
[   15.868807] ==================================================================
[   15.869056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.869606] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.870278] 
[   15.870430] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.870624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.870654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.870679] Call Trace:
[   15.870699]  <TASK>
[   15.870839]  dump_stack_lvl+0x73/0xb0
[   15.870892]  print_report+0xd1/0x610
[   15.870915]  ? __virt_addr_valid+0x1db/0x2d0
[   15.870939]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.870960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.870984]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.871006]  kasan_report+0x141/0x180
[   15.871029]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.871055]  __asan_report_load4_noabort+0x18/0x20
[   15.871081]  kasan_atomics_helper+0x4a1c/0x5450
[   15.871105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.871128]  ? kasan_save_alloc_info+0x3b/0x50
[   15.871163]  ? kasan_save_stack+0x45/0x70
[   15.871186]  kasan_atomics+0x1dc/0x310
[   15.871210]  ? __pfx_kasan_atomics+0x10/0x10
[   15.871235]  ? __pfx_read_tsc+0x10/0x10
[   15.871258]  ? ktime_get_ts64+0x86/0x230
[   15.871283]  kunit_try_run_case+0x1a5/0x480
[   15.871309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.871332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.871359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.871383]  ? __kthread_parkme+0x82/0x180
[   15.871405]  ? preempt_count_sub+0x50/0x80
[   15.871430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.871454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.871478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.871503]  kthread+0x337/0x6f0
[   15.871523]  ? trace_preempt_on+0x20/0xc0
[   15.871548]  ? __pfx_kthread+0x10/0x10
[   15.871570]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.871592]  ? calculate_sigpending+0x7b/0xa0
[   15.871617]  ? __pfx_kthread+0x10/0x10
[   15.871639]  ret_from_fork+0x116/0x1d0
[   15.871659]  ? __pfx_kthread+0x10/0x10
[   15.871682]  ret_from_fork_asm+0x1a/0x30
[   15.871713]  </TASK>
[   15.871726] 
[   15.882568] Allocated by task 283:
[   15.883100]  kasan_save_stack+0x45/0x70
[   15.883405]  kasan_save_track+0x18/0x40
[   15.883552]  kasan_save_alloc_info+0x3b/0x50
[   15.883902]  __kasan_kmalloc+0xb7/0xc0
[   15.884085]  __kmalloc_cache_noprof+0x189/0x420
[   15.884317]  kasan_atomics+0x95/0x310
[   15.884510]  kunit_try_run_case+0x1a5/0x480
[   15.884709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.884954]  kthread+0x337/0x6f0
[   15.885545]  ret_from_fork+0x116/0x1d0
[   15.885695]  ret_from_fork_asm+0x1a/0x30
[   15.886096] 
[   15.886242] The buggy address belongs to the object at ffff8881027c5180
[   15.886242]  which belongs to the cache kmalloc-64 of size 64
[   15.886822] The buggy address is located 0 bytes to the right of
[   15.886822]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.887597] 
[   15.887817] The buggy address belongs to the physical page:
[   15.888099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.888592] flags: 0x200000000000000(node=0|zone=2)
[   15.888800] page_type: f5(slab)
[   15.889110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.889400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.889744] page dumped because: kasan: bad access detected
[   15.889974] 
[   15.890125] Memory state around the buggy address:
[   15.890776]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.891251]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.891600] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.892127]                                      ^
[   15.892359]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.892819]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.893207] ==================================================================
[   15.980636] ==================================================================
[   15.981454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.981748] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.982034] 
[   15.982152] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.982199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.982212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.982235] Call Trace:
[   15.982253]  <TASK>
[   15.982269]  dump_stack_lvl+0x73/0xb0
[   15.982297]  print_report+0xd1/0x610
[   15.982330]  ? __virt_addr_valid+0x1db/0x2d0
[   15.982355]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.982379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.982403]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.982428]  kasan_report+0x141/0x180
[   15.982451]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.982480]  kasan_check_range+0x10c/0x1c0
[   15.982506]  __kasan_check_write+0x18/0x20
[   15.982526]  kasan_atomics_helper+0x12e6/0x5450
[   15.982550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.982573]  ? kasan_save_alloc_info+0x3b/0x50
[   15.982597]  ? kasan_save_stack+0x45/0x70
[   15.982623]  kasan_atomics+0x1dc/0x310
[   15.982646]  ? __pfx_kasan_atomics+0x10/0x10
[   15.982671]  ? __pfx_read_tsc+0x10/0x10
[   15.982693]  ? ktime_get_ts64+0x86/0x230
[   15.982718]  kunit_try_run_case+0x1a5/0x480
[   15.982745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.982795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.982822]  ? __kthread_parkme+0x82/0x180
[   15.982843]  ? preempt_count_sub+0x50/0x80
[   15.982868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.982946]  kthread+0x337/0x6f0
[   15.982966]  ? trace_preempt_on+0x20/0xc0
[   15.982990]  ? __pfx_kthread+0x10/0x10
[   15.983012]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.983035]  ? calculate_sigpending+0x7b/0xa0
[   15.983062]  ? __pfx_kthread+0x10/0x10
[   15.983084]  ret_from_fork+0x116/0x1d0
[   15.983105]  ? __pfx_kthread+0x10/0x10
[   15.983126]  ret_from_fork_asm+0x1a/0x30
[   15.983167]  </TASK>
[   15.983179] 
[   15.990728] Allocated by task 283:
[   15.990862]  kasan_save_stack+0x45/0x70
[   15.991010]  kasan_save_track+0x18/0x40
[   15.991159]  kasan_save_alloc_info+0x3b/0x50
[   15.991376]  __kasan_kmalloc+0xb7/0xc0
[   15.991565]  __kmalloc_cache_noprof+0x189/0x420
[   15.991787]  kasan_atomics+0x95/0x310
[   15.991976]  kunit_try_run_case+0x1a5/0x480
[   15.992158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.992341]  kthread+0x337/0x6f0
[   15.992467]  ret_from_fork+0x116/0x1d0
[   15.992767]  ret_from_fork_asm+0x1a/0x30
[   15.992968] 
[   15.993066] The buggy address belongs to the object at ffff8881027c5180
[   15.993066]  which belongs to the cache kmalloc-64 of size 64
[   15.993809] The buggy address is located 0 bytes to the right of
[   15.993809]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.994195] 
[   15.994271] The buggy address belongs to the physical page:
[   15.994449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.994905] flags: 0x200000000000000(node=0|zone=2)
[   15.995151] page_type: f5(slab)
[   15.995329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.995672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.996012] page dumped because: kasan: bad access detected
[   15.996242] 
[   15.996344] Memory state around the buggy address:
[   15.996509]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996732]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996954] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.997183]                                      ^
[   15.997500]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997827]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998162] ==================================================================
[   15.387261] ==================================================================
[   15.387645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.388206] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.388796] 
[   15.388963] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.389013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.389026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.389050] Call Trace:
[   15.389070]  <TASK>
[   15.389088]  dump_stack_lvl+0x73/0xb0
[   15.389119]  print_report+0xd1/0x610
[   15.389141]  ? __virt_addr_valid+0x1db/0x2d0
[   15.389177]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.389199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.389222]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.389245]  kasan_report+0x141/0x180
[   15.389268]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.389551]  __asan_report_store4_noabort+0x1b/0x30
[   15.389583]  kasan_atomics_helper+0x4b3a/0x5450
[   15.389607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.389630]  ? kasan_save_alloc_info+0x3b/0x50
[   15.389654]  ? kasan_save_stack+0x45/0x70
[   15.389679]  kasan_atomics+0x1dc/0x310
[   15.389704]  ? __pfx_kasan_atomics+0x10/0x10
[   15.389729]  ? __pfx_read_tsc+0x10/0x10
[   15.389751]  ? ktime_get_ts64+0x86/0x230
[   15.389776]  kunit_try_run_case+0x1a5/0x480
[   15.389801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.389825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.389850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.389875]  ? __kthread_parkme+0x82/0x180
[   15.389899]  ? preempt_count_sub+0x50/0x80
[   15.389925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.389949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.389999]  kthread+0x337/0x6f0
[   15.390018]  ? trace_preempt_on+0x20/0xc0
[   15.390042]  ? __pfx_kthread+0x10/0x10
[   15.390064]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.390086]  ? calculate_sigpending+0x7b/0xa0
[   15.390111]  ? __pfx_kthread+0x10/0x10
[   15.390134]  ret_from_fork+0x116/0x1d0
[   15.390164]  ? __pfx_kthread+0x10/0x10
[   15.390186]  ret_from_fork_asm+0x1a/0x30
[   15.390218]  </TASK>
[   15.390229] 
[   15.400137] Allocated by task 283:
[   15.400498]  kasan_save_stack+0x45/0x70
[   15.400806]  kasan_save_track+0x18/0x40
[   15.400959]  kasan_save_alloc_info+0x3b/0x50
[   15.401227]  __kasan_kmalloc+0xb7/0xc0
[   15.401585]  __kmalloc_cache_noprof+0x189/0x420
[   15.401893]  kasan_atomics+0x95/0x310
[   15.402344]  kunit_try_run_case+0x1a5/0x480
[   15.402563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.402809]  kthread+0x337/0x6f0
[   15.403173]  ret_from_fork+0x116/0x1d0
[   15.403560]  ret_from_fork_asm+0x1a/0x30
[   15.403750] 
[   15.403936] The buggy address belongs to the object at ffff8881027c5180
[   15.403936]  which belongs to the cache kmalloc-64 of size 64
[   15.404627] The buggy address is located 0 bytes to the right of
[   15.404627]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.405289] 
[   15.405484] The buggy address belongs to the physical page:
[   15.405720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.406047] flags: 0x200000000000000(node=0|zone=2)
[   15.406545] page_type: f5(slab)
[   15.406692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.407207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.407581] page dumped because: kasan: bad access detected
[   15.408023] 
[   15.408106] Memory state around the buggy address:
[   15.408341]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.408616]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.409163] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.409525]                                      ^
[   15.409738]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.410034]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.410619] ==================================================================
[   15.240632] ==================================================================
[   15.240951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.241605] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.242422] 
[   15.242710] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.242759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.242772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.242794] Call Trace:
[   15.242811]  <TASK>
[   15.242828]  dump_stack_lvl+0x73/0xb0
[   15.242857]  print_report+0xd1/0x610
[   15.242879]  ? __virt_addr_valid+0x1db/0x2d0
[   15.242904]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.242925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.242968]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.242989]  kasan_report+0x141/0x180
[   15.243011]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.243037]  __asan_report_store4_noabort+0x1b/0x30
[   15.243061]  kasan_atomics_helper+0x4ba2/0x5450
[   15.243083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.243106]  ? kasan_save_alloc_info+0x3b/0x50
[   15.243129]  ? kasan_save_stack+0x45/0x70
