Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.202160] ==================================================================
[   22.202233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.202323] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.202373] 
[   22.202453] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.202535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.202564] Hardware name: linux,dummy-virt (DT)
[   22.202594] Call trace:
[   22.202620]  show_stack+0x20/0x38 (C)
[   22.202668]  dump_stack_lvl+0x8c/0xd0
[   22.202730]  print_report+0x118/0x608
[   22.202776]  kasan_report+0xdc/0x128
[   22.202822]  kasan_check_range+0x100/0x1a8
[   22.202869]  __kasan_check_write+0x20/0x30
[   22.202924]  kasan_atomics_helper+0x1058/0x4858
[   22.202979]  kasan_atomics+0x198/0x2e0
[   22.203024]  kunit_try_run_case+0x170/0x3f0
[   22.203072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.203135]  kthread+0x328/0x630
[   22.203177]  ret_from_fork+0x10/0x20
[   22.203223] 
[   22.203245] Allocated by task 265:
[   22.203272]  kasan_save_stack+0x3c/0x68
[   22.203314]  kasan_save_track+0x20/0x40
[   22.203351]  kasan_save_alloc_info+0x40/0x58
[   22.203391]  __kasan_kmalloc+0xd4/0xd8
[   22.203439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.203961]  kasan_atomics+0xb8/0x2e0
[   22.204658]  kunit_try_run_case+0x170/0x3f0
[   22.204935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.205141]  kthread+0x328/0x630
[   22.205243]  ret_from_fork+0x10/0x20
[   22.205396] 
[   22.205459] The buggy address belongs to the object at fff00000c569f300
[   22.205459]  which belongs to the cache kmalloc-64 of size 64
[   22.205631] The buggy address is located 0 bytes to the right of
[   22.205631]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.205782] 
[   22.205805] The buggy address belongs to the physical page:
[   22.205838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.206031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.206343] page_type: f5(slab)
[   22.206398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.206603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.206683] page dumped because: kasan: bad access detected
[   22.206730] 
[   22.206750] Memory state around the buggy address:
[   22.206965]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.207110]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.207386] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.207763]                                      ^
[   22.207808]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.208049]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.208184] ==================================================================
[   22.183233] ==================================================================
[   22.183288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   22.183337] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.183389] 
[   22.183419] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.183505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.183531] Hardware name: linux,dummy-virt (DT)
[   22.183563] Call trace:
[   22.183587]  show_stack+0x20/0x38 (C)
[   22.184231]  dump_stack_lvl+0x8c/0xd0
[   22.184462]  print_report+0x118/0x608
[   22.184592]  kasan_report+0xdc/0x128
[   22.184729]  kasan_check_range+0x100/0x1a8
[   22.184820]  __kasan_check_write+0x20/0x30
[   22.184865]  kasan_atomics_helper+0xf88/0x4858
[   22.184922]  kasan_atomics+0x198/0x2e0
[   22.184967]  kunit_try_run_case+0x170/0x3f0
[   22.185176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.185679]  kthread+0x328/0x630
[   22.185910]  ret_from_fork+0x10/0x20
[   22.186075] 
[   22.186135] Allocated by task 265:
[   22.186181]  kasan_save_stack+0x3c/0x68
[   22.186466]  kasan_save_track+0x20/0x40
[   22.186749]  kasan_save_alloc_info+0x40/0x58
[   22.186916]  __kasan_kmalloc+0xd4/0xd8
[   22.187587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.187897]  kasan_atomics+0xb8/0x2e0
[   22.188144]  kunit_try_run_case+0x170/0x3f0
[   22.188315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.188556]  kthread+0x328/0x630
[   22.188617]  ret_from_fork+0x10/0x20
[   22.188657] 
[   22.188681] The buggy address belongs to the object at fff00000c569f300
[   22.188681]  which belongs to the cache kmalloc-64 of size 64
[   22.189064] The buggy address is located 0 bytes to the right of
[   22.189064]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.189304] 
[   22.189353] The buggy address belongs to the physical page:
[   22.189769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.189951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.190199] page_type: f5(slab)
[   22.190253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.190449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.190657] page dumped because: kasan: bad access detected
[   22.190963] 
[   22.191062] Memory state around the buggy address:
[   22.191240]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.191348]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.191765] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.191975]                                      ^
[   22.192017]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.192063]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.192114] ==================================================================
[   22.325432] ==================================================================
[   22.325487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.325579] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.325867] 
[   22.325919] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.326152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.326249] Hardware name: linux,dummy-virt (DT)
[   22.326284] Call trace:
[   22.326311]  show_stack+0x20/0x38 (C)
[   22.326362]  dump_stack_lvl+0x8c/0xd0
[   22.326618]  print_report+0x118/0x608
[   22.326996]  kasan_report+0xdc/0x128
[   22.327079]  kasan_check_range+0x100/0x1a8
[   22.327132]  __kasan_check_write+0x20/0x30
[   22.327176]  kasan_atomics_helper+0x1644/0x4858
[   22.327507]  kasan_atomics+0x198/0x2e0
[   22.327679]  kunit_try_run_case+0x170/0x3f0
[   22.327851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.327948]  kthread+0x328/0x630
[   22.328115]  ret_from_fork+0x10/0x20
[   22.328234] 
[   22.328256] Allocated by task 265:
[   22.328287]  kasan_save_stack+0x3c/0x68
[   22.328330]  kasan_save_track+0x20/0x40
[   22.328369]  kasan_save_alloc_info+0x40/0x58
[   22.328576]  __kasan_kmalloc+0xd4/0xd8
[   22.328755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.328973]  kasan_atomics+0xb8/0x2e0
[   22.329162]  kunit_try_run_case+0x170/0x3f0
[   22.329246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.329395]  kthread+0x328/0x630
[   22.329482]  ret_from_fork+0x10/0x20
[   22.329599] 
[   22.329623] The buggy address belongs to the object at fff00000c569f300
[   22.329623]  which belongs to the cache kmalloc-64 of size 64
[   22.329870] The buggy address is located 0 bytes to the right of
[   22.329870]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.330069] 
[   22.330599] The buggy address belongs to the physical page:
[   22.331014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.331115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.331187] page_type: f5(slab)
[   22.331262] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.331347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.331604] page dumped because: kasan: bad access detected
[   22.331967] 
[   22.332015] Memory state around the buggy address:
[   22.332216]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.332269]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.332502] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.332548]                                      ^
[   22.332621]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.332759]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.333050] ==================================================================
[   22.114913] ==================================================================
[   22.115189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   22.115363] Read of size 4 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.115427] 
[   22.115579] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.115675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.115704] Hardware name: linux,dummy-virt (DT)
[   22.115751] Call trace:
[   22.115776]  show_stack+0x20/0x38 (C)
[   22.116205]  dump_stack_lvl+0x8c/0xd0
[   22.116621]  print_report+0x118/0x608
[   22.116818]  kasan_report+0xdc/0x128
[   22.116881]  __asan_report_load4_noabort+0x20/0x30
[   22.116933]  kasan_atomics_helper+0x3dd8/0x4858
[   22.117000]  kasan_atomics+0x198/0x2e0
[   22.117067]  kunit_try_run_case+0x170/0x3f0
[   22.117116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.117173]  kthread+0x328/0x630
[   22.117218]  ret_from_fork+0x10/0x20
[   22.117269] 
[   22.117290] Allocated by task 265:
[   22.117320]  kasan_save_stack+0x3c/0x68
[   22.117374]  kasan_save_track+0x20/0x40
[   22.117434]  kasan_save_alloc_info+0x40/0x58
[   22.117476]  __kasan_kmalloc+0xd4/0xd8
[   22.117523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.117564]  kasan_atomics+0xb8/0x2e0
[   22.117608]  kunit_try_run_case+0x170/0x3f0
[   22.117657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.117703]  kthread+0x328/0x630
[   22.117748]  ret_from_fork+0x10/0x20
[   22.117805] 
[   22.117827] The buggy address belongs to the object at fff00000c569f300
[   22.117827]  which belongs to the cache kmalloc-64 of size 64
[   22.117896] The buggy address is located 0 bytes to the right of
[   22.117896]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.117971] 
[   22.118002] The buggy address belongs to the physical page:
[   22.118041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.118098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.118155] page_type: f5(slab)
[   22.118223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.118275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.118317] page dumped because: kasan: bad access detected
[   22.118350] 
[   22.118374] Memory state around the buggy address:
[   22.118409]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.118453]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.118498] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.118538]                                      ^
[   22.118574]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.118621]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.118661] ==================================================================
[   22.286261] ==================================================================
[   22.286354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.286535] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.286650] 
[   22.286707] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.286844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.286882] Hardware name: linux,dummy-virt (DT)
[   22.286914] Call trace:
[   22.286939]  show_stack+0x20/0x38 (C)
[   22.287111]  dump_stack_lvl+0x8c/0xd0
[   22.287174]  print_report+0x118/0x608
[   22.287327]  kasan_report+0xdc/0x128
[   22.287438]  kasan_check_range+0x100/0x1a8
[   22.287494]  __kasan_check_write+0x20/0x30
[   22.287540]  kasan_atomics_helper+0x147c/0x4858
[   22.287588]  kasan_atomics+0x198/0x2e0
[   22.287635]  kunit_try_run_case+0x170/0x3f0
[   22.288226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.288440]  kthread+0x328/0x630
[   22.288553]  ret_from_fork+0x10/0x20
[   22.288618] 
[   22.288641] Allocated by task 265:
[   22.288669]  kasan_save_stack+0x3c/0x68
[   22.288894]  kasan_save_track+0x20/0x40
[   22.289099]  kasan_save_alloc_info+0x40/0x58
[   22.289302]  __kasan_kmalloc+0xd4/0xd8
[   22.289421]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.289689]  kasan_atomics+0xb8/0x2e0
[   22.289791]  kunit_try_run_case+0x170/0x3f0
[   22.289860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.289904]  kthread+0x328/0x630
[   22.290174]  ret_from_fork+0x10/0x20
[   22.290431] 
[   22.290471] The buggy address belongs to the object at fff00000c569f300
[   22.290471]  which belongs to the cache kmalloc-64 of size 64
[   22.290765] The buggy address is located 0 bytes to the right of
[   22.290765]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.290840] 
[   22.290861] The buggy address belongs to the physical page:
[   22.291026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.291399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.291661] page_type: f5(slab)
[   22.291770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.292149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.292261] page dumped because: kasan: bad access detected
[   22.292440] 
[   22.292632] Memory state around the buggy address:
[   22.292841]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.293035]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.293087] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.293136]                                      ^
[   22.293173]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.293216]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.293257] ==================================================================
[   22.042949] ==================================================================
[   22.043171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.043261] Write of size 4 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.043366] 
[   22.043401] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.043817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.043925] Hardware name: linux,dummy-virt (DT)
[   22.044131] Call trace:
[   22.044172]  show_stack+0x20/0x38 (C)
[   22.044403]  dump_stack_lvl+0x8c/0xd0
[   22.044577]  print_report+0x118/0x608
[   22.044849]  kasan_report+0xdc/0x128
[   22.045031]  kasan_check_range+0x100/0x1a8
[   22.045302]  __kasan_check_write+0x20/0x30
[   22.045443]  kasan_atomics_helper+0xa6c/0x4858
[   22.045892]  kasan_atomics+0x198/0x2e0
[   22.046086]  kunit_try_run_case+0x170/0x3f0
[   22.046513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.046805]  kthread+0x328/0x630
[   22.047117]  ret_from_fork+0x10/0x20
[   22.047262] 
[   22.047302] Allocated by task 265:
[   22.047332]  kasan_save_stack+0x3c/0x68
[   22.047533]  kasan_save_track+0x20/0x40
[   22.047729]  kasan_save_alloc_info+0x40/0x58
[   22.047878]  __kasan_kmalloc+0xd4/0xd8
[   22.047979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.048172]  kasan_atomics+0xb8/0x2e0
[   22.048429]  kunit_try_run_case+0x170/0x3f0
[   22.048525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.048730]  kthread+0x328/0x630
[   22.048790]  ret_from_fork+0x10/0x20
[   22.049150] 
[   22.049235] The buggy address belongs to the object at fff00000c569f300
[   22.049235]  which belongs to the cache kmalloc-64 of size 64
[   22.049353] The buggy address is located 0 bytes to the right of
[   22.049353]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.049594] 
[   22.049832] The buggy address belongs to the physical page:
[   22.049878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.049967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.050087] page_type: f5(slab)
[   22.050185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.051081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.051139] page dumped because: kasan: bad access detected
[   22.051318] 
[   22.051374] Memory state around the buggy address:
[   22.051411]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.052504]                                      ^
[   22.054519] 
[   22.055055]  kasan_atomics_helper+0xad4/0x4858
[   22.055482]  kasan_save_alloc_info+0x40/0x58
[   22.055533]  __kasan_kmalloc+0xd4/0xd8
[   22.055582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.055624]  kasan_atomics+0xb8/0x2e0
[   22.055661]  kunit_try_run_case+0x170/0x3f0
[   22.055720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.056733]  kthread+0x328/0x630
[   22.056806]  ret_from_fork+0x10/0x20
[   22.056915] 
[   22.056995] The buggy address belongs to the object at fff00000c569f300
[   22.056995]  which belongs to the cache kmalloc-64 of size 64
[   22.057103] The buggy address is located 0 bytes to the right of
[   22.057103]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.057324] 
[   22.057639] The buggy address belongs to the physical page:
[   22.057724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.058043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.058234] page_type: f5(slab)
[   22.058320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.058929] 
[   22.059462]                                      ^
[   22.062096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.063438]  kasan_atomics+0x198/0x2e0
[   22.065276]  __kasan_kmalloc+0xd4/0xd8
[   22.065395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.065567]  kasan_atomics+0xb8/0x2e0
[   22.066108]  ret_from_fork+0x10/0x20
[   22.067137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.067899] page dumped because: kasan: bad access detected
[   22.068669] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.070867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   22.071383] Call trace:
[   22.072237]  kasan_check_range+0x100/0x1a8
[   22.074578]  kasan_save_alloc_info+0x40/0x58
[   22.074683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.074737]  kasan_atomics+0xb8/0x2e0
[   22.074966] 
[   22.075147] 
[   22.075168] The buggy address belongs to the physical page:
[   22.075444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.077380]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082188]  kasan_atomics+0x198/0x2e0
[   22.084296]  kunit_try_run_case+0x170/0x3f0
[   22.085083] 
[   22.085789] The buggy address belongs to the physical page:
[   22.086207] page_type: f5(slab)
[   22.086459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.086747] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.086941] ==================================================================
[   22.367086] ==================================================================
[   22.367243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.367353] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.367673] 
[   22.367756] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.367955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.368035] Hardware name: linux,dummy-virt (DT)
[   22.368167] Call trace:
[   22.368207]  show_stack+0x20/0x38 (C)
[   22.368258]  dump_stack_lvl+0x8c/0xd0
[   22.368659]  print_report+0x118/0x608
[   22.369050]  kasan_report+0xdc/0x128
[   22.369242]  __asan_report_load8_noabort+0x20/0x30
[   22.369302]  kasan_atomics_helper+0x3e20/0x4858
[   22.369351]  kasan_atomics+0x198/0x2e0
[   22.369397]  kunit_try_run_case+0x170/0x3f0
[   22.369446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.369590]  kthread+0x328/0x630
[   22.369653]  ret_from_fork+0x10/0x20
[   22.369704] 
[   22.369738] Allocated by task 265:
[   22.369777]  kasan_save_stack+0x3c/0x68
[   22.369827]  kasan_save_track+0x20/0x40
[   22.369864]  kasan_save_alloc_info+0x40/0x58
[   22.369906]  __kasan_kmalloc+0xd4/0xd8
[   22.369950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.369991]  kasan_atomics+0xb8/0x2e0
[   22.370066]  kunit_try_run_case+0x170/0x3f0
[   22.370115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.370161]  kthread+0x328/0x630
[   22.370194]  ret_from_fork+0x10/0x20
[   22.370231] 
[   22.370259] The buggy address belongs to the object at fff00000c569f300
[   22.370259]  which belongs to the cache kmalloc-64 of size 64
[   22.370325] The buggy address is located 0 bytes to the right of
[   22.370325]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.370400] 
[   22.370430] The buggy address belongs to the physical page:
[   22.370471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.370525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.370575] page_type: f5(slab)
[   22.370637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.370698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.371494] page dumped because: kasan: bad access detected
[   22.371562] 
[   22.371801] Memory state around the buggy address:
[   22.371882]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.372113]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.372166] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.372235]                                      ^
[   22.372271]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.372594]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.372750] ==================================================================
[   22.243121] ==================================================================
[   22.243178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.243229] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.243280] 
[   22.243314] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.243396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.243426] Hardware name: linux,dummy-virt (DT)
[   22.243672] Call trace:
[   22.243833]  show_stack+0x20/0x38 (C)
[   22.244172]  dump_stack_lvl+0x8c/0xd0
[   22.244406]  print_report+0x118/0x608
[   22.244545]  kasan_report+0xdc/0x128
[   22.244739]  kasan_check_range+0x100/0x1a8
[   22.244795]  __kasan_check_write+0x20/0x30
[   22.244840]  kasan_atomics_helper+0x126c/0x4858
[   22.245078]  kasan_atomics+0x198/0x2e0
[   22.245653]  kunit_try_run_case+0x170/0x3f0
[   22.245797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.245892]  kthread+0x328/0x630
[   22.246038]  ret_from_fork+0x10/0x20
[   22.246130] 
[   22.246151] Allocated by task 265:
[   22.246365]  kasan_save_stack+0x3c/0x68
[   22.246552]  kasan_save_track+0x20/0x40
[   22.246862]  kasan_save_alloc_info+0x40/0x58
[   22.247056]  __kasan_kmalloc+0xd4/0xd8
[   22.247158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.247289]  kasan_atomics+0xb8/0x2e0
[   22.247359]  kunit_try_run_case+0x170/0x3f0
[   22.247417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.247464]  kthread+0x328/0x630
[   22.248272]  ret_from_fork+0x10/0x20
[   22.248764] 
[   22.248806] The buggy address belongs to the object at fff00000c569f300
[   22.248806]  which belongs to the cache kmalloc-64 of size 64
[   22.249143] The buggy address is located 0 bytes to the right of
[   22.249143]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.249433] 
[   22.249637] The buggy address belongs to the physical page:
[   22.249718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.250011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.250094] page_type: f5(slab)
[   22.250143] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.250803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.250857] page dumped because: kasan: bad access detected
[   22.250897] 
[   22.250919] Memory state around the buggy address:
[   22.250962]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.251008]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.251052] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.251101]                                      ^
[   22.251137]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.251190]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.251234] ==================================================================
[   22.320816] ==================================================================
[   22.320892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.320945] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.320996] 
[   22.321030] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.321111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.321138] Hardware name: linux,dummy-virt (DT)
[   22.321171] Call trace:
[   22.321194]  show_stack+0x20/0x38 (C)
[   22.321244]  dump_stack_lvl+0x8c/0xd0
[   22.321294]  print_report+0x118/0x608
[   22.321341]  kasan_report+0xdc/0x128
[   22.321398]  __asan_report_load8_noabort+0x20/0x30
[   22.321451]  kasan_atomics_helper+0x3db0/0x4858
[   22.321508]  kasan_atomics+0x198/0x2e0
[   22.321576]  kunit_try_run_case+0x170/0x3f0
[   22.321625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.321681]  kthread+0x328/0x630
[   22.321737]  ret_from_fork+0x10/0x20
[   22.321792] 
[   22.321813] Allocated by task 265:
[   22.321843]  kasan_save_stack+0x3c/0x68
[   22.321883]  kasan_save_track+0x20/0x40
[   22.321922]  kasan_save_alloc_info+0x40/0x58
[   22.321962]  __kasan_kmalloc+0xd4/0xd8
[   22.322001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.322040]  kasan_atomics+0xb8/0x2e0
[   22.322077]  kunit_try_run_case+0x170/0x3f0
[   22.322114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.322165]  kthread+0x328/0x630
[   22.322198]  ret_from_fork+0x10/0x20
[   22.322234] 
[   22.322264] The buggy address belongs to the object at fff00000c569f300
[   22.322264]  which belongs to the cache kmalloc-64 of size 64
[   22.322324] The buggy address is located 0 bytes to the right of
[   22.322324]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.322395] 
[   22.322417] The buggy address belongs to the physical page:
[   22.322448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.322511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.322560] page_type: f5(slab)
[   22.322599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.322651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.322696] page dumped because: kasan: bad access detected
[   22.323140] 
[   22.323584] Memory state around the buggy address:
[   22.323656]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.323731]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.324012] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.324113]                                      ^
[   22.324594]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.324920]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.324990] ==================================================================
[   22.277323] ==================================================================
[   22.277484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.277734] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.277845] 
[   22.277882] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.278116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.278337] Hardware name: linux,dummy-virt (DT)
[   22.278533] Call trace:
[   22.278579]  show_stack+0x20/0x38 (C)
[   22.278632]  dump_stack_lvl+0x8c/0xd0
[   22.278864]  print_report+0x118/0x608
[   22.278978]  kasan_report+0xdc/0x128
[   22.279066]  kasan_check_range+0x100/0x1a8
[   22.279119]  __kasan_check_write+0x20/0x30
[   22.279247]  kasan_atomics_helper+0x1414/0x4858
[   22.279320]  kasan_atomics+0x198/0x2e0
[   22.279690]  kunit_try_run_case+0x170/0x3f0
[   22.279787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.280087]  kthread+0x328/0x630
[   22.280278]  ret_from_fork+0x10/0x20
[   22.280394] 
[   22.280415] Allocated by task 265:
[   22.280446]  kasan_save_stack+0x3c/0x68
[   22.280488]  kasan_save_track+0x20/0x40
[   22.280528]  kasan_save_alloc_info+0x40/0x58
[   22.280958]  __kasan_kmalloc+0xd4/0xd8
[   22.281195]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.281247]  kasan_atomics+0xb8/0x2e0
[   22.281315]  kunit_try_run_case+0x170/0x3f0
[   22.281992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.282077]  kthread+0x328/0x630
[   22.282136]  ret_from_fork+0x10/0x20
[   22.282174] 
[   22.282545] The buggy address belongs to the object at fff00000c569f300
[   22.282545]  which belongs to the cache kmalloc-64 of size 64
[   22.282997] The buggy address is located 0 bytes to the right of
[   22.282997]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.283072] 
[   22.283095] The buggy address belongs to the physical page:
[   22.283150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.283228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.283313] page_type: f5(slab)
[   22.283646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.283736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.284030] page dumped because: kasan: bad access detected
[   22.284115] 
[   22.284138] Memory state around the buggy address:
[   22.284475]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.284653]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.284871] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.285014]                                      ^
[   22.285057]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.285101]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.285168] ==================================================================
[   22.193413] ==================================================================
[   22.193657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.193730] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.193781] 
[   22.193814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.193898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.193927] Hardware name: linux,dummy-virt (DT)
[   22.194201] Call trace:
[   22.194245]  show_stack+0x20/0x38 (C)
[   22.194571]  dump_stack_lvl+0x8c/0xd0
[   22.194650]  print_report+0x118/0x608
[   22.194777]  kasan_report+0xdc/0x128
[   22.194832]  kasan_check_range+0x100/0x1a8
[   22.194879]  __kasan_check_write+0x20/0x30
[   22.195094]  kasan_atomics_helper+0xff0/0x4858
[   22.195376]  kasan_atomics+0x198/0x2e0
[   22.195566]  kunit_try_run_case+0x170/0x3f0
[   22.195665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.195785]  kthread+0x328/0x630
[   22.195911]  ret_from_fork+0x10/0x20
[   22.196176] 
[   22.196211] Allocated by task 265:
[   22.196242]  kasan_save_stack+0x3c/0x68
[   22.196444]  kasan_save_track+0x20/0x40
[   22.196647]  kasan_save_alloc_info+0x40/0x58
[   22.196887]  __kasan_kmalloc+0xd4/0xd8
[   22.197065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.197304]  kasan_atomics+0xb8/0x2e0
[   22.197438]  kunit_try_run_case+0x170/0x3f0
[   22.197526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.197572]  kthread+0x328/0x630
[   22.197659]  ret_from_fork+0x10/0x20
[   22.198115] 
[   22.198260] The buggy address belongs to the object at fff00000c569f300
[   22.198260]  which belongs to the cache kmalloc-64 of size 64
[   22.198501] The buggy address is located 0 bytes to the right of
[   22.198501]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.198724] 
[   22.198956] The buggy address belongs to the physical page:
[   22.199124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.199326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.199391] page_type: f5(slab)
[   22.199433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.199611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.199864] page dumped because: kasan: bad access detected
[   22.199946] 
[   22.199969] Memory state around the buggy address:
[   22.200218]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.200327]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.200680] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.200788]                                      ^
[   22.200964]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.201158]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.201213] ==================================================================
[   22.168723] ==================================================================
[   22.168785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   22.168914] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.168980] 
[   22.169016] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.169381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.169432] Hardware name: linux,dummy-virt (DT)
[   22.169622] Call trace:
[   22.169658]  show_stack+0x20/0x38 (C)
[   22.169790]  dump_stack_lvl+0x8c/0xd0
[   22.169969]  print_report+0x118/0x608
[   22.170056]  kasan_report+0xdc/0x128
[   22.170186]  __asan_report_store8_noabort+0x20/0x30
[   22.170247]  kasan_atomics_helper+0x3e5c/0x4858
[   22.170296]  kasan_atomics+0x198/0x2e0
[   22.170481]  kunit_try_run_case+0x170/0x3f0
[   22.170544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.170972]  kthread+0x328/0x630
[   22.171058]  ret_from_fork+0x10/0x20
[   22.171356] 
[   22.171431] Allocated by task 265:
[   22.171603]  kasan_save_stack+0x3c/0x68
[   22.171700]  kasan_save_track+0x20/0x40
[   22.171754]  kasan_save_alloc_info+0x40/0x58
[   22.171797]  __kasan_kmalloc+0xd4/0xd8
[   22.171837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.172226]  kasan_atomics+0xb8/0x2e0
[   22.172459]  kunit_try_run_case+0x170/0x3f0
[   22.172633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.172685]  kthread+0x328/0x630
[   22.172733]  ret_from_fork+0x10/0x20
[   22.173258] 
[   22.173354] The buggy address belongs to the object at fff00000c569f300
[   22.173354]  which belongs to the cache kmalloc-64 of size 64
[   22.173512] The buggy address is located 0 bytes to the right of
[   22.173512]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.173585] 
[   22.173607] The buggy address belongs to the physical page:
[   22.173979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.174342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.174643] page_type: f5(slab)
[   22.174887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.175159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.175253] page dumped because: kasan: bad access detected
[   22.175526] 
[   22.175621] Memory state around the buggy address:
[   22.175850]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.175920]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.175985] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.176053]                                      ^
[   22.176090]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.176139]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.176182] ==================================================================
[   22.217811] ==================================================================
[   22.217879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.217929] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.218377] 
[   22.218442] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.218537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.218671] Hardware name: linux,dummy-virt (DT)
[   22.218747] Call trace:
[   22.218776]  show_stack+0x20/0x38 (C)
[   22.218833]  dump_stack_lvl+0x8c/0xd0
[   22.219231]  print_report+0x118/0x608
[   22.219440]  kasan_report+0xdc/0x128
[   22.219702]  kasan_check_range+0x100/0x1a8
[   22.219859]  __kasan_check_write+0x20/0x30
[   22.219908]  kasan_atomics_helper+0x1128/0x4858
[   22.219958]  kasan_atomics+0x198/0x2e0
[   22.220002]  kunit_try_run_case+0x170/0x3f0
[   22.220060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.220119]  kthread+0x328/0x630
[   22.220162]  ret_from_fork+0x10/0x20
[   22.220221] 
[   22.220250] Allocated by task 265:
[   22.220279]  kasan_save_stack+0x3c/0x68
[   22.220331]  kasan_save_track+0x20/0x40
[   22.220379]  kasan_save_alloc_info+0x40/0x58
[   22.220419]  __kasan_kmalloc+0xd4/0xd8
[   22.220474]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.220522]  kasan_atomics+0xb8/0x2e0
[   22.220560]  kunit_try_run_case+0x170/0x3f0
[   22.220597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.220650]  kthread+0x328/0x630
[   22.220693]  ret_from_fork+0x10/0x20
[   22.220742] 
[   22.220771] The buggy address belongs to the object at fff00000c569f300
[   22.220771]  which belongs to the cache kmalloc-64 of size 64
[   22.220846] The buggy address is located 0 bytes to the right of
[   22.220846]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.220914] 
[   22.220936] The buggy address belongs to the physical page:
[   22.220967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.221020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.221070] page_type: f5(slab)
[   22.221112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.221192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.221237] page dumped because: kasan: bad access detected
[   22.221280] 
[   22.221309] Memory state around the buggy address:
[   22.221343]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.221387]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.221433] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.221474]                                      ^
[   22.221510]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.221565]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.221611] ==================================================================
[   22.303294] ==================================================================
[   22.303357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.303490] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.303722] 
[   22.303763] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.304033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.304153] Hardware name: linux,dummy-virt (DT)
[   22.304368] Call trace:
[   22.304594]  show_stack+0x20/0x38 (C)
[   22.304806]  dump_stack_lvl+0x8c/0xd0
[   22.304918]  print_report+0x118/0x608
[   22.305034]  kasan_report+0xdc/0x128
[   22.305094]  kasan_check_range+0x100/0x1a8
[   22.305167]  __kasan_check_write+0x20/0x30
[   22.305566]  kasan_atomics_helper+0x154c/0x4858
[   22.305643]  kasan_atomics+0x198/0x2e0
[   22.305882]  kunit_try_run_case+0x170/0x3f0
[   22.306132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.306248]  kthread+0x328/0x630
[   22.306346]  ret_from_fork+0x10/0x20
[   22.306584] 
[   22.306765] Allocated by task 265:
[   22.306960]  kasan_save_stack+0x3c/0x68
[   22.307178]  kasan_save_track+0x20/0x40
[   22.307274]  kasan_save_alloc_info+0x40/0x58
[   22.307389]  __kasan_kmalloc+0xd4/0xd8
[   22.307481]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.307567]  kasan_atomics+0xb8/0x2e0
[   22.307772]  kunit_try_run_case+0x170/0x3f0
[   22.307823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.308033]  kthread+0x328/0x630
[   22.308293]  ret_from_fork+0x10/0x20
[   22.308485] 
[   22.308531] The buggy address belongs to the object at fff00000c569f300
[   22.308531]  which belongs to the cache kmalloc-64 of size 64
[   22.308745] The buggy address is located 0 bytes to the right of
[   22.308745]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.308987] 
[   22.309032] The buggy address belongs to the physical page:
[   22.309242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.309406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.309811] page_type: f5(slab)
[   22.310131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.310359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.310435] page dumped because: kasan: bad access detected
[   22.310501] 
[   22.310523] Memory state around the buggy address:
[   22.310578]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.310828]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.311020] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.311065]                                      ^
[   22.311101]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.311145]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.311185] ==================================================================
[   22.295020] ==================================================================
[   22.295075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.295150] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.295479] 
[   22.295688] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.295947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.296068] Hardware name: linux,dummy-virt (DT)
[   22.296189] Call trace:
[   22.296314]  show_stack+0x20/0x38 (C)
[   22.296509]  dump_stack_lvl+0x8c/0xd0
[   22.296573]  print_report+0x118/0x608
[   22.296626]  kasan_report+0xdc/0x128
[   22.296673]  kasan_check_range+0x100/0x1a8
[   22.297045]  __kasan_check_write+0x20/0x30
[   22.297448]  kasan_atomics_helper+0x14e4/0x4858
[   22.297588]  kasan_atomics+0x198/0x2e0
[   22.297705]  kunit_try_run_case+0x170/0x3f0
[   22.297833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.298093]  kthread+0x328/0x630
[   22.298294]  ret_from_fork+0x10/0x20
[   22.298391] 
[   22.298545] Allocated by task 265:
[   22.298622]  kasan_save_stack+0x3c/0x68
[   22.298805]  kasan_save_track+0x20/0x40
[   22.298983]  kasan_save_alloc_info+0x40/0x58
[   22.299130]  __kasan_kmalloc+0xd4/0xd8
[   22.299234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.299278]  kasan_atomics+0xb8/0x2e0
[   22.299321]  kunit_try_run_case+0x170/0x3f0
[   22.299618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.299764]  kthread+0x328/0x630
[   22.299807]  ret_from_fork+0x10/0x20
[   22.299848] 
[   22.300210] The buggy address belongs to the object at fff00000c569f300
[   22.300210]  which belongs to the cache kmalloc-64 of size 64
[   22.300506] The buggy address is located 0 bytes to the right of
[   22.300506]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.300618] 