[   15.243163]  kasan_atomics+0x1dc/0x310
[   15.243186]  ? __pfx_kasan_atomics+0x10/0x10
[   15.243209]  ? __pfx_read_tsc+0x10/0x10
[   15.243230]  ? ktime_get_ts64+0x86/0x230
[   15.243254]  kunit_try_run_case+0x1a5/0x480
[   15.243279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.243302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.243325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.243348]  ? __kthread_parkme+0x82/0x180
[   15.243368]  ? preempt_count_sub+0x50/0x80
[   15.243391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.243415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.243438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.243462]  kthread+0x337/0x6f0
[   15.243481]  ? trace_preempt_on+0x20/0xc0
[   15.243504]  ? __pfx_kthread+0x10/0x10
[   15.243524]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.243545]  ? calculate_sigpending+0x7b/0xa0
[   15.243569]  ? __pfx_kthread+0x10/0x10
[   15.243590]  ret_from_fork+0x116/0x1d0
[   15.243609]  ? __pfx_kthread+0x10/0x10
[   15.243629]  ret_from_fork_asm+0x1a/0x30
[   15.243659]  </TASK>
[   15.243670] 
[   15.258022] Allocated by task 283:
[   15.258174]  kasan_save_stack+0x45/0x70
[   15.258374]  kasan_save_track+0x18/0x40
[   15.258823]  kasan_save_alloc_info+0x3b/0x50
[   15.259281]  __kasan_kmalloc+0xb7/0xc0
[   15.259656]  __kmalloc_cache_noprof+0x189/0x420
[   15.260178]  kasan_atomics+0x95/0x310
[   15.260601]  kunit_try_run_case+0x1a5/0x480
[   15.261088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.261340]  kthread+0x337/0x6f0
[   15.261668]  ret_from_fork+0x116/0x1d0
[   15.262056]  ret_from_fork_asm+0x1a/0x30
[   15.262360] 
[   15.262437] The buggy address belongs to the object at ffff8881027c5180
[   15.262437]  which belongs to the cache kmalloc-64 of size 64
[   15.262787] The buggy address is located 0 bytes to the right of
[   15.262787]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.263414] 
[   15.263502] The buggy address belongs to the physical page:
[   15.263716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.264072] flags: 0x200000000000000(node=0|zone=2)
[   15.264328] page_type: f5(slab)
[   15.264504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.264870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.265287] page dumped because: kasan: bad access detected
[   15.265470] 
[   15.265571] Memory state around the buggy address:
[   15.265824]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.266076]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.266414] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.266841]                                      ^
[   15.267012]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.267542]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.267835] ==================================================================
[   16.084192] ==================================================================
[   16.084873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.085574] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.086013] 
[   16.086213] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.086262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.086275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.086320] Call Trace:
[   16.086352]  <TASK>
[   16.086373]  dump_stack_lvl+0x73/0xb0
[   16.086404]  print_report+0xd1/0x610
[   16.086439]  ? __virt_addr_valid+0x1db/0x2d0
[   16.086464]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.086487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.086509]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.086531]  kasan_report+0x141/0x180
[   16.086553]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.086580]  __asan_report_store8_noabort+0x1b/0x30
[   16.086606]  kasan_atomics_helper+0x50d4/0x5450
[   16.086629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.086653]  ? kasan_save_alloc_info+0x3b/0x50
[   16.086677]  ? kasan_save_stack+0x45/0x70
[   16.086702]  kasan_atomics+0x1dc/0x310
[   16.086726]  ? __pfx_kasan_atomics+0x10/0x10
[   16.086751]  ? __pfx_read_tsc+0x10/0x10
[   16.086773]  ? ktime_get_ts64+0x86/0x230
[   16.086798]  kunit_try_run_case+0x1a5/0x480
[   16.086824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.086847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.086872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.086895]  ? __kthread_parkme+0x82/0x180
[   16.086917]  ? preempt_count_sub+0x50/0x80
[   16.086942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.086966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.086990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.087015]  kthread+0x337/0x6f0
[   16.087035]  ? trace_preempt_on+0x20/0xc0
[   16.087060]  ? __pfx_kthread+0x10/0x10
[   16.087082]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.087104]  ? calculate_sigpending+0x7b/0xa0
[   16.087129]  ? __pfx_kthread+0x10/0x10
[   16.087162]  ret_from_fork+0x116/0x1d0
[   16.087182]  ? __pfx_kthread+0x10/0x10
[   16.087203]  ret_from_fork_asm+0x1a/0x30
[   16.087235]  </TASK>
[   16.087247] 
[   16.094820] Allocated by task 283:
[   16.094959]  kasan_save_stack+0x45/0x70
[   16.095117]  kasan_save_track+0x18/0x40
[   16.095341]  kasan_save_alloc_info+0x3b/0x50
[   16.095555]  __kasan_kmalloc+0xb7/0xc0
[   16.095745]  __kmalloc_cache_noprof+0x189/0x420
[   16.095969]  kasan_atomics+0x95/0x310
[   16.096246]  kunit_try_run_case+0x1a5/0x480
[   16.096403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.096602]  kthread+0x337/0x6f0
[   16.096774]  ret_from_fork+0x116/0x1d0
[   16.096965]  ret_from_fork_asm+0x1a/0x30
[   16.097201] 
[   16.097301] The buggy address belongs to the object at ffff8881027c5180
[   16.097301]  which belongs to the cache kmalloc-64 of size 64
[   16.097787] The buggy address is located 0 bytes to the right of
[   16.097787]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.098181] 
[   16.098306] The buggy address belongs to the physical page:
[   16.098558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.098912] flags: 0x200000000000000(node=0|zone=2)
[   16.099213] page_type: f5(slab)
[   16.099454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.099795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.100060] page dumped because: kasan: bad access detected
[   16.100253] 
[   16.100335] Memory state around the buggy address:
[   16.100565]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.100914]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101268] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.101629]                                      ^
[   16.101852]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102159]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102452] ==================================================================
[   16.121275] ==================================================================
[   16.121640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.122140] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.122553] 
[   16.122657] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.122701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.122714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.122736] Call Trace:
[   16.122753]  <TASK>
[   16.122770]  dump_stack_lvl+0x73/0xb0
[   16.122799]  print_report+0xd1/0x610
[   16.122822]  ? __virt_addr_valid+0x1db/0x2d0
[   16.122845]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.122867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.122890]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.122912]  kasan_report+0x141/0x180
[   16.122934]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.122961]  kasan_check_range+0x10c/0x1c0
[   16.122985]  __kasan_check_write+0x18/0x20
[   16.123004]  kasan_atomics_helper+0x15b6/0x5450
[   16.123034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.123058]  ? kasan_save_alloc_info+0x3b/0x50
[   16.123082]  ? kasan_save_stack+0x45/0x70
[   16.123106]  kasan_atomics+0x1dc/0x310
[   16.123130]  ? __pfx_kasan_atomics+0x10/0x10
[   16.123164]  ? __pfx_read_tsc+0x10/0x10
[   16.123187]  ? ktime_get_ts64+0x86/0x230
[   16.123212]  kunit_try_run_case+0x1a5/0x480
[   16.123237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.123261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.123285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.123309]  ? __kthread_parkme+0x82/0x180
[   16.123331]  ? preempt_count_sub+0x50/0x80
[   16.123356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.123381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.123405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.123429]  kthread+0x337/0x6f0
[   16.123449]  ? trace_preempt_on+0x20/0xc0
[   16.123473]  ? __pfx_kthread+0x10/0x10
[   16.123505]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.123527]  ? calculate_sigpending+0x7b/0xa0
[   16.123552]  ? __pfx_kthread+0x10/0x10
[   16.123585]  ret_from_fork+0x116/0x1d0
[   16.123604]  ? __pfx_kthread+0x10/0x10
[   16.123625]  ret_from_fork_asm+0x1a/0x30
[   16.123656]  </TASK>
[   16.123667] 
[   16.131617] Allocated by task 283:
[   16.131783]  kasan_save_stack+0x45/0x70
[   16.131934]  kasan_save_track+0x18/0x40
[   16.132073]  kasan_save_alloc_info+0x3b/0x50
[   16.132235]  __kasan_kmalloc+0xb7/0xc0
[   16.132428]  __kmalloc_cache_noprof+0x189/0x420
[   16.132649]  kasan_atomics+0x95/0x310
[   16.132835]  kunit_try_run_case+0x1a5/0x480
[   16.133121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133480]  kthread+0x337/0x6f0
[   16.133651]  ret_from_fork+0x116/0x1d0
[   16.133839]  ret_from_fork_asm+0x1a/0x30
[   16.134036] 
[   16.134114] The buggy address belongs to the object at ffff8881027c5180
[   16.134114]  which belongs to the cache kmalloc-64 of size 64
[   16.134817] The buggy address is located 0 bytes to the right of
[   16.134817]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.135407] 
[   16.135490] The buggy address belongs to the physical page:
[   16.135667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.136023] flags: 0x200000000000000(node=0|zone=2)
[   16.136253] page_type: f5(slab)
[   16.136467] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.136786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.137109] page dumped because: kasan: bad access detected
[   16.137295] 
[   16.137414] Memory state around the buggy address:
[   16.137652]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.137948]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.138262] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.138657]                                      ^
[   16.138875]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139184]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139528] ==================================================================
[   15.459390] ==================================================================
[   15.459982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.460268] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.460699] 
[   15.460816] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.460863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.460878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.460902] Call Trace:
[   15.460921]  <TASK>
[   15.460939]  dump_stack_lvl+0x73/0xb0
[   15.460968]  print_report+0xd1/0x610
[   15.460993]  ? __virt_addr_valid+0x1db/0x2d0
[   15.461017]  ? kasan_atomics_helper+0x697/0x5450
[   15.461038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.461061]  ? kasan_atomics_helper+0x697/0x5450
[   15.461083]  kasan_report+0x141/0x180
[   15.461106]  ? kasan_atomics_helper+0x697/0x5450
[   15.461132]  kasan_check_range+0x10c/0x1c0
[   15.461168]  __kasan_check_write+0x18/0x20
[   15.461188]  kasan_atomics_helper+0x697/0x5450
[   15.461212]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.461236]  ? kasan_save_alloc_info+0x3b/0x50
[   15.461260]  ? kasan_save_stack+0x45/0x70
[   15.461285]  kasan_atomics+0x1dc/0x310
[   15.461308]  ? __pfx_kasan_atomics+0x10/0x10
[   15.461332]  ? __pfx_read_tsc+0x10/0x10
[   15.461355]  ? ktime_get_ts64+0x86/0x230
[   15.461380]  kunit_try_run_case+0x1a5/0x480
[   15.461406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.461430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.461454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.461479]  ? __kthread_parkme+0x82/0x180
[   15.461500]  ? preempt_count_sub+0x50/0x80
[   15.461525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.461549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.461574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.461598]  kthread+0x337/0x6f0
[   15.461618]  ? trace_preempt_on+0x20/0xc0
[   15.461642]  ? __pfx_kthread+0x10/0x10
[   15.461663]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.461686]  ? calculate_sigpending+0x7b/0xa0