[   22.300763] The buggy address belongs to the physical page:
[   22.300800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.300858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.301300] page_type: f5(slab)
[   22.301371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.301425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.301467] page dumped because: kasan: bad access detected
[   22.301546] 
[   22.301569] Memory state around the buggy address:
[   22.301616]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.301682]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.301738] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.301779]                                      ^
[   22.301816]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.301859]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.301915] ==================================================================
[   22.358206] ==================================================================
[   22.358337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.358451] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.358528] 
[   22.358561] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.358644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.358935] Hardware name: linux,dummy-virt (DT)
[   22.358986] Call trace:
[   22.359220]  show_stack+0x20/0x38 (C)
[   22.359313]  dump_stack_lvl+0x8c/0xd0
[   22.359370]  print_report+0x118/0x608
[   22.359436]  kasan_report+0xdc/0x128
[   22.359655]  kasan_check_range+0x100/0x1a8
[   22.359803]  __kasan_check_write+0x20/0x30
[   22.359891]  kasan_atomics_helper+0x175c/0x4858
[   22.359949]  kasan_atomics+0x198/0x2e0
[   22.359994]  kunit_try_run_case+0x170/0x3f0
[   22.360042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.360102]  kthread+0x328/0x630
[   22.360327]  ret_from_fork+0x10/0x20
[   22.360788] 
[   22.360901] Allocated by task 265:
[   22.361039]  kasan_save_stack+0x3c/0x68
[   22.361181]  kasan_save_track+0x20/0x40
[   22.361476]  kasan_save_alloc_info+0x40/0x58
[   22.361681]  __kasan_kmalloc+0xd4/0xd8
[   22.361914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.362160]  kasan_atomics+0xb8/0x2e0
[   22.362311]  kunit_try_run_case+0x170/0x3f0
[   22.362392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.362474]  kthread+0x328/0x630
[   22.362604]  ret_from_fork+0x10/0x20
[   22.362657] 
[   22.362679] The buggy address belongs to the object at fff00000c569f300
[   22.362679]  which belongs to the cache kmalloc-64 of size 64
[   22.362910] The buggy address is located 0 bytes to the right of
[   22.362910]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.363019] 
[   22.363181] The buggy address belongs to the physical page:
[   22.363377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.363518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.363987] page_type: f5(slab)
[   22.364102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.364637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.364917] page dumped because: kasan: bad access detected
[   22.365216] 
[   22.365355] Memory state around the buggy address:
[   22.365509]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.365756]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.365836] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.366033]                                      ^
[   22.366261]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.366319]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.366534] ==================================================================
[   22.374386] ==================================================================
[   22.374458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.374544] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.374597] 
[   22.374796] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.374932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.374983] Hardware name: linux,dummy-virt (DT)
[   22.375023] Call trace:
[   22.375049]  show_stack+0x20/0x38 (C)
[   22.375101]  dump_stack_lvl+0x8c/0xd0
[   22.375325]  print_report+0x118/0x608
[   22.375390]  kasan_report+0xdc/0x128
[   22.375737]  kasan_check_range+0x100/0x1a8
[   22.376070]  __kasan_check_write+0x20/0x30
[   22.376148]  kasan_atomics_helper+0x17ec/0x4858
[   22.376205]  kasan_atomics+0x198/0x2e0
[   22.376252]  kunit_try_run_case+0x170/0x3f0
[   22.376492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.376743]  kthread+0x328/0x630
[   22.377084]  ret_from_fork+0x10/0x20
[   22.377207] 
[   22.377415] Allocated by task 265:
[   22.377684]  kasan_save_stack+0x3c/0x68
[   22.377902]  kasan_save_track+0x20/0x40
[   22.377976]  kasan_save_alloc_info+0x40/0x58
[   22.378208]  __kasan_kmalloc+0xd4/0xd8
[   22.378548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.378680]  kasan_atomics+0xb8/0x2e0
[   22.378933]  kunit_try_run_case+0x170/0x3f0
[   22.379181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.379285]  kthread+0x328/0x630
[   22.379474]  ret_from_fork+0x10/0x20
[   22.379723] 
[   22.379763] The buggy address belongs to the object at fff00000c569f300
[   22.379763]  which belongs to the cache kmalloc-64 of size 64
[   22.380094] The buggy address is located 0 bytes to the right of
[   22.380094]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.380178] 
[   22.380202] The buggy address belongs to the physical page:
[   22.380656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.380862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.381348] page_type: f5(slab)
[   22.381405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.381843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.381927] page dumped because: kasan: bad access detected
[   22.382016] 
[   22.382039] Memory state around the buggy address:
[   22.382076]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.382348]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.382444] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.382651]                                      ^
[   22.382862]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.382928]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.382984] ==================================================================
[   22.012267] ==================================================================
[   22.012322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.012374] Read of size 4 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.012563] 
[   22.012608] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.012859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.012901] Hardware name: linux,dummy-virt (DT)
[   22.013201] Call trace:
[   22.013245]  show_stack+0x20/0x38 (C)
[   22.013312]  dump_stack_lvl+0x8c/0xd0
[   22.013440]  print_report+0x118/0x608
[   22.013495]  kasan_report+0xdc/0x128
[   22.013541]  __asan_report_load4_noabort+0x20/0x30
[   22.013703]  kasan_atomics_helper+0x42d8/0x4858
[   22.013824]  kunit_try_run_case+0x170/0x3f0
[   22.014656]  kasan_save_alloc_info+0x40/0x58
[   22.014726]  __kasan_kmalloc+0xd4/0xd8
[   22.014993]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.015249]  kthread+0x328/0x630
[   22.015838] 
[   22.015860] The buggy address belongs to the physical page:
[   22.016402] page_type: f5(slab)
[   22.017513]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.017754] ==================================================================
[   22.344489] ==================================================================
[   22.344543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.344592] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.344689] 
[   22.344732] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.344816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.344843] Hardware name: linux,dummy-virt (DT)
[   22.344874] Call trace:
[   22.344898]  show_stack+0x20/0x38 (C)
[   22.344948]  dump_stack_lvl+0x8c/0xd0
[   22.344995]  print_report+0x118/0x608
[   22.345043]  kasan_report+0xdc/0x128
[   22.345103]  kasan_check_range+0x100/0x1a8
[   22.345160]  __kasan_check_write+0x20/0x30
[   22.345207]  kasan_atomics_helper+0x16d0/0x4858
[   22.345254]  kasan_atomics+0x198/0x2e0
[   22.345300]  kunit_try_run_case+0x170/0x3f0
[   22.345355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.345417]  kthread+0x328/0x630
[   22.345459]  ret_from_fork+0x10/0x20
[   22.345511] 
[   22.345534] Allocated by task 265:
[   22.345562]  kasan_save_stack+0x3c/0x68
[   22.345604]  kasan_save_track+0x20/0x40
[   22.345650]  kasan_save_alloc_info+0x40/0x58
[   22.345692]  __kasan_kmalloc+0xd4/0xd8
[   22.345740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.345790]  kasan_atomics+0xb8/0x2e0
[   22.345826]  kunit_try_run_case+0x170/0x3f0
[   22.345865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.345911]  kthread+0x328/0x630
[   22.345945]  ret_from_fork+0x10/0x20
[   22.345982] 
[   22.346002] The buggy address belongs to the object at fff00000c569f300
[   22.346002]  which belongs to the cache kmalloc-64 of size 64
[   22.346061] The buggy address is located 0 bytes to the right of
[   22.346061]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.346135] 
[   22.346158] The buggy address belongs to the physical page:
[   22.346199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.346261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.346318] page_type: f5(slab)
[   22.346356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.346408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.346451] page dumped because: kasan: bad access detected
[   22.346483] 
[   22.346504] Memory state around the buggy address:
[   22.346539]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.346584]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.346636] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.346682]                                      ^
[   22.347228]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.347953]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.348013] ==================================================================
[   22.151250] ==================================================================
[   22.151429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   22.151517] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.151570] 
[   22.151741] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.151892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.151937] Hardware name: linux,dummy-virt (DT)
[   22.151968] Call trace:
[   22.152124]  show_stack+0x20/0x38 (C)
[   22.152336]  dump_stack_lvl+0x8c/0xd0
[   22.152462]  print_report+0x118/0x608
[   22.152626]  kasan_report+0xdc/0x128
[   22.152794]  __asan_report_load8_noabort+0x20/0x30
[   22.153007]  kasan_atomics_helper+0x3f58/0x4858
[   22.153141]  kasan_atomics+0x198/0x2e0
[   22.153232]  kunit_try_run_case+0x170/0x3f0
[   22.153366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.153424]  kthread+0x328/0x630
[   22.153493]  ret_from_fork+0x10/0x20
[   22.153910] 
[   22.154358] Allocated by task 265:
[   22.154411]  kasan_save_stack+0x3c/0x68
[   22.154724]  kasan_save_track+0x20/0x40
[   22.154783]  kasan_save_alloc_info+0x40/0x58
[   22.154836]  __kasan_kmalloc+0xd4/0xd8
[   22.154875]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.154916]  kasan_atomics+0xb8/0x2e0
[   22.154955]  kunit_try_run_case+0x170/0x3f0
[   22.155343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.155692]  kthread+0x328/0x630
[   22.156106]  ret_from_fork+0x10/0x20
[   22.156176] 
[   22.156313] The buggy address belongs to the object at fff00000c569f300
[   22.156313]  which belongs to the cache kmalloc-64 of size 64
[   22.156544] The buggy address is located 0 bytes to the right of
[   22.156544]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.156963] 
[   22.157098] The buggy address belongs to the physical page:
[   22.157161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.157237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.157449] page_type: f5(slab)
[   22.157662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.157984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.158111] page dumped because: kasan: bad access detected
[   22.158311] 
[   22.158485] Memory state around the buggy address:
[   22.158527]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.158842]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.159077] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.159347]                                      ^
[   22.159566]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.159626]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.159951] ==================================================================
[   22.333608] ==================================================================
[   22.333674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.333793] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.334095] 
[   22.334379] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.334768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.335055] Hardware name: linux,dummy-virt (DT)
[   22.335101] Call trace:
[   22.335365]  show_stack+0x20/0x38 (C)
[   22.335536]  dump_stack_lvl+0x8c/0xd0
[   22.335666]  print_report+0x118/0x608
[   22.335781]  kasan_report+0xdc/0x128
[   22.335846]  __asan_report_load8_noabort+0x20/0x30
[   22.336123]  kasan_atomics_helper+0x3df4/0x4858
[   22.336375]  kasan_atomics+0x198/0x2e0
[   22.336482]  kunit_try_run_case+0x170/0x3f0
[   22.337085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.337229]  kthread+0x328/0x630
[   22.337422]  ret_from_fork+0x10/0x20
[   22.337636] 
[   22.337733] Allocated by task 265:
[   22.337912]  kasan_save_stack+0x3c/0x68
[   22.338211]  kasan_save_track+0x20/0x40
[   22.338299]  kasan_save_alloc_info+0x40/0x58
[   22.338433]  __kasan_kmalloc+0xd4/0xd8
[   22.338530]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.338778]  kasan_atomics+0xb8/0x2e0
[   22.339055]  kunit_try_run_case+0x170/0x3f0
[   22.339132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.339346]  kthread+0x328/0x630
[   22.339505]  ret_from_fork+0x10/0x20
[   22.339706] 
[   22.339776] The buggy address belongs to the object at fff00000c569f300
[   22.339776]  which belongs to the cache kmalloc-64 of size 64
[   22.339984] The buggy address is located 0 bytes to the right of
[   22.339984]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.340064] 
[   22.340092] The buggy address belongs to the physical page:
[   22.340130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.340350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.340596] page_type: f5(slab)
[   22.340972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.341032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.341076] page dumped because: kasan: bad access detected
[   22.341268] 
[   22.341444] Memory state around the buggy address:
[   22.341909]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.341970]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.342162] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.342236]                                      ^
[   22.342519]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.342832]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.342984] ==================================================================
[   22.032320] ==================================================================
[   22.032373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   22.032700] 
[   22.033022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.034000]  kasan_check_range+0x100/0x1a8
[   22.034999]  ret_from_fork+0x10/0x20
[   22.035111] 
[   22.035178] Allocated by task 265:
[   22.035225]  kasan_save_stack+0x3c/0x68
[   22.035407]  kasan_save_track+0x20/0x40
[   22.035490]  kasan_save_alloc_info+0x40/0x58
[   22.035549]  __kasan_kmalloc+0xd4/0xd8
[   22.035674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.035925]  kasan_atomics+0xb8/0x2e0
[   22.036112]  kunit_try_run_case+0x170/0x3f0
[   22.036202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.036254]  kthread+0x328/0x630
[   22.036287]  ret_from_fork+0x10/0x20
[   22.036583] 
[   22.036827] The buggy address belongs to the object at fff00000c569f300
[   22.036827]  which belongs to the cache kmalloc-64 of size 64
[   22.037008] The buggy address is located 0 bytes to the right of
[   22.037008]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.037319] 
[   22.037467] The buggy address belongs to the physical page:
[   22.037805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.037997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.038116] page_type: f5(slab)
[   22.038364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.039298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.039725] page dumped because: kasan: bad access detected
[   22.039793] 
[   22.039842] Memory state around the buggy address:
[   22.040004]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.040262]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.040314] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.040414]                                      ^
[   22.040878]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.040965]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.041094] ==================================================================
[   22.222831] ==================================================================
[   22.222884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.222955] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.223007] 
[   22.223438] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.223557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.223586] Hardware name: linux,dummy-virt (DT)
[   22.223619] Call trace:
[   22.223952]  show_stack+0x20/0x38 (C)
[   22.224185]  dump_stack_lvl+0x8c/0xd0
[   22.224471]  print_report+0x118/0x608
[   22.224870]  kasan_report+0xdc/0x128
[   22.225481]  kasan_check_range+0x100/0x1a8
[   22.225771]  __kasan_check_write+0x20/0x30
[   22.225880]  kasan_atomics_helper+0x1190/0x4858
[   22.225961]  kasan_atomics+0x198/0x2e0
[   22.226008]  kunit_try_run_case+0x170/0x3f0
[   22.226077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.226691]  kthread+0x328/0x630
[   22.226959]  ret_from_fork+0x10/0x20
[   22.227492] 
[   22.227738] Allocated by task 265:
[   22.227817]  kasan_save_stack+0x3c/0x68
[   22.227888]  kasan_save_track+0x20/0x40
[   22.228041]  kasan_save_alloc_info+0x40/0x58
[   22.228295]  __kasan_kmalloc+0xd4/0xd8
[   22.228497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.228677]  kasan_atomics+0xb8/0x2e0
[   22.228783]  kunit_try_run_case+0x170/0x3f0
[   22.229028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.229198]  kthread+0x328/0x630
[   22.229601]  ret_from_fork+0x10/0x20
[   22.229674] 
[   22.229697] The buggy address belongs to the object at fff00000c569f300
[   22.229697]  which belongs to the cache kmalloc-64 of size 64
[   22.229965] The buggy address is located 0 bytes to the right of
[   22.229965]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.230267] 
[   22.230601] The buggy address belongs to the physical page:
[   22.230648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.231183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.231363] page_type: f5(slab)
[   22.231567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.231637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.231845] page dumped because: kasan: bad access detected
[   22.232073] 
[   22.232293] Memory state around the buggy address:
[   22.232506]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.232620]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.232666] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.232867]                                      ^
[   22.232928]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.233019]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.233191] ==================================================================
[   22.209192] ==================================================================
[   22.209245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.209448] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.209512] 
[   22.209547] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.209822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.209998] Hardware name: linux,dummy-virt (DT)
[   22.210042] Call trace:
[   22.210068]  show_stack+0x20/0x38 (C)
[   22.210120]  dump_stack_lvl+0x8c/0xd0
[   22.210167]  print_report+0x118/0x608
[   22.210749]  kasan_report+0xdc/0x128
[   22.210828]  kasan_check_range+0x100/0x1a8
[   22.211038]  __kasan_check_write+0x20/0x30
[   22.211209]  kasan_atomics_helper+0x10c0/0x4858
[   22.211270]  kasan_atomics+0x198/0x2e0
[   22.211406]  kunit_try_run_case+0x170/0x3f0
[   22.211586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.211645]  kthread+0x328/0x630
[   22.211688]  ret_from_fork+0x10/0x20
[   22.211967] 
[   22.212125] Allocated by task 265:
[   22.212296]  kasan_save_stack+0x3c/0x68
[   22.212518]  kasan_save_track+0x20/0x40
[   22.212745]  kasan_save_alloc_info+0x40/0x58
[   22.212894]  __kasan_kmalloc+0xd4/0xd8
[   22.212981]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.213024]  kasan_atomics+0xb8/0x2e0
[   22.213101]  kunit_try_run_case+0x170/0x3f0
[   22.213429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.213980]  kthread+0x328/0x630
[   22.214255]  ret_from_fork+0x10/0x20
[   22.214475] 
[   22.214534] The buggy address belongs to the object at fff00000c569f300
[   22.214534]  which belongs to the cache kmalloc-64 of size 64
[   22.214787] The buggy address is located 0 bytes to the right of
[   22.214787]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.214960] 
[   22.215200] The buggy address belongs to the physical page:
[   22.215255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.215324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.215452] page_type: f5(slab)
[   22.215496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.215688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.216041] page dumped because: kasan: bad access detected
[   22.216131] 
[   22.216302] Memory state around the buggy address:
[   22.216345]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.216530]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.216583] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.216768]                                      ^
[   22.216831]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.217072]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.217212] ==================================================================
[   22.253198] ==================================================================
[   22.253273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.253326] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.253487] 
[   22.253545] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.253685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.253746] Hardware name: linux,dummy-virt (DT)
[   22.253778] Call trace:
[   22.253804]  show_stack+0x20/0x38 (C)
[   22.253860]  dump_stack_lvl+0x8c/0xd0
[   22.254213]  print_report+0x118/0x608
[   22.254629]  kasan_report+0xdc/0x128
[   22.254707]  kasan_check_range+0x100/0x1a8
[   22.254862]  __kasan_check_write+0x20/0x30
[   22.254912]  kasan_atomics_helper+0x12d8/0x4858
[   22.255230]  kasan_atomics+0x198/0x2e0
[   22.255299]  kunit_try_run_case+0x170/0x3f0
[   22.255640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.255751]  kthread+0x328/0x630
[   22.255867]  ret_from_fork+0x10/0x20
[   22.256030] 
[   22.256147] Allocated by task 265:
[   22.256190]  kasan_save_stack+0x3c/0x68
[   22.256241]  kasan_save_track+0x20/0x40
[   22.256281]  kasan_save_alloc_info+0x40/0x58
[   22.256592]  __kasan_kmalloc+0xd4/0xd8
[   22.256705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.257169]  kasan_atomics+0xb8/0x2e0
[   22.257301]  kunit_try_run_case+0x170/0x3f0
[   22.257378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.257759]  kthread+0x328/0x630
[   22.258003]  ret_from_fork+0x10/0x20
[   22.258083] 
[   22.258128] The buggy address belongs to the object at fff00000c569f300
[   22.258128]  which belongs to the cache kmalloc-64 of size 64
[   22.258205] The buggy address is located 0 bytes to the right of
[   22.258205]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.258655] 
[   22.258924] The buggy address belongs to the physical page:
[   22.259093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.259188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.259391] page_type: f5(slab)
[   22.259653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.259808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.259931] page dumped because: kasan: bad access detected
[   22.259968] 
[   22.260240] Memory state around the buggy address:
[   22.260376]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.260424]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.260497] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.260553]                                      ^
[   22.260600]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.260643]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.260689] ==================================================================
[   22.261979] ==================================================================
[   22.262033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.262204] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.262269] 
[   22.262473] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.262616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.262648] Hardware name: linux,dummy-virt (DT)
[   22.262678] Call trace:
[   22.262705]  show_stack+0x20/0x38 (C)
[   22.262768]  dump_stack_lvl+0x8c/0xd0
[   22.263236]  print_report+0x118/0x608
[   22.263308]  kasan_report+0xdc/0x128
[   22.263355]  kasan_check_range+0x100/0x1a8
[   22.263583]  __kasan_check_write+0x20/0x30
[   22.263688]  kasan_atomics_helper+0x1384/0x4858
[   22.263751]  kasan_atomics+0x198/0x2e0
[   22.263795]  kunit_try_run_case+0x170/0x3f0
[   22.264195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.264303]  kthread+0x328/0x630
[   22.264603]  ret_from_fork+0x10/0x20
[   22.264830] 
[   22.265004] Allocated by task 265:
[   22.265321]  kasan_save_stack+0x3c/0x68
[   22.265518]  kasan_save_track+0x20/0x40
[   22.265685]  kasan_save_alloc_info+0x40/0x58
[   22.265820]  __kasan_kmalloc+0xd4/0xd8
[   22.265920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.265981]  kasan_atomics+0xb8/0x2e0
[   22.266020]  kunit_try_run_case+0x170/0x3f0
[   22.266058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.266104]  kthread+0x328/0x630
[   22.266176]  ret_from_fork+0x10/0x20
[   22.266214] 
[   22.266237] The buggy address belongs to the object at fff00000c569f300
[   22.266237]  which belongs to the cache kmalloc-64 of size 64
[   22.266311] The buggy address is located 0 bytes to the right of
[   22.266311]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.266386] 
[   22.266423] The buggy address belongs to the physical page:
[   22.266464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.266534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.266583] page_type: f5(slab)
[   22.266658] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.266731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.266793] page dumped because: kasan: bad access detected
[   22.266829] 
[   22.266859] Memory state around the buggy address:
[   22.266900]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.266945]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.266990] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.267030]                                      ^
[   22.267065]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.267108]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.267148] ==================================================================
[   22.268037] ==================================================================
[   22.268481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.268634] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.268981] 
[   22.269024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.269130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.269169] Hardware name: linux,dummy-virt (DT)
[   22.269211] Call trace:
[   22.269243]  show_stack+0x20/0x38 (C)
[   22.269297]  dump_stack_lvl+0x8c/0xd0
[   22.269578]  print_report+0x118/0x608
[   22.269776]  kasan_report+0xdc/0x128
[   22.269849]  __asan_report_load8_noabort+0x20/0x30
[   22.269901]  kasan_atomics_helper+0x3f04/0x4858
[   22.270160]  kasan_atomics+0x198/0x2e0
[   22.270275]  kunit_try_run_case+0x170/0x3f0
[   22.270456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.270647]  kthread+0x328/0x630
[   22.270929]  ret_from_fork+0x10/0x20
[   22.271088] 
[   22.271115] Allocated by task 265:
[   22.271184]  kasan_save_stack+0x3c/0x68
[   22.271342]  kasan_save_track+0x20/0x40
[   22.271408]  kasan_save_alloc_info+0x40/0x58
[   22.271460]  __kasan_kmalloc+0xd4/0xd8
[   22.271556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.271613]  kasan_atomics+0xb8/0x2e0
[   22.271651]  kunit_try_run_case+0x170/0x3f0
[   22.271860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.272068]  kthread+0x328/0x630
[   22.272184]  ret_from_fork+0x10/0x20
[   22.272244] 
[   22.272501] The buggy address belongs to the object at fff00000c569f300
[   22.272501]  which belongs to the cache kmalloc-64 of size 64
[   22.272799] The buggy address is located 0 bytes to the right of
[   22.272799]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.272990] 
[   22.273158] The buggy address belongs to the physical page:
[   22.273339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.273937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.274190] page_type: f5(slab)
[   22.274273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.274346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.274563] page dumped because: kasan: bad access detected
[   22.274830] 
[   22.275058] Memory state around the buggy address:
[   22.275323]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.275554]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.275787] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.275982]                                      ^
[   22.276028]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.276209]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.276311] ==================================================================
[   22.348827] ==================================================================
[   22.348879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.349250] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.349517] 
[   22.349575] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.349742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.349802] Hardware name: linux,dummy-virt (DT)
[   22.349836] Call trace:
[   22.349866]  show_stack+0x20/0x38 (C)
[   22.349919]  dump_stack_lvl+0x8c/0xd0
[   22.349966]  print_report+0x118/0x608
[   22.350252]  kasan_report+0xdc/0x128
[   22.350330]  __asan_report_load8_noabort+0x20/0x30
[   22.350383]  kasan_atomics_helper+0x3e10/0x4858
[   22.350839]  kasan_atomics+0x198/0x2e0
[   22.350997]  kunit_try_run_case+0x170/0x3f0
[   22.351475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.351575]  kthread+0x328/0x630
[   22.351638]  ret_from_fork+0x10/0x20
[   22.351811] 
[   22.351834] Allocated by task 265:
[   22.351866]  kasan_save_stack+0x3c/0x68
[   22.351916]  kasan_save_track+0x20/0x40
[   22.351955]  kasan_save_alloc_info+0x40/0x58
[   22.351995]  __kasan_kmalloc+0xd4/0xd8
[   22.352205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.352905]  kasan_atomics+0xb8/0x2e0
[   22.352981]  kunit_try_run_case+0x170/0x3f0
[   22.353156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.353251]  kthread+0x328/0x630
[   22.353478]  ret_from_fork+0x10/0x20
[   22.353660] 
[   22.353873] The buggy address belongs to the object at fff00000c569f300
[   22.353873]  which belongs to the cache kmalloc-64 of size 64
[   22.354162] The buggy address is located 0 bytes to the right of
[   22.354162]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.354303] 
[   22.354371] The buggy address belongs to the physical page:
[   22.354499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.354596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.354758] page_type: f5(slab)
[   22.354842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.354895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.354938] page dumped because: kasan: bad access detected
[   22.355109] 
[   22.355554] Memory state around the buggy address:
[   22.355601]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.355649]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.355694] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.356193]                                      ^
[   22.356514]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.356610]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.356654] ==================================================================
[   22.161410] ==================================================================
[   22.161470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   22.161521] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.161572] 
[   22.161625] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.161722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.161750] Hardware name: linux,dummy-virt (DT)
[   22.161783] Call trace:
[   22.161807]  show_stack+0x20/0x38 (C)
[   22.161861]  dump_stack_lvl+0x8c/0xd0
[   22.161908]  print_report+0x118/0x608
[   22.161955]  kasan_report+0xdc/0x128
[   22.162000]  kasan_check_range+0x100/0x1a8
[   22.162048]  __kasan_check_write+0x20/0x30
[   22.162092]  kasan_atomics_helper+0xe44/0x4858
[   22.162141]  kasan_atomics+0x198/0x2e0
[   22.162195]  kunit_try_run_case+0x170/0x3f0
[   22.162244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.162296]  kthread+0x328/0x630
[   22.162347]  ret_from_fork+0x10/0x20
[   22.162400] 
[   22.162421] Allocated by task 265:
[   22.162452]  kasan_save_stack+0x3c/0x68
[   22.162502]  kasan_save_track+0x20/0x40
[   22.162541]  kasan_save_alloc_info+0x40/0x58
[   22.162583]  __kasan_kmalloc+0xd4/0xd8
[   22.162621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.162661]  kasan_atomics+0xb8/0x2e0
[   22.162699]  kunit_try_run_case+0x170/0x3f0
[   22.163105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.163170]  kthread+0x328/0x630
[   22.163470]  ret_from_fork+0x10/0x20
[   22.163542] 
[   22.163587] The buggy address belongs to the object at fff00000c569f300
[   22.163587]  which belongs to the cache kmalloc-64 of size 64
[   22.163970] The buggy address is located 0 bytes to the right of
[   22.163970]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.164200] 
[   22.164331] The buggy address belongs to the physical page:
[   22.164366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.164751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.165232] page_type: f5(slab)
[   22.165321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.165574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.165793] page dumped because: kasan: bad access detected
[   22.166036] 
[   22.166086] Memory state around the buggy address:
[   22.166253]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.166360]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.166416] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.166610]                                      ^
[   22.166972]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.167219]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.167319] ==================================================================
[   22.119809] ==================================================================
[   22.119861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   22.120259] Write of size 4 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.120408] 
[   22.120589] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.120676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.121029] Hardware name: linux,dummy-virt (DT)
[   22.121462] Call trace:
[   22.121514]  show_stack+0x20/0x38 (C)
[   22.121609]  dump_stack_lvl+0x8c/0xd0
[   22.121788]  print_report+0x118/0x608
[   22.121876]  kasan_report+0xdc/0x128
[   22.122099]  kasan_check_range+0x100/0x1a8
[   22.122194]  __kasan_check_write+0x20/0x30
[   22.122524]  kasan_atomics_helper+0xd3c/0x4858
[   22.122583]  kasan_atomics+0x198/0x2e0
[   22.123088]  kunit_try_run_case+0x170/0x3f0
[   22.123315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.123474]  kthread+0x328/0x630
[   22.123553]  ret_from_fork+0x10/0x20
[   22.124024] 
[   22.124122] Allocated by task 265:
[   22.124317]  kasan_save_stack+0x3c/0x68
[   22.124545]  kasan_save_track+0x20/0x40
[   22.124887]  kasan_save_alloc_info+0x40/0x58
[   22.125079]  __kasan_kmalloc+0xd4/0xd8
[   22.125167]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.125384]  kasan_atomics+0xb8/0x2e0
[   22.125473]  kunit_try_run_case+0x170/0x3f0
[   22.125718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.125982]  kthread+0x328/0x630
[   22.126324]  ret_from_fork+0x10/0x20
[   22.126677] 
[   22.126849] The buggy address belongs to the object at fff00000c569f300
[   22.126849]  which belongs to the cache kmalloc-64 of size 64
[   22.127201] The buggy address is located 0 bytes to the right of
[   22.127201]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.127337] 
[   22.127364] The buggy address belongs to the physical page:
[   22.127593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.127851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.128089] page_type: f5(slab)
[   22.128458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.128659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.128971] page dumped because: kasan: bad access detected
[   22.129050] 
[   22.129302] Memory state around the buggy address:
[   22.129436]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.129679]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.130061] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.130251]                                      ^
[   22.130367]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130455]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130594] ==================================================================
[   22.141917] ==================================================================
[   22.141970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   22.142114] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.142175] 
[   22.142216] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.142606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.142895] Hardware name: linux,dummy-virt (DT)
[   22.142976] Call trace:
[   22.143009]  show_stack+0x20/0x38 (C)
[   22.143060]  dump_stack_lvl+0x8c/0xd0
[   22.143109]  print_report+0x118/0x608
[   22.143155]  kasan_report+0xdc/0x128
[   22.143221]  kasan_check_range+0x100/0x1a8
[   22.143271]  __kasan_check_read+0x20/0x30
[   22.143339]  kasan_atomics_helper+0xdd4/0x4858
[   22.143395]  kasan_atomics+0x198/0x2e0
[   22.143443]  kunit_try_run_case+0x170/0x3f0
[   22.144131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.144200]  kthread+0x328/0x630
[   22.144243]  ret_from_fork+0x10/0x20
[   22.144305] 
[   22.144326] Allocated by task 265:
[   22.144754]  kasan_save_stack+0x3c/0x68
[   22.144956]  kasan_save_track+0x20/0x40
[   22.145012]  kasan_save_alloc_info+0x40/0x58
[   22.145055]  __kasan_kmalloc+0xd4/0xd8
[   22.145532]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.145720]  kasan_atomics+0xb8/0x2e0
[   22.145836]  kunit_try_run_case+0x170/0x3f0
[   22.145927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.145982]  kthread+0x328/0x630
[   22.146023]  ret_from_fork+0x10/0x20
[   22.146210] 
[   22.146337] The buggy address belongs to the object at fff00000c569f300
[   22.146337]  which belongs to the cache kmalloc-64 of size 64
[   22.146784] The buggy address is located 0 bytes to the right of
[   22.146784]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.146867] 
[   22.146951] The buggy address belongs to the physical page:
[   22.147498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.147747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.147837] page_type: f5(slab)
[   22.147881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.147933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.148206] page dumped because: kasan: bad access detected
[   22.148493] 
[   22.148561] Memory state around the buggy address:
[   22.148894]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.149035]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.149114] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.149155]                                      ^
[   22.149208]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.149268]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.149307] ==================================================================
[   22.028548] ==================================================================
[   22.028633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.028698] Write of size 4 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.028763] 
[   22.028796] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.028878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.028907] Hardware name: linux,dummy-virt (DT)
[   22.028949] Call trace:
[   22.028974]  show_stack+0x20/0x38 (C)
[   22.029022]  dump_stack_lvl+0x8c/0xd0
[   22.029068]  print_report+0x118/0x608
[   22.029116]  kasan_report+0xdc/0x128
[   22.029161]  kasan_check_range+0x100/0x1a8
[   22.029217]  __kasan_check_write+0x20/0x30
[   22.029265]  kasan_atomics_helper+0x99c/0x4858
[   22.029313]  kasan_atomics+0x198/0x2e0
[   22.029358]  kunit_try_run_case+0x170/0x3f0
[   22.029406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.029457]  kthread+0x328/0x630
[   22.029500]  ret_from_fork+0x10/0x20
[   22.029547] 
[   22.029568] Allocated by task 265:
[   22.029598]  kasan_save_stack+0x3c/0x68
[   22.029639]  kasan_save_track+0x20/0x40
[   22.029676]  kasan_save_alloc_info+0x40/0x58
[   22.029728]  __kasan_kmalloc+0xd4/0xd8
[   22.029770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.029810]  kasan_atomics+0xb8/0x2e0
[   22.029848]  kunit_try_run_case+0x170/0x3f0
[   22.029887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.029931]  kthread+0x328/0x630
[   22.029966]  ret_from_fork+0x10/0x20
[   22.030002] 
[   22.030022] The buggy address belongs to the object at fff00000c569f300
[   22.030022]  which belongs to the cache kmalloc-64 of size 64
[   22.030089] The buggy address is located 0 bytes to the right of
[   22.030089]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.030156] 
[   22.030187] The buggy address belongs to the physical page:
[   22.030219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.030271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.030319] page_type: f5(slab)
[   22.030357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.030408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.030467] page dumped because: kasan: bad access detected
[   22.030500] 
[   22.030522] Memory state around the buggy address:
[   22.030564]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.030610]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.030654] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.030694]                                      ^
[   22.031564]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.031631]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.031731] ==================================================================
[   22.312664] ==================================================================
[   22.312806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.312860] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.312929] 
[   22.313031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.313129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.313157] Hardware name: linux,dummy-virt (DT)
[   22.313196] Call trace:
[   22.313228]  show_stack+0x20/0x38 (C)
[   22.313535]  dump_stack_lvl+0x8c/0xd0
[   22.313611]  print_report+0x118/0x608
[   22.313659]  kasan_report+0xdc/0x128
[   22.314080]  kasan_check_range+0x100/0x1a8
[   22.314309]  __kasan_check_write+0x20/0x30
[   22.314373]  kasan_atomics_helper+0x15b4/0x4858
[   22.314465]  kasan_atomics+0x198/0x2e0
[   22.314626]  kunit_try_run_case+0x170/0x3f0
[   22.314763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.314850]  kthread+0x328/0x630
[   22.314909]  ret_from_fork+0x10/0x20
[   22.314965] 
[   22.314988] Allocated by task 265:
[   22.315264]  kasan_save_stack+0x3c/0x68
[   22.315329]  kasan_save_track+0x20/0x40
[   22.315595]  kasan_save_alloc_info+0x40/0x58
[   22.315776]  __kasan_kmalloc+0xd4/0xd8
[   22.315903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.316082]  kasan_atomics+0xb8/0x2e0
[   22.316238]  kunit_try_run_case+0x170/0x3f0
[   22.316283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.316328]  kthread+0x328/0x630
[   22.316369]  ret_from_fork+0x10/0x20
[   22.316578] 
[   22.316746] The buggy address belongs to the object at fff00000c569f300
[   22.316746]  which belongs to the cache kmalloc-64 of size 64
[   22.317034] The buggy address is located 0 bytes to the right of
[   22.317034]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.317238] 
[   22.317283] The buggy address belongs to the physical page:
[   22.317491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.317681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.317746] page_type: f5(slab)
[   22.318226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.318332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.318539] page dumped because: kasan: bad access detected
[   22.318687] 
[   22.318760] Memory state around the buggy address:
[   22.319092]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.319216]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.319510] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.319643]                                      ^
[   22.319690]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.319742]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.319969] ==================================================================
[   22.177512] ==================================================================
[   22.177747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   22.177807] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.177866] 
[   22.177899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.177981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.178008] Hardware name: linux,dummy-virt (DT)
[   22.178040] Call trace:
[   22.178064]  show_stack+0x20/0x38 (C)
[   22.178112]  dump_stack_lvl+0x8c/0xd0
[   22.178159]  print_report+0x118/0x608
[   22.178318]  kasan_report+0xdc/0x128
[   22.178377]  kasan_check_range+0x100/0x1a8
[   22.178427]  __kasan_check_write+0x20/0x30
[   22.178472]  kasan_atomics_helper+0xeb8/0x4858
[   22.178519]  kasan_atomics+0x198/0x2e0
[   22.178565]  kunit_try_run_case+0x170/0x3f0
[   22.178611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.178664]  kthread+0x328/0x630
[   22.178705]  ret_from_fork+0x10/0x20
[   22.178769] 
[   22.178789] Allocated by task 265:
[   22.178817]  kasan_save_stack+0x3c/0x68
[   22.178860]  kasan_save_track+0x20/0x40
[   22.178898]  kasan_save_alloc_info+0x40/0x58
[   22.178938]  __kasan_kmalloc+0xd4/0xd8
[   22.178976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.179016]  kasan_atomics+0xb8/0x2e0
[   22.179055]  kunit_try_run_case+0x170/0x3f0
[   22.179094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.179138]  kthread+0x328/0x630
[   22.179172]  ret_from_fork+0x10/0x20
[   22.179209] 
[   22.179229] The buggy address belongs to the object at fff00000c569f300
[   22.179229]  which belongs to the cache kmalloc-64 of size 64
[   22.179287] The buggy address is located 0 bytes to the right of
[   22.179287]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.179352] 
[   22.179373] The buggy address belongs to the physical page:
[   22.179405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.179461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.179508] page_type: f5(slab)
[   22.179547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.179598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.179640] page dumped because: kasan: bad access detected
[   22.179673] 
[   22.179694] Memory state around the buggy address:
[   22.179738]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.179780]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.179823] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.179861]                                      ^
[   22.179895]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.179938]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.179977] ==================================================================
[   22.234052] ==================================================================
[   22.234119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.234274] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.234680] 
[   22.234794] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.235002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.235061] Hardware name: linux,dummy-virt (DT)
[   22.235133] Call trace:
[   22.235163]  show_stack+0x20/0x38 (C)
[   22.235240]  dump_stack_lvl+0x8c/0xd0
[   22.235465]  print_report+0x118/0x608
[   22.235762]  kasan_report+0xdc/0x128
[   22.235972]  kasan_check_range+0x100/0x1a8
[   22.236300]  __kasan_check_write+0x20/0x30
[   22.236405]  kasan_atomics_helper+0x11f8/0x4858
[   22.236511]  kasan_atomics+0x198/0x2e0
[   22.236607]  kunit_try_run_case+0x170/0x3f0
[   22.236721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.236776]  kthread+0x328/0x630
[   22.236818]  ret_from_fork+0x10/0x20
[   22.237441] 
[   22.237697] Allocated by task 265:
[   22.237797]  kasan_save_stack+0x3c/0x68
[   22.237912]  kasan_save_track+0x20/0x40
[   22.237969]  kasan_save_alloc_info+0x40/0x58
[   22.238092]  __kasan_kmalloc+0xd4/0xd8
[   22.238160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.238337]  kasan_atomics+0xb8/0x2e0
[   22.238397]  kunit_try_run_case+0x170/0x3f0
[   22.238768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.239050]  kthread+0x328/0x630
[   22.239118]  ret_from_fork+0x10/0x20
[   22.239264] 
[   22.239326] The buggy address belongs to the object at fff00000c569f300
[   22.239326]  which belongs to the cache kmalloc-64 of size 64
[   22.239526] The buggy address is located 0 bytes to the right of
[   22.239526]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.239729] 
[   22.239922] The buggy address belongs to the physical page:
[   22.239997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.240204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.240450] page_type: f5(slab)
[   22.240507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.240560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.240943] page dumped because: kasan: bad access detected
[   22.241169] 
[   22.241446] Memory state around the buggy address:
[   22.241529]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.241746]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.241871] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.241981]                                      ^
[   22.242033]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.242077]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.242223] ==================================================================
[   22.132342] ==================================================================
[   22.132512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   22.132724] Read of size 4 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.132800] 
[   22.132845] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.133094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.133257] Hardware name: linux,dummy-virt (DT)
[   22.133523] Call trace:
[   22.133568]  show_stack+0x20/0x38 (C)
[   22.133622]  dump_stack_lvl+0x8c/0xd0
[   22.133815]  print_report+0x118/0x608
[   22.134022]  kasan_report+0xdc/0x128
[   22.134091]  __asan_report_load4_noabort+0x20/0x30
[   22.134149]  kasan_atomics_helper+0x3e04/0x4858
[   22.134350]  kasan_atomics+0x198/0x2e0
[   22.134543]  kunit_try_run_case+0x170/0x3f0
[   22.134615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.135019]  kthread+0x328/0x630
[   22.135182]  ret_from_fork+0x10/0x20
[   22.135243] 
[   22.135439] Allocated by task 265:
[   22.135549]  kasan_save_stack+0x3c/0x68
[   22.135598]  kasan_save_track+0x20/0x40
[   22.135637]  kasan_save_alloc_info+0x40/0x58
[   22.135679]  __kasan_kmalloc+0xd4/0xd8
[   22.136155]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.136345]  kasan_atomics+0xb8/0x2e0
[   22.136554]  kunit_try_run_case+0x170/0x3f0
[   22.136610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.136832]  kthread+0x328/0x630
[   22.136977]  ret_from_fork+0x10/0x20
[   22.137086] 
[   22.137304] The buggy address belongs to the object at fff00000c569f300
[   22.137304]  which belongs to the cache kmalloc-64 of size 64
[   22.137460] The buggy address is located 0 bytes to the right of
[   22.137460]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.137648] 
[   22.137674] The buggy address belongs to the physical page:
[   22.137900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.138119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.138199] page_type: f5(slab)
[   22.138417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.138813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.139068] page dumped because: kasan: bad access detected
[   22.139122] 
[   22.139535] Memory state around the buggy address:
[   22.139680]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.139742]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.139938] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.140171]                                      ^
[   22.140269]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.140357]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.140520] ==================================================================
[   22.180090] ==================================================================
[   22.180137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   22.180181] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265
[   22.180231] 
[   22.180260] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.180340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.180368] Hardware name: linux,dummy-virt (DT)
[   22.180399] Call trace:
[   22.180421]  show_stack+0x20/0x38 (C)
[   22.180467]  dump_stack_lvl+0x8c/0xd0
[   22.180514]  print_report+0x118/0x608
[   22.180561]  kasan_report+0xdc/0x128
[   22.180606]  kasan_check_range+0x100/0x1a8
[   22.180656]  __kasan_check_write+0x20/0x30
[   22.180932]  kasan_atomics_helper+0xf20/0x4858
[   22.180997]  kasan_atomics+0x198/0x2e0
[   22.181043]  kunit_try_run_case+0x170/0x3f0
[   22.181143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181198]  kthread+0x328/0x630
[   22.181239]  ret_from_fork+0x10/0x20
[   22.181286] 
[   22.181308] Allocated by task 265:
[   22.181336]  kasan_save_stack+0x3c/0x68
[   22.181379]  kasan_save_track+0x20/0x40
[   22.181418]  kasan_save_alloc_info+0x40/0x58
[   22.181458]  __kasan_kmalloc+0xd4/0xd8
[   22.181496]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.181537]  kasan_atomics+0xb8/0x2e0
[   22.181572]  kunit_try_run_case+0x170/0x3f0
[   22.181613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181658]  kthread+0x328/0x630
[   22.181692]  ret_from_fork+0x10/0x20
[   22.181740] 
[   22.181761] The buggy address belongs to the object at fff00000c569f300
[   22.181761]  which belongs to the cache kmalloc-64 of size 64
[   22.181819] The buggy address is located 0 bytes to the right of
[   22.181819]  allocated 48-byte region [fff00000c569f300, fff00000c569f330)
[   22.181884] 
[   22.181906] The buggy address belongs to the physical page:
[   22.181937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   22.181989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.182038] page_type: f5(slab)
[   22.182074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.182127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.182169] page dumped because: kasan: bad access detected
[   22.182203] 
[   22.182223] Memory state around the buggy address:
[   22.182256]  fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.182302]  fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.182344] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.182383]                                      ^
[   22.182414]  fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.182458]  fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.182497] ==================================================================

[   16.140365] ==================================================================
[   16.141257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   16.142157] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.142824] 
[   16.142984] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.143031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.143057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.143080] Call Trace:
[   16.143096]  <TASK>
[   16.143112]  dump_stack_lvl+0x73/0xb0
[   16.143141]  print_report+0xd1/0x650
[   16.143163]  ? __virt_addr_valid+0x1db/0x2d0
[   16.143187]  ? kasan_atomics_helper+0xd47/0x5450
[   16.143218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.143245]  ? kasan_atomics_helper+0xd47/0x5450
[   16.143267]  kasan_report+0x141/0x180
[   16.143290]  ? kasan_atomics_helper+0xd47/0x5450
[   16.143317]  kasan_check_range+0x10c/0x1c0
[   16.143341]  __kasan_check_write+0x18/0x20
[   16.143361]  kasan_atomics_helper+0xd47/0x5450
[   16.143383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.143406]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.143431]  ? kasan_atomics+0x152/0x310
[   16.143458]  kasan_atomics+0x1dc/0x310
[   16.143481]  ? __pfx_kasan_atomics+0x10/0x10
[   16.143505]  ? __pfx_read_tsc+0x10/0x10
[   16.143526]  ? ktime_get_ts64+0x86/0x230
[   16.143551]  kunit_try_run_case+0x1a5/0x480
[   16.143576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.143600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.143622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.143645]  ? __kthread_parkme+0x82/0x180
[   16.143666]  ? preempt_count_sub+0x50/0x80
[   16.143689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.143713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.143736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.143760]  kthread+0x337/0x6f0
[   16.143780]  ? trace_preempt_on+0x20/0xc0
[   16.143805]  ? __pfx_kthread+0x10/0x10
[   16.143826]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.143847]  ? calculate_sigpending+0x7b/0xa0
[   16.143871]  ? __pfx_kthread+0x10/0x10
[   16.143893]  ret_from_fork+0x116/0x1d0
[   16.143912]  ? __pfx_kthread+0x10/0x10
[   16.143932]  ret_from_fork_asm+0x1a/0x30
[   16.143965]  </TASK>
[   16.143976] 
[   16.158023] Allocated by task 282:
[   16.158408]  kasan_save_stack+0x45/0x70
[   16.158803]  kasan_save_track+0x18/0x40
[   16.159249]  kasan_save_alloc_info+0x3b/0x50
[   16.159694]  __kasan_kmalloc+0xb7/0xc0
[   16.160001]  __kmalloc_cache_noprof+0x189/0x420
[   16.160289]  kasan_atomics+0x95/0x310
[   16.160656]  kunit_try_run_case+0x1a5/0x480
[   16.161032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.161732]  kthread+0x337/0x6f0
[   16.161867]  ret_from_fork+0x116/0x1d0
[   16.162003]  ret_from_fork_asm+0x1a/0x30
[   16.162256] 
[   16.162422] The buggy address belongs to the object at ffff88810261fc00
[   16.162422]  which belongs to the cache kmalloc-64 of size 64
[   16.163553] The buggy address is located 0 bytes to the right of
[   16.163553]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.164749] 
[   16.164996] The buggy address belongs to the physical page:
[   16.165459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.165929] flags: 0x200000000000000(node=0|zone=2)
[   16.166451] page_type: f5(slab)
[   16.166961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.167465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.168106] page dumped because: kasan: bad access detected
[   16.168643] 
[   16.168767] Memory state around the buggy address:
[   16.168926]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.169364]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.169969] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.170696]                                      ^
[   16.171215]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.171947]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.172473] ==================================================================
[   15.908959] ==================================================================
[   15.909225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.910338] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.910858] 
[   15.911225] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.911274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.911288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.911311] Call Trace:
[   15.911327]  <TASK>
[   15.911344]  dump_stack_lvl+0x73/0xb0
[   15.911374]  print_report+0xd1/0x650
[   15.911397]  ? __virt_addr_valid+0x1db/0x2d0
[   15.911421]  ? kasan_atomics_helper+0x860/0x5450
[   15.911443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.911470]  ? kasan_atomics_helper+0x860/0x5450
[   15.911492]  kasan_report+0x141/0x180
[   15.911528]  ? kasan_atomics_helper+0x860/0x5450
[   15.911555]  kasan_check_range+0x10c/0x1c0
[   15.911581]  __kasan_check_write+0x18/0x20
[   15.911601]  kasan_atomics_helper+0x860/0x5450
[   15.911624]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.911647]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.911673]  ? kasan_atomics+0x152/0x310
[   15.911700]  kasan_atomics+0x1dc/0x310
[   15.911723]  ? __pfx_kasan_atomics+0x10/0x10
[   15.911747]  ? __pfx_read_tsc+0x10/0x10
[   15.911768]  ? ktime_get_ts64+0x86/0x230
[   15.911794]  kunit_try_run_case+0x1a5/0x480
[   15.911819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.911842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.911865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.911889]  ? __kthread_parkme+0x82/0x180
[   15.911909]  ? preempt_count_sub+0x50/0x80
[   15.911934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.911958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.911981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.912003]  kthread+0x337/0x6f0
[   15.912024]  ? trace_preempt_on+0x20/0xc0
[   15.912109]  ? __pfx_kthread+0x10/0x10
[   15.912135]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.912156]  ? calculate_sigpending+0x7b/0xa0
[   15.912181]  ? __pfx_kthread+0x10/0x10
[   15.912203]  ret_from_fork+0x116/0x1d0
[   15.912222]  ? __pfx_kthread+0x10/0x10
[   15.912243]  ret_from_fork_asm+0x1a/0x30
[   15.912274]  </TASK>
[   15.912286] 
[   15.925740] Allocated by task 282:
[   15.925887]  kasan_save_stack+0x45/0x70
[   15.926316]  kasan_save_track+0x18/0x40
[   15.926759]  kasan_save_alloc_info+0x3b/0x50
[   15.927016]  __kasan_kmalloc+0xb7/0xc0
[   15.927259]  __kmalloc_cache_noprof+0x189/0x420
[   15.927499]  kasan_atomics+0x95/0x310
[   15.927953]  kunit_try_run_case+0x1a5/0x480
[   15.928373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.928756]  kthread+0x337/0x6f0
[   15.929360]  ret_from_fork+0x116/0x1d0
[   15.929730]  ret_from_fork_asm+0x1a/0x30
[   15.929963] 
[   15.930253] The buggy address belongs to the object at ffff88810261fc00
[   15.930253]  which belongs to the cache kmalloc-64 of size 64
[   15.930853] The buggy address is located 0 bytes to the right of
[   15.930853]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.931864] 
[   15.931977] The buggy address belongs to the physical page:
[   15.932392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.932876] flags: 0x200000000000000(node=0|zone=2)
[   15.933179] page_type: f5(slab)
[   15.933328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.933967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.934684] page dumped because: kasan: bad access detected
[   15.935056] 
[   15.935299] Memory state around the buggy address:
[   15.935759]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.936301]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.936640] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.937053]                                      ^
[   15.937598]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.938058]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.938536] ==================================================================
[   16.456487] ==================================================================
[   16.456804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   16.457419] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.457964] 
[   16.458143] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.458191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.458204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.458226] Call Trace:
[   16.458241]  <TASK>
[   16.458257]  dump_stack_lvl+0x73/0xb0
[   16.458285]  print_report+0xd1/0x650
[   16.458308]  ? __virt_addr_valid+0x1db/0x2d0
[   16.458330]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.458351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.458377]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.458400]  kasan_report+0x141/0x180
[   16.458421]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.458448]  __asan_report_load4_noabort+0x18/0x20
[   16.458472]  kasan_atomics_helper+0x49ce/0x5450
[   16.458495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.458606]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.458632]  ? kasan_atomics+0x152/0x310
[   16.458658]  kasan_atomics+0x1dc/0x310
[   16.458682]  ? __pfx_kasan_atomics+0x10/0x10
[   16.458706]  ? __pfx_read_tsc+0x10/0x10
[   16.458727]  ? ktime_get_ts64+0x86/0x230
[   16.458751]  kunit_try_run_case+0x1a5/0x480
[   16.458776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.458798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.458821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.458844]  ? __kthread_parkme+0x82/0x180
[   16.458864]  ? preempt_count_sub+0x50/0x80
[   16.458888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.458912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.458936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.458959]  kthread+0x337/0x6f0
[   16.458979]  ? trace_preempt_on+0x20/0xc0
[   16.459001]  ? __pfx_kthread+0x10/0x10
[   16.459023]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.459080]  ? calculate_sigpending+0x7b/0xa0
[   16.459104]  ? __pfx_kthread+0x10/0x10
[   16.459127]  ret_from_fork+0x116/0x1d0
[   16.459146]  ? __pfx_kthread+0x10/0x10
[   16.459167]  ret_from_fork_asm+0x1a/0x30
[   16.459199]  </TASK>
[   16.459211] 
[   16.469938] Allocated by task 282:
[   16.470218]  kasan_save_stack+0x45/0x70
[   16.470539]  kasan_save_track+0x18/0x40
[   16.470829]  kasan_save_alloc_info+0x3b/0x50
[   16.471001]  __kasan_kmalloc+0xb7/0xc0
[   16.471275]  __kmalloc_cache_noprof+0x189/0x420
[   16.471861]  kasan_atomics+0x95/0x310
[   16.472062]  kunit_try_run_case+0x1a5/0x480
[   16.472438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.472800]  kthread+0x337/0x6f0
[   16.472977]  ret_from_fork+0x116/0x1d0
[   16.473361]  ret_from_fork_asm+0x1a/0x30
[   16.473569] 
[   16.473773] The buggy address belongs to the object at ffff88810261fc00
[   16.473773]  which belongs to the cache kmalloc-64 of size 64
[   16.474291] The buggy address is located 0 bytes to the right of
[   16.474291]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.475068] 
[   16.475361] The buggy address belongs to the physical page:
[   16.475686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.476005] flags: 0x200000000000000(node=0|zone=2)
[   16.476548] page_type: f5(slab)
[   16.476727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.477079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.477773] page dumped because: kasan: bad access detected
[   16.478175] 
[   16.478274] Memory state around the buggy address:
[   16.478624]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.478999]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.479550] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.479839]                                      ^
[   16.480288]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.480696]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.480988] ==================================================================
[   16.081520] ==================================================================
[   16.082319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   16.082703] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.083353] 
[   16.083585] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.083632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.083645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.083678] Call Trace:
[   16.083694]  <TASK>
[   16.083711]  dump_stack_lvl+0x73/0xb0
[   16.083824]  print_report+0xd1/0x650
[   16.083848]  ? __virt_addr_valid+0x1db/0x2d0
[   16.083871]  ? kasan_atomics_helper+0xc70/0x5450
[   16.083893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.083920]  ? kasan_atomics_helper+0xc70/0x5450
[   16.083941]  kasan_report+0x141/0x180
[   16.083964]  ? kasan_atomics_helper+0xc70/0x5450
[   16.083991]  kasan_check_range+0x10c/0x1c0
[   16.084015]  __kasan_check_write+0x18/0x20
[   16.084034]  kasan_atomics_helper+0xc70/0x5450
[   16.084080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.084102]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.084127]  ? kasan_atomics+0x152/0x310
[   16.084154]  kasan_atomics+0x1dc/0x310
[   16.084177]  ? __pfx_kasan_atomics+0x10/0x10
[   16.084202]  ? __pfx_read_tsc+0x10/0x10
[   16.084223]  ? ktime_get_ts64+0x86/0x230
[   16.084247]  kunit_try_run_case+0x1a5/0x480
[   16.084271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.084317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.084340]  ? __kthread_parkme+0x82/0x180
[   16.084361]  ? preempt_count_sub+0x50/0x80
[   16.084384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.084434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.084458]  kthread+0x337/0x6f0
[   16.084477]  ? trace_preempt_on+0x20/0xc0
[   16.084500]  ? __pfx_kthread+0x10/0x10
[   16.084573]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.084596]  ? calculate_sigpending+0x7b/0xa0
[   16.084622]  ? __pfx_kthread+0x10/0x10
[   16.084645]  ret_from_fork+0x116/0x1d0
[   16.084664]  ? __pfx_kthread+0x10/0x10
[   16.084685]  ret_from_fork_asm+0x1a/0x30
[   16.084717]  </TASK>
[   16.084729] 
[   16.096878] Allocated by task 282:
[   16.097074]  kasan_save_stack+0x45/0x70
[   16.097665]  kasan_save_track+0x18/0x40
[   16.097818]  kasan_save_alloc_info+0x3b/0x50
[   16.098207]  __kasan_kmalloc+0xb7/0xc0
[   16.098551]  __kmalloc_cache_noprof+0x189/0x420
[   16.098949]  kasan_atomics+0x95/0x310
[   16.099221]  kunit_try_run_case+0x1a5/0x480
[   16.099543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.099927]  kthread+0x337/0x6f0
[   16.100364]  ret_from_fork+0x116/0x1d0
[   16.100581]  ret_from_fork_asm+0x1a/0x30
[   16.100870] 
[   16.100976] The buggy address belongs to the object at ffff88810261fc00
[   16.100976]  which belongs to the cache kmalloc-64 of size 64
[   16.101773] The buggy address is located 0 bytes to the right of
[   16.101773]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.102868] 
[   16.102971] The buggy address belongs to the physical page:
[   16.103187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.103787] flags: 0x200000000000000(node=0|zone=2)
[   16.104316] page_type: f5(slab)
[   16.104499] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.104956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.105497] page dumped because: kasan: bad access detected
[   16.105782] 
[   16.105875] Memory state around the buggy address:
[   16.106363]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.106631]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.107486] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.107937]                                      ^
[   16.108510]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.108849]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.109370] ==================================================================
[   15.704659] ==================================================================
[   15.705001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.705408] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.705833] 
[   15.705926] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.705973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.705987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.706011] Call Trace:
[   15.706076]  <TASK>
[   15.706119]  dump_stack_lvl+0x73/0xb0
[   15.706149]  print_report+0xd1/0x650
[   15.706171]  ? __virt_addr_valid+0x1db/0x2d0
[   15.706194]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.706216]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.706243]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.706266]  kasan_report+0x141/0x180
[   15.706288]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.706315]  __asan_report_load4_noabort+0x18/0x20
[   15.706340]  kasan_atomics_helper+0x4b54/0x5450
[   15.706363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.706386]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.706411]  ? kasan_atomics+0x152/0x310
[   15.706438]  kasan_atomics+0x1dc/0x310
[   15.706460]  ? __pfx_kasan_atomics+0x10/0x10
[   15.706486]  ? __pfx_read_tsc+0x10/0x10
[   15.706586]  ? ktime_get_ts64+0x86/0x230
[   15.706640]  kunit_try_run_case+0x1a5/0x480
[   15.706696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.706719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.706742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.706766]  ? __kthread_parkme+0x82/0x180
[   15.706788]  ? preempt_count_sub+0x50/0x80
[   15.706813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.706837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.706861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.706884]  kthread+0x337/0x6f0
[   15.706905]  ? trace_preempt_on+0x20/0xc0
[   15.706928]  ? __pfx_kthread+0x10/0x10
[   15.706949]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.706971]  ? calculate_sigpending+0x7b/0xa0
[   15.706995]  ? __pfx_kthread+0x10/0x10
[   15.707017]  ret_from_fork+0x116/0x1d0
[   15.707037]  ? __pfx_kthread+0x10/0x10
[   15.707107]  ret_from_fork_asm+0x1a/0x30
[   15.707142]  </TASK>
[   15.707154] 
[   15.716552] Allocated by task 282:
[   15.716798]  kasan_save_stack+0x45/0x70
[   15.717036]  kasan_save_track+0x18/0x40
[   15.717329]  kasan_save_alloc_info+0x3b/0x50
[   15.717614]  __kasan_kmalloc+0xb7/0xc0
[   15.717755]  __kmalloc_cache_noprof+0x189/0x420
[   15.718002]  kasan_atomics+0x95/0x310
[   15.718255]  kunit_try_run_case+0x1a5/0x480
[   15.718539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.718797]  kthread+0x337/0x6f0
[   15.718973]  ret_from_fork+0x116/0x1d0
[   15.719346]  ret_from_fork_asm+0x1a/0x30
[   15.719586] 
[   15.719712] The buggy address belongs to the object at ffff88810261fc00
[   15.719712]  which belongs to the cache kmalloc-64 of size 64
[   15.720358] The buggy address is located 0 bytes to the right of
[   15.720358]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.720808] 
[   15.721131] The buggy address belongs to the physical page:
[   15.721488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.721800] flags: 0x200000000000000(node=0|zone=2)
[   15.721970] page_type: f5(slab)
[   15.722107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.722699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.723285] page dumped because: kasan: bad access detected
[   15.723758] 
[   15.723853] Memory state around the buggy address:
[   15.724219]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.724451]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.725068] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.725408]                                      ^
[   15.725653]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726386]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726800] ==================================================================
[   15.998645] ==================================================================
[   15.999404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.999833] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.000459] 
[   16.000583] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.000777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.000798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.000820] Call Trace:
[   16.000834]  <TASK>
[   16.000850]  dump_stack_lvl+0x73/0xb0
[   16.000884]  print_report+0xd1/0x650
[   16.000906]  ? __virt_addr_valid+0x1db/0x2d0
[   16.000929]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.000951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.000977]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.001001]  kasan_report+0x141/0x180
[   16.001024]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.001063]  kasan_check_range+0x10c/0x1c0
[   16.001088]  __kasan_check_write+0x18/0x20
[   16.001108]  kasan_atomics_helper+0xa2b/0x5450
[   16.001130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.001153]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.001178]  ? kasan_atomics+0x152/0x310
[   16.001205]  kasan_atomics+0x1dc/0x310
[   16.001228]  ? __pfx_kasan_atomics+0x10/0x10
[   16.001253]  ? __pfx_read_tsc+0x10/0x10
[   16.001274]  ? ktime_get_ts64+0x86/0x230
[   16.001299]  kunit_try_run_case+0x1a5/0x480
[   16.001323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.001369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.001393]  ? __kthread_parkme+0x82/0x180
[   16.001414]  ? preempt_count_sub+0x50/0x80
[   16.001438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.001486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.001510]  kthread+0x337/0x6f0
[   16.001530]  ? trace_preempt_on+0x20/0xc0
[   16.001560]  ? __pfx_kthread+0x10/0x10
[   16.001582]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.001603]  ? calculate_sigpending+0x7b/0xa0
[   16.001627]  ? __pfx_kthread+0x10/0x10
[   16.001649]  ret_from_fork+0x116/0x1d0
[   16.001668]  ? __pfx_kthread+0x10/0x10
[   16.001689]  ret_from_fork_asm+0x1a/0x30
[   16.001720]  </TASK>
[   16.001732] 
[   16.013678] Allocated by task 282:
[   16.014076]  kasan_save_stack+0x45/0x70
[   16.014644]  kasan_save_track+0x18/0x40
[   16.014826]  kasan_save_alloc_info+0x3b/0x50
[   16.015058]  __kasan_kmalloc+0xb7/0xc0
[   16.015475]  __kmalloc_cache_noprof+0x189/0x420
[   16.015799]  kasan_atomics+0x95/0x310
[   16.016123]  kunit_try_run_case+0x1a5/0x480
[   16.016417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.016757]  kthread+0x337/0x6f0
[   16.016900]  ret_from_fork+0x116/0x1d0
[   16.017361]  ret_from_fork_asm+0x1a/0x30
[   16.017721] 
[   16.017978] The buggy address belongs to the object at ffff88810261fc00
[   16.017978]  which belongs to the cache kmalloc-64 of size 64
[   16.018752] The buggy address is located 0 bytes to the right of
[   16.018752]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.019364] 
[   16.019776] The buggy address belongs to the physical page:
[   16.019987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.020363] flags: 0x200000000000000(node=0|zone=2)
[   16.020588] page_type: f5(slab)
[   16.020747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.021048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.021374] page dumped because: kasan: bad access detected
[   16.021616] 
[   16.021703] Memory state around the buggy address:
[   16.021917]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.022773]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.023282] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.023733]                                      ^
[   16.023948]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.024644]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.025052] ==================================================================
[   16.837170] ==================================================================
[   16.837414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.837694] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.838333] 
[   16.838550] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.838595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.838608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.838636] Call Trace:
[   16.838655]  <TASK>
[   16.838672]  dump_stack_lvl+0x73/0xb0
[   16.838699]  print_report+0xd1/0x650
[   16.838722]  ? __virt_addr_valid+0x1db/0x2d0
[   16.838745]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.838766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.838794]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.838816]  kasan_report+0x141/0x180
[   16.838838]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.838865]  __asan_report_load8_noabort+0x18/0x20
[   16.838889]  kasan_atomics_helper+0x4f30/0x5450
[   16.838912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.838935]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.838960]  ? kasan_atomics+0x152/0x310
[   16.838986]  kasan_atomics+0x1dc/0x310
[   16.839008]  ? __pfx_kasan_atomics+0x10/0x10