[   15.461710]  ? __pfx_kthread+0x10/0x10
[   15.461732]  ret_from_fork+0x116/0x1d0
[   15.461751]  ? __pfx_kthread+0x10/0x10
[   15.461773]  ret_from_fork_asm+0x1a/0x30
[   15.461804]  </TASK>
[   15.461816] 
[   15.469792] Allocated by task 283:
[   15.469936]  kasan_save_stack+0x45/0x70
[   15.470079]  kasan_save_track+0x18/0x40
[   15.470225]  kasan_save_alloc_info+0x3b/0x50
[   15.470374]  __kasan_kmalloc+0xb7/0xc0
[   15.470506]  __kmalloc_cache_noprof+0x189/0x420
[   15.470776]  kasan_atomics+0x95/0x310
[   15.470963]  kunit_try_run_case+0x1a5/0x480
[   15.471237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.471510]  kthread+0x337/0x6f0
[   15.471638]  ret_from_fork+0x116/0x1d0
[   15.471771]  ret_from_fork_asm+0x1a/0x30
[   15.471911] 
[   15.471983] The buggy address belongs to the object at ffff8881027c5180
[   15.471983]  which belongs to the cache kmalloc-64 of size 64
[   15.473187] The buggy address is located 0 bytes to the right of
[   15.473187]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.473762] 
[   15.473858] The buggy address belongs to the physical page:
[   15.474074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.474405] flags: 0x200000000000000(node=0|zone=2)
[   15.474630] page_type: f5(slab)
[   15.474809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.475200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.475589] page dumped because: kasan: bad access detected
[   15.475819] 
[   15.475963] Memory state around the buggy address:
[   15.476137]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476420]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476813] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.477065]                                      ^
[   15.477496]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.478141]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.478466] ==================================================================
[   16.103078] ==================================================================
[   16.103445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.103772] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.104139] 
[   16.104249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.104295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.104324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.104348] Call Trace:
[   16.104367]  <TASK>
[   16.104384]  dump_stack_lvl+0x73/0xb0
[   16.104425]  print_report+0xd1/0x610
[   16.104449]  ? __virt_addr_valid+0x1db/0x2d0
[   16.104482]  ? kasan_atomics_helper+0x151d/0x5450
[   16.104504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.104527]  ? kasan_atomics_helper+0x151d/0x5450
[   16.104559]  kasan_report+0x141/0x180
[   16.104582]  ? kasan_atomics_helper+0x151d/0x5450
[   16.104609]  kasan_check_range+0x10c/0x1c0
[   16.104635]  __kasan_check_write+0x18/0x20
[   16.104664]  kasan_atomics_helper+0x151d/0x5450
[   16.104687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.104712]  ? kasan_save_alloc_info+0x3b/0x50
[   16.104746]  ? kasan_save_stack+0x45/0x70
[   16.104770]  kasan_atomics+0x1dc/0x310
[   16.104793]  ? __pfx_kasan_atomics+0x10/0x10
[   16.104818]  ? __pfx_read_tsc+0x10/0x10
[   16.104840]  ? ktime_get_ts64+0x86/0x230
[   16.104865]  kunit_try_run_case+0x1a5/0x480
[   16.104891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.104914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.104938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.104972]  ? __kthread_parkme+0x82/0x180
[   16.104993]  ? preempt_count_sub+0x50/0x80
[   16.105018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.105053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.105077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.105102]  kthread+0x337/0x6f0
[   16.105122]  ? trace_preempt_on+0x20/0xc0
[   16.105155]  ? __pfx_kthread+0x10/0x10
[   16.105177]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.105199]  ? calculate_sigpending+0x7b/0xa0
[   16.105223]  ? __pfx_kthread+0x10/0x10
[   16.105246]  ret_from_fork+0x116/0x1d0
[   16.105266]  ? __pfx_kthread+0x10/0x10
[   16.105287]  ret_from_fork_asm+0x1a/0x30
[   16.105319]  </TASK>
[   16.105330] 
[   16.112981] Allocated by task 283:
[   16.113190]  kasan_save_stack+0x45/0x70
[   16.113404]  kasan_save_track+0x18/0x40
[   16.113547]  kasan_save_alloc_info+0x3b/0x50
[   16.113786]  __kasan_kmalloc+0xb7/0xc0
[   16.113951]  __kmalloc_cache_noprof+0x189/0x420
[   16.114185]  kasan_atomics+0x95/0x310
[   16.114406]  kunit_try_run_case+0x1a5/0x480
[   16.114605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.114851]  kthread+0x337/0x6f0
[   16.115034]  ret_from_fork+0x116/0x1d0
[   16.115209]  ret_from_fork_asm+0x1a/0x30
[   16.115414] 
[   16.115509] The buggy address belongs to the object at ffff8881027c5180
[   16.115509]  which belongs to the cache kmalloc-64 of size 64
[   16.116001] The buggy address is located 0 bytes to the right of
[   16.116001]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.116618] 
[   16.116700] The buggy address belongs to the physical page:
[   16.116954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.117298] flags: 0x200000000000000(node=0|zone=2)
[   16.117520] page_type: f5(slab)
[   16.117645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.117879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.118110] page dumped because: kasan: bad access detected
[   16.118393] 
[   16.118487] Memory state around the buggy address:
[   16.118882]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.119214]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.119639] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.119855]                                      ^
[   16.120011]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.120237]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.120595] ==================================================================
[   16.562160] ==================================================================
[   16.562498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.562736] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.562962] 
[   16.563051] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.563100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.563113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.563136] Call Trace:
[   16.563164]  <TASK>
[   16.563180]  dump_stack_lvl+0x73/0xb0
[   16.563206]  print_report+0xd1/0x610
[   16.563230]  ? __virt_addr_valid+0x1db/0x2d0
[   16.563253]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.563275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.563309]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.563331]  kasan_report+0x141/0x180
[   16.563353]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.563391]  __asan_report_load8_noabort+0x18/0x20
[   16.563415]  kasan_atomics_helper+0x4fb2/0x5450
[   16.563438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.563461]  ? kasan_save_alloc_info+0x3b/0x50
[   16.563485]  ? kasan_save_stack+0x45/0x70
[   16.563508]  kasan_atomics+0x1dc/0x310
[   16.563532]  ? __pfx_kasan_atomics+0x10/0x10
[   16.563556]  ? __pfx_read_tsc+0x10/0x10
[   16.563577]  ? ktime_get_ts64+0x86/0x230
[   16.563602]  kunit_try_run_case+0x1a5/0x480
[   16.563627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.563650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.563674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.563698]  ? __kthread_parkme+0x82/0x180
[   16.563719]  ? preempt_count_sub+0x50/0x80
[   16.563743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.563767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.563791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.563815]  kthread+0x337/0x6f0
[   16.563835]  ? trace_preempt_on+0x20/0xc0
[   16.563859]  ? __pfx_kthread+0x10/0x10
[   16.563880]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.563901]  ? calculate_sigpending+0x7b/0xa0
[   16.563925]  ? __pfx_kthread+0x10/0x10
[   16.563947]  ret_from_fork+0x116/0x1d0
[   16.563966]  ? __pfx_kthread+0x10/0x10
[   16.563987]  ret_from_fork_asm+0x1a/0x30
[   16.564019]  </TASK>
[   16.564030] 
[   16.572049] Allocated by task 283:
[   16.572235]  kasan_save_stack+0x45/0x70
[   16.572533]  kasan_save_track+0x18/0x40
[   16.572674]  kasan_save_alloc_info+0x3b/0x50
[   16.572877]  __kasan_kmalloc+0xb7/0xc0
[   16.573069]  __kmalloc_cache_noprof+0x189/0x420
[   16.573348]  kasan_atomics+0x95/0x310
[   16.573520]  kunit_try_run_case+0x1a5/0x480
[   16.573755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.573998]  kthread+0x337/0x6f0
[   16.574167]  ret_from_fork+0x116/0x1d0
[   16.574399]  ret_from_fork_asm+0x1a/0x30
[   16.574567] 
[   16.574644] The buggy address belongs to the object at ffff8881027c5180
[   16.574644]  which belongs to the cache kmalloc-64 of size 64
[   16.575184] The buggy address is located 0 bytes to the right of
[   16.575184]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.575740] 
[   16.575840] The buggy address belongs to the physical page:
[   16.576086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.576506] flags: 0x200000000000000(node=0|zone=2)
[   16.576720] page_type: f5(slab)
[   16.576915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.577231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.577621] page dumped because: kasan: bad access detected
[   16.577871] 
[   16.577978] Memory state around the buggy address:
[   16.578161]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.578423]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.578799] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.579139]                                      ^
[   16.579459]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.579790]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.580087] ==================================================================
[   15.961648] ==================================================================
[   15.961958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.962606] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.962947] 
[   15.963080] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.963126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.963139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.963174] Call Trace:
[   15.963195]  <TASK>
[   15.963355]  dump_stack_lvl+0x73/0xb0
[   15.963388]  print_report+0xd1/0x610
[   15.963411]  ? __virt_addr_valid+0x1db/0x2d0
[   15.963436]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.963524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.963548]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.963627]  kasan_report+0x141/0x180
[   15.963651]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.963678]  __asan_report_load4_noabort+0x18/0x20
[   15.963703]  kasan_atomics_helper+0x49e8/0x5450
[   15.963728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.963753]  ? kasan_save_alloc_info+0x3b/0x50
[   15.963777]  ? kasan_save_stack+0x45/0x70
[   15.963801]  kasan_atomics+0x1dc/0x310
[   15.963825]  ? __pfx_kasan_atomics+0x10/0x10
[   15.963849]  ? __pfx_read_tsc+0x10/0x10
[   15.963871]  ? ktime_get_ts64+0x86/0x230
[   15.963896]  kunit_try_run_case+0x1a5/0x480
[   15.963923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.963971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.963994]  ? __kthread_parkme+0x82/0x180
[   15.964015]  ? preempt_count_sub+0x50/0x80
[   15.964039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.964065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.964114]  kthread+0x337/0x6f0
[   15.964134]  ? trace_preempt_on+0x20/0xc0
[   15.964169]  ? __pfx_kthread+0x10/0x10
[   15.964190]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.964213]  ? calculate_sigpending+0x7b/0xa0
[   15.964238]  ? __pfx_kthread+0x10/0x10
[   15.964259]  ret_from_fork+0x116/0x1d0
[   15.964279]  ? __pfx_kthread+0x10/0x10
[   15.964300]  ret_from_fork_asm+0x1a/0x30
[   15.964349]  </TASK>
[   15.964360] 
[   15.971774] Allocated by task 283:
[   15.971938]  kasan_save_stack+0x45/0x70
[   15.972085]  kasan_save_track+0x18/0x40
[   15.972233]  kasan_save_alloc_info+0x3b/0x50
[   15.972391]  __kasan_kmalloc+0xb7/0xc0
[   15.972580]  __kmalloc_cache_noprof+0x189/0x420
[   15.972799]  kasan_atomics+0x95/0x310
[   15.972990]  kunit_try_run_case+0x1a5/0x480
[   15.973189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.973372]  kthread+0x337/0x6f0
[   15.973498]  ret_from_fork+0x116/0x1d0
[   15.973850]  ret_from_fork_asm+0x1a/0x30
[   15.974059] 
[   15.974169] The buggy address belongs to the object at ffff8881027c5180
[   15.974169]  which belongs to the cache kmalloc-64 of size 64
[   15.974768] The buggy address is located 0 bytes to the right of
[   15.974768]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.975262] 