[   16.839033]  ? __pfx_read_tsc+0x10/0x10
[   16.839065]  ? ktime_get_ts64+0x86/0x230
[   16.839090]  kunit_try_run_case+0x1a5/0x480
[   16.839114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.839137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.839161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.839184]  ? __kthread_parkme+0x82/0x180
[   16.839204]  ? preempt_count_sub+0x50/0x80
[   16.839229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.839252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.839275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.839299]  kthread+0x337/0x6f0
[   16.839318]  ? trace_preempt_on+0x20/0xc0
[   16.839342]  ? __pfx_kthread+0x10/0x10
[   16.839363]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.839386]  ? calculate_sigpending+0x7b/0xa0
[   16.839410]  ? __pfx_kthread+0x10/0x10
[   16.839432]  ret_from_fork+0x116/0x1d0
[   16.839451]  ? __pfx_kthread+0x10/0x10
[   16.839471]  ret_from_fork_asm+0x1a/0x30
[   16.839502]  </TASK>
[   16.839523] 
[   16.851823] Allocated by task 282:
[   16.852155]  kasan_save_stack+0x45/0x70
[   16.852516]  kasan_save_track+0x18/0x40
[   16.852856]  kasan_save_alloc_info+0x3b/0x50
[   16.853250]  __kasan_kmalloc+0xb7/0xc0
[   16.853653]  __kmalloc_cache_noprof+0x189/0x420
[   16.854077]  kasan_atomics+0x95/0x310
[   16.854415]  kunit_try_run_case+0x1a5/0x480
[   16.854770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.854944]  kthread+0x337/0x6f0
[   16.855076]  ret_from_fork+0x116/0x1d0
[   16.855211]  ret_from_fork_asm+0x1a/0x30
[   16.855352] 
[   16.855425] The buggy address belongs to the object at ffff88810261fc00
[   16.855425]  which belongs to the cache kmalloc-64 of size 64
[   16.856336] The buggy address is located 0 bytes to the right of
[   16.856336]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.857573] 
[   16.857739] The buggy address belongs to the physical page:
[   16.858234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.858949] flags: 0x200000000000000(node=0|zone=2)
[   16.859402] page_type: f5(slab)
[   16.859747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.860366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.860632] page dumped because: kasan: bad access detected
[   16.861108] 
[   16.861264] Memory state around the buggy address:
[   16.861723]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.862338]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.862615] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.862832]                                      ^
[   16.862989]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863514]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864251] ==================================================================
[   16.865349] ==================================================================
[   16.865982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.866859] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.867582] 
[   16.867761] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.867805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.867840] Call Trace:
[   16.867859]  <TASK>
[   16.867876]  dump_stack_lvl+0x73/0xb0
[   16.867903]  print_report+0xd1/0x650
[   16.867926]  ? __virt_addr_valid+0x1db/0x2d0
[   16.867948]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.867970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.867997]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.868019]  kasan_report+0x141/0x180
[   16.868053]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.868081]  kasan_check_range+0x10c/0x1c0
[   16.868106]  __kasan_check_write+0x18/0x20
[   16.868126]  kasan_atomics_helper+0x1ce1/0x5450
[   16.868149]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.868171]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.868196]  ? kasan_atomics+0x152/0x310
[   16.868223]  kasan_atomics+0x1dc/0x310
[   16.868246]  ? __pfx_kasan_atomics+0x10/0x10
[   16.868271]  ? __pfx_read_tsc+0x10/0x10
[   16.868292]  ? ktime_get_ts64+0x86/0x230
[   16.868315]  kunit_try_run_case+0x1a5/0x480
[   16.868339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.868361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.868384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.868407]  ? __kthread_parkme+0x82/0x180
[   16.868428]  ? preempt_count_sub+0x50/0x80
[   16.868452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.868476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.868499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.868532]  kthread+0x337/0x6f0
[   16.868552]  ? trace_preempt_on+0x20/0xc0
[   16.868574]  ? __pfx_kthread+0x10/0x10
[   16.868595]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.868616]  ? calculate_sigpending+0x7b/0xa0
[   16.868640]  ? __pfx_kthread+0x10/0x10
[   16.868662]  ret_from_fork+0x116/0x1d0
[   16.868680]  ? __pfx_kthread+0x10/0x10
[   16.868701]  ret_from_fork_asm+0x1a/0x30
[   16.868733]  </TASK>
[   16.868744] 
[   16.880545] Allocated by task 282:
[   16.880703]  kasan_save_stack+0x45/0x70
[   16.880884]  kasan_save_track+0x18/0x40
[   16.881068]  kasan_save_alloc_info+0x3b/0x50
[   16.881950]  __kasan_kmalloc+0xb7/0xc0
[   16.882184]  __kmalloc_cache_noprof+0x189/0x420
[   16.882411]  kasan_atomics+0x95/0x310
[   16.883147]  kunit_try_run_case+0x1a5/0x480
[   16.883476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.883907]  kthread+0x337/0x6f0
[   16.884182]  ret_from_fork+0x116/0x1d0
[   16.884381]  ret_from_fork_asm+0x1a/0x30
[   16.884742] 
[   16.884841] The buggy address belongs to the object at ffff88810261fc00
[   16.884841]  which belongs to the cache kmalloc-64 of size 64
[   16.885717] The buggy address is located 0 bytes to the right of
[   16.885717]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.886257] 
[   16.886353] The buggy address belongs to the physical page:
[   16.886861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.887281] flags: 0x200000000000000(node=0|zone=2)
[   16.887646] page_type: f5(slab)
[   16.888085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.888395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.888968] page dumped because: kasan: bad access detected
[   16.889327] 
[   16.889432] Memory state around the buggy address:
[   16.890016]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.890321]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.890795] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.891180]                                      ^
[   16.891371]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892010]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892479] ==================================================================
[   15.549986] ==================================================================
[   15.551501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.552755] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.554334] 
[   15.554451] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.554501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.554513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.554536] Call Trace:
[   15.554550]  <TASK>
[   15.554569]  dump_stack_lvl+0x73/0xb0
[   15.554599]  print_report+0xd1/0x650
[   15.554621]  ? __virt_addr_valid+0x1db/0x2d0
[   15.554643]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.554664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.554688]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.554709]  kasan_report+0x141/0x180
[   15.554731]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.554756]  __asan_report_load4_noabort+0x18/0x20
[   15.554779]  kasan_atomics_helper+0x4bbc/0x5450
[   15.554801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.554822]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.554846]  ? kasan_atomics+0x152/0x310
[   15.554872]  kasan_atomics+0x1dc/0x310
[   15.554893]  ? __pfx_kasan_atomics+0x10/0x10
[   15.554916]  ? __pfx_read_tsc+0x10/0x10
[   15.554937]  ? ktime_get_ts64+0x86/0x230
[   15.554962]  kunit_try_run_case+0x1a5/0x480
[   15.554986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.555007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.555031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.555065]  ? __kthread_parkme+0x82/0x180
[   15.555085]  ? preempt_count_sub+0x50/0x80
[   15.555109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.555132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.555154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.555176]  kthread+0x337/0x6f0
[   15.555196]  ? trace_preempt_on+0x20/0xc0
[   15.555218]  ? __pfx_kthread+0x10/0x10
[   15.555238]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.555258]  ? calculate_sigpending+0x7b/0xa0
[   15.555280]  ? __pfx_kthread+0x10/0x10
[   15.555301]  ret_from_fork+0x116/0x1d0
[   15.555319]  ? __pfx_kthread+0x10/0x10
[   15.555338]  ret_from_fork_asm+0x1a/0x30
[   15.555369]  </TASK>
[   15.555381] 
[   15.570544] Allocated by task 282:
[   15.571169]  kasan_save_stack+0x45/0x70
[   15.571566]  kasan_save_track+0x18/0x40
[   15.572075]  kasan_save_alloc_info+0x3b/0x50
[   15.572567]  __kasan_kmalloc+0xb7/0xc0
[   15.573005]  __kmalloc_cache_noprof+0x189/0x420
[   15.573571]  kasan_atomics+0x95/0x310
[   15.574158]  kunit_try_run_case+0x1a5/0x480
[   15.574685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.574871]  kthread+0x337/0x6f0
[   15.575360]  ret_from_fork+0x116/0x1d0
[   15.575837]  ret_from_fork_asm+0x1a/0x30
[   15.576367] 
[   15.576642] The buggy address belongs to the object at ffff88810261fc00
[   15.576642]  which belongs to the cache kmalloc-64 of size 64
[   15.577008] The buggy address is located 0 bytes to the right of
[   15.577008]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.578496] 
[   15.578671] The buggy address belongs to the physical page:
[   15.579358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.580272] flags: 0x200000000000000(node=0|zone=2)
[   15.580831] page_type: f5(slab)
[   15.580965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.581252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.582252] page dumped because: kasan: bad access detected
[   15.582922] 
[   15.583384] Memory state around the buggy address:
[   15.583912]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.584696]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.585236] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.585807]                                      ^
[   15.586295]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.587108]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.587716] ==================================================================
[   16.653760] ==================================================================
[   16.653988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.654587] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.654807] 
[   16.655875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.655926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.655940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.655961] Call Trace:
[   16.655980]  <TASK>
[   16.655997]  dump_stack_lvl+0x73/0xb0
[   16.656026]  print_report+0xd1/0x650
[   16.656094]  ? __virt_addr_valid+0x1db/0x2d0
[   16.656118]  ? kasan_atomics_helper+0x177f/0x5450
[   16.656139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.656165]  ? kasan_atomics_helper+0x177f/0x5450
[   16.656187]  kasan_report+0x141/0x180
[   16.656209]  ? kasan_atomics_helper+0x177f/0x5450
[   16.656236]  kasan_check_range+0x10c/0x1c0
[   16.656260]  __kasan_check_write+0x18/0x20
[   16.656279]  kasan_atomics_helper+0x177f/0x5450
[   16.656302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.656324]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.656348]  ? kasan_atomics+0x152/0x310
[   16.656375]  kasan_atomics+0x1dc/0x310
[   16.656397]  ? __pfx_kasan_atomics+0x10/0x10
[   16.656421]  ? __pfx_read_tsc+0x10/0x10
[   16.656442]  ? ktime_get_ts64+0x86/0x230
[   16.656468]  kunit_try_run_case+0x1a5/0x480
[   16.656491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.656514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.656537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.656560]  ? __kthread_parkme+0x82/0x180
[   16.656580]  ? preempt_count_sub+0x50/0x80
[   16.656605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.656629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.656653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.656677]  kthread+0x337/0x6f0
[   16.656697]  ? trace_preempt_on+0x20/0xc0
[   16.656720]  ? __pfx_kthread+0x10/0x10
[   16.656741]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.656762]  ? calculate_sigpending+0x7b/0xa0
[   16.656786]  ? __pfx_kthread+0x10/0x10
[   16.656808]  ret_from_fork+0x116/0x1d0
[   16.656827]  ? __pfx_kthread+0x10/0x10
[   16.656847]  ret_from_fork_asm+0x1a/0x30
[   16.656879]  </TASK>
[   16.656892] 
[   16.664304] Allocated by task 282:
[   16.664456]  kasan_save_stack+0x45/0x70
[   16.664762]  kasan_save_track+0x18/0x40
[   16.664953]  kasan_save_alloc_info+0x3b/0x50
[   16.665151]  __kasan_kmalloc+0xb7/0xc0
[   16.665285]  __kmalloc_cache_noprof+0x189/0x420
[   16.665441]  kasan_atomics+0x95/0x310
[   16.665686]  kunit_try_run_case+0x1a5/0x480
[   16.665893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.666166]  kthread+0x337/0x6f0
[   16.666336]  ret_from_fork+0x116/0x1d0
[   16.666500]  ret_from_fork_asm+0x1a/0x30
[   16.666692] 
[   16.666768] The buggy address belongs to the object at ffff88810261fc00
[   16.666768]  which belongs to the cache kmalloc-64 of size 64
[   16.667207] The buggy address is located 0 bytes to the right of
[   16.667207]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.667903] 
[   16.668003] The buggy address belongs to the physical page:
[   16.668247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.668597] flags: 0x200000000000000(node=0|zone=2)
[   16.668803] page_type: f5(slab)
[   16.668966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.669265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.669639] page dumped because: kasan: bad access detected
[   16.669817] 
[   16.669888] Memory state around the buggy address:
[   16.670057]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.670377]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.670700] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.671131]                                      ^
[   16.671292]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.671511]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.671831] ==================================================================
[   16.614312] ==================================================================
[   16.614638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.614965] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.615294] 
[   16.615407] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.615450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.615463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.615484] Call Trace:
[   16.615501]  <TASK>
[   16.615525]  dump_stack_lvl+0x73/0xb0
[   16.615551]  print_report+0xd1/0x650
[   16.615574]  ? __virt_addr_valid+0x1db/0x2d0
[   16.615595]  ? kasan_atomics_helper+0x164f/0x5450
[   16.615617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.615644]  ? kasan_atomics_helper+0x164f/0x5450
[   16.615665]  kasan_report+0x141/0x180
[   16.615689]  ? kasan_atomics_helper+0x164f/0x5450
[   16.615716]  kasan_check_range+0x10c/0x1c0
[   16.615740]  __kasan_check_write+0x18/0x20
[   16.615760]  kasan_atomics_helper+0x164f/0x5450
[   16.615784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.615805]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.615830]  ? kasan_atomics+0x152/0x310
[   16.615857]  kasan_atomics+0x1dc/0x310
[   16.615880]  ? __pfx_kasan_atomics+0x10/0x10
[   16.615905]  ? __pfx_read_tsc+0x10/0x10
[   16.615926]  ? ktime_get_ts64+0x86/0x230
[   16.615951]  kunit_try_run_case+0x1a5/0x480
[   16.615976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.615999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.616023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.616058]  ? __kthread_parkme+0x82/0x180
[   16.616079]  ? preempt_count_sub+0x50/0x80
[   16.616104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.616128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.616152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.616176]  kthread+0x337/0x6f0
[   16.616196]  ? trace_preempt_on+0x20/0xc0
[   16.616219]  ? __pfx_kthread+0x10/0x10
[   16.616239]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.616261]  ? calculate_sigpending+0x7b/0xa0
[   16.616285]  ? __pfx_kthread+0x10/0x10
[   16.616307]  ret_from_fork+0x116/0x1d0
[   16.616326]  ? __pfx_kthread+0x10/0x10
[   16.616347]  ret_from_fork_asm+0x1a/0x30
[   16.616379]  </TASK>
[   16.616391] 
[   16.624100] Allocated by task 282:
[   16.624286]  kasan_save_stack+0x45/0x70
[   16.624490]  kasan_save_track+0x18/0x40
[   16.624698]  kasan_save_alloc_info+0x3b/0x50
[   16.624884]  __kasan_kmalloc+0xb7/0xc0
[   16.625071]  __kmalloc_cache_noprof+0x189/0x420
[   16.625284]  kasan_atomics+0x95/0x310
[   16.625452]  kunit_try_run_case+0x1a5/0x480
[   16.625647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.625849]  kthread+0x337/0x6f0
[   16.625970]  ret_from_fork+0x116/0x1d0
[   16.626115]  ret_from_fork_asm+0x1a/0x30
[   16.626257] 
[   16.626330] The buggy address belongs to the object at ffff88810261fc00
[   16.626330]  which belongs to the cache kmalloc-64 of size 64
[   16.626774] The buggy address is located 0 bytes to the right of
[   16.626774]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.627335] 
[   16.627433] The buggy address belongs to the physical page:
[   16.627685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.628058] flags: 0x200000000000000(node=0|zone=2)
[   16.628237] page_type: f5(slab)
[   16.628360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.628809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.629171] page dumped because: kasan: bad access detected
[   16.629424] 
[   16.629525] Memory state around the buggy address:
[   16.629733]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.629969]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.630303] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.630631]                                      ^
[   16.630820]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.631094]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.631398] ==================================================================
[   16.380237] ==================================================================
[   16.380609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.380845] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.381091] 
[   16.381201] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.381243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.381256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.381278] Call Trace:
[   16.381291]  <TASK>
[   16.381305]  dump_stack_lvl+0x73/0xb0
[   16.381331]  print_report+0xd1/0x650
[   16.381353]  ? __virt_addr_valid+0x1db/0x2d0
[   16.381374]  ? kasan_atomics_helper+0x1217/0x5450
[   16.381395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.381421]  ? kasan_atomics_helper+0x1217/0x5450
[   16.381442]  kasan_report+0x141/0x180
[   16.381465]  ? kasan_atomics_helper+0x1217/0x5450
[   16.381492]  kasan_check_range+0x10c/0x1c0
[   16.381516]  __kasan_check_write+0x18/0x20
[   16.381535]  kasan_atomics_helper+0x1217/0x5450
[   16.381563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.381585]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.381610]  ? kasan_atomics+0x152/0x310
[   16.381636]  kasan_atomics+0x1dc/0x310
[   16.381659]  ? __pfx_kasan_atomics+0x10/0x10
[   16.381683]  ? __pfx_read_tsc+0x10/0x10
[   16.381704]  ? ktime_get_ts64+0x86/0x230
[   16.381777]  kunit_try_run_case+0x1a5/0x480
[   16.381806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.381829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.381852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.381876]  ? __kthread_parkme+0x82/0x180
[   16.381896]  ? preempt_count_sub+0x50/0x80
[   16.381921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.381945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.381969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.381992]  kthread+0x337/0x6f0
[   16.382012]  ? trace_preempt_on+0x20/0xc0
[   16.382035]  ? __pfx_kthread+0x10/0x10
[   16.382095]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.382120]  ? calculate_sigpending+0x7b/0xa0
[   16.382143]  ? __pfx_kthread+0x10/0x10
[   16.382166]  ret_from_fork+0x116/0x1d0
[   16.382186]  ? __pfx_kthread+0x10/0x10
[   16.382207]  ret_from_fork_asm+0x1a/0x30
[   16.382238]  </TASK>
[   16.382250] 
[   16.394779] Allocated by task 282:
[   16.394917]  kasan_save_stack+0x45/0x70
[   16.395134]  kasan_save_track+0x18/0x40
[   16.395452]  kasan_save_alloc_info+0x3b/0x50
[   16.395634]  __kasan_kmalloc+0xb7/0xc0
[   16.395770]  __kmalloc_cache_noprof+0x189/0x420
[   16.395990]  kasan_atomics+0x95/0x310
[   16.396289]  kunit_try_run_case+0x1a5/0x480
[   16.396592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.396841]  kthread+0x337/0x6f0
[   16.396965]  ret_from_fork+0x116/0x1d0
[   16.397119]  ret_from_fork_asm+0x1a/0x30
[   16.397283] 
[   16.397414] The buggy address belongs to the object at ffff88810261fc00
[   16.397414]  which belongs to the cache kmalloc-64 of size 64
[   16.398321] The buggy address is located 0 bytes to the right of
[   16.398321]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.398864] 
[   16.398941] The buggy address belongs to the physical page:
[   16.399381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.399894] flags: 0x200000000000000(node=0|zone=2)
[   16.400206] page_type: f5(slab)
[   16.400377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.400738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.401123] page dumped because: kasan: bad access detected
[   16.401315] 
[   16.401389] Memory state around the buggy address:
[   16.401564]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.401885]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.402216] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.402537]                                      ^
[   16.402772]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.403248]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.403561] ==================================================================
[   16.729260] ==================================================================
[   16.729647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.730006] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.730338] 
[   16.730425] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.730469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.730482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.730523] Call Trace:
[   16.730538]  <TASK>
[   16.730553]  dump_stack_lvl+0x73/0xb0
[   16.730580]  print_report+0xd1/0x650
[   16.730603]  ? __virt_addr_valid+0x1db/0x2d0
[   16.730625]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.730667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.730694]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.730716]  kasan_report+0x141/0x180
[   16.730756]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.730784]  kasan_check_range+0x10c/0x1c0
[   16.730807]  __kasan_check_write+0x18/0x20
[   16.730826]  kasan_atomics_helper+0x19e3/0x5450
[   16.730849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.730871]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.730895]  ? kasan_atomics+0x152/0x310
[   16.730922]  kasan_atomics+0x1dc/0x310
[   16.730961]  ? __pfx_kasan_atomics+0x10/0x10
[   16.730986]  ? __pfx_read_tsc+0x10/0x10
[   16.731007]  ? ktime_get_ts64+0x86/0x230
[   16.731058]  kunit_try_run_case+0x1a5/0x480
[   16.731082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.731118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.731154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.731191]  ? __kthread_parkme+0x82/0x180
[   16.731224]  ? preempt_count_sub+0x50/0x80
[   16.731248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.731272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.731295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.731318]  kthread+0x337/0x6f0
[   16.731337]  ? trace_preempt_on+0x20/0xc0
[   16.731360]  ? __pfx_kthread+0x10/0x10
[   16.731382]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.731404]  ? calculate_sigpending+0x7b/0xa0
[   16.731427]  ? __pfx_kthread+0x10/0x10
[   16.731449]  ret_from_fork+0x116/0x1d0
[   16.731467]  ? __pfx_kthread+0x10/0x10
[   16.731488]  ret_from_fork_asm+0x1a/0x30
[   16.731538]  </TASK>
[   16.731549] 
[   16.739283] Allocated by task 282:
[   16.739421]  kasan_save_stack+0x45/0x70
[   16.739670]  kasan_save_track+0x18/0x40
[   16.739896]  kasan_save_alloc_info+0x3b/0x50
[   16.740121]  __kasan_kmalloc+0xb7/0xc0
[   16.740273]  __kmalloc_cache_noprof+0x189/0x420
[   16.740563]  kasan_atomics+0x95/0x310
[   16.740754]  kunit_try_run_case+0x1a5/0x480
[   16.740953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.741211]  kthread+0x337/0x6f0
[   16.741355]  ret_from_fork+0x116/0x1d0
[   16.741544]  ret_from_fork_asm+0x1a/0x30
[   16.741773] 
[   16.741886] The buggy address belongs to the object at ffff88810261fc00
[   16.741886]  which belongs to the cache kmalloc-64 of size 64
[   16.742375] The buggy address is located 0 bytes to the right of
[   16.742375]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.743052] 
[   16.743158] The buggy address belongs to the physical page:
[   16.743408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.743789] flags: 0x200000000000000(node=0|zone=2)
[   16.744025] page_type: f5(slab)
[   16.744200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.744561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.744913] page dumped because: kasan: bad access detected
[   16.745154] 
[   16.745249] Memory state around the buggy address:
[   16.745458]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.745830]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.746158] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.746489]                                      ^
[   16.746734]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.746965]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.747609] ==================================================================
[   16.748935] ==================================================================
[   16.749562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.749890] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.750208] 
[   16.750309] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.750352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.750365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.750388] Call Trace:
[   16.750403]  <TASK>
[   16.750417]  dump_stack_lvl+0x73/0xb0
[   16.750444]  print_report+0xd1/0x650
[   16.750466]  ? __virt_addr_valid+0x1db/0x2d0
[   16.750489]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.750789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.750819]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.750841]  kasan_report+0x141/0x180
[   16.750865]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.750995]  kasan_check_range+0x10c/0x1c0
[   16.751025]  __kasan_check_write+0x18/0x20
[   16.751058]  kasan_atomics_helper+0x1a7f/0x5450
[   16.751082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.751104]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.751128]  ? kasan_atomics+0x152/0x310
[   16.751155]  kasan_atomics+0x1dc/0x310
[   16.751178]  ? __pfx_kasan_atomics+0x10/0x10
[   16.751202]  ? __pfx_read_tsc+0x10/0x10
[   16.751224]  ? ktime_get_ts64+0x86/0x230
[   16.751247]  kunit_try_run_case+0x1a5/0x480
[   16.751271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.751295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.751317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.751340]  ? __kthread_parkme+0x82/0x180
[   16.751361]  ? preempt_count_sub+0x50/0x80
[   16.751384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.751408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.751431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.751455]  kthread+0x337/0x6f0
[   16.751474]  ? trace_preempt_on+0x20/0xc0
[   16.751646]  ? __pfx_kthread+0x10/0x10
[   16.751677]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.751701]  ? calculate_sigpending+0x7b/0xa0
[   16.751727]  ? __pfx_kthread+0x10/0x10
[   16.751749]  ret_from_fork+0x116/0x1d0
[   16.751769]  ? __pfx_kthread+0x10/0x10
[   16.751789]  ret_from_fork_asm+0x1a/0x30
[   16.751820]  </TASK>
[   16.751832] 
[   16.763021] Allocated by task 282:
[   16.763331]  kasan_save_stack+0x45/0x70
[   16.763691]  kasan_save_track+0x18/0x40
[   16.764000]  kasan_save_alloc_info+0x3b/0x50
[   16.764226]  __kasan_kmalloc+0xb7/0xc0
[   16.764400]  __kmalloc_cache_noprof+0x189/0x420
[   16.764809]  kasan_atomics+0x95/0x310
[   16.765001]  kunit_try_run_case+0x1a5/0x480
[   16.765527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.765785]  kthread+0x337/0x6f0
[   16.765949]  ret_from_fork+0x116/0x1d0
[   16.766139]  ret_from_fork_asm+0x1a/0x30
[   16.766325] 
[   16.766418] The buggy address belongs to the object at ffff88810261fc00
[   16.766418]  which belongs to the cache kmalloc-64 of size 64
[   16.767465] The buggy address is located 0 bytes to the right of
[   16.767465]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.768232] 
[   16.768318] The buggy address belongs to the physical page:
[   16.768499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.768745] flags: 0x200000000000000(node=0|zone=2)
[   16.768914] page_type: f5(slab)
[   16.769051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.769288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.769526] page dumped because: kasan: bad access detected
[   16.770479] 
[   16.770667] Memory state around the buggy address:
[   16.771401]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.772214]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.773067] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.773886]                                      ^
[   16.774445]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775258]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775938] ==================================================================
[   17.027322] ==================================================================
[   17.027653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   17.027981] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.028312] 
[   17.028418] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.028459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.028472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.028493] Call Trace:
[   17.028509]  <TASK>
[   17.028525]  dump_stack_lvl+0x73/0xb0
[   17.028550]  print_report+0xd1/0x650
[   17.028572]  ? __virt_addr_valid+0x1db/0x2d0
[   17.028593]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.028662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.028689]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.028710]  kasan_report+0x141/0x180
[   17.028733]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.028760]  __asan_report_load8_noabort+0x18/0x20
[   17.028784]  kasan_atomics_helper+0x4f98/0x5450
[   17.028806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.028828]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.028853]  ? kasan_atomics+0x152/0x310
[   17.028880]  kasan_atomics+0x1dc/0x310
[   17.028903]  ? __pfx_kasan_atomics+0x10/0x10
[   17.028929]  ? __pfx_read_tsc+0x10/0x10
[   17.028950]  ? ktime_get_ts64+0x86/0x230
[   17.028974]  kunit_try_run_case+0x1a5/0x480
[   17.028998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.029021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.029055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.029080]  ? __kthread_parkme+0x82/0x180
[   17.029099]  ? preempt_count_sub+0x50/0x80
[   17.029123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.029147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.029170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.029194]  kthread+0x337/0x6f0
[   17.029214]  ? trace_preempt_on+0x20/0xc0
[   17.029236]  ? __pfx_kthread+0x10/0x10
[   17.029257]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.029279]  ? calculate_sigpending+0x7b/0xa0
[   17.029303]  ? __pfx_kthread+0x10/0x10
[   17.029325]  ret_from_fork+0x116/0x1d0
[   17.029344]  ? __pfx_kthread+0x10/0x10
[   17.029366]  ret_from_fork_asm+0x1a/0x30
[   17.029400]  </TASK>
[   17.029412] 
[   17.037492] Allocated by task 282:
[   17.037699]  kasan_save_stack+0x45/0x70
[   17.037900]  kasan_save_track+0x18/0x40
[   17.038106]  kasan_save_alloc_info+0x3b/0x50
[   17.038321]  __kasan_kmalloc+0xb7/0xc0
[   17.038523]  __kmalloc_cache_noprof+0x189/0x420
[   17.038750]  kasan_atomics+0x95/0x310
[   17.038950]  kunit_try_run_case+0x1a5/0x480
[   17.039189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.039415]  kthread+0x337/0x6f0
[   17.039612]  ret_from_fork+0x116/0x1d0
[   17.039822]  ret_from_fork_asm+0x1a/0x30
[   17.039969] 
[   17.040096] The buggy address belongs to the object at ffff88810261fc00
[   17.040096]  which belongs to the cache kmalloc-64 of size 64
[   17.040676] The buggy address is located 0 bytes to the right of
[   17.040676]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.041217] 
[   17.041306] The buggy address belongs to the physical page:
[   17.041606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.041948] flags: 0x200000000000000(node=0|zone=2)
[   17.042200] page_type: f5(slab)
[   17.042384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.042744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.043144] page dumped because: kasan: bad access detected
[   17.043400] 
[   17.043505] Memory state around the buggy address:
[   17.043747]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.044103]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.044317] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.044525]                                      ^
[   17.044745]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.045063]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.045371] ==================================================================
[   16.532591] ==================================================================
[   16.532886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.533943] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.534428] 
[   16.534645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.534696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.534708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.534732] Call Trace:
[   16.534811]  <TASK>
[   16.534832]  dump_stack_lvl+0x73/0xb0
[   16.534862]  print_report+0xd1/0x650
[   16.534886]  ? __virt_addr_valid+0x1db/0x2d0
[   16.534908]  ? kasan_atomics_helper+0x1467/0x5450
[   16.534931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.534956]  ? kasan_atomics_helper+0x1467/0x5450
[   16.534978]  kasan_report+0x141/0x180
[   16.535001]  ? kasan_atomics_helper+0x1467/0x5450
[   16.535027]  kasan_check_range+0x10c/0x1c0
[   16.535127]  __kasan_check_write+0x18/0x20
[   16.535149]  kasan_atomics_helper+0x1467/0x5450
[   16.535173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.535195]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.535221]  ? kasan_atomics+0x152/0x310
[   16.535247]  kasan_atomics+0x1dc/0x310
[   16.535270]  ? __pfx_kasan_atomics+0x10/0x10
[   16.535295]  ? __pfx_read_tsc+0x10/0x10
[   16.535316]  ? ktime_get_ts64+0x86/0x230
[   16.535342]  kunit_try_run_case+0x1a5/0x480
[   16.535366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.535389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.535412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.535436]  ? __kthread_parkme+0x82/0x180
[   16.535456]  ? preempt_count_sub+0x50/0x80
[   16.535481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.535524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.535547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.535571]  kthread+0x337/0x6f0
[   16.535593]  ? trace_preempt_on+0x20/0xc0
[   16.535616]  ? __pfx_kthread+0x10/0x10
[   16.535637]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.535659]  ? calculate_sigpending+0x7b/0xa0
[   16.535684]  ? __pfx_kthread+0x10/0x10
[   16.535706]  ret_from_fork+0x116/0x1d0
[   16.535725]  ? __pfx_kthread+0x10/0x10
[   16.535746]  ret_from_fork_asm+0x1a/0x30
[   16.535778]  </TASK>
[   16.535790] 
[   16.546583] Allocated by task 282:
[   16.546934]  kasan_save_stack+0x45/0x70
[   16.547306]  kasan_save_track+0x18/0x40
[   16.547567]  kasan_save_alloc_info+0x3b/0x50
[   16.547800]  __kasan_kmalloc+0xb7/0xc0
[   16.548181]  __kmalloc_cache_noprof+0x189/0x420
[   16.548368]  kasan_atomics+0x95/0x310
[   16.548732]  kunit_try_run_case+0x1a5/0x480
[   16.549009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.549399]  kthread+0x337/0x6f0
[   16.549676]  ret_from_fork+0x116/0x1d0
[   16.549829]  ret_from_fork_asm+0x1a/0x30
[   16.550359] 
[   16.550466] The buggy address belongs to the object at ffff88810261fc00
[   16.550466]  which belongs to the cache kmalloc-64 of size 64
[   16.551187] The buggy address is located 0 bytes to the right of
[   16.551187]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.551674] 
[   16.551774] The buggy address belongs to the physical page:
[   16.552009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.552735] flags: 0x200000000000000(node=0|zone=2)
[   16.553111] page_type: f5(slab)
[   16.553382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.553820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.554275] page dumped because: kasan: bad access detected
[   16.554620] 
[   16.554716] Memory state around the buggy address:
[   16.554922]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.555609]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.556027] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.556410]                                      ^
[   16.556636]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.556936]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.557530] ==================================================================
[   16.507236] ==================================================================
[   16.507545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.508373] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.508768] 
[   16.508887] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.508932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.508945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.508967] Call Trace:
[   16.508985]  <TASK>
[   16.509002]  dump_stack_lvl+0x73/0xb0
[   16.509031]  print_report+0xd1/0x650
[   16.509310]  ? __virt_addr_valid+0x1db/0x2d0
[   16.509341]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.509363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.509390]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.509413]  kasan_report+0x141/0x180
[   16.509436]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.509463]  __asan_report_load8_noabort+0x18/0x20
[   16.509488]  kasan_atomics_helper+0x4eae/0x5450
[   16.509523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.509546]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.509574]  ? kasan_atomics+0x152/0x310
[   16.509604]  kasan_atomics+0x1dc/0x310
[   16.509627]  ? __pfx_kasan_atomics+0x10/0x10
[   16.509651]  ? __pfx_read_tsc+0x10/0x10
[   16.509672]  ? ktime_get_ts64+0x86/0x230
[   16.509697]  kunit_try_run_case+0x1a5/0x480
[   16.509722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.509744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.509768]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.509793]  ? __kthread_parkme+0x82/0x180
[   16.509814]  ? preempt_count_sub+0x50/0x80
[   16.509838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.509863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.509886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.509910]  kthread+0x337/0x6f0
[   16.509930]  ? trace_preempt_on+0x20/0xc0
[   16.509952]  ? __pfx_kthread+0x10/0x10
[   16.509974]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.509996]  ? calculate_sigpending+0x7b/0xa0
[   16.510020]  ? __pfx_kthread+0x10/0x10
[   16.510054]  ret_from_fork+0x116/0x1d0
[   16.510123]  ? __pfx_kthread+0x10/0x10
[   16.510146]  ret_from_fork_asm+0x1a/0x30
[   16.510178]  </TASK>
[   16.510190] 
[   16.521335] Allocated by task 282:
[   16.521668]  kasan_save_stack+0x45/0x70
[   16.521876]  kasan_save_track+0x18/0x40
[   16.522443]  kasan_save_alloc_info+0x3b/0x50
[   16.522742]  __kasan_kmalloc+0xb7/0xc0
[   16.522934]  __kmalloc_cache_noprof+0x189/0x420
[   16.523371]  kasan_atomics+0x95/0x310
[   16.523615]  kunit_try_run_case+0x1a5/0x480
[   16.523811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.524037]  kthread+0x337/0x6f0
[   16.524203]  ret_from_fork+0x116/0x1d0
[   16.524386]  ret_from_fork_asm+0x1a/0x30
[   16.524863] 
[   16.524965] The buggy address belongs to the object at ffff88810261fc00
[   16.524965]  which belongs to the cache kmalloc-64 of size 64
[   16.525695] The buggy address is located 0 bytes to the right of
[   16.525695]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.526238] 
[   16.526345] The buggy address belongs to the physical page:
[   16.526891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.527583] flags: 0x200000000000000(node=0|zone=2)
[   16.527794] page_type: f5(slab)
[   16.527972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.528680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.528997] page dumped because: kasan: bad access detected
[   16.529417] 
[   16.529560] Memory state around the buggy address:
[   16.529845]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.530345]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.530786] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.531256]                                      ^
[   16.531462]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.531782]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.532111] ==================================================================
[   17.064496] ==================================================================
[   17.064961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   17.065431] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.065799] 
[   17.065943] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.065988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.066199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.066222] Call Trace:
[   17.066237]  <TASK>
[   17.066252]  dump_stack_lvl+0x73/0xb0
[   17.066279]  print_report+0xd1/0x650
[   17.066301]  ? __virt_addr_valid+0x1db/0x2d0
[   17.066324]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.066346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.066372]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.066394]  kasan_report+0x141/0x180
[   17.066417]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.066444]  __asan_report_load8_noabort+0x18/0x20
[   17.066467]  kasan_atomics_helper+0x4fb2/0x5450
[   17.066491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.066512]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.066537]  ? kasan_atomics+0x152/0x310
[   17.066563]  kasan_atomics+0x1dc/0x310
[   17.066586]  ? __pfx_kasan_atomics+0x10/0x10
[   17.066611]  ? __pfx_read_tsc+0x10/0x10
[   17.066632]  ? ktime_get_ts64+0x86/0x230
[   17.066656]  kunit_try_run_case+0x1a5/0x480
[   17.066680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.066703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.066727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.066751]  ? __kthread_parkme+0x82/0x180
[   17.066771]  ? preempt_count_sub+0x50/0x80
[   17.066795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.066819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.066842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.066866]  kthread+0x337/0x6f0
[   17.066885]  ? trace_preempt_on+0x20/0xc0
[   17.066909]  ? __pfx_kthread+0x10/0x10
[   17.066930]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.066952]  ? calculate_sigpending+0x7b/0xa0
[   17.066976]  ? __pfx_kthread+0x10/0x10
[   17.066997]  ret_from_fork+0x116/0x1d0
[   17.067016]  ? __pfx_kthread+0x10/0x10
[   17.067037]  ret_from_fork_asm+0x1a/0x30
[   17.067078]  </TASK>
[   17.067089] 
[   17.074701] Allocated by task 282:
[   17.074916]  kasan_save_stack+0x45/0x70
[   17.075121]  kasan_save_track+0x18/0x40
[   17.075330]  kasan_save_alloc_info+0x3b/0x50
[   17.075594]  __kasan_kmalloc+0xb7/0xc0
[   17.075802]  __kmalloc_cache_noprof+0x189/0x420
[   17.076032]  kasan_atomics+0x95/0x310
[   17.076249]  kunit_try_run_case+0x1a5/0x480
[   17.076456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.076747]  kthread+0x337/0x6f0
[   17.076950]  ret_from_fork+0x116/0x1d0
[   17.077152]  ret_from_fork_asm+0x1a/0x30
[   17.077372] 
[   17.077474] The buggy address belongs to the object at ffff88810261fc00
[   17.077474]  which belongs to the cache kmalloc-64 of size 64
[   17.077830] The buggy address is located 0 bytes to the right of
[   17.077830]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.078197] 
[   17.078268] The buggy address belongs to the physical page:
[   17.078540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.078897] flags: 0x200000000000000(node=0|zone=2)
[   17.079144] page_type: f5(slab)
[   17.079313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.079897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.080147] page dumped because: kasan: bad access detected
[   17.080321] 
[   17.080392] Memory state around the buggy address:
[   17.080548]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.080764]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.081079] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.081504]                                      ^
[   17.081838]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.082464]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.082910] ==================================================================
[   15.800022] ==================================================================
[   15.800401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.800885] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.801326] 
[   15.801434] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.801542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.801574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.801640] Call Trace:
[   15.801661]  <TASK>
[   15.801691]  dump_stack_lvl+0x73/0xb0
[   15.801722]  print_report+0xd1/0x650
[   15.801746]  ? __virt_addr_valid+0x1db/0x2d0
[   15.801770]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.801791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.801817]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.801839]  kasan_report+0x141/0x180
[   15.801872]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.801899]  kasan_check_range+0x10c/0x1c0
[   15.801923]  __kasan_check_write+0x18/0x20
[   15.801987]  kasan_atomics_helper+0x5fe/0x5450
[   15.802012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.802055]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.802127]  ? kasan_atomics+0x152/0x310
[   15.802155]  kasan_atomics+0x1dc/0x310
[   15.802178]  ? __pfx_kasan_atomics+0x10/0x10
[   15.802202]  ? __pfx_read_tsc+0x10/0x10
[   15.802224]  ? ktime_get_ts64+0x86/0x230
[   15.802250]  kunit_try_run_case+0x1a5/0x480
[   15.802275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.802298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.802322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.802346]  ? __kthread_parkme+0x82/0x180
[   15.802367]  ? preempt_count_sub+0x50/0x80
[   15.802390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.802415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.802438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.802462]  kthread+0x337/0x6f0
[   15.802482]  ? trace_preempt_on+0x20/0xc0
[   15.802505]  ? __pfx_kthread+0x10/0x10
[   15.802526]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.802547]  ? calculate_sigpending+0x7b/0xa0
[   15.802571]  ? __pfx_kthread+0x10/0x10
[   15.802593]  ret_from_fork+0x116/0x1d0
[   15.802611]  ? __pfx_kthread+0x10/0x10
[   15.802633]  ret_from_fork_asm+0x1a/0x30
[   15.802665]  </TASK>
[   15.802677] 
[   15.813297] Allocated by task 282:
[   15.813432]  kasan_save_stack+0x45/0x70
[   15.813759]  kasan_save_track+0x18/0x40
[   15.814115]  kasan_save_alloc_info+0x3b/0x50
[   15.814330]  __kasan_kmalloc+0xb7/0xc0
[   15.814465]  __kmalloc_cache_noprof+0x189/0x420
[   15.815003]  kasan_atomics+0x95/0x310
[   15.815507]  kunit_try_run_case+0x1a5/0x480
[   15.815735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.816084]  kthread+0x337/0x6f0
[   15.816405]  ret_from_fork+0x116/0x1d0
[   15.816756]  ret_from_fork_asm+0x1a/0x30
[   15.817051] 
[   15.817205] The buggy address belongs to the object at ffff88810261fc00
[   15.817205]  which belongs to the cache kmalloc-64 of size 64
[   15.817994] The buggy address is located 0 bytes to the right of
[   15.817994]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.818739] 
[   15.818862] The buggy address belongs to the physical page:
[   15.819269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.819602] flags: 0x200000000000000(node=0|zone=2)
[   15.819821] page_type: f5(slab)
[   15.819989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.820483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.820838] page dumped because: kasan: bad access detected
[   15.821248] 
[   15.821430] Memory state around the buggy address:
[   15.821695]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.822144]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.822486] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.822995]                                      ^
[   15.823294]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.823686]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.824062] ==================================================================
[   16.560108] ==================================================================
[   16.560386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.560947] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.561256] 
[   16.561348] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.561394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.561408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.561430] Call Trace:
[   16.561444]  <TASK>
[   16.561460]  dump_stack_lvl+0x73/0xb0
[   16.561488]  print_report+0xd1/0x650
[   16.561511]  ? __virt_addr_valid+0x1db/0x2d0
[   16.561534]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.561560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.561586]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.561608]  kasan_report+0x141/0x180
[   16.561631]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.561792]  __asan_report_store8_noabort+0x1b/0x30
[   16.561824]  kasan_atomics_helper+0x50d4/0x5450
[   16.561848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.561871]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.561896]  ? kasan_atomics+0x152/0x310
[   16.561924]  kasan_atomics+0x1dc/0x310
[   16.561947]  ? __pfx_kasan_atomics+0x10/0x10
[   16.561972]  ? __pfx_read_tsc+0x10/0x10
[   16.561994]  ? ktime_get_ts64+0x86/0x230
[   16.562018]  kunit_try_run_case+0x1a5/0x480
[   16.562056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.562369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.562395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.562420]  ? __kthread_parkme+0x82/0x180
[   16.562441]  ? preempt_count_sub+0x50/0x80
[   16.562465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.562490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.562513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.562537]  kthread+0x337/0x6f0
[   16.562557]  ? trace_preempt_on+0x20/0xc0
[   16.562582]  ? __pfx_kthread+0x10/0x10
[   16.562602]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.562624]  ? calculate_sigpending+0x7b/0xa0
[   16.562649]  ? __pfx_kthread+0x10/0x10
[   16.562671]  ret_from_fork+0x116/0x1d0
[   16.562691]  ? __pfx_kthread+0x10/0x10
[   16.562713]  ret_from_fork_asm+0x1a/0x30
[   16.562744]  </TASK>
[   16.562755] 
[   16.570048] Allocated by task 282:
[   16.570198]  kasan_save_stack+0x45/0x70
[   16.570407]  kasan_save_track+0x18/0x40
[   16.570605]  kasan_save_alloc_info+0x3b/0x50
[   16.570854]  __kasan_kmalloc+0xb7/0xc0
[   16.571019]  __kmalloc_cache_noprof+0x189/0x420
[   16.571230]  kasan_atomics+0x95/0x310
[   16.571405]  kunit_try_run_case+0x1a5/0x480
[   16.571662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.571889]  kthread+0x337/0x6f0
[   16.572031]  ret_from_fork+0x116/0x1d0
[   16.572176]  ret_from_fork_asm+0x1a/0x30
[   16.572375] 
[   16.572471] The buggy address belongs to the object at ffff88810261fc00
[   16.572471]  which belongs to the cache kmalloc-64 of size 64
[   16.572933] The buggy address is located 0 bytes to the right of
[   16.572933]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.573470] 
[   16.573609] The buggy address belongs to the physical page:
[   16.573839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.574152] flags: 0x200000000000000(node=0|zone=2)
[   16.574365] page_type: f5(slab)
[   16.574549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.574855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.575160] page dumped because: kasan: bad access detected
[   16.575375] 
[   16.575448] Memory state around the buggy address:
[   16.575606]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.575827]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.576056] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.576380]                                      ^
[   16.576603]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.576942]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.577269] ==================================================================
[   16.893225] ==================================================================
[   16.893924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.894437] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.894995] 
[   16.895245] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.895296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.895310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.895332] Call Trace:
[   16.895348]  <TASK>
[   16.895364]  dump_stack_lvl+0x73/0xb0
[   16.895392]  print_report+0xd1/0x650
[   16.895415]  ? __virt_addr_valid+0x1db/0x2d0
[   16.895439]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.895460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.895487]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.895656]  kasan_report+0x141/0x180
[   16.895689]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.895717]  kasan_check_range+0x10c/0x1c0
[   16.895742]  __kasan_check_write+0x18/0x20
[   16.895762]  kasan_atomics_helper+0x1d7a/0x5450
[   16.895785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.895808]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.895834]  ? kasan_atomics+0x152/0x310
[   16.895860]  kasan_atomics+0x1dc/0x310
[   16.895884]  ? __pfx_kasan_atomics+0x10/0x10
[   16.895908]  ? __pfx_read_tsc+0x10/0x10
[   16.895930]  ? ktime_get_ts64+0x86/0x230
[   16.895954]  kunit_try_run_case+0x1a5/0x480
[   16.895978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.896025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.896059]  ? __kthread_parkme+0x82/0x180
[   16.896081]  ? preempt_count_sub+0x50/0x80
[   16.896104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.896151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.896175]  kthread+0x337/0x6f0
[   16.896194]  ? trace_preempt_on+0x20/0xc0
[   16.896217]  ? __pfx_kthread+0x10/0x10
[   16.896238]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.896260]  ? calculate_sigpending+0x7b/0xa0
[   16.896284]  ? __pfx_kthread+0x10/0x10
[   16.896305]  ret_from_fork+0x116/0x1d0
[   16.896324]  ? __pfx_kthread+0x10/0x10
[   16.896345]  ret_from_fork_asm+0x1a/0x30
[   16.896377]  </TASK>
[   16.896390] 
[   16.908321] Allocated by task 282:
[   16.908458]  kasan_save_stack+0x45/0x70
[   16.908609]  kasan_save_track+0x18/0x40
[   16.908743]  kasan_save_alloc_info+0x3b/0x50
[   16.908887]  __kasan_kmalloc+0xb7/0xc0
[   16.909017]  __kmalloc_cache_noprof+0x189/0x420
[   16.909178]  kasan_atomics+0x95/0x310
[   16.909308]  kunit_try_run_case+0x1a5/0x480
[   16.909450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.909624]  kthread+0x337/0x6f0
[   16.909745]  ret_from_fork+0x116/0x1d0
[   16.909874]  ret_from_fork_asm+0x1a/0x30
[   16.910011] 
[   16.911711] The buggy address belongs to the object at ffff88810261fc00
[   16.911711]  which belongs to the cache kmalloc-64 of size 64
[   16.912193] The buggy address is located 0 bytes to the right of
[   16.912193]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.912806] 
[   16.912891] The buggy address belongs to the physical page:
[   16.913083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.913329] flags: 0x200000000000000(node=0|zone=2)
[   16.913524] page_type: f5(slab)
[   16.914876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.915408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.916474] page dumped because: kasan: bad access detected
[   16.916915] 
[   16.916992] Memory state around the buggy address:
[   16.917437]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.918110]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.918326] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.918659]                                      ^
[   16.919139]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.919793]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.920434] ==================================================================
[   17.102198] ==================================================================
[   17.102525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   17.102813] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.103261] 
[   17.103364] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.103407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.103420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.103476] Call Trace:
[   17.103494]  <TASK>
[   17.103510]  dump_stack_lvl+0x73/0xb0
[   17.103539]  print_report+0xd1/0x650
[   17.103563]  ? __virt_addr_valid+0x1db/0x2d0
[   17.103585]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.103638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.103666]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.103687]  kasan_report+0x141/0x180
[   17.103710]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.103738]  __asan_report_load8_noabort+0x18/0x20
[   17.103793]  kasan_atomics_helper+0x4fa5/0x5450
[   17.103816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.103839]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.103864]  ? kasan_atomics+0x152/0x310
[   17.103919]  kasan_atomics+0x1dc/0x310
[   17.103943]  ? __pfx_kasan_atomics+0x10/0x10
[   17.103968]  ? __pfx_read_tsc+0x10/0x10
[   17.103988]  ? ktime_get_ts64+0x86/0x230
[   17.104013]  kunit_try_run_case+0x1a5/0x480
[   17.104037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.104070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.104094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.104118]  ? __kthread_parkme+0x82/0x180
[   17.104139]  ? preempt_count_sub+0x50/0x80
[   17.104163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.104218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.104242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.104266]  kthread+0x337/0x6f0
[   17.104287]  ? trace_preempt_on+0x20/0xc0
[   17.104336]  ? __pfx_kthread+0x10/0x10
[   17.104359]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.104380]  ? calculate_sigpending+0x7b/0xa0
[   17.104404]  ? __pfx_kthread+0x10/0x10
[   17.104426]  ret_from_fork+0x116/0x1d0
[   17.104471]  ? __pfx_kthread+0x10/0x10
[   17.104492]  ret_from_fork_asm+0x1a/0x30
[   17.104537]  </TASK>
[   17.104551] 
[   17.112597] Allocated by task 282:
[   17.112804]  kasan_save_stack+0x45/0x70
[   17.113015]  kasan_save_track+0x18/0x40
[   17.113210]  kasan_save_alloc_info+0x3b/0x50
[   17.113434]  __kasan_kmalloc+0xb7/0xc0
[   17.113722]  __kmalloc_cache_noprof+0x189/0x420
[   17.113978]  kasan_atomics+0x95/0x310
[   17.114189]  kunit_try_run_case+0x1a5/0x480
[   17.114441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.114824]  kthread+0x337/0x6f0
[   17.114950]  ret_from_fork+0x116/0x1d0
[   17.115112]  ret_from_fork_asm+0x1a/0x30
[   17.115312] 
[   17.115408] The buggy address belongs to the object at ffff88810261fc00
[   17.115408]  which belongs to the cache kmalloc-64 of size 64
[   17.116175] The buggy address is located 0 bytes to the right of
[   17.116175]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.116803] 
[   17.116877] The buggy address belongs to the physical page:
[   17.117060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.117301] flags: 0x200000000000000(node=0|zone=2)
[   17.117819] page_type: f5(slab)
[   17.117991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.118443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.119010] page dumped because: kasan: bad access detected
[   17.119351] 
[   17.119426] Memory state around the buggy address:
[   17.119761]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120091]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120443] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.120740]                                      ^
[   17.120900]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121213]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121650] ==================================================================
[   15.660136] ==================================================================
[   15.660788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.661280] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.661701] 
[   15.661827] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.661874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.661887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.661910] Call Trace:
[   15.661932]  <TASK>
[   15.661987]  dump_stack_lvl+0x73/0xb0
[   15.662017]  print_report+0xd1/0x650
[   15.662053]  ? __virt_addr_valid+0x1db/0x2d0
[   15.662129]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.662191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.662219]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.662240]  kasan_report+0x141/0x180
[   15.662264]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.662291]  __asan_report_store4_noabort+0x1b/0x30
[   15.662316]  kasan_atomics_helper+0x4b6e/0x5450
[   15.662340]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.662362]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.662419]  ? kasan_atomics+0x152/0x310
[   15.662447]  kasan_atomics+0x1dc/0x310
[   15.662471]  ? __pfx_kasan_atomics+0x10/0x10
[   15.662497]  ? __pfx_read_tsc+0x10/0x10
[   15.662520]  ? ktime_get_ts64+0x86/0x230
[   15.662545]  kunit_try_run_case+0x1a5/0x480
[   15.662603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.662651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.662675]  ? __kthread_parkme+0x82/0x180
[   15.662697]  ? preempt_count_sub+0x50/0x80
[   15.662722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.662794]  kthread+0x337/0x6f0
[   15.662813]  ? trace_preempt_on+0x20/0xc0
[   15.662837]  ? __pfx_kthread+0x10/0x10
[   15.662858]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.662879]  ? calculate_sigpending+0x7b/0xa0
[   15.662905]  ? __pfx_kthread+0x10/0x10
[   15.662927]  ret_from_fork+0x116/0x1d0
[   15.662946]  ? __pfx_kthread+0x10/0x10
[   15.662967]  ret_from_fork_asm+0x1a/0x30
[   15.662999]  </TASK>
[   15.663012] 
[   15.672284] Allocated by task 282:
[   15.672458]  kasan_save_stack+0x45/0x70
[   15.672623]  kasan_save_track+0x18/0x40
[   15.672901]  kasan_save_alloc_info+0x3b/0x50
[   15.673141]  __kasan_kmalloc+0xb7/0xc0
[   15.673282]  __kmalloc_cache_noprof+0x189/0x420
[   15.673441]  kasan_atomics+0x95/0x310
[   15.673708]  kunit_try_run_case+0x1a5/0x480
[   15.674020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.674344]  kthread+0x337/0x6f0
[   15.674579]  ret_from_fork+0x116/0x1d0
[   15.674799]  ret_from_fork_asm+0x1a/0x30
[   15.674954] 
[   15.675145] The buggy address belongs to the object at ffff88810261fc00
[   15.675145]  which belongs to the cache kmalloc-64 of size 64
[   15.675740] The buggy address is located 0 bytes to the right of
[   15.675740]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.676429] 
[   15.676717] The buggy address belongs to the physical page:
[   15.676920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.677578] flags: 0x200000000000000(node=0|zone=2)
[   15.677844] page_type: f5(slab)
[   15.678033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.678503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.678839] page dumped because: kasan: bad access detected
[   15.679183] 
[   15.679301] Memory state around the buggy address:
[   15.679544]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.679805]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.680265] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.680531]                                      ^
[   15.680807]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681211]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681837] ==================================================================
[   16.776472] ==================================================================
[   16.776713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.776948] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.777856] 
[   16.778464] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.778536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.778550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.778572] Call Trace:
[   16.778591]  <TASK>
[   16.778608]  dump_stack_lvl+0x73/0xb0
[   16.778638]  print_report+0xd1/0x650
[   16.778662]  ? __virt_addr_valid+0x1db/0x2d0
[   16.778685]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.778706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.778732]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.778754]  kasan_report+0x141/0x180
[   16.778778]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.778805]  kasan_check_range+0x10c/0x1c0
[   16.778828]  __kasan_check_write+0x18/0x20
[   16.778848]  kasan_atomics_helper+0x1b22/0x5450
[   16.778870]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.778894]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.778919]  ? kasan_atomics+0x152/0x310
[   16.778946]  kasan_atomics+0x1dc/0x310
[   16.778968]  ? __pfx_kasan_atomics+0x10/0x10
[   16.778992]  ? __pfx_read_tsc+0x10/0x10
[   16.779013]  ? ktime_get_ts64+0x86/0x230
[   16.779038]  kunit_try_run_case+0x1a5/0x480
[   16.779073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.779095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.779117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.779141]  ? __kthread_parkme+0x82/0x180
[   16.779163]  ? preempt_count_sub+0x50/0x80
[   16.779187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.779211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.779234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.779257]  kthread+0x337/0x6f0
[   16.779276]  ? trace_preempt_on+0x20/0xc0
[   16.779300]  ? __pfx_kthread+0x10/0x10
[   16.779321]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.779341]  ? calculate_sigpending+0x7b/0xa0
[   16.779365]  ? __pfx_kthread+0x10/0x10
[   16.779387]  ret_from_fork+0x116/0x1d0
[   16.779406]  ? __pfx_kthread+0x10/0x10
[   16.779426]  ret_from_fork_asm+0x1a/0x30
[   16.779458]  </TASK>
[   16.779469] 
[   16.795845] Allocated by task 282:
[   16.795983]  kasan_save_stack+0x45/0x70
[   16.796146]  kasan_save_track+0x18/0x40
[   16.796287]  kasan_save_alloc_info+0x3b/0x50
[   16.796438]  __kasan_kmalloc+0xb7/0xc0
[   16.796604]  __kmalloc_cache_noprof+0x189/0x420
[   16.797346]  kasan_atomics+0x95/0x310
[   16.797763]  kunit_try_run_case+0x1a5/0x480
[   16.798306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.798879]  kthread+0x337/0x6f0
[   16.799287]  ret_from_fork+0x116/0x1d0
[   16.799747]  ret_from_fork_asm+0x1a/0x30
[   16.800208] 
[   16.800372] The buggy address belongs to the object at ffff88810261fc00
[   16.800372]  which belongs to the cache kmalloc-64 of size 64
[   16.801463] The buggy address is located 0 bytes to the right of
[   16.801463]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.802275] 
[   16.802357] The buggy address belongs to the physical page:
[   16.802686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.803470] flags: 0x200000000000000(node=0|zone=2)
[   16.803983] page_type: f5(slab)
[   16.804378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.804970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.805438] page dumped because: kasan: bad access detected
[   16.805953] 
[   16.806030] Memory state around the buggy address:
[   16.806204]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.806426]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.806796] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.807636]                                      ^
[   16.808067]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.808754]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.809374] ==================================================================
[   15.751896] ==================================================================
[   15.752370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.752892] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.753392] 
[   15.753598] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.753658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.753672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.753696] Call Trace:
[   15.753717]  <TASK>
[   15.753736]  dump_stack_lvl+0x73/0xb0
[   15.753767]  print_report+0xd1/0x650
[   15.753790]  ? __virt_addr_valid+0x1db/0x2d0
[   15.753814]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.753835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.753861]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.753884]  kasan_report+0x141/0x180
[   15.753907]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.753934]  __asan_report_store4_noabort+0x1b/0x30
[   15.753959]  kasan_atomics_helper+0x4b3a/0x5450
[   15.753981]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.754004]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.754029]  ? kasan_atomics+0x152/0x310
[   15.754148]  kasan_atomics+0x1dc/0x310
[   15.754178]  ? __pfx_kasan_atomics+0x10/0x10
[   15.754202]  ? __pfx_read_tsc+0x10/0x10
[   15.754238]  ? ktime_get_ts64+0x86/0x230
[   15.754263]  kunit_try_run_case+0x1a5/0x480
[   15.754288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.754311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.754335]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.754359]  ? __kthread_parkme+0x82/0x180
[   15.754380]  ? preempt_count_sub+0x50/0x80
[   15.754405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.754429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.754452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.754476]  kthread+0x337/0x6f0
[   15.754495]  ? trace_preempt_on+0x20/0xc0
[   15.754519]  ? __pfx_kthread+0x10/0x10
[   15.754540]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.754561]  ? calculate_sigpending+0x7b/0xa0
[   15.754585]  ? __pfx_kthread+0x10/0x10
[   15.754607]  ret_from_fork+0x116/0x1d0
[   15.754626]  ? __pfx_kthread+0x10/0x10
[   15.754647]  ret_from_fork_asm+0x1a/0x30
[   15.754680]  </TASK>
[   15.754692] 
[   15.764992] Allocated by task 282:
[   15.765290]  kasan_save_stack+0x45/0x70
[   15.765719]  kasan_save_track+0x18/0x40
[   15.765874]  kasan_save_alloc_info+0x3b/0x50
[   15.766212]  __kasan_kmalloc+0xb7/0xc0
[   15.766464]  __kmalloc_cache_noprof+0x189/0x420
[   15.766737]  kasan_atomics+0x95/0x310
[   15.766911]  kunit_try_run_case+0x1a5/0x480
[   15.767427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.767813]  kthread+0x337/0x6f0
[   15.767990]  ret_from_fork+0x116/0x1d0
[   15.768224]  ret_from_fork_asm+0x1a/0x30
[   15.768429] 
[   15.768508] The buggy address belongs to the object at ffff88810261fc00
[   15.768508]  which belongs to the cache kmalloc-64 of size 64
[   15.769025] The buggy address is located 0 bytes to the right of
[   15.769025]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.769682] 
[   15.769793] The buggy address belongs to the physical page:
[   15.769972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.770328] flags: 0x200000000000000(node=0|zone=2)
[   15.770761] page_type: f5(slab)
[   15.770912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.771461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.772003] page dumped because: kasan: bad access detected
[   15.772294] 
[   15.772394] Memory state around the buggy address:
[   15.772760]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.773179]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.773849] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.774247]                                      ^
[   15.774631]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.774964]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.775338] ==================================================================
[   15.824769] ==================================================================
[   15.825238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.825949] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.826437] 
[   15.826644] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.826691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.826748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.826774] Call Trace:
[   15.826792]  <TASK>
[   15.826857]  dump_stack_lvl+0x73/0xb0
[   15.826888]  print_report+0xd1/0x650
[   15.826923]  ? __virt_addr_valid+0x1db/0x2d0
[   15.826947]  ? kasan_atomics_helper+0x697/0x5450
[   15.826968]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.826994]  ? kasan_atomics_helper+0x697/0x5450
[   15.827016]  kasan_report+0x141/0x180
[   15.827048]  ? kasan_atomics_helper+0x697/0x5450
[   15.827076]  kasan_check_range+0x10c/0x1c0
[   15.827100]  __kasan_check_write+0x18/0x20
[   15.827120]  kasan_atomics_helper+0x697/0x5450
[   15.827143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.827166]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.827191]  ? kasan_atomics+0x152/0x310
[   15.827218]  kasan_atomics+0x1dc/0x310
[   15.827241]  ? __pfx_kasan_atomics+0x10/0x10
[   15.827265]  ? __pfx_read_tsc+0x10/0x10
[   15.827287]  ? ktime_get_ts64+0x86/0x230
[   15.827312]  kunit_try_run_case+0x1a5/0x480
[   15.827337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.827359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.827383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.827407]  ? __kthread_parkme+0x82/0x180
[   15.827428]  ? preempt_count_sub+0x50/0x80
[   15.827452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.827476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.827499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.827569]  kthread+0x337/0x6f0
[   15.827591]  ? trace_preempt_on+0x20/0xc0
[   15.827614]  ? __pfx_kthread+0x10/0x10
[   15.827636]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.827657]  ? calculate_sigpending+0x7b/0xa0
[   15.827682]  ? __pfx_kthread+0x10/0x10
[   15.827703]  ret_from_fork+0x116/0x1d0
[   15.827723]  ? __pfx_kthread+0x10/0x10
[   15.827744]  ret_from_fork_asm+0x1a/0x30
[   15.827776]  </TASK>
[   15.827788] 
[   15.836858] Allocated by task 282:
[   15.837097]  kasan_save_stack+0x45/0x70
[   15.837623]  kasan_save_track+0x18/0x40
[   15.838225]  kasan_save_alloc_info+0x3b/0x50
[   15.838466]  __kasan_kmalloc+0xb7/0xc0
[   15.838767]  __kmalloc_cache_noprof+0x189/0x420
[   15.839289]  kasan_atomics+0x95/0x310
[   15.839446]  kunit_try_run_case+0x1a5/0x480
[   15.839811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.840032]  kthread+0x337/0x6f0
[   15.840500]  ret_from_fork+0x116/0x1d0
[   15.840764]  ret_from_fork_asm+0x1a/0x30
[   15.840978] 
[   15.841179] The buggy address belongs to the object at ffff88810261fc00
[   15.841179]  which belongs to the cache kmalloc-64 of size 64
[   15.841809] The buggy address is located 0 bytes to the right of
[   15.841809]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.842483] 
[   15.842589] The buggy address belongs to the physical page:
[   15.842898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.843519] flags: 0x200000000000000(node=0|zone=2)
[   15.843803] page_type: f5(slab)
[   15.844028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.844371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.845131] page dumped because: kasan: bad access detected
[   15.845435] 
[   15.845543] Memory state around the buggy address:
[   15.845776]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846258]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846549] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.846982]                                      ^
[   15.847247]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.847813]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848285] ==================================================================
[   15.848933] ==================================================================
[   15.849240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.849851] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.850647] 
[   15.850747] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.850905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.850922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.850945] Call Trace:
[   15.850976]  <TASK>
[   15.850994]  dump_stack_lvl+0x73/0xb0
[   15.851023]  print_report+0xd1/0x650
[   15.851060]  ? __virt_addr_valid+0x1db/0x2d0
[   15.851083]  ? kasan_atomics_helper+0x72f/0x5450
[   15.851104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.851182]  ? kasan_atomics_helper+0x72f/0x5450
[   15.851256]  kasan_report+0x141/0x180
[   15.851281]  ? kasan_atomics_helper+0x72f/0x5450
[   15.851318]  kasan_check_range+0x10c/0x1c0
[   15.851343]  __kasan_check_write+0x18/0x20
[   15.851363]  kasan_atomics_helper+0x72f/0x5450
[   15.851387]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.851408]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.851433]  ? kasan_atomics+0x152/0x310
[   15.851460]  kasan_atomics+0x1dc/0x310
[   15.851482]  ? __pfx_kasan_atomics+0x10/0x10
[   15.851516]  ? __pfx_read_tsc+0x10/0x10
[   15.851538]  ? ktime_get_ts64+0x86/0x230
[   15.851562]  kunit_try_run_case+0x1a5/0x480
[   15.851586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.851632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.851656]  ? __kthread_parkme+0x82/0x180
[   15.851676]  ? preempt_count_sub+0x50/0x80
[   15.851700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.851772]  kthread+0x337/0x6f0
[   15.851793]  ? trace_preempt_on+0x20/0xc0
[   15.851815]  ? __pfx_kthread+0x10/0x10
[   15.851836]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.851858]  ? calculate_sigpending+0x7b/0xa0
[   15.851882]  ? __pfx_kthread+0x10/0x10
[   15.851904]  ret_from_fork+0x116/0x1d0
[   15.851922]  ? __pfx_kthread+0x10/0x10
[   15.851943]  ret_from_fork_asm+0x1a/0x30
[   15.851975]  </TASK>
[   15.851986] 
[   15.865306] Allocated by task 282:
[   15.865450]  kasan_save_stack+0x45/0x70
[   15.865677]  kasan_save_track+0x18/0x40
[   15.866527]  kasan_save_alloc_info+0x3b/0x50
[   15.866723]  __kasan_kmalloc+0xb7/0xc0
[   15.866858]  __kmalloc_cache_noprof+0x189/0x420
[   15.867011]  kasan_atomics+0x95/0x310
[   15.867160]  kunit_try_run_case+0x1a5/0x480
[   15.867300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.867469]  kthread+0x337/0x6f0
[   15.867587]  ret_from_fork+0x116/0x1d0
[   15.867716]  ret_from_fork_asm+0x1a/0x30
[   15.868973] 
[   15.869079] The buggy address belongs to the object at ffff88810261fc00
[   15.869079]  which belongs to the cache kmalloc-64 of size 64
[   15.870140] The buggy address is located 0 bytes to the right of
[   15.870140]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.870684] 
[   15.870759] The buggy address belongs to the physical page:
[   15.872095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.872777] flags: 0x200000000000000(node=0|zone=2)
[   15.873213] page_type: f5(slab)
[   15.873500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.873973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.874358] page dumped because: kasan: bad access detected
[   15.874905] 
[   15.875009] Memory state around the buggy address:
[   15.875469]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.875973]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.876544] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.877002]                                      ^
[   15.877364]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878026]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878508] ==================================================================
[   16.322990] ==================================================================
[   16.323243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.323568] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.323976] 