[   15.975379] The buggy address belongs to the physical page:
[   15.975623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.975924] flags: 0x200000000000000(node=0|zone=2)
[   15.976179] page_type: f5(slab)
[   15.976363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.976628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.976972] page dumped because: kasan: bad access detected
[   15.977216] 
[   15.977290] Memory state around the buggy address:
[   15.977525]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.977817]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.978085] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.978311]                                      ^
[   15.978540]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978860]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.979125] ==================================================================
[   16.598748] ==================================================================
[   16.599428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.599783] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.600124] 
[   16.600245] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.600298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.600311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.600337] Call Trace:
[   16.600364]  <TASK>
[   16.600380]  dump_stack_lvl+0x73/0xb0
[   16.600408]  print_report+0xd1/0x610
[   16.600430]  ? __virt_addr_valid+0x1db/0x2d0
[   16.600453]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.600474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.600506]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.600529]  kasan_report+0x141/0x180
[   16.600552]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.600589]  __asan_report_load8_noabort+0x18/0x20
[   16.600615]  kasan_atomics_helper+0x4fa5/0x5450
[   16.600637]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.600669]  ? kasan_save_alloc_info+0x3b/0x50
[   16.600694]  ? kasan_save_stack+0x45/0x70
[   16.600718]  kasan_atomics+0x1dc/0x310
[   16.600751]  ? __pfx_kasan_atomics+0x10/0x10
[   16.600775]  ? __pfx_read_tsc+0x10/0x10
[   16.600797]  ? ktime_get_ts64+0x86/0x230
[   16.600821]  kunit_try_run_case+0x1a5/0x480
[   16.600854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.600877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.600912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.600938]  ? __kthread_parkme+0x82/0x180
[   16.600959]  ? preempt_count_sub+0x50/0x80
[   16.600983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.601017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.601042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.601077]  kthread+0x337/0x6f0
[   16.601096]  ? trace_preempt_on+0x20/0xc0
[   16.601120]  ? __pfx_kthread+0x10/0x10
[   16.601149]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.601171]  ? calculate_sigpending+0x7b/0xa0
[   16.601196]  ? __pfx_kthread+0x10/0x10
[   16.601218]  ret_from_fork+0x116/0x1d0
[   16.601237]  ? __pfx_kthread+0x10/0x10
[   16.601258]  ret_from_fork_asm+0x1a/0x30
[   16.601289]  </TASK>
[   16.601300] 
[   16.608984] Allocated by task 283:
[   16.609186]  kasan_save_stack+0x45/0x70
[   16.609401]  kasan_save_track+0x18/0x40
[   16.609540]  kasan_save_alloc_info+0x3b/0x50
[   16.609694]  __kasan_kmalloc+0xb7/0xc0
[   16.609830]  __kmalloc_cache_noprof+0x189/0x420
[   16.609989]  kasan_atomics+0x95/0x310
[   16.610124]  kunit_try_run_case+0x1a5/0x480
[   16.610285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.610570]  kthread+0x337/0x6f0
[   16.610741]  ret_from_fork+0x116/0x1d0
[   16.610928]  ret_from_fork_asm+0x1a/0x30
[   16.611127] 
[   16.611233] The buggy address belongs to the object at ffff8881027c5180
[   16.611233]  which belongs to the cache kmalloc-64 of size 64
[   16.611834] The buggy address is located 0 bytes to the right of
[   16.611834]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.612220] 
[   16.612293] The buggy address belongs to the physical page:
[   16.612737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.613118] flags: 0x200000000000000(node=0|zone=2)
[   16.613364] page_type: f5(slab)
[   16.613639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.614023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.614466] page dumped because: kasan: bad access detected
[   16.614753] 
[   16.614864] Memory state around the buggy address:
[   16.615086]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.615327]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.615649] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.615967]                                      ^
[   16.616125]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.616383]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.616860] ==================================================================
[   16.261748] ==================================================================
[   16.262094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.262496] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.262754] 
[   16.262844] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.262890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.262904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.262928] Call Trace:
[   16.262947]  <TASK>
[   16.262965]  dump_stack_lvl+0x73/0xb0
[   16.262994]  print_report+0xd1/0x610
[   16.263017]  ? __virt_addr_valid+0x1db/0x2d0
[   16.263041]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.263062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.263085]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.263108]  kasan_report+0x141/0x180
[   16.263130]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.263167]  kasan_check_range+0x10c/0x1c0
[   16.263191]  __kasan_check_write+0x18/0x20
[   16.263212]  kasan_atomics_helper+0x19e3/0x5450
[   16.263234]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.263257]  ? kasan_save_alloc_info+0x3b/0x50
[   16.263281]  ? kasan_save_stack+0x45/0x70
[   16.263305]  kasan_atomics+0x1dc/0x310
[   16.263352]  ? __pfx_kasan_atomics+0x10/0x10
[   16.263377]  ? __pfx_read_tsc+0x10/0x10
[   16.263399]  ? ktime_get_ts64+0x86/0x230
[   16.263437]  kunit_try_run_case+0x1a5/0x480
[   16.263462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.263510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.263534]  ? __kthread_parkme+0x82/0x180
[   16.263554]  ? preempt_count_sub+0x50/0x80
[   16.263579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.263628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.263652]  kthread+0x337/0x6f0
[   16.263674]  ? trace_preempt_on+0x20/0xc0
[   16.263699]  ? __pfx_kthread+0x10/0x10
[   16.263720]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.263742]  ? calculate_sigpending+0x7b/0xa0
[   16.263767]  ? __pfx_kthread+0x10/0x10
[   16.263789]  ret_from_fork+0x116/0x1d0
[   16.263808]  ? __pfx_kthread+0x10/0x10
[   16.263829]  ret_from_fork_asm+0x1a/0x30
[   16.263860]  </TASK>
[   16.263870] 
[   16.271840] Allocated by task 283:
[   16.272006]  kasan_save_stack+0x45/0x70
[   16.272164]  kasan_save_track+0x18/0x40
[   16.272305]  kasan_save_alloc_info+0x3b/0x50
[   16.272463]  __kasan_kmalloc+0xb7/0xc0
[   16.272599]  __kmalloc_cache_noprof+0x189/0x420
[   16.272759]  kasan_atomics+0x95/0x310
[   16.272894]  kunit_try_run_case+0x1a5/0x480
[   16.273245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.273793]  kthread+0x337/0x6f0
[   16.273990]  ret_from_fork+0x116/0x1d0
[   16.274193]  ret_from_fork_asm+0x1a/0x30
[   16.274414] 
[   16.274515] The buggy address belongs to the object at ffff8881027c5180
[   16.274515]  which belongs to the cache kmalloc-64 of size 64
[   16.275080] The buggy address is located 0 bytes to the right of
[   16.275080]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.275651] 
[   16.275727] The buggy address belongs to the physical page:
[   16.275908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.276296] flags: 0x200000000000000(node=0|zone=2)
[   16.276671] page_type: f5(slab)
[   16.276829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.277150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.277477] page dumped because: kasan: bad access detected
[   16.277735] 
[   16.277833] Memory state around the buggy address:
[   16.278054]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278453]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278756] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.279064]                                      ^
[   16.279289]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279636]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279929] ==================================================================
[   16.206277] ==================================================================
[   16.206635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.207126] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.207493] 
[   16.207622] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.207667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.207680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.207715] Call Trace:
[   16.207733]  <TASK>
[   16.207749]  dump_stack_lvl+0x73/0xb0
[   16.207789]  print_report+0xd1/0x610
[   16.207812]  ? __virt_addr_valid+0x1db/0x2d0
[   16.207835]  ? kasan_atomics_helper+0x1818/0x5450
[   16.207856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.207879]  ? kasan_atomics_helper+0x1818/0x5450
[   16.207901]  kasan_report+0x141/0x180
[   16.207923]  ? kasan_atomics_helper+0x1818/0x5450
[   16.207950]  kasan_check_range+0x10c/0x1c0
[   16.207974]  __kasan_check_write+0x18/0x20
[   16.207994]  kasan_atomics_helper+0x1818/0x5450
[   16.208017]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.208041]  ? kasan_save_alloc_info+0x3b/0x50
[   16.208065]  ? kasan_save_stack+0x45/0x70
[   16.208088]  kasan_atomics+0x1dc/0x310
[   16.208111]  ? __pfx_kasan_atomics+0x10/0x10
[   16.208136]  ? __pfx_read_tsc+0x10/0x10
[   16.208167]  ? ktime_get_ts64+0x86/0x230
[   16.208192]  kunit_try_run_case+0x1a5/0x480
[   16.208218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.208241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.208265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.208289]  ? __kthread_parkme+0x82/0x180
[   16.208310]  ? preempt_count_sub+0x50/0x80
[   16.208338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.208363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.208387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.208411]  kthread+0x337/0x6f0
[   16.208431]  ? trace_preempt_on+0x20/0xc0
[   16.208454]  ? __pfx_kthread+0x10/0x10
[   16.208476]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.208498]  ? calculate_sigpending+0x7b/0xa0
[   16.208522]  ? __pfx_kthread+0x10/0x10
[   16.208555]  ret_from_fork+0x116/0x1d0
[   16.208574]  ? __pfx_kthread+0x10/0x10
[   16.208596]  ret_from_fork_asm+0x1a/0x30
[   16.208639]  </TASK>
[   16.208651] 
[   16.216748] Allocated by task 283:
[   16.216885]  kasan_save_stack+0x45/0x70
[   16.217120]  kasan_save_track+0x18/0x40
[   16.217472]  kasan_save_alloc_info+0x3b/0x50
[   16.217627]  __kasan_kmalloc+0xb7/0xc0
[   16.217762]  __kmalloc_cache_noprof+0x189/0x420
[   16.217935]  kasan_atomics+0x95/0x310
[   16.218124]  kunit_try_run_case+0x1a5/0x480
[   16.218359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.218640]  kthread+0x337/0x6f0
[   16.218836]  ret_from_fork+0x116/0x1d0
[   16.219027]  ret_from_fork_asm+0x1a/0x30
[   16.219230] 
[   16.219306] The buggy address belongs to the object at ffff8881027c5180
[   16.219306]  which belongs to the cache kmalloc-64 of size 64
[   16.219793] The buggy address is located 0 bytes to the right of
[   16.219793]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.220284] 
[   16.220450] The buggy address belongs to the physical page:
[   16.220653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.221021] flags: 0x200000000000000(node=0|zone=2)
[   16.221247] page_type: f5(slab)
[   16.221523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.221765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.221998] page dumped because: kasan: bad access detected
[   16.222194] 
[   16.222311] Memory state around the buggy address:
[   16.222536]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.222880]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.223210] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.223530]                                      ^
[   16.223690]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.223912]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.224250] ==================================================================
[   15.614186] ==================================================================