[   16.324092] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.324135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.324149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.324170] Call Trace:
[   16.324185]  <TASK>
[   16.324201]  dump_stack_lvl+0x73/0xb0
[   16.324227]  print_report+0xd1/0x650
[   16.324249]  ? __virt_addr_valid+0x1db/0x2d0
[   16.324273]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.324294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.324320]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.324343]  kasan_report+0x141/0x180
[   16.324366]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.324394]  __asan_report_load4_noabort+0x18/0x20
[   16.324418]  kasan_atomics_helper+0x4a1c/0x5450
[   16.324441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.324464]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.324488]  ? kasan_atomics+0x152/0x310
[   16.324515]  kasan_atomics+0x1dc/0x310
[   16.324539]  ? __pfx_kasan_atomics+0x10/0x10
[   16.324564]  ? __pfx_read_tsc+0x10/0x10
[   16.324603]  ? ktime_get_ts64+0x86/0x230
[   16.324629]  kunit_try_run_case+0x1a5/0x480
[   16.324653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.324675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.324698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.324722]  ? __kthread_parkme+0x82/0x180
[   16.324743]  ? preempt_count_sub+0x50/0x80
[   16.324767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.324792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.324815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.324839]  kthread+0x337/0x6f0
[   16.324859]  ? trace_preempt_on+0x20/0xc0
[   16.324882]  ? __pfx_kthread+0x10/0x10
[   16.324904]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.324925]  ? calculate_sigpending+0x7b/0xa0
[   16.324950]  ? __pfx_kthread+0x10/0x10
[   16.324972]  ret_from_fork+0x116/0x1d0
[   16.324991]  ? __pfx_kthread+0x10/0x10
[   16.325012]  ret_from_fork_asm+0x1a/0x30
[   16.325054]  </TASK>
[   16.325067] 
[   16.332569] Allocated by task 282:
[   16.332700]  kasan_save_stack+0x45/0x70
[   16.332927]  kasan_save_track+0x18/0x40
[   16.333172]  kasan_save_alloc_info+0x3b/0x50
[   16.333394]  __kasan_kmalloc+0xb7/0xc0
[   16.333595]  __kmalloc_cache_noprof+0x189/0x420
[   16.333865]  kasan_atomics+0x95/0x310
[   16.334036]  kunit_try_run_case+0x1a5/0x480
[   16.334244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.334422]  kthread+0x337/0x6f0
[   16.334560]  ret_from_fork+0x116/0x1d0
[   16.334878]  ret_from_fork_asm+0x1a/0x30
[   16.335362] 
[   16.335450] The buggy address belongs to the object at ffff88810261fc00
[   16.335450]  which belongs to the cache kmalloc-64 of size 64
[   16.335986] The buggy address is located 0 bytes to the right of
[   16.335986]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.336660] 
[   16.336755] The buggy address belongs to the physical page:
[   16.337012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.337401] flags: 0x200000000000000(node=0|zone=2)
[   16.337635] page_type: f5(slab)
[   16.337761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.337996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.338273] page dumped because: kasan: bad access detected
[   16.338563] 
[   16.338659] Memory state around the buggy address:
[   16.338887]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.339219]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.339440] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.339799]                                      ^
[   16.340029]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.340715]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341436] ==================================================================
[   16.631951] ==================================================================
[   16.632635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.632952] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.633264] 
[   16.633378] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.633421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.633435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.633456] Call Trace:
[   16.633471]  <TASK>
[   16.633487]  dump_stack_lvl+0x73/0xb0
[   16.633525]  print_report+0xd1/0x650
[   16.633547]  ? __virt_addr_valid+0x1db/0x2d0
[   16.633575]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.633596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.633622]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.633645]  kasan_report+0x141/0x180
[   16.633667]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.633694]  kasan_check_range+0x10c/0x1c0
[   16.633719]  __kasan_check_write+0x18/0x20
[   16.633738]  kasan_atomics_helper+0x16e7/0x5450
[   16.633760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.633783]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.633808]  ? kasan_atomics+0x152/0x310
[   16.633835]  kasan_atomics+0x1dc/0x310
[   16.633858]  ? __pfx_kasan_atomics+0x10/0x10
[   16.633883]  ? __pfx_read_tsc+0x10/0x10
[   16.633905]  ? ktime_get_ts64+0x86/0x230
[   16.633929]  kunit_try_run_case+0x1a5/0x480
[   16.633954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.633976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.634001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.634024]  ? __kthread_parkme+0x82/0x180
[   16.634056]  ? preempt_count_sub+0x50/0x80
[   16.634080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.634104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.634128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.634151]  kthread+0x337/0x6f0
[   16.634171]  ? trace_preempt_on+0x20/0xc0
[   16.634195]  ? __pfx_kthread+0x10/0x10
[   16.634216]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.634239]  ? calculate_sigpending+0x7b/0xa0
[   16.634263]  ? __pfx_kthread+0x10/0x10
[   16.634285]  ret_from_fork+0x116/0x1d0
[   16.634304]  ? __pfx_kthread+0x10/0x10
[   16.634325]  ret_from_fork_asm+0x1a/0x30
[   16.634357]  </TASK>
[   16.634369] 
[   16.641307] Allocated by task 282:
[   16.641483]  kasan_save_stack+0x45/0x70
[   16.641689]  kasan_save_track+0x18/0x40
[   16.641880]  kasan_save_alloc_info+0x3b/0x50
[   16.642133]  __kasan_kmalloc+0xb7/0xc0
[   16.642335]  __kmalloc_cache_noprof+0x189/0x420
[   16.642605]  kasan_atomics+0x95/0x310
[   16.642794]  kunit_try_run_case+0x1a5/0x480
[   16.643002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.643264]  kthread+0x337/0x6f0
[   16.643432]  ret_from_fork+0x116/0x1d0
[   16.643734]  ret_from_fork_asm+0x1a/0x30
[   16.643880] 
[   16.643952] The buggy address belongs to the object at ffff88810261fc00
[   16.643952]  which belongs to the cache kmalloc-64 of size 64
[   16.644315] The buggy address is located 0 bytes to the right of
[   16.644315]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.645287] 
[   16.645394] The buggy address belongs to the physical page:
[   16.647680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.648087] flags: 0x200000000000000(node=0|zone=2)
[   16.648292] page_type: f5(slab)
[   16.648414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.648734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.649078] page dumped because: kasan: bad access detected
[   16.649253] 
[   16.649325] Memory state around the buggy address:
[   16.649518]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.649784]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.652088] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.652429]                                      ^
[   16.652830]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.653078]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.653289] ==================================================================
[   17.122283] ==================================================================
[   17.122671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.123017] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.123390] 
[   17.123508] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.123582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.123596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.123617] Call Trace:
[   17.123633]  <TASK>
[   17.123649]  dump_stack_lvl+0x73/0xb0
[   17.123675]  print_report+0xd1/0x650
[   17.123731]  ? __virt_addr_valid+0x1db/0x2d0
[   17.123753]  ? kasan_atomics_helper+0x224c/0x5450
[   17.123794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.123821]  ? kasan_atomics_helper+0x224c/0x5450
[   17.123874]  kasan_report+0x141/0x180
[   17.123898]  ? kasan_atomics_helper+0x224c/0x5450
[   17.123926]  kasan_check_range+0x10c/0x1c0
[   17.123950]  __kasan_check_write+0x18/0x20
[   17.123970]  kasan_atomics_helper+0x224c/0x5450
[   17.124020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.124054]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.124079]  ? kasan_atomics+0x152/0x310
[   17.124134]  kasan_atomics+0x1dc/0x310
[   17.124158]  ? __pfx_kasan_atomics+0x10/0x10
[   17.124182]  ? __pfx_read_tsc+0x10/0x10
[   17.124203]  ? ktime_get_ts64+0x86/0x230
[   17.124228]  kunit_try_run_case+0x1a5/0x480
[   17.124252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.124306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.124330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.124353]  ? __kthread_parkme+0x82/0x180
[   17.124374]  ? preempt_count_sub+0x50/0x80
[   17.124424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.124450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.124473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.124497]  kthread+0x337/0x6f0
[   17.124527]  ? trace_preempt_on+0x20/0xc0
[   17.124577]  ? __pfx_kthread+0x10/0x10
[   17.124599]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.124621]  ? calculate_sigpending+0x7b/0xa0
[   17.124645]  ? __pfx_kthread+0x10/0x10
[   17.124667]  ret_from_fork+0x116/0x1d0
[   17.124715]  ? __pfx_kthread+0x10/0x10
[   17.124759]  ret_from_fork_asm+0x1a/0x30
[   17.124817]  </TASK>
[   17.124829] 
[   17.133475] Allocated by task 282:
[   17.133712]  kasan_save_stack+0x45/0x70
[   17.133921]  kasan_save_track+0x18/0x40
[   17.134163]  kasan_save_alloc_info+0x3b/0x50
[   17.134392]  __kasan_kmalloc+0xb7/0xc0
[   17.134640]  __kmalloc_cache_noprof+0x189/0x420
[   17.134864]  kasan_atomics+0x95/0x310
[   17.135014]  kunit_try_run_case+0x1a5/0x480
[   17.135169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.135341]  kthread+0x337/0x6f0
[   17.135512]  ret_from_fork+0x116/0x1d0
[   17.135697]  ret_from_fork_asm+0x1a/0x30
[   17.136012] 
[   17.136236] The buggy address belongs to the object at ffff88810261fc00
[   17.136236]  which belongs to the cache kmalloc-64 of size 64
[   17.136885] The buggy address is located 0 bytes to the right of
[   17.136885]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.137369] 
[   17.137501] The buggy address belongs to the physical page:
[   17.137771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.138027] flags: 0x200000000000000(node=0|zone=2)
[   17.138310] page_type: f5(slab)
[   17.138514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.138831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.139150] page dumped because: kasan: bad access detected
[   17.139427] 
[   17.139530] Memory state around the buggy address:
[   17.139750]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.140101]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.140481] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.140828]                                      ^
[   17.141063]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.141311]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.141717] ==================================================================
[   16.280876] ==================================================================
[   16.281121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   16.281458] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.281798] 
[   16.282007] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.282062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.282075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.282096] Call Trace:
[   16.282112]  <TASK>
[   16.282127]  dump_stack_lvl+0x73/0xb0
[   16.282153]  print_report+0xd1/0x650
[   16.282176]  ? __virt_addr_valid+0x1db/0x2d0
[   16.282198]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.282220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.282247]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.282269]  kasan_report+0x141/0x180
[   16.282293]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.282320]  __asan_report_load4_noabort+0x18/0x20
[   16.282344]  kasan_atomics_helper+0x4a36/0x5450
[   16.282367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.282390]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.282414]  ? kasan_atomics+0x152/0x310
[   16.282441]  kasan_atomics+0x1dc/0x310
[   16.282464]  ? __pfx_kasan_atomics+0x10/0x10
[   16.282489]  ? __pfx_read_tsc+0x10/0x10
[   16.282566]  ? ktime_get_ts64+0x86/0x230
[   16.282593]  kunit_try_run_case+0x1a5/0x480
[   16.282618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.282640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.282664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.282688]  ? __kthread_parkme+0x82/0x180
[   16.282708]  ? preempt_count_sub+0x50/0x80
[   16.282732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.282757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.282780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.282804]  kthread+0x337/0x6f0
[   16.282823]  ? trace_preempt_on+0x20/0xc0
[   16.282846]  ? __pfx_kthread+0x10/0x10
[   16.282867]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.282889]  ? calculate_sigpending+0x7b/0xa0
[   16.282912]  ? __pfx_kthread+0x10/0x10
[   16.282934]  ret_from_fork+0x116/0x1d0
[   16.282953]  ? __pfx_kthread+0x10/0x10
[   16.282975]  ret_from_fork_asm+0x1a/0x30
[   16.283007]  </TASK>
[   16.283018] 
[   16.290925] Allocated by task 282:
[   16.291067]  kasan_save_stack+0x45/0x70
[   16.291257]  kasan_save_track+0x18/0x40
[   16.291449]  kasan_save_alloc_info+0x3b/0x50
[   16.291660]  __kasan_kmalloc+0xb7/0xc0
[   16.291851]  __kmalloc_cache_noprof+0x189/0x420
[   16.292223]  kasan_atomics+0x95/0x310
[   16.292383]  kunit_try_run_case+0x1a5/0x480
[   16.292573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.292829]  kthread+0x337/0x6f0
[   16.292998]  ret_from_fork+0x116/0x1d0
[   16.293366]  ret_from_fork_asm+0x1a/0x30
[   16.293613] 
[   16.293706] The buggy address belongs to the object at ffff88810261fc00
[   16.293706]  which belongs to the cache kmalloc-64 of size 64
[   16.294227] The buggy address is located 0 bytes to the right of
[   16.294227]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.294794] 
[   16.294891] The buggy address belongs to the physical page:
[   16.295198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.295446] flags: 0x200000000000000(node=0|zone=2)
[   16.295900] page_type: f5(slab)
[   16.296125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.296442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.296770] page dumped because: kasan: bad access detected
[   16.296947] 
[   16.297018] Memory state around the buggy address:
[   16.297255]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.297583]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.298330] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.298679]                                      ^
[   16.298907]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299266]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299596] ==================================================================
[   16.968573] ==================================================================
[   16.969215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.969700] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.970006] 
[   16.970127] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.970170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.970183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.970204] Call Trace:
[   16.970218]  <TASK>
[   16.970233]  dump_stack_lvl+0x73/0xb0
[   16.970259]  print_report+0xd1/0x650
[   16.970281]  ? __virt_addr_valid+0x1db/0x2d0
[   16.970303]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.970325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.970350]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.970372]  kasan_report+0x141/0x180
[   16.970433]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.970461]  kasan_check_range+0x10c/0x1c0
[   16.970485]  __kasan_check_write+0x18/0x20
[   16.970504]  kasan_atomics_helper+0x1f43/0x5450
[   16.970540]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.970561]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.970619]  ? kasan_atomics+0x152/0x310
[   16.970646]  kasan_atomics+0x1dc/0x310
[   16.970669]  ? __pfx_kasan_atomics+0x10/0x10
[   16.970693]  ? __pfx_read_tsc+0x10/0x10
[   16.970715]  ? ktime_get_ts64+0x86/0x230
[   16.970771]  kunit_try_run_case+0x1a5/0x480
[   16.970795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.970817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.970842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.970866]  ? __kthread_parkme+0x82/0x180
[   16.970918]  ? preempt_count_sub+0x50/0x80
[   16.970942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.970967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.970991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.971014]  kthread+0x337/0x6f0
[   16.971034]  ? trace_preempt_on+0x20/0xc0
[   16.971069]  ? __pfx_kthread+0x10/0x10
[   16.971090]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.971112]  ? calculate_sigpending+0x7b/0xa0
[   16.971136]  ? __pfx_kthread+0x10/0x10
[   16.971158]  ret_from_fork+0x116/0x1d0
[   16.971176]  ? __pfx_kthread+0x10/0x10
[   16.971197]  ret_from_fork_asm+0x1a/0x30
[   16.971228]  </TASK>
[   16.971239] 
[   16.979318] Allocated by task 282:
[   16.979496]  kasan_save_stack+0x45/0x70
[   16.979693]  kasan_save_track+0x18/0x40
[   16.979923]  kasan_save_alloc_info+0x3b/0x50
[   16.980155]  __kasan_kmalloc+0xb7/0xc0
[   16.980315]  __kmalloc_cache_noprof+0x189/0x420
[   16.980466]  kasan_atomics+0x95/0x310
[   16.980716]  kunit_try_run_case+0x1a5/0x480
[   16.981002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.981228]  kthread+0x337/0x6f0
[   16.981537]  ret_from_fork+0x116/0x1d0
[   16.981889]  ret_from_fork_asm+0x1a/0x30
[   16.982093] 
[   16.982188] The buggy address belongs to the object at ffff88810261fc00
[   16.982188]  which belongs to the cache kmalloc-64 of size 64
[   16.982708] The buggy address is located 0 bytes to the right of
[   16.982708]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.983227] 
[   16.983298] The buggy address belongs to the physical page:
[   16.983464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.984212] flags: 0x200000000000000(node=0|zone=2)
[   16.984445] page_type: f5(slab)
[   16.984692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.985058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.985382] page dumped because: kasan: bad access detected
[   16.985625] 
[   16.985754] Memory state around the buggy address:
[   16.985999]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.986225]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.986433] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.987072]                                      ^
[   16.987364]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.987921]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.988210] ==================================================================
[   16.053633] ==================================================================
[   16.053936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   16.054573] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.055155] 
[   16.055415] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.055477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.055491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.055514] Call Trace:
[   16.055529]  <TASK>
[   16.055545]  dump_stack_lvl+0x73/0xb0
[   16.055574]  print_report+0xd1/0x650
[   16.055597]  ? __virt_addr_valid+0x1db/0x2d0
[   16.055620]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.055641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.055668]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.055689]  kasan_report+0x141/0x180
[   16.055714]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.055741]  kasan_check_range+0x10c/0x1c0
[   16.055765]  __kasan_check_write+0x18/0x20
[   16.055785]  kasan_atomics_helper+0xb6a/0x5450
[   16.055807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.055830]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.055855]  ? kasan_atomics+0x152/0x310
[   16.055883]  kasan_atomics+0x1dc/0x310
[   16.055906]  ? __pfx_kasan_atomics+0x10/0x10
[   16.055931]  ? __pfx_read_tsc+0x10/0x10
[   16.055952]  ? ktime_get_ts64+0x86/0x230
[   16.055977]  kunit_try_run_case+0x1a5/0x480
[   16.056002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.056025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.056058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.056132]  ? __kthread_parkme+0x82/0x180
[   16.056153]  ? preempt_count_sub+0x50/0x80
[   16.056177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.056202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.056226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.056249]  kthread+0x337/0x6f0
[   16.056269]  ? trace_preempt_on+0x20/0xc0
[   16.056293]  ? __pfx_kthread+0x10/0x10
[   16.056313]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.056335]  ? calculate_sigpending+0x7b/0xa0
[   16.056360]  ? __pfx_kthread+0x10/0x10
[   16.056382]  ret_from_fork+0x116/0x1d0
[   16.056401]  ? __pfx_kthread+0x10/0x10
[   16.056422]  ret_from_fork_asm+0x1a/0x30
[   16.056454]  </TASK>
[   16.056467] 
[   16.068737] Allocated by task 282:
[   16.068913]  kasan_save_stack+0x45/0x70
[   16.069129]  kasan_save_track+0x18/0x40
[   16.069748]  kasan_save_alloc_info+0x3b/0x50
[   16.070117]  __kasan_kmalloc+0xb7/0xc0
[   16.070430]  __kmalloc_cache_noprof+0x189/0x420
[   16.070825]  kasan_atomics+0x95/0x310
[   16.071017]  kunit_try_run_case+0x1a5/0x480
[   16.071399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.071666]  kthread+0x337/0x6f0
[   16.071986]  ret_from_fork+0x116/0x1d0
[   16.072359]  ret_from_fork_asm+0x1a/0x30
[   16.072567] 
[   16.072770] The buggy address belongs to the object at ffff88810261fc00
[   16.072770]  which belongs to the cache kmalloc-64 of size 64
[   16.073545] The buggy address is located 0 bytes to the right of
[   16.073545]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.074421] 
[   16.074563] The buggy address belongs to the physical page:
[   16.074759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.075438] flags: 0x200000000000000(node=0|zone=2)
[   16.075647] page_type: f5(slab)
[   16.075956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.076540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.076960] page dumped because: kasan: bad access detected
[   16.077371] 
[   16.077477] Memory state around the buggy address:
[   16.077913]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.078551]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.078861] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.079315]                                      ^
[   16.079497]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.080289]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.080789] ==================================================================
[   16.809994] ==================================================================
[   16.810557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.811198] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.811812] 
[   16.811997] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.812054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.812067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.812091] Call Trace:
[   16.812106]  <TASK>
[   16.812124]  dump_stack_lvl+0x73/0xb0
[   16.812152]  print_report+0xd1/0x650
[   16.812174]  ? __virt_addr_valid+0x1db/0x2d0
[   16.812197]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.812219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.812245]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.812268]  kasan_report+0x141/0x180
[   16.812289]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.812317]  kasan_check_range+0x10c/0x1c0
[   16.812341]  __kasan_check_write+0x18/0x20
[   16.812361]  kasan_atomics_helper+0x1c18/0x5450
[   16.812383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.812404]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.812430]  ? kasan_atomics+0x152/0x310
[   16.812456]  kasan_atomics+0x1dc/0x310
[   16.812479]  ? __pfx_kasan_atomics+0x10/0x10
[   16.812503]  ? __pfx_read_tsc+0x10/0x10
[   16.812525]  ? ktime_get_ts64+0x86/0x230
[   16.812550]  kunit_try_run_case+0x1a5/0x480
[   16.812574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.812596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.812620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.812644]  ? __kthread_parkme+0x82/0x180
[   16.812674]  ? preempt_count_sub+0x50/0x80
[   16.812698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.812722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.812746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.812769]  kthread+0x337/0x6f0
[   16.812790]  ? trace_preempt_on+0x20/0xc0
[   16.812814]  ? __pfx_kthread+0x10/0x10
[   16.812835]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.812857]  ? calculate_sigpending+0x7b/0xa0
[   16.812881]  ? __pfx_kthread+0x10/0x10
[   16.812903]  ret_from_fork+0x116/0x1d0
[   16.812921]  ? __pfx_kthread+0x10/0x10
[   16.812943]  ret_from_fork_asm+0x1a/0x30
[   16.812974]  </TASK>
[   16.812986] 
[   16.824008] Allocated by task 282:
[   16.824152]  kasan_save_stack+0x45/0x70
[   16.824296]  kasan_save_track+0x18/0x40
[   16.824433]  kasan_save_alloc_info+0x3b/0x50
[   16.824609]  __kasan_kmalloc+0xb7/0xc0
[   16.824936]  __kmalloc_cache_noprof+0x189/0x420
[   16.825345]  kasan_atomics+0x95/0x310
[   16.825710]  kunit_try_run_case+0x1a5/0x480
[   16.826086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.826670]  kthread+0x337/0x6f0
[   16.826978]  ret_from_fork+0x116/0x1d0
[   16.827388]  ret_from_fork_asm+0x1a/0x30
[   16.827760] 
[   16.827928] The buggy address belongs to the object at ffff88810261fc00
[   16.827928]  which belongs to the cache kmalloc-64 of size 64
[   16.828991] The buggy address is located 0 bytes to the right of
[   16.828991]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.830293] 
[   16.830453] The buggy address belongs to the physical page:
[   16.831003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.831296] flags: 0x200000000000000(node=0|zone=2)
[   16.831462] page_type: f5(slab)
[   16.831716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.832369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.833121] page dumped because: kasan: bad access detected
[   16.833636] 
[   16.833793] Memory state around the buggy address:
[   16.834199]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.834569]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.835197] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.835455]                                      ^
[   16.835648]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.836107]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.836621] ==================================================================
[   15.682380] ==================================================================
[   15.682839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.683307] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.683644] 
[   15.683770] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.683849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.683862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.683884] Call Trace:
[   15.683902]  <TASK>
[   15.683920]  dump_stack_lvl+0x73/0xb0
[   15.683981]  print_report+0xd1/0x650
[   15.684004]  ? __virt_addr_valid+0x1db/0x2d0
[   15.684027]  ? kasan_atomics_helper+0x3df/0x5450
[   15.684107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.684137]  ? kasan_atomics_helper+0x3df/0x5450
[   15.684199]  kasan_report+0x141/0x180
[   15.684222]  ? kasan_atomics_helper+0x3df/0x5450
[   15.684249]  kasan_check_range+0x10c/0x1c0
[   15.684273]  __kasan_check_read+0x15/0x20
[   15.684292]  kasan_atomics_helper+0x3df/0x5450
[   15.684315]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.684337]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.684361]  ? kasan_atomics+0x152/0x310
[   15.684389]  kasan_atomics+0x1dc/0x310
[   15.684413]  ? __pfx_kasan_atomics+0x10/0x10
[   15.684437]  ? __pfx_read_tsc+0x10/0x10
[   15.684459]  ? ktime_get_ts64+0x86/0x230
[   15.684484]  kunit_try_run_case+0x1a5/0x480
[   15.684509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.684555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.684579]  ? __kthread_parkme+0x82/0x180
[   15.684601]  ? preempt_count_sub+0x50/0x80
[   15.684626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.684676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.684700]  kthread+0x337/0x6f0
[   15.684720]  ? trace_preempt_on+0x20/0xc0
[   15.684743]  ? __pfx_kthread+0x10/0x10
[   15.684764]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.684788]  ? calculate_sigpending+0x7b/0xa0
[   15.684812]  ? __pfx_kthread+0x10/0x10
[   15.684833]  ret_from_fork+0x116/0x1d0
[   15.684852]  ? __pfx_kthread+0x10/0x10
[   15.684873]  ret_from_fork_asm+0x1a/0x30
[   15.684906]  </TASK>
[   15.684918] 
[   15.694588] Allocated by task 282:
[   15.694810]  kasan_save_stack+0x45/0x70
[   15.694960]  kasan_save_track+0x18/0x40
[   15.695105]  kasan_save_alloc_info+0x3b/0x50
[   15.695357]  __kasan_kmalloc+0xb7/0xc0
[   15.695613]  __kmalloc_cache_noprof+0x189/0x420
[   15.695957]  kasan_atomics+0x95/0x310
[   15.696339]  kunit_try_run_case+0x1a5/0x480
[   15.696557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.696885]  kthread+0x337/0x6f0
[   15.697251]  ret_from_fork+0x116/0x1d0
[   15.697416]  ret_from_fork_asm+0x1a/0x30
[   15.697746] 
[   15.697825] The buggy address belongs to the object at ffff88810261fc00
[   15.697825]  which belongs to the cache kmalloc-64 of size 64
[   15.698372] The buggy address is located 0 bytes to the right of
[   15.698372]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.699256] 
[   15.699338] The buggy address belongs to the physical page:
[   15.699614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.699985] flags: 0x200000000000000(node=0|zone=2)
[   15.700339] page_type: f5(slab)
[   15.700502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.700736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.701187] page dumped because: kasan: bad access detected
[   15.701372] 
[   15.701442] Memory state around the buggy address:
[   15.701852]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.702227]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.702776] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.703086]                                      ^
[   15.703264]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.703673]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.704063] ==================================================================
[   16.949728] ==================================================================
[   16.950218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.950606] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.950910] 
[   16.951075] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.951126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.951140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.951161] Call Trace:
[   16.951178]  <TASK>
[   16.951195]  dump_stack_lvl+0x73/0xb0
[   16.951222]  print_report+0xd1/0x650
[   16.951244]  ? __virt_addr_valid+0x1db/0x2d0
[   16.951268]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.951290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.951316]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.951338]  kasan_report+0x141/0x180
[   16.951360]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.951386]  kasan_check_range+0x10c/0x1c0
[   16.951411]  __kasan_check_write+0x18/0x20
[   16.951430]  kasan_atomics_helper+0x1eaa/0x5450
[   16.951454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.951476]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.951502]  ? kasan_atomics+0x152/0x310
[   16.951529]  kasan_atomics+0x1dc/0x310
[   16.951553]  ? __pfx_kasan_atomics+0x10/0x10
[   16.951577]  ? __pfx_read_tsc+0x10/0x10
[   16.951599]  ? ktime_get_ts64+0x86/0x230
[   16.951625]  kunit_try_run_case+0x1a5/0x480
[   16.951649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.951672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.951695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.951718]  ? __kthread_parkme+0x82/0x180
[   16.951739]  ? preempt_count_sub+0x50/0x80
[   16.951763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.951787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.951811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.951835]  kthread+0x337/0x6f0
[   16.951855]  ? trace_preempt_on+0x20/0xc0
[   16.951877]  ? __pfx_kthread+0x10/0x10
[   16.951897]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.951919]  ? calculate_sigpending+0x7b/0xa0
[   16.951942]  ? __pfx_kthread+0x10/0x10
[   16.951964]  ret_from_fork+0x116/0x1d0
[   16.951983]  ? __pfx_kthread+0x10/0x10
[   16.952004]  ret_from_fork_asm+0x1a/0x30
[   16.952035]  </TASK>
[   16.952055] 
[   16.960186] Allocated by task 282:
[   16.960428]  kasan_save_stack+0x45/0x70
[   16.960654]  kasan_save_track+0x18/0x40
[   16.960865]  kasan_save_alloc_info+0x3b/0x50
[   16.961117]  __kasan_kmalloc+0xb7/0xc0
[   16.961309]  __kmalloc_cache_noprof+0x189/0x420
[   16.961528]  kasan_atomics+0x95/0x310
[   16.961733]  kunit_try_run_case+0x1a5/0x480
[   16.961970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.962254]  kthread+0x337/0x6f0
[   16.962443]  ret_from_fork+0x116/0x1d0
[   16.962678]  ret_from_fork_asm+0x1a/0x30
[   16.962878] 
[   16.963003] The buggy address belongs to the object at ffff88810261fc00
[   16.963003]  which belongs to the cache kmalloc-64 of size 64
[   16.963514] The buggy address is located 0 bytes to the right of
[   16.963514]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.963976] 
[   16.964063] The buggy address belongs to the physical page:
[   16.964231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.964572] flags: 0x200000000000000(node=0|zone=2)
[   16.964802] page_type: f5(slab)
[   16.964967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.965321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.965621] page dumped because: kasan: bad access detected
[   16.965908] 
[   16.966073] Memory state around the buggy address:
[   16.966346]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.966650]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.966861] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.967080]                                      ^
[   16.967242]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.967644]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.968068] ==================================================================
[   15.775930] ==================================================================
[   15.776579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.777060] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.777491] 
[   15.777676] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.777791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.777805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.777841] Call Trace:
[   15.777861]  <TASK>
[   15.777880]  dump_stack_lvl+0x73/0xb0
[   15.777909]  print_report+0xd1/0x650
[   15.777933]  ? __virt_addr_valid+0x1db/0x2d0
[   15.777958]  ? kasan_atomics_helper+0x565/0x5450
[   15.778061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.778090]  ? kasan_atomics_helper+0x565/0x5450
[   15.778114]  kasan_report+0x141/0x180
[   15.778137]  ? kasan_atomics_helper+0x565/0x5450
[   15.778164]  kasan_check_range+0x10c/0x1c0
[   15.778188]  __kasan_check_write+0x18/0x20
[   15.778208]  kasan_atomics_helper+0x565/0x5450
[   15.778243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.778267]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.778293]  ? kasan_atomics+0x152/0x310
[   15.778319]  kasan_atomics+0x1dc/0x310
[   15.778342]  ? __pfx_kasan_atomics+0x10/0x10
[   15.778366]  ? __pfx_read_tsc+0x10/0x10
[   15.778387]  ? ktime_get_ts64+0x86/0x230
[   15.778412]  kunit_try_run_case+0x1a5/0x480
[   15.778438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.778461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.778485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.778510]  ? __kthread_parkme+0x82/0x180
[   15.778531]  ? preempt_count_sub+0x50/0x80
[   15.778556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.778581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.778627]  kthread+0x337/0x6f0
[   15.778648]  ? trace_preempt_on+0x20/0xc0
[   15.778672]  ? __pfx_kthread+0x10/0x10
[   15.778693]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.778717]  ? calculate_sigpending+0x7b/0xa0
[   15.778741]  ? __pfx_kthread+0x10/0x10
[   15.778763]  ret_from_fork+0x116/0x1d0
[   15.778782]  ? __pfx_kthread+0x10/0x10
[   15.778803]  ret_from_fork_asm+0x1a/0x30
[   15.778835]  </TASK>
[   15.778847] 
[   15.788489] Allocated by task 282:
[   15.788735]  kasan_save_stack+0x45/0x70
[   15.788901]  kasan_save_track+0x18/0x40
[   15.789037]  kasan_save_alloc_info+0x3b/0x50
[   15.789199]  __kasan_kmalloc+0xb7/0xc0
[   15.789668]  __kmalloc_cache_noprof+0x189/0x420
[   15.790200]  kasan_atomics+0x95/0x310
[   15.790471]  kunit_try_run_case+0x1a5/0x480
[   15.790700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.790933]  kthread+0x337/0x6f0
[   15.791106]  ret_from_fork+0x116/0x1d0
[   15.791611]  ret_from_fork_asm+0x1a/0x30
[   15.791845] 
[   15.791919] The buggy address belongs to the object at ffff88810261fc00
[   15.791919]  which belongs to the cache kmalloc-64 of size 64
[   15.792379] The buggy address is located 0 bytes to the right of
[   15.792379]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.793396] 
[   15.793672] The buggy address belongs to the physical page:
[   15.793862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.794341] flags: 0x200000000000000(node=0|zone=2)
[   15.794706] page_type: f5(slab)
[   15.795181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.795656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.795957] page dumped because: kasan: bad access detected
[   15.796488] 
[   15.796597] Memory state around the buggy address:
[   15.796852]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.797307]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.797774] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.798210]                                      ^
[   15.798506]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.798990]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.799436] ==================================================================
[   15.879451] ==================================================================
[   15.880253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.880786] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.881395] 
[   15.881633] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.881785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.881804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.881829] Call Trace:
[   15.881849]  <TASK>
[   15.881868]  dump_stack_lvl+0x73/0xb0
[   15.881898]  print_report+0xd1/0x650
[   15.881921]  ? __virt_addr_valid+0x1db/0x2d0
[   15.881944]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.881966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.881993]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.882015]  kasan_report+0x141/0x180
[   15.882037]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.882170]  kasan_check_range+0x10c/0x1c0
[   15.882198]  __kasan_check_write+0x18/0x20
[   15.882218]  kasan_atomics_helper+0x7c7/0x5450
[   15.882242]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.882265]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.882290]  ? kasan_atomics+0x152/0x310
[   15.882318]  kasan_atomics+0x1dc/0x310
[   15.882340]  ? __pfx_kasan_atomics+0x10/0x10
[   15.882365]  ? __pfx_read_tsc+0x10/0x10
[   15.882387]  ? ktime_get_ts64+0x86/0x230
[   15.882412]  kunit_try_run_case+0x1a5/0x480
[   15.882438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882460]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.882484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.882509]  ? __kthread_parkme+0x82/0x180