[   15.614631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.615033] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.615353] 
[   15.615442] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.615486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.615500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.615523] Call Trace:
[   15.615541]  <TASK>
[   15.615557]  dump_stack_lvl+0x73/0xb0
[   15.615587]  print_report+0xd1/0x610
[   15.615610]  ? __virt_addr_valid+0x1db/0x2d0
[   15.615635]  ? kasan_atomics_helper+0xac7/0x5450
[   15.615657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.615680]  ? kasan_atomics_helper+0xac7/0x5450
[   15.615703]  kasan_report+0x141/0x180
[   15.615726]  ? kasan_atomics_helper+0xac7/0x5450
[   15.615753]  kasan_check_range+0x10c/0x1c0
[   15.615777]  __kasan_check_write+0x18/0x20
[   15.615797]  kasan_atomics_helper+0xac7/0x5450
[   15.615820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.615844]  ? kasan_save_alloc_info+0x3b/0x50
[   15.615868]  ? kasan_save_stack+0x45/0x70
[   15.615892]  kasan_atomics+0x1dc/0x310
[   15.615916]  ? __pfx_kasan_atomics+0x10/0x10
[   15.615941]  ? __pfx_read_tsc+0x10/0x10
[   15.615965]  ? ktime_get_ts64+0x86/0x230
[   15.615990]  kunit_try_run_case+0x1a5/0x480
[   15.616016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.616040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.616064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.616089]  ? __kthread_parkme+0x82/0x180
[   15.616110]  ? preempt_count_sub+0x50/0x80
[   15.616135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.616169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.616194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.616219]  kthread+0x337/0x6f0
[   15.616239]  ? trace_preempt_on+0x20/0xc0
[   15.616263]  ? __pfx_kthread+0x10/0x10
[   15.616285]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.616307]  ? calculate_sigpending+0x7b/0xa0
[   15.616336]  ? __pfx_kthread+0x10/0x10
[   15.616358]  ret_from_fork+0x116/0x1d0
[   15.616377]  ? __pfx_kthread+0x10/0x10
[   15.616399]  ret_from_fork_asm+0x1a/0x30
[   15.616431]  </TASK>
[   15.616443] 
[   15.625297] Allocated by task 283:
[   15.625539]  kasan_save_stack+0x45/0x70
[   15.625761]  kasan_save_track+0x18/0x40
[   15.626062]  kasan_save_alloc_info+0x3b/0x50
[   15.626245]  __kasan_kmalloc+0xb7/0xc0
[   15.626667]  __kmalloc_cache_noprof+0x189/0x420
[   15.627012]  kasan_atomics+0x95/0x310
[   15.627217]  kunit_try_run_case+0x1a5/0x480
[   15.627491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.627753]  kthread+0x337/0x6f0
[   15.627972]  ret_from_fork+0x116/0x1d0
[   15.628195]  ret_from_fork_asm+0x1a/0x30
[   15.628430] 
[   15.628532] The buggy address belongs to the object at ffff8881027c5180
[   15.628532]  which belongs to the cache kmalloc-64 of size 64
[   15.629119] The buggy address is located 0 bytes to the right of
[   15.629119]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.629628] 
[   15.629728] The buggy address belongs to the physical page:
[   15.630033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.630426] flags: 0x200000000000000(node=0|zone=2)
[   15.630679] page_type: f5(slab)
[   15.630819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.631186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.631691] page dumped because: kasan: bad access detected
[   15.631929] 
[   15.632098] Memory state around the buggy address:
[   15.632337]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.632664]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.633054] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.633393]                                      ^
[   15.633633]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.633968]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634292] ==================================================================
[   16.243139] ==================================================================
[   16.243875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.244224] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.244534] 
[   16.244674] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.244719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.244733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.244757] Call Trace:
[   16.244775]  <TASK>
[   16.244791]  dump_stack_lvl+0x73/0xb0
[   16.244819]  print_report+0xd1/0x610
[   16.244842]  ? __virt_addr_valid+0x1db/0x2d0
[   16.244865]  ? kasan_atomics_helper+0x194a/0x5450
[   16.244887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.244910]  ? kasan_atomics_helper+0x194a/0x5450
[   16.244933]  kasan_report+0x141/0x180
[   16.244955]  ? kasan_atomics_helper+0x194a/0x5450
[   16.244982]  kasan_check_range+0x10c/0x1c0
[   16.245006]  __kasan_check_write+0x18/0x20
[   16.245025]  kasan_atomics_helper+0x194a/0x5450
[   16.245049]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.245071]  ? kasan_save_alloc_info+0x3b/0x50
[   16.245096]  ? kasan_save_stack+0x45/0x70
[   16.245122]  kasan_atomics+0x1dc/0x310
[   16.245157]  ? __pfx_kasan_atomics+0x10/0x10
[   16.245182]  ? __pfx_read_tsc+0x10/0x10
[   16.245204]  ? ktime_get_ts64+0x86/0x230
[   16.245229]  kunit_try_run_case+0x1a5/0x480
[   16.245254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.245278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.245302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.245326]  ? __kthread_parkme+0x82/0x180
[   16.245347]  ? preempt_count_sub+0x50/0x80
[   16.245372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.245397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.245421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.245445]  kthread+0x337/0x6f0
[   16.245465]  ? trace_preempt_on+0x20/0xc0
[   16.245489]  ? __pfx_kthread+0x10/0x10
[   16.245510]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.245532]  ? calculate_sigpending+0x7b/0xa0
[   16.245557]  ? __pfx_kthread+0x10/0x10
[   16.245578]  ret_from_fork+0x116/0x1d0
[   16.245598]  ? __pfx_kthread+0x10/0x10
[   16.245619]  ret_from_fork_asm+0x1a/0x30
[   16.245650]  </TASK>
[   16.245661] 
[   16.252816] Allocated by task 283:
[   16.252971]  kasan_save_stack+0x45/0x70
[   16.253179]  kasan_save_track+0x18/0x40
[   16.253373]  kasan_save_alloc_info+0x3b/0x50
[   16.253585]  __kasan_kmalloc+0xb7/0xc0
[   16.253964]  __kmalloc_cache_noprof+0x189/0x420
[   16.254201]  kasan_atomics+0x95/0x310
[   16.254484]  kunit_try_run_case+0x1a5/0x480
[   16.254720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.254975]  kthread+0x337/0x6f0
[   16.255155]  ret_from_fork+0x116/0x1d0
[   16.255383]  ret_from_fork_asm+0x1a/0x30
[   16.255584] 
[   16.255683] The buggy address belongs to the object at ffff8881027c5180
[   16.255683]  which belongs to the cache kmalloc-64 of size 64
[   16.256227] The buggy address is located 0 bytes to the right of
[   16.256227]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.256729] 
[   16.256805] The buggy address belongs to the physical page:
[   16.256982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.257286] flags: 0x200000000000000(node=0|zone=2)
[   16.257535] page_type: f5(slab)
[   16.257718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.258104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.258681] page dumped because: kasan: bad access detected
[   16.258953] 
[   16.259059] Memory state around the buggy address:
[   16.259282]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.259567]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.259788] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.260006]                                      ^
[   16.260180]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.260785]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261102] ==================================================================
[   16.355779] ==================================================================
[   16.356157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.356515] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.356849] 
[   16.356961] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.357006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.357031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.357053] Call Trace:
[   16.357070]  <TASK>
[   16.357085]  dump_stack_lvl+0x73/0xb0
[   16.357113]  print_report+0xd1/0x610
[   16.357135]  ? __virt_addr_valid+0x1db/0x2d0
[   16.357167]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.357189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.357212]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.357235]  kasan_report+0x141/0x180
[   16.357260]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.357286]  kasan_check_range+0x10c/0x1c0
[   16.357317]  __kasan_check_write+0x18/0x20
[   16.357337]  kasan_atomics_helper+0x1ce1/0x5450
[   16.357361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.357385]  ? kasan_save_alloc_info+0x3b/0x50
[   16.357410]  ? kasan_save_stack+0x45/0x70
[   16.357434]  kasan_atomics+0x1dc/0x310
[   16.357458]  ? __pfx_kasan_atomics+0x10/0x10
[   16.357482]  ? __pfx_read_tsc+0x10/0x10
[   16.357504]  ? ktime_get_ts64+0x86/0x230
[   16.357529]  kunit_try_run_case+0x1a5/0x480
[   16.357554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.357578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.357602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.357627]  ? __kthread_parkme+0x82/0x180
[   16.357647]  ? preempt_count_sub+0x50/0x80
[   16.357671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.357696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.357719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.357744]  kthread+0x337/0x6f0
[   16.357764]  ? trace_preempt_on+0x20/0xc0
[   16.357788]  ? __pfx_kthread+0x10/0x10
[   16.357833]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.357856]  ? calculate_sigpending+0x7b/0xa0
[   16.357893]  ? __pfx_kthread+0x10/0x10
[   16.357915]  ret_from_fork+0x116/0x1d0
[   16.357935]  ? __pfx_kthread+0x10/0x10
[   16.357956]  ret_from_fork_asm+0x1a/0x30
[   16.357998]  </TASK>
[   16.358009] 
[   16.365848] Allocated by task 283:
[   16.366032]  kasan_save_stack+0x45/0x70
[   16.366241]  kasan_save_track+0x18/0x40
[   16.366438]  kasan_save_alloc_info+0x3b/0x50
[   16.366668]  __kasan_kmalloc+0xb7/0xc0
[   16.366873]  __kmalloc_cache_noprof+0x189/0x420
[   16.367087]  kasan_atomics+0x95/0x310
[   16.367310]  kunit_try_run_case+0x1a5/0x480
[   16.367551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.367801]  kthread+0x337/0x6f0
[   16.367996]  ret_from_fork+0x116/0x1d0
[   16.368188]  ret_from_fork_asm+0x1a/0x30
[   16.368437] 
[   16.368541] The buggy address belongs to the object at ffff8881027c5180
[   16.368541]  which belongs to the cache kmalloc-64 of size 64
[   16.368941] The buggy address is located 0 bytes to the right of
[   16.368941]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.369351] 
[   16.369427] The buggy address belongs to the physical page:
[   16.369604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.369849] flags: 0x200000000000000(node=0|zone=2)
[   16.370018] page_type: f5(slab)
[   16.370190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.370574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.370913] page dumped because: kasan: bad access detected
[   16.371174] 
[   16.371270] Memory state around the buggy address:
[   16.371527]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.371850]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.372183] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.372537]                                      ^
[   16.372772]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.373123]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.373462] ==================================================================
[   15.916406] ==================================================================
[   15.916897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.917226] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.917669] 
[   15.917937] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.917987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.918001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.918025] Call Trace:
[   15.918044]  <TASK>
[   15.918063]  dump_stack_lvl+0x73/0xb0
[   15.918093]  print_report+0xd1/0x610
[   15.918117]  ? __virt_addr_valid+0x1db/0x2d0
[   15.918141]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.918173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.918196]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.918371]  kasan_report+0x141/0x180
[   15.918395]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.918422]  __asan_report_load4_noabort+0x18/0x20
[   15.918447]  kasan_atomics_helper+0x4a02/0x5450