[   15.882530]  ? preempt_count_sub+0x50/0x80
[   15.882554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.882603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.882627]  kthread+0x337/0x6f0
[   15.882646]  ? trace_preempt_on+0x20/0xc0
[   15.882671]  ? __pfx_kthread+0x10/0x10
[   15.882692]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.882714]  ? calculate_sigpending+0x7b/0xa0
[   15.882737]  ? __pfx_kthread+0x10/0x10
[   15.882760]  ret_from_fork+0x116/0x1d0
[   15.882778]  ? __pfx_kthread+0x10/0x10
[   15.882801]  ret_from_fork_asm+0x1a/0x30
[   15.882833]  </TASK>
[   15.882846] 
[   15.895714] Allocated by task 282:
[   15.895895]  kasan_save_stack+0x45/0x70
[   15.896340]  kasan_save_track+0x18/0x40
[   15.896671]  kasan_save_alloc_info+0x3b/0x50
[   15.897003]  __kasan_kmalloc+0xb7/0xc0
[   15.897431]  __kmalloc_cache_noprof+0x189/0x420
[   15.897760]  kasan_atomics+0x95/0x310
[   15.897937]  kunit_try_run_case+0x1a5/0x480
[   15.898587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.898830]  kthread+0x337/0x6f0
[   15.899231]  ret_from_fork+0x116/0x1d0
[   15.899430]  ret_from_fork_asm+0x1a/0x30
[   15.899579] 
[   15.899679] The buggy address belongs to the object at ffff88810261fc00
[   15.899679]  which belongs to the cache kmalloc-64 of size 64
[   15.900659] The buggy address is located 0 bytes to the right of
[   15.900659]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.901421] 
[   15.901835] The buggy address belongs to the physical page:
[   15.902098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.902725] flags: 0x200000000000000(node=0|zone=2)
[   15.903091] page_type: f5(slab)
[   15.903498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.903972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.904451] page dumped because: kasan: bad access detected
[   15.904901] 
[   15.904999] Memory state around the buggy address:
[   15.905476]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.906005]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.906641] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.907104]                                      ^
[   15.907546]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.907857]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.908465] ==================================================================
[   16.025912] ==================================================================
[   16.026767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   16.027290] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.027539] 
[   16.027873] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.028004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.028021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.028054] Call Trace:
[   16.028080]  <TASK>
[   16.028097]  dump_stack_lvl+0x73/0xb0
[   16.028126]  print_report+0xd1/0x650
[   16.028149]  ? __virt_addr_valid+0x1db/0x2d0
[   16.028172]  ? kasan_atomics_helper+0xac7/0x5450
[   16.028193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.028219]  ? kasan_atomics_helper+0xac7/0x5450
[   16.028241]  kasan_report+0x141/0x180
[   16.028264]  ? kasan_atomics_helper+0xac7/0x5450
[   16.028290]  kasan_check_range+0x10c/0x1c0
[   16.028315]  __kasan_check_write+0x18/0x20
[   16.028335]  kasan_atomics_helper+0xac7/0x5450
[   16.028357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.028380]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.028405]  ? kasan_atomics+0x152/0x310
[   16.028432]  kasan_atomics+0x1dc/0x310
[   16.028455]  ? __pfx_kasan_atomics+0x10/0x10
[   16.028480]  ? __pfx_read_tsc+0x10/0x10
[   16.028501]  ? ktime_get_ts64+0x86/0x230
[   16.028577]  kunit_try_run_case+0x1a5/0x480
[   16.028602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.028625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.028648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.028671]  ? __kthread_parkme+0x82/0x180
[   16.028693]  ? preempt_count_sub+0x50/0x80
[   16.028717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.028742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.028765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.028788]  kthread+0x337/0x6f0
[   16.028809]  ? trace_preempt_on+0x20/0xc0
[   16.028832]  ? __pfx_kthread+0x10/0x10
[   16.028853]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.028875]  ? calculate_sigpending+0x7b/0xa0
[   16.028900]  ? __pfx_kthread+0x10/0x10
[   16.028922]  ret_from_fork+0x116/0x1d0
[   16.028941]  ? __pfx_kthread+0x10/0x10
[   16.028961]  ret_from_fork_asm+0x1a/0x30
[   16.028993]  </TASK>
[   16.029005] 
[   16.041098] Allocated by task 282:
[   16.041269]  kasan_save_stack+0x45/0x70
[   16.041716]  kasan_save_track+0x18/0x40
[   16.041906]  kasan_save_alloc_info+0x3b/0x50
[   16.042114]  __kasan_kmalloc+0xb7/0xc0
[   16.042289]  __kmalloc_cache_noprof+0x189/0x420
[   16.042493]  kasan_atomics+0x95/0x310
[   16.043176]  kunit_try_run_case+0x1a5/0x480
[   16.043342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.043870]  kthread+0x337/0x6f0
[   16.044136]  ret_from_fork+0x116/0x1d0
[   16.044380]  ret_from_fork_asm+0x1a/0x30
[   16.044757] 
[   16.044864] The buggy address belongs to the object at ffff88810261fc00
[   16.044864]  which belongs to the cache kmalloc-64 of size 64
[   16.045543] The buggy address is located 0 bytes to the right of
[   16.045543]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.046406] 
[   16.046493] The buggy address belongs to the physical page:
[   16.047183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.047635] flags: 0x200000000000000(node=0|zone=2)
[   16.047953] page_type: f5(slab)
[   16.048093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.048703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.049029] page dumped because: kasan: bad access detected
[   16.049490] 
[   16.049617] Memory state around the buggy address:
[   16.050149]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.050607]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.051022] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.051691]                                      ^
[   16.052006]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.052431]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.052888] ==================================================================
[   15.627844] ==================================================================
[   15.629075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.629932] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.630656] 
[   15.630754] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.630801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.630813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.630834] Call Trace:
[   15.630853]  <TASK>
[   15.630873]  dump_stack_lvl+0x73/0xb0
[   15.630901]  print_report+0xd1/0x650
[   15.630923]  ? __virt_addr_valid+0x1db/0x2d0
[   15.630946]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.630966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.630991]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.631011]  kasan_report+0x141/0x180
[   15.631032]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.631072]  __asan_report_load4_noabort+0x18/0x20
[   15.631097]  kasan_atomics_helper+0x4b88/0x5450
[   15.631118]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.631139]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.631164]  ? kasan_atomics+0x152/0x310
[   15.631189]  kasan_atomics+0x1dc/0x310
[   15.631210]  ? __pfx_kasan_atomics+0x10/0x10
[   15.631233]  ? __pfx_read_tsc+0x10/0x10
[   15.631253]  ? ktime_get_ts64+0x86/0x230
[   15.631278]  kunit_try_run_case+0x1a5/0x480
[   15.631303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.631324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.631348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.631370]  ? __kthread_parkme+0x82/0x180
[   15.631390]  ? preempt_count_sub+0x50/0x80
[   15.631413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.631436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.631459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.631481]  kthread+0x337/0x6f0
[   15.631500]  ? trace_preempt_on+0x20/0xc0
[   15.631522]  ? __pfx_kthread+0x10/0x10
[   15.631541]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.631562]  ? calculate_sigpending+0x7b/0xa0
[   15.631585]  ? __pfx_kthread+0x10/0x10
[   15.631606]  ret_from_fork+0x116/0x1d0
[   15.631623]  ? __pfx_kthread+0x10/0x10
[   15.631643]  ret_from_fork_asm+0x1a/0x30
[   15.631674]  </TASK>
[   15.631685] 
[   15.647851] Allocated by task 282:
[   15.648353]  kasan_save_stack+0x45/0x70
[   15.648770]  kasan_save_track+0x18/0x40
[   15.649236]  kasan_save_alloc_info+0x3b/0x50
[   15.649395]  __kasan_kmalloc+0xb7/0xc0
[   15.649579]  __kmalloc_cache_noprof+0x189/0x420
[   15.650031]  kasan_atomics+0x95/0x310
[   15.650524]  kunit_try_run_case+0x1a5/0x480
[   15.650927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.651426]  kthread+0x337/0x6f0
[   15.651835]  ret_from_fork+0x116/0x1d0
[   15.652184]  ret_from_fork_asm+0x1a/0x30
[   15.652556] 
[   15.652636] The buggy address belongs to the object at ffff88810261fc00
[   15.652636]  which belongs to the cache kmalloc-64 of size 64
[   15.652993] The buggy address is located 0 bytes to the right of
[   15.652993]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.653871] 
[   15.653985] The buggy address belongs to the physical page:
[   15.654539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.654947] flags: 0x200000000000000(node=0|zone=2)
[   15.655293] page_type: f5(slab)
[   15.655472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.655940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.656326] page dumped because: kasan: bad access detected
[   15.656668] 
[   15.656774] Memory state around the buggy address:
[   15.656986]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.657658]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.657959] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.658364]                                      ^
[   15.658772]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659095]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659554] ==================================================================
[   17.045861] ==================================================================
[   17.046324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   17.046550] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.046764] 
[   17.046844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.046885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.046897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.046920] Call Trace:
[   17.046933]  <TASK>
[   17.046949]  dump_stack_lvl+0x73/0xb0
[   17.046973]  print_report+0xd1/0x650
[   17.046995]  ? __virt_addr_valid+0x1db/0x2d0
[   17.047016]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.047037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.047074]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.047113]  kasan_report+0x141/0x180
[   17.047135]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.047200]  kasan_check_range+0x10c/0x1c0
[   17.047250]  __kasan_check_write+0x18/0x20
[   17.047270]  kasan_atomics_helper+0x20c8/0x5450
[   17.047292]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.047315]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.047340]  ? kasan_atomics+0x152/0x310
[   17.047366]  kasan_atomics+0x1dc/0x310
[   17.047389]  ? __pfx_kasan_atomics+0x10/0x10
[   17.047414]  ? __pfx_read_tsc+0x10/0x10
[   17.047435]  ? ktime_get_ts64+0x86/0x230
[   17.047458]  kunit_try_run_case+0x1a5/0x480
[   17.047483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.047516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.047539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.047593]  ? __kthread_parkme+0x82/0x180
[   17.047614]  ? preempt_count_sub+0x50/0x80
[   17.047639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.047664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.047687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.047740]  kthread+0x337/0x6f0
[   17.047761]  ? trace_preempt_on+0x20/0xc0
[   17.047783]  ? __pfx_kthread+0x10/0x10
[   17.047807]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.047829]  ? calculate_sigpending+0x7b/0xa0
[   17.047883]  ? __pfx_kthread+0x10/0x10
[   17.047905]  ret_from_fork+0x116/0x1d0
[   17.047924]  ? __pfx_kthread+0x10/0x10
[   17.047945]  ret_from_fork_asm+0x1a/0x30
[   17.047979]  </TASK>
[   17.048022] 
[   17.056275] Allocated by task 282:
[   17.056467]  kasan_save_stack+0x45/0x70
[   17.056696]  kasan_save_track+0x18/0x40
[   17.056891]  kasan_save_alloc_info+0x3b/0x50
[   17.057072]  __kasan_kmalloc+0xb7/0xc0
[   17.057304]  __kmalloc_cache_noprof+0x189/0x420
[   17.057580]  kasan_atomics+0x95/0x310
[   17.057776]  kunit_try_run_case+0x1a5/0x480
[   17.057918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.058097]  kthread+0x337/0x6f0
[   17.058215]  ret_from_fork+0x116/0x1d0
[   17.058390]  ret_from_fork_asm+0x1a/0x30
[   17.058583] 
[   17.058676] The buggy address belongs to the object at ffff88810261fc00
[   17.058676]  which belongs to the cache kmalloc-64 of size 64
[   17.059232] The buggy address is located 0 bytes to the right of
[   17.059232]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.059768] 
[   17.059863] The buggy address belongs to the physical page:
[   17.060106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.060522] flags: 0x200000000000000(node=0|zone=2)
[   17.060753] page_type: f5(slab)
[   17.060871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.061107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.061326] page dumped because: kasan: bad access detected
[   17.061518] 
[   17.061621] Memory state around the buggy address:
[   17.061886]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.062226]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.062640] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.062985]                                      ^
[   17.063226]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.063582]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.063905] ==================================================================
[   16.921016] ==================================================================
[   16.921803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.922489] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.922884] 
[   16.922974] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.923018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.923031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.923067] Call Trace:
[   16.923082]  <TASK>
[   16.923099]  dump_stack_lvl+0x73/0xb0
[   16.923128]  print_report+0xd1/0x650
[   16.923150]  ? __virt_addr_valid+0x1db/0x2d0
[   16.923173]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.923194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.923220]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.923242]  kasan_report+0x141/0x180
[   16.923266]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.923294]  kasan_check_range+0x10c/0x1c0
[   16.923318]  __kasan_check_write+0x18/0x20
[   16.923337]  kasan_atomics_helper+0x1e12/0x5450
[   16.923360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.923383]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.923409]  ? kasan_atomics+0x152/0x310
[   16.923436]  kasan_atomics+0x1dc/0x310
[   16.923459]  ? __pfx_kasan_atomics+0x10/0x10
[   16.923485]  ? __pfx_read_tsc+0x10/0x10
[   16.923535]  ? ktime_get_ts64+0x86/0x230
[   16.923559]  kunit_try_run_case+0x1a5/0x480
[   16.923624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.923649]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.923672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.923696]  ? __kthread_parkme+0x82/0x180
[   16.923717]  ? preempt_count_sub+0x50/0x80
[   16.923768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.923793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.923816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.923840]  kthread+0x337/0x6f0
[   16.923859]  ? trace_preempt_on+0x20/0xc0
[   16.923883]  ? __pfx_kthread+0x10/0x10
[   16.923903]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.923925]  ? calculate_sigpending+0x7b/0xa0
[   16.923948]  ? __pfx_kthread+0x10/0x10
[   16.923971]  ret_from_fork+0x116/0x1d0
[   16.923990]  ? __pfx_kthread+0x10/0x10
[   16.924011]  ret_from_fork_asm+0x1a/0x30
[   16.924051]  </TASK>
[   16.924064] 
[   16.937125] Allocated by task 282:
[   16.937526]  kasan_save_stack+0x45/0x70
[   16.937909]  kasan_save_track+0x18/0x40
[   16.938292]  kasan_save_alloc_info+0x3b/0x50
[   16.938715]  __kasan_kmalloc+0xb7/0xc0
[   16.939093]  __kmalloc_cache_noprof+0x189/0x420
[   16.939404]  kasan_atomics+0x95/0x310
[   16.939710]  kunit_try_run_case+0x1a5/0x480
[   16.940118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.940524]  kthread+0x337/0x6f0
[   16.940828]  ret_from_fork+0x116/0x1d0
[   16.940963]  ret_from_fork_asm+0x1a/0x30
[   16.941113] 
[   16.941186] The buggy address belongs to the object at ffff88810261fc00
[   16.941186]  which belongs to the cache kmalloc-64 of size 64
[   16.941690] The buggy address is located 0 bytes to the right of
[   16.941690]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.942824] 
[   16.943020] The buggy address belongs to the physical page:
[   16.943559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.944254] flags: 0x200000000000000(node=0|zone=2)
[   16.944732] page_type: f5(slab)
[   16.944974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.945267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.945547] page dumped because: kasan: bad access detected
[   16.946099] 
[   16.946292] Memory state around the buggy address:
[   16.946755]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.947389]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.947822] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.948052]                                      ^
[   16.948222]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.948600]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.948874] ==================================================================
[   16.403968] ==================================================================
[   16.404406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   16.404663] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.404990] 
[   16.405111] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.405156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.405169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.405191] Call Trace:
[   16.405207]  <TASK>
[   16.405224]  dump_stack_lvl+0x73/0xb0
[   16.405253]  print_report+0xd1/0x650
[   16.405276]  ? __virt_addr_valid+0x1db/0x2d0
[   16.405299]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.405320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.405346]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.405368]  kasan_report+0x141/0x180
[   16.405391]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.405417]  __asan_report_load4_noabort+0x18/0x20
[   16.405441]  kasan_atomics_helper+0x49e8/0x5450
[   16.405464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.405486]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.406259]  ? kasan_atomics+0x152/0x310
[   16.406297]  kasan_atomics+0x1dc/0x310
[   16.406321]  ? __pfx_kasan_atomics+0x10/0x10
[   16.406347]  ? __pfx_read_tsc+0x10/0x10
[   16.406369]  ? ktime_get_ts64+0x86/0x230
[   16.406394]  kunit_try_run_case+0x1a5/0x480
[   16.406418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.406441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.406464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.406488]  ? __kthread_parkme+0x82/0x180
[   16.406509]  ? preempt_count_sub+0x50/0x80
[   16.406533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.406557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.406580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.406604]  kthread+0x337/0x6f0
[   16.406623]  ? trace_preempt_on+0x20/0xc0
[   16.406648]  ? __pfx_kthread+0x10/0x10
[   16.406669]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.406691]  ? calculate_sigpending+0x7b/0xa0
[   16.406714]  ? __pfx_kthread+0x10/0x10
[   16.406736]  ret_from_fork+0x116/0x1d0
[   16.406755]  ? __pfx_kthread+0x10/0x10
[   16.406775]  ret_from_fork_asm+0x1a/0x30
[   16.406806]  </TASK>
[   16.406819] 
[   16.418015] Allocated by task 282:
[   16.418240]  kasan_save_stack+0x45/0x70
[   16.418750]  kasan_save_track+0x18/0x40
[   16.418955]  kasan_save_alloc_info+0x3b/0x50
[   16.419400]  __kasan_kmalloc+0xb7/0xc0
[   16.419654]  __kmalloc_cache_noprof+0x189/0x420
[   16.419938]  kasan_atomics+0x95/0x310
[   16.420360]  kunit_try_run_case+0x1a5/0x480
[   16.420609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.421030]  kthread+0x337/0x6f0
[   16.421213]  ret_from_fork+0x116/0x1d0
[   16.421590]  ret_from_fork_asm+0x1a/0x30
[   16.421797] 
[   16.421878] The buggy address belongs to the object at ffff88810261fc00
[   16.421878]  which belongs to the cache kmalloc-64 of size 64
[   16.422725] The buggy address is located 0 bytes to the right of
[   16.422725]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.423427] 
[   16.423616] The buggy address belongs to the physical page:
[   16.423986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.424557] flags: 0x200000000000000(node=0|zone=2)
[   16.424832] page_type: f5(slab)
[   16.424987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.425857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.426442] page dumped because: kasan: bad access detected
[   16.426782] 
[   16.426883] Memory state around the buggy address:
[   16.427250]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.427567]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.427854] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.428411]                                      ^
[   16.428614]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.429324]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.429615] ==================================================================
[   16.577969] ==================================================================
[   16.578434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.578868] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.579198] 
[   16.579292] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.579333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.579346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.579367] Call Trace:
[   16.579382]  <TASK>
[   16.579397]  dump_stack_lvl+0x73/0xb0
[   16.579424]  print_report+0xd1/0x650
[   16.579446]  ? __virt_addr_valid+0x1db/0x2d0
[   16.579469]  ? kasan_atomics_helper+0x151d/0x5450
[   16.579490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.579516]  ? kasan_atomics_helper+0x151d/0x5450
[   16.579540]  kasan_report+0x141/0x180
[   16.579562]  ? kasan_atomics_helper+0x151d/0x5450
[   16.579589]  kasan_check_range+0x10c/0x1c0
[   16.579613]  __kasan_check_write+0x18/0x20
[   16.579633]  kasan_atomics_helper+0x151d/0x5450
[   16.579658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.579681]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.579706]  ? kasan_atomics+0x152/0x310
[   16.579733]  kasan_atomics+0x1dc/0x310
[   16.579755]  ? __pfx_kasan_atomics+0x10/0x10
[   16.579780]  ? __pfx_read_tsc+0x10/0x10
[   16.579801]  ? ktime_get_ts64+0x86/0x230
[   16.579825]  kunit_try_run_case+0x1a5/0x480
[   16.579849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.579872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.579895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.579919]  ? __kthread_parkme+0x82/0x180
[   16.579939]  ? preempt_count_sub+0x50/0x80
[   16.579964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.579989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.580012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.580036]  kthread+0x337/0x6f0
[   16.580067]  ? trace_preempt_on+0x20/0xc0
[   16.580090]  ? __pfx_kthread+0x10/0x10
[   16.580111]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.580133]  ? calculate_sigpending+0x7b/0xa0
[   16.580156]  ? __pfx_kthread+0x10/0x10
[   16.580180]  ret_from_fork+0x116/0x1d0
[   16.580199]  ? __pfx_kthread+0x10/0x10
[   16.580220]  ret_from_fork_asm+0x1a/0x30
[   16.580251]  </TASK>
[   16.580263] 
[   16.587728] Allocated by task 282:
[   16.587903]  kasan_save_stack+0x45/0x70
[   16.588062]  kasan_save_track+0x18/0x40
[   16.588219]  kasan_save_alloc_info+0x3b/0x50
[   16.588433]  __kasan_kmalloc+0xb7/0xc0
[   16.588621]  __kmalloc_cache_noprof+0x189/0x420
[   16.588971]  kasan_atomics+0x95/0x310
[   16.589117]  kunit_try_run_case+0x1a5/0x480
[   16.589266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.589442]  kthread+0x337/0x6f0
[   16.589572]  ret_from_fork+0x116/0x1d0
[   16.589705]  ret_from_fork_asm+0x1a/0x30
[   16.589844] 
[   16.589916] The buggy address belongs to the object at ffff88810261fc00
[   16.589916]  which belongs to the cache kmalloc-64 of size 64
[   16.590523] The buggy address is located 0 bytes to the right of
[   16.590523]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.591087] 
[   16.591184] The buggy address belongs to the physical page:
[   16.591423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.591665] flags: 0x200000000000000(node=0|zone=2)
[   16.591833] page_type: f5(slab)
[   16.591954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.592199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.592602] page dumped because: kasan: bad access detected
[   16.592856] 
[   16.592952] Memory state around the buggy address:
[   16.593190]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.593529]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.593861] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.594201]                                      ^
[   16.594436]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.595096]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.595374] ==================================================================
[   16.430237] ==================================================================
[   16.430519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   16.431644] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.431978] 
[   16.432196] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.432372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.432387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.432411] Call Trace:
[   16.432427]  <TASK>
[   16.432443]  dump_stack_lvl+0x73/0xb0
[   16.432472]  print_report+0xd1/0x650
[   16.432495]  ? __virt_addr_valid+0x1db/0x2d0
[   16.432526]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.432549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.432575]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.432597]  kasan_report+0x141/0x180
[   16.432619]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.432646]  kasan_check_range+0x10c/0x1c0
[   16.432670]  __kasan_check_write+0x18/0x20
[   16.432689]  kasan_atomics_helper+0x12e6/0x5450
[   16.432712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.432734]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.432758]  ? kasan_atomics+0x152/0x310
[   16.432785]  kasan_atomics+0x1dc/0x310
[   16.432808]  ? __pfx_kasan_atomics+0x10/0x10
[   16.432833]  ? __pfx_read_tsc+0x10/0x10
[   16.432854]  ? ktime_get_ts64+0x86/0x230
[   16.432877]  kunit_try_run_case+0x1a5/0x480
[   16.432902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.432924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.432947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.432970]  ? __kthread_parkme+0x82/0x180
[   16.432990]  ? preempt_count_sub+0x50/0x80
[   16.433013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.433053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.433088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.433112]  kthread+0x337/0x6f0
[   16.433131]  ? trace_preempt_on+0x20/0xc0
[   16.433154]  ? __pfx_kthread+0x10/0x10
[   16.433175]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.433196]  ? calculate_sigpending+0x7b/0xa0
[   16.433220]  ? __pfx_kthread+0x10/0x10
[   16.433242]  ret_from_fork+0x116/0x1d0
[   16.433261]  ? __pfx_kthread+0x10/0x10
[   16.433282]  ret_from_fork_asm+0x1a/0x30
[   16.433314]  </TASK>
[   16.433325] 
[   16.444694] Allocated by task 282:
[   16.444963]  kasan_save_stack+0x45/0x70
[   16.445439]  kasan_save_track+0x18/0x40
[   16.445658]  kasan_save_alloc_info+0x3b/0x50
[   16.445950]  __kasan_kmalloc+0xb7/0xc0
[   16.446381]  __kmalloc_cache_noprof+0x189/0x420
[   16.446649]  kasan_atomics+0x95/0x310
[   16.446905]  kunit_try_run_case+0x1a5/0x480
[   16.447087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.447488]  kthread+0x337/0x6f0
[   16.447666]  ret_from_fork+0x116/0x1d0
[   16.447954]  ret_from_fork_asm+0x1a/0x30
[   16.448175] 
[   16.448337] The buggy address belongs to the object at ffff88810261fc00
[   16.448337]  which belongs to the cache kmalloc-64 of size 64
[   16.449056] The buggy address is located 0 bytes to the right of
[   16.449056]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.449975] 
[   16.450098] The buggy address belongs to the physical page:
[   16.450749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.451157] flags: 0x200000000000000(node=0|zone=2)
[   16.451469] page_type: f5(slab)
[   16.451701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.452017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.452555] page dumped because: kasan: bad access detected
[   16.452813] 
[   16.452902] Memory state around the buggy address:
[   16.453350]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.453799]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.454264] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.454578]                                      ^
[   16.454787]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.455094]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.455765] ==================================================================
[   16.299987] ==================================================================
[   16.300587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   16.300878] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.301115] 
[   16.301203] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.301247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.301261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.301283] Call Trace:
[   16.301301]  <TASK>
[   16.301319]  dump_stack_lvl+0x73/0xb0
[   16.301345]  print_report+0xd1/0x650
[   16.301369]  ? __virt_addr_valid+0x1db/0x2d0
[   16.301391]  ? kasan_atomics_helper+0x1079/0x5450
[   16.301412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.301439]  ? kasan_atomics_helper+0x1079/0x5450
[   16.301461]  kasan_report+0x141/0x180
[   16.301483]  ? kasan_atomics_helper+0x1079/0x5450
[   16.301510]  kasan_check_range+0x10c/0x1c0
[   16.301535]  __kasan_check_write+0x18/0x20
[   16.301559]  kasan_atomics_helper+0x1079/0x5450
[   16.301583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.301605]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.301631]  ? kasan_atomics+0x152/0x310
[   16.301657]  kasan_atomics+0x1dc/0x310
[   16.301681]  ? __pfx_kasan_atomics+0x10/0x10
[   16.301705]  ? __pfx_read_tsc+0x10/0x10
[   16.301727]  ? ktime_get_ts64+0x86/0x230
[   16.301751]  kunit_try_run_case+0x1a5/0x480
[   16.301777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.301800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.301868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.301895]  ? __kthread_parkme+0x82/0x180
[   16.301916]  ? preempt_count_sub+0x50/0x80
[   16.301941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.301966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.301990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.302014]  kthread+0x337/0x6f0
[   16.302034]  ? trace_preempt_on+0x20/0xc0
[   16.302099]  ? __pfx_kthread+0x10/0x10
[   16.302122]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.302144]  ? calculate_sigpending+0x7b/0xa0
[   16.302168]  ? __pfx_kthread+0x10/0x10
[   16.302191]  ret_from_fork+0x116/0x1d0
[   16.302210]  ? __pfx_kthread+0x10/0x10
[   16.302230]  ret_from_fork_asm+0x1a/0x30
[   16.302263]  </TASK>
[   16.302276] 
[   16.310367] Allocated by task 282:
[   16.310692]  kasan_save_stack+0x45/0x70
[   16.310897]  kasan_save_track+0x18/0x40
[   16.311191]  kasan_save_alloc_info+0x3b/0x50
[   16.311410]  __kasan_kmalloc+0xb7/0xc0
[   16.311710]  __kmalloc_cache_noprof+0x189/0x420
[   16.311929]  kasan_atomics+0x95/0x310
[   16.312264]  kunit_try_run_case+0x1a5/0x480
[   16.313195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.313467]  kthread+0x337/0x6f0
[   16.313693]  ret_from_fork+0x116/0x1d0
[   16.314129]  ret_from_fork_asm+0x1a/0x30
[   16.314353] 
[   16.314455] The buggy address belongs to the object at ffff88810261fc00
[   16.314455]  which belongs to the cache kmalloc-64 of size 64
[   16.315708] The buggy address is located 0 bytes to the right of
[   16.315708]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.316747] 
[   16.316851] The buggy address belongs to the physical page:
[   16.317463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.318033] flags: 0x200000000000000(node=0|zone=2)
[   16.318522] page_type: f5(slab)
[   16.318696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.319013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.319712] page dumped because: kasan: bad access detected
[   16.320171] 
[   16.320273] Memory state around the buggy address:
[   16.320484]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.321205]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.321520] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.321818]                                      ^
[   16.322027]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322262]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322563] ==================================================================
[   16.481828] ==================================================================
[   16.482140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   16.482991] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.483248] 
[   16.483340] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.483384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.483399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.483422] Call Trace:
[   16.483440]  <TASK>
[   16.483457]  dump_stack_lvl+0x73/0xb0
[   16.483485]  print_report+0xd1/0x650
[   16.483507]  ? __virt_addr_valid+0x1db/0x2d0
[   16.483531]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.483552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.483579]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.483601]  kasan_report+0x141/0x180
[   16.483624]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.483651]  kasan_check_range+0x10c/0x1c0
[   16.483674]  __kasan_check_read+0x15/0x20
[   16.483694]  kasan_atomics_helper+0x13b5/0x5450
[   16.483718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.483739]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.483765]  ? kasan_atomics+0x152/0x310
[   16.483792]  kasan_atomics+0x1dc/0x310
[   16.483814]  ? __pfx_kasan_atomics+0x10/0x10
[   16.483839]  ? __pfx_read_tsc+0x10/0x10
[   16.483860]  ? ktime_get_ts64+0x86/0x230
[   16.483885]  kunit_try_run_case+0x1a5/0x480
[   16.483909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.483932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.483955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.483979]  ? __kthread_parkme+0x82/0x180
[   16.484000]  ? preempt_count_sub+0x50/0x80
[   16.484024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.484059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.484083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.484106]  kthread+0x337/0x6f0
[   16.484126]  ? trace_preempt_on+0x20/0xc0
[   16.484148]  ? __pfx_kthread+0x10/0x10
[   16.484170]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.484191]  ? calculate_sigpending+0x7b/0xa0
[   16.484215]  ? __pfx_kthread+0x10/0x10
[   16.484236]  ret_from_fork+0x116/0x1d0
[   16.484256]  ? __pfx_kthread+0x10/0x10
[   16.484278]  ret_from_fork_asm+0x1a/0x30
[   16.484310]  </TASK>
[   16.484322] 
[   16.495634] Allocated by task 282:
[   16.495997]  kasan_save_stack+0x45/0x70
[   16.496261]  kasan_save_track+0x18/0x40
[   16.496458]  kasan_save_alloc_info+0x3b/0x50
[   16.496813]  __kasan_kmalloc+0xb7/0xc0
[   16.496999]  __kmalloc_cache_noprof+0x189/0x420
[   16.497644]  kasan_atomics+0x95/0x310
[   16.497843]  kunit_try_run_case+0x1a5/0x480
[   16.498057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.498239]  kthread+0x337/0x6f0
[   16.498415]  ret_from_fork+0x116/0x1d0
[   16.498611]  ret_from_fork_asm+0x1a/0x30
[   16.498799] 
[   16.498887] The buggy address belongs to the object at ffff88810261fc00
[   16.498887]  which belongs to the cache kmalloc-64 of size 64
[   16.499827] The buggy address is located 0 bytes to the right of
[   16.499827]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.500721] 
[   16.500805] The buggy address belongs to the physical page:
[   16.501198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.501505] flags: 0x200000000000000(node=0|zone=2)
[   16.501971] page_type: f5(slab)
[   16.502221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.502471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.503097] page dumped because: kasan: bad access detected
[   16.503356] 
[   16.503443] Memory state around the buggy address:
[   16.503887]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.504271]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.504624] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.505035]                                      ^
[   16.505452]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506005]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506531] ==================================================================
[   15.727382] ==================================================================
[   15.727712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.728603] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.729022] 
[   15.729226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.729276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.729291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.729314] Call Trace:
[   15.729332]  <TASK>
[   15.729417]  dump_stack_lvl+0x73/0xb0
[   15.729532]  print_report+0xd1/0x650
[   15.729565]  ? __virt_addr_valid+0x1db/0x2d0
[   15.729607]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.729628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.729655]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.729678]  kasan_report+0x141/0x180
[   15.729700]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.729727]  kasan_check_range+0x10c/0x1c0
[   15.729754]  __kasan_check_write+0x18/0x20
[   15.729773]  kasan_atomics_helper+0x4a0/0x5450
[   15.729796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.729820]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.729845]  ? kasan_atomics+0x152/0x310
[   15.729871]  kasan_atomics+0x1dc/0x310
[   15.729895]  ? __pfx_kasan_atomics+0x10/0x10
[   15.729920]  ? __pfx_read_tsc+0x10/0x10
[   15.729943]  ? ktime_get_ts64+0x86/0x230
[   15.729968]  kunit_try_run_case+0x1a5/0x480
[   15.729992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.730050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.730073]  ? __kthread_parkme+0x82/0x180
[   15.730095]  ? preempt_count_sub+0x50/0x80
[   15.730119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.730167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.730190]  kthread+0x337/0x6f0
[   15.730210]  ? trace_preempt_on+0x20/0xc0
[   15.730234]  ? __pfx_kthread+0x10/0x10
[   15.730254]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.730275]  ? calculate_sigpending+0x7b/0xa0
[   15.730300]  ? __pfx_kthread+0x10/0x10
[   15.730323]  ret_from_fork+0x116/0x1d0
[   15.730342]  ? __pfx_kthread+0x10/0x10
[   15.730363]  ret_from_fork_asm+0x1a/0x30
[   15.730395]  </TASK>
[   15.730408] 
[   15.740873] Allocated by task 282:
[   15.741156]  kasan_save_stack+0x45/0x70
[   15.741376]  kasan_save_track+0x18/0x40
[   15.741537]  kasan_save_alloc_info+0x3b/0x50
[   15.741757]  __kasan_kmalloc+0xb7/0xc0
[   15.742000]  __kmalloc_cache_noprof+0x189/0x420
[   15.742340]  kasan_atomics+0x95/0x310
[   15.742600]  kunit_try_run_case+0x1a5/0x480
[   15.742833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743063]  kthread+0x337/0x6f0
[   15.743508]  ret_from_fork+0x116/0x1d0
[   15.743684]  ret_from_fork_asm+0x1a/0x30