[   15.918470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.918494]  ? kasan_save_alloc_info+0x3b/0x50
[   15.918518]  ? kasan_save_stack+0x45/0x70
[   15.918542]  kasan_atomics+0x1dc/0x310
[   15.918565]  ? __pfx_kasan_atomics+0x10/0x10
[   15.918593]  ? __pfx_read_tsc+0x10/0x10
[   15.918615]  ? ktime_get_ts64+0x86/0x230
[   15.918641]  kunit_try_run_case+0x1a5/0x480
[   15.918666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.918714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.918738]  ? __kthread_parkme+0x82/0x180
[   15.918759]  ? preempt_count_sub+0x50/0x80
[   15.918784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.918857]  kthread+0x337/0x6f0
[   15.918877]  ? trace_preempt_on+0x20/0xc0
[   15.918901]  ? __pfx_kthread+0x10/0x10
[   15.918922]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.918946]  ? calculate_sigpending+0x7b/0xa0
[   15.918972]  ? __pfx_kthread+0x10/0x10
[   15.918995]  ret_from_fork+0x116/0x1d0
[   15.919014]  ? __pfx_kthread+0x10/0x10
[   15.919035]  ret_from_fork_asm+0x1a/0x30
[   15.919066]  </TASK>
[   15.919079] 
[   15.928660] Allocated by task 283:
[   15.928915]  kasan_save_stack+0x45/0x70
[   15.929080]  kasan_save_track+0x18/0x40
[   15.929286]  kasan_save_alloc_info+0x3b/0x50
[   15.929471]  __kasan_kmalloc+0xb7/0xc0
[   15.929660]  __kmalloc_cache_noprof+0x189/0x420
[   15.929849]  kasan_atomics+0x95/0x310
[   15.930020]  kunit_try_run_case+0x1a5/0x480
[   15.930593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930797]  kthread+0x337/0x6f0
[   15.931090]  ret_from_fork+0x116/0x1d0
[   15.931275]  ret_from_fork_asm+0x1a/0x30
[   15.931594] 
[   15.931676] The buggy address belongs to the object at ffff8881027c5180
[   15.931676]  which belongs to the cache kmalloc-64 of size 64
[   15.932444] The buggy address is located 0 bytes to the right of
[   15.932444]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.933089] 
[   15.933274] The buggy address belongs to the physical page:
[   15.933579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.934035] flags: 0x200000000000000(node=0|zone=2)
[   15.934280] page_type: f5(slab)
[   15.934534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.934965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.935293] page dumped because: kasan: bad access detected
[   15.935518] 
[   15.935608] Memory state around the buggy address:
[   15.935821]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.936125]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.936699] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.937099]                                      ^
[   15.937298]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.937748]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.938114] ==================================================================
[   16.374040] ==================================================================
[   16.374405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.374752] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.375086] 
[   16.375208] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.375254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.375267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.375290] Call Trace:
[   16.375307]  <TASK>
[   16.375324]  dump_stack_lvl+0x73/0xb0
[   16.375352]  print_report+0xd1/0x610
[   16.375375]  ? __virt_addr_valid+0x1db/0x2d0
[   16.375398]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.375419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.375442]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.375465]  kasan_report+0x141/0x180
[   16.375487]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.375514]  kasan_check_range+0x10c/0x1c0
[   16.375538]  __kasan_check_write+0x18/0x20
[   16.375558]  kasan_atomics_helper+0x1d7a/0x5450
[   16.375581]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.375605]  ? kasan_save_alloc_info+0x3b/0x50
[   16.375630]  ? kasan_save_stack+0x45/0x70
[   16.375654]  kasan_atomics+0x1dc/0x310
[   16.375677]  ? __pfx_kasan_atomics+0x10/0x10
[   16.375702]  ? __pfx_read_tsc+0x10/0x10
[   16.375724]  ? ktime_get_ts64+0x86/0x230
[   16.375749]  kunit_try_run_case+0x1a5/0x480
[   16.375775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.375824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.375848]  ? __kthread_parkme+0x82/0x180
[   16.375869]  ? preempt_count_sub+0x50/0x80
[   16.375893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.375966]  kthread+0x337/0x6f0
[   16.375985]  ? trace_preempt_on+0x20/0xc0
[   16.376009]  ? __pfx_kthread+0x10/0x10
[   16.376031]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.376053]  ? calculate_sigpending+0x7b/0xa0
[   16.376077]  ? __pfx_kthread+0x10/0x10
[   16.376099]  ret_from_fork+0x116/0x1d0
[   16.376118]  ? __pfx_kthread+0x10/0x10
[   16.376139]  ret_from_fork_asm+0x1a/0x30
[   16.377066]  </TASK>
[   16.377080] 
[   16.392802] Allocated by task 283:
[   16.392951]  kasan_save_stack+0x45/0x70
[   16.393107]  kasan_save_track+0x18/0x40
[   16.393465]  kasan_save_alloc_info+0x3b/0x50
[   16.393849]  __kasan_kmalloc+0xb7/0xc0
[   16.394214]  __kmalloc_cache_noprof+0x189/0x420
[   16.394647]  kasan_atomics+0x95/0x310
[   16.394985]  kunit_try_run_case+0x1a5/0x480
[   16.395456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.395928]  kthread+0x337/0x6f0
[   16.396056]  ret_from_fork+0x116/0x1d0
[   16.396207]  ret_from_fork_asm+0x1a/0x30
[   16.396482] 
[   16.396654] The buggy address belongs to the object at ffff8881027c5180
[   16.396654]  which belongs to the cache kmalloc-64 of size 64
[   16.397705] The buggy address is located 0 bytes to the right of
[   16.397705]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.398749] 
[   16.398827] The buggy address belongs to the physical page:
[   16.399005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.399262] flags: 0x200000000000000(node=0|zone=2)
[   16.399703] page_type: f5(slab)
[   16.399993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.400661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.401337] page dumped because: kasan: bad access detected
[   16.401797] 
[   16.401960] Memory state around the buggy address:
[   16.402408]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.403008]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.403276] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.403899]                                      ^
[   16.404361]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404709]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404929] ==================================================================
[   15.699609] ==================================================================
[   15.700581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.701717] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.702875] 
[   15.703067] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.703118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.703131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.703167] Call Trace:
[   15.703186]  <TASK>
[   15.703204]  dump_stack_lvl+0x73/0xb0
[   15.703237]  print_report+0xd1/0x610
[   15.703261]  ? __virt_addr_valid+0x1db/0x2d0
[   15.703284]  ? kasan_atomics_helper+0xd47/0x5450
[   15.703307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.703343]  ? kasan_atomics_helper+0xd47/0x5450
[   15.703366]  kasan_report+0x141/0x180
[   15.703389]  ? kasan_atomics_helper+0xd47/0x5450
[   15.703415]  kasan_check_range+0x10c/0x1c0
[   15.703439]  __kasan_check_write+0x18/0x20
[   15.703459]  kasan_atomics_helper+0xd47/0x5450
[   15.703483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.703507]  ? kasan_save_alloc_info+0x3b/0x50
[   15.703531]  ? kasan_save_stack+0x45/0x70
[   15.703556]  kasan_atomics+0x1dc/0x310
[   15.703580]  ? __pfx_kasan_atomics+0x10/0x10
[   15.703605]  ? __pfx_read_tsc+0x10/0x10
[   15.703628]  ? ktime_get_ts64+0x86/0x230
[   15.703653]  kunit_try_run_case+0x1a5/0x480
[   15.703679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.703703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.703727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.703752]  ? __kthread_parkme+0x82/0x180
[   15.703774]  ? preempt_count_sub+0x50/0x80
[   15.703799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.703823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.703848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.703874]  kthread+0x337/0x6f0
[   15.703895]  ? trace_preempt_on+0x20/0xc0
[   15.703920]  ? __pfx_kthread+0x10/0x10
[   15.703941]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.703964]  ? calculate_sigpending+0x7b/0xa0
[   15.703989]  ? __pfx_kthread+0x10/0x10
[   15.704011]  ret_from_fork+0x116/0x1d0
[   15.704031]  ? __pfx_kthread+0x10/0x10
[   15.704052]  ret_from_fork_asm+0x1a/0x30
[   15.704085]  </TASK>
[   15.704096] 
[   15.712105] Allocated by task 283:
[   15.712307]  kasan_save_stack+0x45/0x70
[   15.712525]  kasan_save_track+0x18/0x40
[   15.712800]  kasan_save_alloc_info+0x3b/0x50
[   15.713067]  __kasan_kmalloc+0xb7/0xc0
[   15.713259]  __kmalloc_cache_noprof+0x189/0x420
[   15.713549]  kasan_atomics+0x95/0x310
[   15.713688]  kunit_try_run_case+0x1a5/0x480
[   15.713885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.714153]  kthread+0x337/0x6f0
[   15.714340]  ret_from_fork+0x116/0x1d0
[   15.714595]  ret_from_fork_asm+0x1a/0x30
[   15.714774] 
[   15.714849] The buggy address belongs to the object at ffff8881027c5180
[   15.714849]  which belongs to the cache kmalloc-64 of size 64
[   15.715404] The buggy address is located 0 bytes to the right of
[   15.715404]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.715871] 
[   15.715963] The buggy address belongs to the physical page:
[   15.716231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.716597] flags: 0x200000000000000(node=0|zone=2)
[   15.716801] page_type: f5(slab)
[   15.716954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.717201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.717434] page dumped because: kasan: bad access detected
[   15.717609] 
[   15.717682] Memory state around the buggy address:
[   15.717905]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.718286]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.718613] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.719239]                                      ^
[   15.719702]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720071]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720449] ==================================================================
[   15.792969] ==================================================================
[   15.793234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.793498] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.794478] 
[   15.794675] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.794786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.794802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.794825] Call Trace:
[   15.794842]  <TASK>
[   15.794859]  dump_stack_lvl+0x73/0xb0
[   15.794890]  print_report+0xd1/0x610
[   15.794913]  ? __virt_addr_valid+0x1db/0x2d0
[   15.794936]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.794958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.794981]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.795003]  kasan_report+0x141/0x180
[   15.795034]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.795061]  kasan_check_range+0x10c/0x1c0
[   15.795085]  __kasan_check_write+0x18/0x20
[   15.795216]  kasan_atomics_helper+0xfa9/0x5450
[   15.795243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.795268]  ? kasan_save_alloc_info+0x3b/0x50
[   15.795292]  ? kasan_save_stack+0x45/0x70
[   15.795325]  kasan_atomics+0x1dc/0x310
[   15.795348]  ? __pfx_kasan_atomics+0x10/0x10
[   15.795374]  ? __pfx_read_tsc+0x10/0x10
[   15.795396]  ? ktime_get_ts64+0x86/0x230
[   15.795422]  kunit_try_run_case+0x1a5/0x480
[   15.795447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.795471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.795495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.795519]  ? __kthread_parkme+0x82/0x180
[   15.795540]  ? preempt_count_sub+0x50/0x80
[   15.795565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.795590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.795614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.795639]  kthread+0x337/0x6f0
[   15.795661]  ? trace_preempt_on+0x20/0xc0
[   15.795685]  ? __pfx_kthread+0x10/0x10
[   15.795707]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.795729]  ? calculate_sigpending+0x7b/0xa0
[   15.795754]  ? __pfx_kthread+0x10/0x10
[   15.795777]  ret_from_fork+0x116/0x1d0
[   15.795796]  ? __pfx_kthread+0x10/0x10
[   15.795818]  ret_from_fork_asm+0x1a/0x30
[   15.795849]  </TASK>
[   15.795862] 
[   15.806627] Allocated by task 283:
[   15.806808]  kasan_save_stack+0x45/0x70
[   15.807219]  kasan_save_track+0x18/0x40
[   15.807377]  kasan_save_alloc_info+0x3b/0x50
[   15.807799]  __kasan_kmalloc+0xb7/0xc0
[   15.808053]  __kmalloc_cache_noprof+0x189/0x420
[   15.808278]  kasan_atomics+0x95/0x310
[   15.808477]  kunit_try_run_case+0x1a5/0x480
[   15.808935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.809167]  kthread+0x337/0x6f0
[   15.809512]  ret_from_fork+0x116/0x1d0
[   15.809755]  ret_from_fork_asm+0x1a/0x30
[   15.809960] 
[   15.810052] The buggy address belongs to the object at ffff8881027c5180
[   15.810052]  which belongs to the cache kmalloc-64 of size 64
[   15.810816] The buggy address is located 0 bytes to the right of
[   15.810816]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.811620] 
[   15.811713] The buggy address belongs to the physical page:
[   15.811946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.812587] flags: 0x200000000000000(node=0|zone=2)
[   15.812879] page_type: f5(slab)
[   15.813155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.813461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.813875] page dumped because: kasan: bad access detected
[   15.814316] 
[   15.814494] Memory state around the buggy address:
[   15.814795]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.815099]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.815704] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.816077]                                      ^
[   15.816293]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.816810]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817349] ==================================================================
[   16.225250] ==================================================================
[   16.225666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.226030] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.226396] 
[   16.226525] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.226572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.226585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.226609] Call Trace:
[   16.226626]  <TASK>
[   16.226656]  dump_stack_lvl+0x73/0xb0
[   16.226684]  print_report+0xd1/0x610
[   16.226706]  ? __virt_addr_valid+0x1db/0x2d0
[   16.226741]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.226763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.226786]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.226817]  kasan_report+0x141/0x180
[   16.226839]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.226866]  kasan_check_range+0x10c/0x1c0
[   16.226900]  __kasan_check_write+0x18/0x20
[   16.226919]  kasan_atomics_helper+0x18b1/0x5450
[   16.226943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.226975]  ? kasan_save_alloc_info+0x3b/0x50
[   16.226999]  ? kasan_save_stack+0x45/0x70
[   16.227023]  kasan_atomics+0x1dc/0x310
[   16.227056]  ? __pfx_kasan_atomics+0x10/0x10
[   16.227081]  ? __pfx_read_tsc+0x10/0x10
[   16.227103]  ? ktime_get_ts64+0x86/0x230
[   16.227128]  kunit_try_run_case+0x1a5/0x480
[   16.227172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.227196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.227221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.227255]  ? __kthread_parkme+0x82/0x180
[   16.227277]  ? preempt_count_sub+0x50/0x80
[   16.227301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.227325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.227349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.227374]  kthread+0x337/0x6f0
[   16.227395]  ? trace_preempt_on+0x20/0xc0
[   16.227418]  ? __pfx_kthread+0x10/0x10
[   16.227440]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.227462]  ? calculate_sigpending+0x7b/0xa0
[   16.227486]  ? __pfx_kthread+0x10/0x10
[   16.227508]  ret_from_fork+0x116/0x1d0
[   16.227527]  ? __pfx_kthread+0x10/0x10
[   16.227548]  ret_from_fork_asm+0x1a/0x30
[   16.227580]  </TASK>
[   16.227590] 
[   16.235509] Allocated by task 283:
[   16.235695]  kasan_save_stack+0x45/0x70
[   16.235895]  kasan_save_track+0x18/0x40
[   16.236081]  kasan_save_alloc_info+0x3b/0x50
[   16.236309]  __kasan_kmalloc+0xb7/0xc0
[   16.236497]  __kmalloc_cache_noprof+0x189/0x420
[   16.236719]  kasan_atomics+0x95/0x310
[   16.236897]  kunit_try_run_case+0x1a5/0x480
[   16.237095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.237334]  kthread+0x337/0x6f0
[   16.237456]  ret_from_fork+0x116/0x1d0
[   16.237620]  ret_from_fork_asm+0x1a/0x30
[   16.237844] 
[   16.237956] The buggy address belongs to the object at ffff8881027c5180
[   16.237956]  which belongs to the cache kmalloc-64 of size 64
[   16.238499] The buggy address is located 0 bytes to the right of
[   16.238499]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.239026] 
[   16.239125] The buggy address belongs to the physical page:
[   16.239394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.239714] flags: 0x200000000000000(node=0|zone=2)
[   16.239913] page_type: f5(slab)
[   16.240104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.240490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.240770] page dumped because: kasan: bad access detected
[   16.240941] 
[   16.241011] Memory state around the buggy address:
[   16.241175]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.241388]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.241602] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.241812]                                      ^
[   16.241966]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.242262]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.242583] ==================================================================
[   15.656732] ==================================================================
[   15.656977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.657589] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.658131] 
[   15.658261] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.658327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.658341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.658379] Call Trace:
[   15.658410]  <TASK>
[   15.658426]  dump_stack_lvl+0x73/0xb0
[   15.658483]  print_report+0xd1/0x610
[   15.658520]  ? __virt_addr_valid+0x1db/0x2d0
[   15.658556]  ? kasan_atomics_helper+0xc70/0x5450
[   15.658591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.658627]  ? kasan_atomics_helper+0xc70/0x5450
[   15.658664]  kasan_report+0x141/0x180
[   15.658700]  ? kasan_atomics_helper+0xc70/0x5450
[   15.658740]  kasan_check_range+0x10c/0x1c0
[   15.658778]  __kasan_check_write+0x18/0x20
[   15.658799]  kasan_atomics_helper+0xc70/0x5450
[   15.658848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.658886]  ? kasan_save_alloc_info+0x3b/0x50
[   15.658925]  ? kasan_save_stack+0x45/0x70
[   15.658963]  kasan_atomics+0x1dc/0x310
[   15.658986]  ? __pfx_kasan_atomics+0x10/0x10
[   15.659025]  ? __pfx_read_tsc+0x10/0x10
[   15.659060]  ? ktime_get_ts64+0x86/0x230
[   15.659097]  kunit_try_run_case+0x1a5/0x480
[   15.659123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.659156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.659181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.659205]  ? __kthread_parkme+0x82/0x180
[   15.659226]  ? preempt_count_sub+0x50/0x80
[   15.659250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.659274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.659299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.659323]  kthread+0x337/0x6f0
[   15.659343]  ? trace_preempt_on+0x20/0xc0
[   15.659367]  ? __pfx_kthread+0x10/0x10
[   15.659389]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.659411]  ? calculate_sigpending+0x7b/0xa0
[   15.659487]  ? __pfx_kthread+0x10/0x10
[   15.659511]  ret_from_fork+0x116/0x1d0
[   15.659530]  ? __pfx_kthread+0x10/0x10
[   15.659552]  ret_from_fork_asm+0x1a/0x30
[   15.659583]  </TASK>
[   15.659596] 
[   15.668388] Allocated by task 283:
[   15.668592]  kasan_save_stack+0x45/0x70
[   15.668747]  kasan_save_track+0x18/0x40
[   15.669071]  kasan_save_alloc_info+0x3b/0x50
[   15.669375]  __kasan_kmalloc+0xb7/0xc0
[   15.669552]  __kmalloc_cache_noprof+0x189/0x420
[   15.669789]  kasan_atomics+0x95/0x310
[   15.670022]  kunit_try_run_case+0x1a5/0x480
[   15.670241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.670609]  kthread+0x337/0x6f0
[   15.670773]  ret_from_fork+0x116/0x1d0
[   15.670988]  ret_from_fork_asm+0x1a/0x30
[   15.671274] 
[   15.671418] The buggy address belongs to the object at ffff8881027c5180
[   15.671418]  which belongs to the cache kmalloc-64 of size 64
[   15.672054] The buggy address is located 0 bytes to the right of
[   15.672054]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.672548] 
[   15.672624] The buggy address belongs to the physical page:
[   15.672796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.673028] flags: 0x200000000000000(node=0|zone=2)
[   15.673517] page_type: f5(slab)
[   15.673708] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.674368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.674711] page dumped because: kasan: bad access detected
[   15.675075] 
[   15.675174] Memory state around the buggy address:
[   15.675341]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.675706]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.676051] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.676393]                                      ^
[   15.676666]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.677229]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.677605] ==================================================================
[   15.505203] ==================================================================
[   15.505547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.506217] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.506610] 
[   15.506732] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.506778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.506792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.506816] Call Trace:
[   15.506834]  <TASK>
[   15.506852]  dump_stack_lvl+0x73/0xb0
[   15.506882]  print_report+0xd1/0x610
[   15.506906]  ? __virt_addr_valid+0x1db/0x2d0
[   15.506929]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.506950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.506973]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.506994]  kasan_report+0x141/0x180
[   15.507018]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.507044]  kasan_check_range+0x10c/0x1c0
[   15.507068]  __kasan_check_write+0x18/0x20
[   15.507088]  kasan_atomics_helper+0x7c7/0x5450
[   15.507111]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.507135]  ? kasan_save_alloc_info+0x3b/0x50
[   15.507169]  ? kasan_save_stack+0x45/0x70
[   15.507194]  kasan_atomics+0x1dc/0x310
[   15.507216]  ? __pfx_kasan_atomics+0x10/0x10
[   15.507241]  ? __pfx_read_tsc+0x10/0x10
[   15.507263]  ? ktime_get_ts64+0x86/0x230
[   15.507290]  kunit_try_run_case+0x1a5/0x480
[   15.507325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507348]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.507373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.507397]  ? __kthread_parkme+0x82/0x180
[   15.507418]  ? preempt_count_sub+0x50/0x80
[   15.507443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.507492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.507516]  kthread+0x337/0x6f0
[   15.507537]  ? trace_preempt_on+0x20/0xc0
[   15.507561]  ? __pfx_kthread+0x10/0x10
[   15.507583]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.507605]  ? calculate_sigpending+0x7b/0xa0
[   15.507629]  ? __pfx_kthread+0x10/0x10
[   15.507652]  ret_from_fork+0x116/0x1d0
[   15.507671]  ? __pfx_kthread+0x10/0x10
[   15.507692]  ret_from_fork_asm+0x1a/0x30
[   15.507723]  </TASK>
[   15.507735] 
[   15.519262] Allocated by task 283:
[   15.519548]  kasan_save_stack+0x45/0x70
[   15.519904]  kasan_save_track+0x18/0x40
[   15.520096]  kasan_save_alloc_info+0x3b/0x50
[   15.520483]  __kasan_kmalloc+0xb7/0xc0
[   15.520666]  __kmalloc_cache_noprof+0x189/0x420
[   15.520888]  kasan_atomics+0x95/0x310
[   15.521173]  kunit_try_run_case+0x1a5/0x480
[   15.521374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.522003]  kthread+0x337/0x6f0
[   15.522193]  ret_from_fork+0x116/0x1d0
[   15.522553]  ret_from_fork_asm+0x1a/0x30
[   15.522723] 
[   15.522826] The buggy address belongs to the object at ffff8881027c5180
[   15.522826]  which belongs to the cache kmalloc-64 of size 64
[   15.523588] The buggy address is located 0 bytes to the right of
[   15.523588]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.524402] 
[   15.524513] The buggy address belongs to the physical page:
[   15.524893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.525313] flags: 0x200000000000000(node=0|zone=2)
[   15.525580] page_type: f5(slab)
[   15.525732] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.526476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.526821] page dumped because: kasan: bad access detected
[   15.527126] 
[   15.527221] Memory state around the buggy address:
[   15.527684]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.528105]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.528400] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.528871]                                      ^
[   15.529241]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.529635]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.530155] ==================================================================
[   15.593664] ==================================================================
[   15.593936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.594289] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.594666] 
[   15.594784] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.594829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.594842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.594901] Call Trace:
[   15.594940]  <TASK>
[   15.594957]  dump_stack_lvl+0x73/0xb0
[   15.594986]  print_report+0xd1/0x610
[   15.595009]  ? __virt_addr_valid+0x1db/0x2d0
[   15.595033]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.595055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.595078]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.595118]  kasan_report+0x141/0x180
[   15.595141]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.595177]  kasan_check_range+0x10c/0x1c0
[   15.595201]  __kasan_check_write+0x18/0x20
[   15.595241]  kasan_atomics_helper+0xa2b/0x5450
[   15.595264]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.595288]  ? kasan_save_alloc_info+0x3b/0x50
[   15.595313]  ? kasan_save_stack+0x45/0x70
[   15.595337]  kasan_atomics+0x1dc/0x310
[   15.595360]  ? __pfx_kasan_atomics+0x10/0x10
[   15.595385]  ? __pfx_read_tsc+0x10/0x10
[   15.595407]  ? ktime_get_ts64+0x86/0x230
[   15.595432]  kunit_try_run_case+0x1a5/0x480
[   15.595457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595480]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.595505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.595529]  ? __kthread_parkme+0x82/0x180
[   15.595550]  ? preempt_count_sub+0x50/0x80
[   15.595575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.595626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.595652]  kthread+0x337/0x6f0
[   15.595689]  ? trace_preempt_on+0x20/0xc0
[   15.595714]  ? __pfx_kthread+0x10/0x10
[   15.595736]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.595758]  ? calculate_sigpending+0x7b/0xa0
[   15.595800]  ? __pfx_kthread+0x10/0x10
[   15.595823]  ret_from_fork+0x116/0x1d0
[   15.595843]  ? __pfx_kthread+0x10/0x10
[   15.595909]  ret_from_fork_asm+0x1a/0x30
[   15.595941]  </TASK>
[   15.595953] 
[   15.604537] Allocated by task 283:
[   15.604694]  kasan_save_stack+0x45/0x70
[   15.604958]  kasan_save_track+0x18/0x40
[   15.605167]  kasan_save_alloc_info+0x3b/0x50
[   15.605661]  __kasan_kmalloc+0xb7/0xc0
[   15.605810]  __kmalloc_cache_noprof+0x189/0x420
[   15.606044]  kasan_atomics+0x95/0x310
[   15.606268]  kunit_try_run_case+0x1a5/0x480
[   15.606475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.606782]  kthread+0x337/0x6f0
[   15.606990]  ret_from_fork+0x116/0x1d0
[   15.607243]  ret_from_fork_asm+0x1a/0x30
[   15.607463] 
[   15.607566] The buggy address belongs to the object at ffff8881027c5180
[   15.607566]  which belongs to the cache kmalloc-64 of size 64
[   15.608118] The buggy address is located 0 bytes to the right of
[   15.608118]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.608685] 
[   15.608788] The buggy address belongs to the physical page:
[   15.609089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.609447] flags: 0x200000000000000(node=0|zone=2)
[   15.609677] page_type: f5(slab)
[   15.609890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.610140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.610549] page dumped because: kasan: bad access detected
[   15.610830] 
[   15.611005] Memory state around the buggy address:
[   15.611243]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.611794]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.612383] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.612699]                                      ^
[   15.612973]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.613243]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.613648] ==================================================================
[   15.744621] ==================================================================
[   15.744869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.745670] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   15.746015] 
[   15.746327] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.746376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.746389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.746413] Call Trace:
[   15.746432]  <TASK>
[   15.746450]  dump_stack_lvl+0x73/0xb0
[   15.746549]  print_report+0xd1/0x610
[   15.746572]  ? __virt_addr_valid+0x1db/0x2d0
[   15.746596]  ? kasan_atomics_helper+0xe78/0x5450
[   15.746618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.746641]  ? kasan_atomics_helper+0xe78/0x5450
[   15.746663]  kasan_report+0x141/0x180
[   15.746685]  ? kasan_atomics_helper+0xe78/0x5450
[   15.746711]  kasan_check_range+0x10c/0x1c0
[   15.746737]  __kasan_check_write+0x18/0x20
[   15.746757]  kasan_atomics_helper+0xe78/0x5450
[   15.746780]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.746804]  ? kasan_save_alloc_info+0x3b/0x50
[   15.746828]  ? kasan_save_stack+0x45/0x70
[   15.746852]  kasan_atomics+0x1dc/0x310
[   15.746875]  ? __pfx_kasan_atomics+0x10/0x10
[   15.746901]  ? __pfx_read_tsc+0x10/0x10
[   15.746924]  ? ktime_get_ts64+0x86/0x230
[   15.746949]  kunit_try_run_case+0x1a5/0x480
[   15.746975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.746998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.747023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.747047]  ? __kthread_parkme+0x82/0x180
[   15.747069]  ? preempt_count_sub+0x50/0x80
[   15.747093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.747118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.747154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.747179]  kthread+0x337/0x6f0
[   15.747199]  ? trace_preempt_on+0x20/0xc0
[   15.747223]  ? __pfx_kthread+0x10/0x10
[   15.747245]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.747267]  ? calculate_sigpending+0x7b/0xa0
[   15.747292]  ? __pfx_kthread+0x10/0x10
[   15.747316]  ret_from_fork+0x116/0x1d0
[   15.747337]  ? __pfx_kthread+0x10/0x10
[   15.747359]  ret_from_fork_asm+0x1a/0x30
[   15.747390]  </TASK>
[   15.747401] 
[   15.757928] Allocated by task 283:
[   15.758443]  kasan_save_stack+0x45/0x70
[   15.758613]  kasan_save_track+0x18/0x40
[   15.758791]  kasan_save_alloc_info+0x3b/0x50
[   15.759271]  __kasan_kmalloc+0xb7/0xc0
[   15.759453]  __kmalloc_cache_noprof+0x189/0x420
[   15.759740]  kasan_atomics+0x95/0x310
[   15.760025]  kunit_try_run_case+0x1a5/0x480
[   15.760346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.760550]  kthread+0x337/0x6f0
[   15.760799]  ret_from_fork+0x116/0x1d0
[   15.761023]  ret_from_fork_asm+0x1a/0x30
[   15.761272] 
[   15.761473] The buggy address belongs to the object at ffff8881027c5180
[   15.761473]  which belongs to the cache kmalloc-64 of size 64
[   15.762133] The buggy address is located 0 bytes to the right of
[   15.762133]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   15.762742] 
[   15.762927] The buggy address belongs to the physical page:
[   15.763130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   15.763740] flags: 0x200000000000000(node=0|zone=2)
[   15.764117] page_type: f5(slab)
[   15.764305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.764796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.765277] page dumped because: kasan: bad access detected
[   15.765613] 
[   15.765693] Memory state around the buggy address:
[   15.765995]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.766567]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.766893] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.767472]                                      ^
[   15.767701]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.768089]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.768397] ==================================================================
[   16.502923] ==================================================================
[   16.503254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.503622] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283
[   16.503951] 
[   16.504083] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.504128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.504151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.504174] Call Trace:
[   16.504192]  <TASK>
[   16.504207]  dump_stack_lvl+0x73/0xb0
[   16.504245]  print_report+0xd1/0x610
[   16.504267]  ? __virt_addr_valid+0x1db/0x2d0
[   16.504290]  ? kasan_atomics_helper+0x2006/0x5450
[   16.504341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.504364]  ? kasan_atomics_helper+0x2006/0x5450
[   16.504386]  kasan_report+0x141/0x180
[   16.504409]  ? kasan_atomics_helper+0x2006/0x5450
[   16.504436]  kasan_check_range+0x10c/0x1c0
[   16.504459]  __kasan_check_write+0x18/0x20
[   16.504479]  kasan_atomics_helper+0x2006/0x5450
[   16.504503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.504526]  ? kasan_save_alloc_info+0x3b/0x50
[   16.504550]  ? kasan_save_stack+0x45/0x70
[   16.504574]  kasan_atomics+0x1dc/0x310
[   16.504597]  ? __pfx_kasan_atomics+0x10/0x10
[   16.504621]  ? __pfx_read_tsc+0x10/0x10
[   16.504643]  ? ktime_get_ts64+0x86/0x230
[   16.504667]  kunit_try_run_case+0x1a5/0x480
[   16.504692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.504715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.504740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.504764]  ? __kthread_parkme+0x82/0x180
[   16.504785]  ? preempt_count_sub+0x50/0x80
[   16.504810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.504844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.504868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.504903]  kthread+0x337/0x6f0
[   16.504924]  ? trace_preempt_on+0x20/0xc0
[   16.504949]  ? __pfx_kthread+0x10/0x10
[   16.504971]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.504994]  ? calculate_sigpending+0x7b/0xa0
[   16.505018]  ? __pfx_kthread+0x10/0x10
[   16.505040]  ret_from_fork+0x116/0x1d0
[   16.505059]  ? __pfx_kthread+0x10/0x10
[   16.505081]  ret_from_fork_asm+0x1a/0x30
[   16.505112]  </TASK>
[   16.505124] 
[   16.512818] Allocated by task 283:
[   16.513012]  kasan_save_stack+0x45/0x70
[   16.513167]  kasan_save_track+0x18/0x40
[   16.513306]  kasan_save_alloc_info+0x3b/0x50
[   16.513459]  __kasan_kmalloc+0xb7/0xc0
[   16.513603]  __kmalloc_cache_noprof+0x189/0x420
[   16.513840]  kasan_atomics+0x95/0x310
[   16.514051]  kunit_try_run_case+0x1a5/0x480
[   16.514349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.514621]  kthread+0x337/0x6f0
[   16.514907]  ret_from_fork+0x116/0x1d0
[   16.515183]  ret_from_fork_asm+0x1a/0x30
[   16.515722] 
[   16.516261] The buggy address belongs to the object at ffff8881027c5180
[   16.516261]  which belongs to the cache kmalloc-64 of size 64
[   16.517327] The buggy address is located 0 bytes to the right of
[   16.517327]  allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0)
[   16.517979] 
[   16.518063] The buggy address belongs to the physical page:
[   16.518481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5
[   16.518891] flags: 0x200000000000000(node=0|zone=2)
[   16.519205] page_type: f5(slab)
[   16.519396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.519876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.520266] page dumped because: kasan: bad access detected
[   16.520732] 
[   16.520821] Memory state around the buggy address:
[   16.521205]  ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.521637]  ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.522011] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.522290]                                      ^
[   16.522614]  ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523091]  ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523500] ==================================================================