[   15.743937] 
[   15.744034] The buggy address belongs to the object at ffff88810261fc00
[   15.744034]  which belongs to the cache kmalloc-64 of size 64
[   15.744842] The buggy address is located 0 bytes to the right of
[   15.744842]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.745621] 
[   15.745727] The buggy address belongs to the physical page:
[   15.746074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.746629] flags: 0x200000000000000(node=0|zone=2)
[   15.746837] page_type: f5(slab)
[   15.746989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.747524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.747924] page dumped because: kasan: bad access detected
[   15.748384] 
[   15.748476] Memory state around the buggy address:
[   15.748886]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.749206]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.749685] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.750003]                                      ^
[   15.750238]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750851]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.751268] ==================================================================
[   16.109975] ==================================================================
[   16.110256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   16.111006] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.111403] 
[   16.111766] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.111816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.111830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.111852] Call Trace:
[   16.111872]  <TASK>
[   16.111889]  dump_stack_lvl+0x73/0xb0
[   16.111919]  print_report+0xd1/0x650
[   16.111941]  ? __virt_addr_valid+0x1db/0x2d0
[   16.111963]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.111984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.112010]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.112032]  kasan_report+0x141/0x180
[   16.112068]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.112095]  __asan_report_load4_noabort+0x18/0x20
[   16.112119]  kasan_atomics_helper+0x4a84/0x5450
[   16.112142]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.112165]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.112190]  ? kasan_atomics+0x152/0x310
[   16.112216]  kasan_atomics+0x1dc/0x310
[   16.112241]  ? __pfx_kasan_atomics+0x10/0x10
[   16.112265]  ? __pfx_read_tsc+0x10/0x10
[   16.112287]  ? ktime_get_ts64+0x86/0x230
[   16.112311]  kunit_try_run_case+0x1a5/0x480
[   16.112335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.112382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.112405]  ? __kthread_parkme+0x82/0x180
[   16.112426]  ? preempt_count_sub+0x50/0x80
[   16.112450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.112771]  kthread+0x337/0x6f0
[   16.112794]  ? trace_preempt_on+0x20/0xc0
[   16.112833]  ? __pfx_kthread+0x10/0x10
[   16.112854]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.112876]  ? calculate_sigpending+0x7b/0xa0
[   16.112900]  ? __pfx_kthread+0x10/0x10
[   16.112923]  ret_from_fork+0x116/0x1d0
[   16.112941]  ? __pfx_kthread+0x10/0x10
[   16.112963]  ret_from_fork_asm+0x1a/0x30
[   16.112995]  </TASK>
[   16.113006] 
[   16.125793] Allocated by task 282:
[   16.125933]  kasan_save_stack+0x45/0x70
[   16.126171]  kasan_save_track+0x18/0x40
[   16.126625]  kasan_save_alloc_info+0x3b/0x50
[   16.127021]  __kasan_kmalloc+0xb7/0xc0
[   16.128162]  __kmalloc_cache_noprof+0x189/0x420
[   16.128570]  kasan_atomics+0x95/0x310
[   16.128959]  kunit_try_run_case+0x1a5/0x480
[   16.129345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.129667]  kthread+0x337/0x6f0
[   16.130136]  ret_from_fork+0x116/0x1d0
[   16.130583]  ret_from_fork_asm+0x1a/0x30
[   16.130939] 
[   16.131014] The buggy address belongs to the object at ffff88810261fc00
[   16.131014]  which belongs to the cache kmalloc-64 of size 64
[   16.131870] The buggy address is located 0 bytes to the right of
[   16.131870]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.133576] 
[   16.133701] The buggy address belongs to the physical page:
[   16.133876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.134126] flags: 0x200000000000000(node=0|zone=2)
[   16.134343] page_type: f5(slab)
[   16.134657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.134995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.135506] page dumped because: kasan: bad access detected
[   16.136009] 
[   16.136119] Memory state around the buggy address:
[   16.136757]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.137246]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.137899] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.138190]                                      ^
[   16.138654]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139356]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139869] ==================================================================
[   15.969196] ==================================================================
[   15.969448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.970722] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.971213] 
[   15.972234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.972287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.972301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.972324] Call Trace:
[   15.972337]  <TASK>
[   15.972353]  dump_stack_lvl+0x73/0xb0
[   15.972382]  print_report+0xd1/0x650
[   15.972405]  ? __virt_addr_valid+0x1db/0x2d0
[   15.972428]  ? kasan_atomics_helper+0x992/0x5450
[   15.972450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.972475]  ? kasan_atomics_helper+0x992/0x5450
[   15.972496]  kasan_report+0x141/0x180
[   15.972518]  ? kasan_atomics_helper+0x992/0x5450
[   15.972545]  kasan_check_range+0x10c/0x1c0
[   15.972569]  __kasan_check_write+0x18/0x20
[   15.972589]  kasan_atomics_helper+0x992/0x5450
[   15.972612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.972634]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.972659]  ? kasan_atomics+0x152/0x310
[   15.972686]  kasan_atomics+0x1dc/0x310
[   15.972709]  ? __pfx_kasan_atomics+0x10/0x10
[   15.972733]  ? __pfx_read_tsc+0x10/0x10
[   15.972755]  ? ktime_get_ts64+0x86/0x230
[   15.972780]  kunit_try_run_case+0x1a5/0x480
[   15.972804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.972851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.972876]  ? __kthread_parkme+0x82/0x180
[   15.972896]  ? preempt_count_sub+0x50/0x80
[   15.972920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972994]  kthread+0x337/0x6f0
[   15.973014]  ? trace_preempt_on+0x20/0xc0
[   15.973037]  ? __pfx_kthread+0x10/0x10
[   15.973070]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.973092]  ? calculate_sigpending+0x7b/0xa0
[   15.973115]  ? __pfx_kthread+0x10/0x10
[   15.973139]  ret_from_fork+0x116/0x1d0
[   15.973157]  ? __pfx_kthread+0x10/0x10
[   15.973179]  ret_from_fork_asm+0x1a/0x30
[   15.973211]  </TASK>
[   15.973225] 
[   15.985917] Allocated by task 282:
[   15.986494]  kasan_save_stack+0x45/0x70
[   15.986702]  kasan_save_track+0x18/0x40
[   15.986860]  kasan_save_alloc_info+0x3b/0x50
[   15.987486]  __kasan_kmalloc+0xb7/0xc0
[   15.987798]  __kmalloc_cache_noprof+0x189/0x420
[   15.988012]  kasan_atomics+0x95/0x310
[   15.988443]  kunit_try_run_case+0x1a5/0x480
[   15.988681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.989029]  kthread+0x337/0x6f0
[   15.989370]  ret_from_fork+0x116/0x1d0
[   15.989559]  ret_from_fork_asm+0x1a/0x30
[   15.989899] 
[   15.990005] The buggy address belongs to the object at ffff88810261fc00
[   15.990005]  which belongs to the cache kmalloc-64 of size 64
[   15.990889] The buggy address is located 0 bytes to the right of
[   15.990889]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.991903] 
[   15.992007] The buggy address belongs to the physical page:
[   15.992389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.992865] flags: 0x200000000000000(node=0|zone=2)
[   15.993295] page_type: f5(slab)
[   15.993470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.994141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.994588] page dumped because: kasan: bad access detected
[   15.994926] 
[   15.995006] Memory state around the buggy address:
[   15.995283]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.995794]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996091] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.996418]                                      ^
[   15.997116]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997400]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997861] ==================================================================
[   16.238534] ==================================================================
[   16.239027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   16.239549] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.240418] 
[   16.240658] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.240706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.240719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.240742] Call Trace:
[   16.240759]  <TASK>
[   16.240789]  dump_stack_lvl+0x73/0xb0
[   16.240818]  print_report+0xd1/0x650
[   16.240840]  ? __virt_addr_valid+0x1db/0x2d0
[   16.240863]  ? kasan_atomics_helper+0xf10/0x5450
[   16.240884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.240911]  ? kasan_atomics_helper+0xf10/0x5450
[   16.240932]  kasan_report+0x141/0x180
[   16.240955]  ? kasan_atomics_helper+0xf10/0x5450
[   16.240982]  kasan_check_range+0x10c/0x1c0
[   16.241006]  __kasan_check_write+0x18/0x20
[   16.241025]  kasan_atomics_helper+0xf10/0x5450
[   16.241060]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.241083]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.241108]  ? kasan_atomics+0x152/0x310
[   16.241135]  kasan_atomics+0x1dc/0x310
[   16.241157]  ? __pfx_kasan_atomics+0x10/0x10
[   16.241181]  ? __pfx_read_tsc+0x10/0x10
[   16.241204]  ? ktime_get_ts64+0x86/0x230
[   16.241230]  kunit_try_run_case+0x1a5/0x480
[   16.241254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.241277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.241300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.241324]  ? __kthread_parkme+0x82/0x180
[   16.241345]  ? preempt_count_sub+0x50/0x80
[   16.241370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.241396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.241419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.241443]  kthread+0x337/0x6f0
[   16.241462]  ? trace_preempt_on+0x20/0xc0
[   16.241486]  ? __pfx_kthread+0x10/0x10
[   16.241544]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.241575]  ? calculate_sigpending+0x7b/0xa0
[   16.241599]  ? __pfx_kthread+0x10/0x10
[   16.241621]  ret_from_fork+0x116/0x1d0
[   16.241641]  ? __pfx_kthread+0x10/0x10
[   16.241662]  ret_from_fork_asm+0x1a/0x30
[   16.241694]  </TASK>
[   16.241705] 
[   16.252470] Allocated by task 282:
[   16.252666]  kasan_save_stack+0x45/0x70
[   16.252879]  kasan_save_track+0x18/0x40
[   16.253285]  kasan_save_alloc_info+0x3b/0x50
[   16.253519]  __kasan_kmalloc+0xb7/0xc0
[   16.253722]  __kmalloc_cache_noprof+0x189/0x420
[   16.253912]  kasan_atomics+0x95/0x310
[   16.254057]  kunit_try_run_case+0x1a5/0x480
[   16.254268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.254511]  kthread+0x337/0x6f0
[   16.254729]  ret_from_fork+0x116/0x1d0
[   16.254894]  ret_from_fork_asm+0x1a/0x30
[   16.255180] 
[   16.255269] The buggy address belongs to the object at ffff88810261fc00
[   16.255269]  which belongs to the cache kmalloc-64 of size 64
[   16.255625] The buggy address is located 0 bytes to the right of
[   16.255625]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.256192] 
[   16.256283] The buggy address belongs to the physical page:
[   16.256580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.256832] flags: 0x200000000000000(node=0|zone=2)
[   16.257016] page_type: f5(slab)
[   16.257389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.257877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.258428] page dumped because: kasan: bad access detected
[   16.258723] 
[   16.258814] Memory state around the buggy address:
[   16.259015]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.259382]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.259707] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.259981]                                      ^
[   16.260152]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.260372]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.260825] ==================================================================
[   16.988610] ==================================================================
[   16.988996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.989325] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.989694] 
[   16.989798] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.989840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.989853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.989907] Call Trace:
[   16.989922]  <TASK>
[   16.989938]  dump_stack_lvl+0x73/0xb0
[   16.989964]  print_report+0xd1/0x650
[   16.989986]  ? __virt_addr_valid+0x1db/0x2d0
[   16.990011]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.990076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.990102]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.990125]  kasan_report+0x141/0x180
[   16.990147]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.990206]  __asan_report_load8_noabort+0x18/0x20
[   16.990232]  kasan_atomics_helper+0x4f71/0x5450
[   16.990254]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.990276]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.990323]  ? kasan_atomics+0x152/0x310
[   16.990349]  kasan_atomics+0x1dc/0x310
[   16.990372]  ? __pfx_kasan_atomics+0x10/0x10
[   16.990397]  ? __pfx_read_tsc+0x10/0x10
[   16.990417]  ? ktime_get_ts64+0x86/0x230
[   16.990442]  kunit_try_run_case+0x1a5/0x480
[   16.990465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.990489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.990522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.990546]  ? __kthread_parkme+0x82/0x180
[   16.990567]  ? preempt_count_sub+0x50/0x80
[   16.990591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.990643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.990690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.990759]  kthread+0x337/0x6f0
[   16.990824]  ? trace_preempt_on+0x20/0xc0
[   16.990914]  ? __pfx_kthread+0x10/0x10
[   16.990959]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.990981]  ? calculate_sigpending+0x7b/0xa0
[   16.991005]  ? __pfx_kthread+0x10/0x10
[   16.991028]  ret_from_fork+0x116/0x1d0
[   16.991055]  ? __pfx_kthread+0x10/0x10
[   16.991077]  ret_from_fork_asm+0x1a/0x30
[   16.991109]  </TASK>
[   16.991120] 
[   16.999035] Allocated by task 282:
[   16.999250]  kasan_save_stack+0x45/0x70
[   16.999454]  kasan_save_track+0x18/0x40
[   16.999653]  kasan_save_alloc_info+0x3b/0x50
[   16.999885]  __kasan_kmalloc+0xb7/0xc0
[   17.000148]  __kmalloc_cache_noprof+0x189/0x420
[   17.000433]  kasan_atomics+0x95/0x310
[   17.000700]  kunit_try_run_case+0x1a5/0x480
[   17.000913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.001135]  kthread+0x337/0x6f0
[   17.001306]  ret_from_fork+0x116/0x1d0
[   17.001563]  ret_from_fork_asm+0x1a/0x30
[   17.001710] 
[   17.001822] The buggy address belongs to the object at ffff88810261fc00
[   17.001822]  which belongs to the cache kmalloc-64 of size 64
[   17.002363] The buggy address is located 0 bytes to the right of
[   17.002363]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.002934] 
[   17.003032] The buggy address belongs to the physical page:
[   17.003320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.003656] flags: 0x200000000000000(node=0|zone=2)
[   17.003917] page_type: f5(slab)
[   17.004083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.004448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.004803] page dumped because: kasan: bad access detected
[   17.005070] 
[   17.005160] Memory state around the buggy address:
[   17.005384]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.005792]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.006104] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.006456]                                      ^
[   17.006682]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.007002]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.007221] ==================================================================
[   16.341878] ==================================================================
[   16.342252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   16.342492] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.342826] 
[   16.342936] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.342978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.342991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.343012] Call Trace:
[   16.343027]  <TASK>
[   16.343055]  dump_stack_lvl+0x73/0xb0
[   16.343082]  print_report+0xd1/0x650
[   16.343103]  ? __virt_addr_valid+0x1db/0x2d0
[   16.343126]  ? kasan_atomics_helper+0x1148/0x5450
[   16.343148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.343174]  ? kasan_atomics_helper+0x1148/0x5450
[   16.343197]  kasan_report+0x141/0x180
[   16.343220]  ? kasan_atomics_helper+0x1148/0x5450
[   16.343246]  kasan_check_range+0x10c/0x1c0
[   16.343270]  __kasan_check_write+0x18/0x20
[   16.343290]  kasan_atomics_helper+0x1148/0x5450
[   16.343312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.343335]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.343359]  ? kasan_atomics+0x152/0x310
[   16.343385]  kasan_atomics+0x1dc/0x310
[   16.343408]  ? __pfx_kasan_atomics+0x10/0x10
[   16.343432]  ? __pfx_read_tsc+0x10/0x10
[   16.343453]  ? ktime_get_ts64+0x86/0x230
[   16.343477]  kunit_try_run_case+0x1a5/0x480
[   16.343501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.343523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.343547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.343570]  ? __kthread_parkme+0x82/0x180
[   16.343590]  ? preempt_count_sub+0x50/0x80
[   16.343614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.343638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.343661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.343684]  kthread+0x337/0x6f0
[   16.343704]  ? trace_preempt_on+0x20/0xc0
[   16.343726]  ? __pfx_kthread+0x10/0x10
[   16.343748]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.343770]  ? calculate_sigpending+0x7b/0xa0
[   16.343794]  ? __pfx_kthread+0x10/0x10
[   16.343816]  ret_from_fork+0x116/0x1d0
[   16.343835]  ? __pfx_kthread+0x10/0x10
[   16.343856]  ret_from_fork_asm+0x1a/0x30
[   16.343888]  </TASK>
[   16.343900] 
[   16.352021] Allocated by task 282:
[   16.352402]  kasan_save_stack+0x45/0x70
[   16.352622]  kasan_save_track+0x18/0x40
[   16.353006]  kasan_save_alloc_info+0x3b/0x50
[   16.353403]  __kasan_kmalloc+0xb7/0xc0
[   16.353633]  __kmalloc_cache_noprof+0x189/0x420
[   16.353853]  kasan_atomics+0x95/0x310
[   16.353987]  kunit_try_run_case+0x1a5/0x480
[   16.354282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354544]  kthread+0x337/0x6f0
[   16.354715]  ret_from_fork+0x116/0x1d0
[   16.354936]  ret_from_fork_asm+0x1a/0x30
[   16.355093] 
[   16.355193] The buggy address belongs to the object at ffff88810261fc00
[   16.355193]  which belongs to the cache kmalloc-64 of size 64
[   16.355674] The buggy address is located 0 bytes to the right of
[   16.355674]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.356333] 
[   16.356437] The buggy address belongs to the physical page:
[   16.356736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.357029] flags: 0x200000000000000(node=0|zone=2)
[   16.357282] page_type: f5(slab)
[   16.357435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.357938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.358330] page dumped because: kasan: bad access detected
[   16.358513] 
[   16.358610] Memory state around the buggy address:
[   16.358840]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359235]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359548] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.359836]                                      ^
[   16.360019]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360248]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360463] ==================================================================
[   17.142245] ==================================================================
[   17.142590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.142994] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.143414] 
[   17.143532] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.143576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.143589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.143611] Call Trace:
[   17.143624]  <TASK>
[   17.143640]  dump_stack_lvl+0x73/0xb0
[   17.143668]  print_report+0xd1/0x650
[   17.143690]  ? __virt_addr_valid+0x1db/0x2d0
[   17.143713]  ? kasan_atomics_helper+0x5115/0x5450
[   17.143773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.143799]  ? kasan_atomics_helper+0x5115/0x5450
[   17.143821]  kasan_report+0x141/0x180
[   17.143845]  ? kasan_atomics_helper+0x5115/0x5450
[   17.143872]  __asan_report_load8_noabort+0x18/0x20
[   17.143927]  kasan_atomics_helper+0x5115/0x5450
[   17.143953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.143976]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.144002]  ? kasan_atomics+0x152/0x310
[   17.144029]  kasan_atomics+0x1dc/0x310
[   17.144064]  ? __pfx_kasan_atomics+0x10/0x10
[   17.144118]  ? __pfx_read_tsc+0x10/0x10
[   17.144142]  ? ktime_get_ts64+0x86/0x230
[   17.144166]  kunit_try_run_case+0x1a5/0x480
[   17.144191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.144213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.144237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.144262]  ? __kthread_parkme+0x82/0x180
[   17.144282]  ? preempt_count_sub+0x50/0x80
[   17.144306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.144331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.144354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.144378]  kthread+0x337/0x6f0
[   17.144398]  ? trace_preempt_on+0x20/0xc0
[   17.144421]  ? __pfx_kthread+0x10/0x10
[   17.144442]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.144464]  ? calculate_sigpending+0x7b/0xa0
[   17.144488]  ? __pfx_kthread+0x10/0x10
[   17.144542]  ret_from_fork+0x116/0x1d0
[   17.144562]  ? __pfx_kthread+0x10/0x10
[   17.144582]  ret_from_fork_asm+0x1a/0x30
[   17.144614]  </TASK>
[   17.144626] 
[   17.152356] Allocated by task 282:
[   17.152484]  kasan_save_stack+0x45/0x70
[   17.152643]  kasan_save_track+0x18/0x40
[   17.152996]  kasan_save_alloc_info+0x3b/0x50
[   17.153331]  __kasan_kmalloc+0xb7/0xc0
[   17.153608]  __kmalloc_cache_noprof+0x189/0x420
[   17.153981]  kasan_atomics+0x95/0x310
[   17.154233]  kunit_try_run_case+0x1a5/0x480
[   17.154473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.154750]  kthread+0x337/0x6f0
[   17.154884]  ret_from_fork+0x116/0x1d0
[   17.155013]  ret_from_fork_asm+0x1a/0x30
[   17.155157] 
[   17.155228] The buggy address belongs to the object at ffff88810261fc00
[   17.155228]  which belongs to the cache kmalloc-64 of size 64
[   17.156272] The buggy address is located 0 bytes to the right of
[   17.156272]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.156912] 
[   17.157019] The buggy address belongs to the physical page:
[   17.157290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.157680] flags: 0x200000000000000(node=0|zone=2)
[   17.157848] page_type: f5(slab)
[   17.158065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.158409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.158802] page dumped because: kasan: bad access detected
[   17.159051] 
[   17.159169] Memory state around the buggy address:
[   17.159399]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.159745]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.160053] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.160368]                                      ^
[   17.160653]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.160994]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.161323] ==================================================================
[   16.689696] ==================================================================
[   16.690060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.690540] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.690879] 
[   16.691024] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.691076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.691089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.691109] Call Trace:
[   16.691125]  <TASK>
[   16.691140]  dump_stack_lvl+0x73/0xb0
[   16.691165]  print_report+0xd1/0x650
[   16.691187]  ? __virt_addr_valid+0x1db/0x2d0
[   16.691210]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.691230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.691258]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.691280]  kasan_report+0x141/0x180
[   16.691302]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.691329]  kasan_check_range+0x10c/0x1c0
[   16.691353]  __kasan_check_write+0x18/0x20
[   16.691372]  kasan_atomics_helper+0x18b1/0x5450
[   16.691395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.691417]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.691443]  ? kasan_atomics+0x152/0x310
[   16.691487]  kasan_atomics+0x1dc/0x310
[   16.691520]  ? __pfx_kasan_atomics+0x10/0x10
[   16.691545]  ? __pfx_read_tsc+0x10/0x10
[   16.691566]  ? ktime_get_ts64+0x86/0x230
[   16.691590]  kunit_try_run_case+0x1a5/0x480
[   16.691613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.691636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.691659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.691681]  ? __kthread_parkme+0x82/0x180
[   16.691702]  ? preempt_count_sub+0x50/0x80
[   16.691726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.691750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.691773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.691796]  kthread+0x337/0x6f0
[   16.691815]  ? trace_preempt_on+0x20/0xc0
[   16.691839]  ? __pfx_kthread+0x10/0x10
[   16.691859]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.691880]  ? calculate_sigpending+0x7b/0xa0
[   16.691903]  ? __pfx_kthread+0x10/0x10
[   16.691926]  ret_from_fork+0x116/0x1d0
[   16.691944]  ? __pfx_kthread+0x10/0x10
[   16.691964]  ret_from_fork_asm+0x1a/0x30
[   16.691996]  </TASK>
[   16.692008] 
[   16.699519] Allocated by task 282:
[   16.699678]  kasan_save_stack+0x45/0x70
[   16.699848]  kasan_save_track+0x18/0x40
[   16.699985]  kasan_save_alloc_info+0x3b/0x50
[   16.700145]  __kasan_kmalloc+0xb7/0xc0
[   16.700337]  __kmalloc_cache_noprof+0x189/0x420
[   16.700604]  kasan_atomics+0x95/0x310
[   16.700811]  kunit_try_run_case+0x1a5/0x480
[   16.701028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.701263]  kthread+0x337/0x6f0
[   16.701415]  ret_from_fork+0x116/0x1d0
[   16.701633]  ret_from_fork_asm+0x1a/0x30
[   16.701803] 
[   16.701875] The buggy address belongs to the object at ffff88810261fc00
[   16.701875]  which belongs to the cache kmalloc-64 of size 64
[   16.702239] The buggy address is located 0 bytes to the right of
[   16.702239]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.702649] 
[   16.702749] The buggy address belongs to the physical page:
[   16.702998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.703362] flags: 0x200000000000000(node=0|zone=2)
[   16.703723] page_type: f5(slab)
[   16.703894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.704252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.704706] page dumped because: kasan: bad access detected
[   16.704962] 
[   16.705066] Memory state around the buggy address:
[   16.705269]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.705583]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.705850] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.706141]                                      ^
[   16.706342]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.706643]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.706860] ==================================================================
[   16.710683] ==================================================================
[   16.710999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.711321] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.711625] 
[   16.711723] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.712109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.712125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.712148] Call Trace:
[   16.712162]  <TASK>
[   16.712178]  dump_stack_lvl+0x73/0xb0
[   16.712205]  print_report+0xd1/0x650
[   16.712227]  ? __virt_addr_valid+0x1db/0x2d0
[   16.712249]  ? kasan_atomics_helper+0x194a/0x5450
[   16.712270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.712297]  ? kasan_atomics_helper+0x194a/0x5450
[   16.712319]  kasan_report+0x141/0x180
[   16.712341]  ? kasan_atomics_helper+0x194a/0x5450
[   16.712368]  kasan_check_range+0x10c/0x1c0
[   16.712392]  __kasan_check_write+0x18/0x20
[   16.712412]  kasan_atomics_helper+0x194a/0x5450
[   16.712434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.712456]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.712482]  ? kasan_atomics+0x152/0x310
[   16.712510]  kasan_atomics+0x1dc/0x310
[   16.712532]  ? __pfx_kasan_atomics+0x10/0x10
[   16.712557]  ? __pfx_read_tsc+0x10/0x10
[   16.712578]  ? ktime_get_ts64+0x86/0x230
[   16.712682]  kunit_try_run_case+0x1a5/0x480
[   16.712709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.712731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.712755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.712779]  ? __kthread_parkme+0x82/0x180
[   16.712798]  ? preempt_count_sub+0x50/0x80
[   16.712823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.712847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.712870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.712894]  kthread+0x337/0x6f0
[   16.712914]  ? trace_preempt_on+0x20/0xc0
[   16.712936]  ? __pfx_kthread+0x10/0x10
[   16.712958]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.712979]  ? calculate_sigpending+0x7b/0xa0
[   16.713003]  ? __pfx_kthread+0x10/0x10
[   16.713025]  ret_from_fork+0x116/0x1d0
[   16.713054]  ? __pfx_kthread+0x10/0x10
[   16.713076]  ret_from_fork_asm+0x1a/0x30
[   16.713108]  </TASK>
[   16.713119] 
[   16.720682] Allocated by task 282:
[   16.720857]  kasan_save_stack+0x45/0x70
[   16.721035]  kasan_save_track+0x18/0x40
[   16.721274]  kasan_save_alloc_info+0x3b/0x50
[   16.721489]  __kasan_kmalloc+0xb7/0xc0
[   16.721702]  __kmalloc_cache_noprof+0x189/0x420
[   16.721909]  kasan_atomics+0x95/0x310
[   16.722051]  kunit_try_run_case+0x1a5/0x480
[   16.722199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.722420]  kthread+0x337/0x6f0
[   16.722642]  ret_from_fork+0x116/0x1d0
[   16.722854]  ret_from_fork_asm+0x1a/0x30
[   16.723084] 
[   16.723205] The buggy address belongs to the object at ffff88810261fc00
[   16.723205]  which belongs to the cache kmalloc-64 of size 64
[   16.723670] The buggy address is located 0 bytes to the right of
[   16.723670]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.724249] 
[   16.724347] The buggy address belongs to the physical page:
[   16.724627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.724983] flags: 0x200000000000000(node=0|zone=2)
[   16.725205] page_type: f5(slab)
[   16.725394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.725758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.726113] page dumped because: kasan: bad access detected
[   16.726350] 
[   16.726445] Memory state around the buggy address:
[   16.726699]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.726994]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.727309] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.727673]                                      ^
[   16.727959]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.728319]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.728662] ==================================================================
[   16.360857] ==================================================================
[   16.361369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   16.361723] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.361946] 
[   16.362028] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.362080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.362114] Call Trace:
[   16.362130]  <TASK>
[   16.362146]  dump_stack_lvl+0x73/0xb0
[   16.362220]  print_report+0xd1/0x650
[   16.362245]  ? __virt_addr_valid+0x1db/0x2d0
[   16.362269]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.362291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.362317]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.362339]  kasan_report+0x141/0x180
[   16.362361]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.362389]  __asan_report_load4_noabort+0x18/0x20
[   16.362414]  kasan_atomics_helper+0x4a02/0x5450
[   16.362436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.362458]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.362483]  ? kasan_atomics+0x152/0x310
[   16.362509]  kasan_atomics+0x1dc/0x310
[   16.362531]  ? __pfx_kasan_atomics+0x10/0x10
[   16.362557]  ? __pfx_read_tsc+0x10/0x10
[   16.362578]  ? ktime_get_ts64+0x86/0x230
[   16.362603]  kunit_try_run_case+0x1a5/0x480
[   16.362627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.362650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.362673]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.362697]  ? __kthread_parkme+0x82/0x180
[   16.362718]  ? preempt_count_sub+0x50/0x80
[   16.362742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.362767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.362790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.362813]  kthread+0x337/0x6f0
[   16.362834]  ? trace_preempt_on+0x20/0xc0
[   16.362856]  ? __pfx_kthread+0x10/0x10
[   16.362878]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.362900]  ? calculate_sigpending+0x7b/0xa0
[   16.362925]  ? __pfx_kthread+0x10/0x10
[   16.362948]  ret_from_fork+0x116/0x1d0
[   16.362967]  ? __pfx_kthread+0x10/0x10
[   16.362989]  ret_from_fork_asm+0x1a/0x30
[   16.363020]  </TASK>
[   16.363032] 
[   16.371357] Allocated by task 282:
[   16.371558]  kasan_save_stack+0x45/0x70
[   16.371753]  kasan_save_track+0x18/0x40
[   16.371903]  kasan_save_alloc_info+0x3b/0x50
[   16.372152]  __kasan_kmalloc+0xb7/0xc0
[   16.372401]  __kmalloc_cache_noprof+0x189/0x420
[   16.372639]  kasan_atomics+0x95/0x310
[   16.372820]  kunit_try_run_case+0x1a5/0x480
[   16.373008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.373283]  kthread+0x337/0x6f0
[   16.373445]  ret_from_fork+0x116/0x1d0
[   16.373634]  ret_from_fork_asm+0x1a/0x30
[   16.373900] 
[   16.373974] The buggy address belongs to the object at ffff88810261fc00
[   16.373974]  which belongs to the cache kmalloc-64 of size 64
[   16.374335] The buggy address is located 0 bytes to the right of
[   16.374335]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.374699] 
[   16.374772] The buggy address belongs to the physical page:
[   16.374943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.375553] flags: 0x200000000000000(node=0|zone=2)
[   16.375792] page_type: f5(slab)
[   16.375963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.376713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.377016] page dumped because: kasan: bad access detected
[   16.377604] 
[   16.377690] Memory state around the buggy address:
[   16.377918]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.378259]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.378483] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.378821]                                      ^
[   16.379105]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.379432]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.379806] ==================================================================
[   15.939462] ==================================================================
[   15.940247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.940745] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.941398] 
[   15.941497] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.941542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.941603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.941628] Call Trace:
[   15.941647]  <TASK>
[   15.941795]  dump_stack_lvl+0x73/0xb0
[   15.941830]  print_report+0xd1/0x650
[   15.941853]  ? __virt_addr_valid+0x1db/0x2d0
[   15.941877]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.941898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.941925]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.941947]  kasan_report+0x141/0x180
[   15.941970]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.941998]  kasan_check_range+0x10c/0x1c0
[   15.942022]  __kasan_check_write+0x18/0x20
[   15.942053]  kasan_atomics_helper+0x8f9/0x5450
[   15.942125]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.942149]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.942174]  ? kasan_atomics+0x152/0x310
[   15.942201]  kasan_atomics+0x1dc/0x310
[   15.942224]  ? __pfx_kasan_atomics+0x10/0x10
[   15.942249]  ? __pfx_read_tsc+0x10/0x10
[   15.942270]  ? ktime_get_ts64+0x86/0x230
[   15.942295]  kunit_try_run_case+0x1a5/0x480
[   15.942319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.942365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.942390]  ? __kthread_parkme+0x82/0x180
[   15.942412]  ? preempt_count_sub+0x50/0x80
[   15.942436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.942486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.942511]  kthread+0x337/0x6f0
[   15.942531]  ? trace_preempt_on+0x20/0xc0
[   15.942553]  ? __pfx_kthread+0x10/0x10
[   15.942574]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.942596]  ? calculate_sigpending+0x7b/0xa0
[   15.942619]  ? __pfx_kthread+0x10/0x10
[   15.942643]  ret_from_fork+0x116/0x1d0
[   15.942662]  ? __pfx_kthread+0x10/0x10
[   15.942684]  ret_from_fork_asm+0x1a/0x30
[   15.942715]  </TASK>
[   15.942728] 
[   15.955664] Allocated by task 282:
[   15.955862]  kasan_save_stack+0x45/0x70
[   15.956346]  kasan_save_track+0x18/0x40
[   15.956552]  kasan_save_alloc_info+0x3b/0x50
[   15.956850]  __kasan_kmalloc+0xb7/0xc0
[   15.957022]  __kmalloc_cache_noprof+0x189/0x420
[   15.957567]  kasan_atomics+0x95/0x310
[   15.957881]  kunit_try_run_case+0x1a5/0x480
[   15.958216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.958607]  kthread+0x337/0x6f0
[   15.958789]  ret_from_fork+0x116/0x1d0
[   15.959268]  ret_from_fork_asm+0x1a/0x30
[   15.959678] 
[   15.959785] The buggy address belongs to the object at ffff88810261fc00
[   15.959785]  which belongs to the cache kmalloc-64 of size 64
[   15.960627] The buggy address is located 0 bytes to the right of
[   15.960627]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.961543] 
[   15.961805] The buggy address belongs to the physical page:
[   15.962106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.962455] flags: 0x200000000000000(node=0|zone=2)
[   15.962928] page_type: f5(slab)
[   15.963339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.963843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.964468] page dumped because: kasan: bad access detected
[   15.964819] 
[   15.964927] Memory state around the buggy address:
[   15.965445]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.965949]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.966539] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.966978]                                      ^
[   15.967452]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.967902]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.968512] ==================================================================
[   17.083439] ==================================================================
[   17.083796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   17.084021] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.084611] 
[   17.084720] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.084761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.084774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.084795] Call Trace:
[   17.084809]  <TASK>
[   17.084823]  dump_stack_lvl+0x73/0xb0
[   17.084850]  print_report+0xd1/0x650
[   17.084871]  ? __virt_addr_valid+0x1db/0x2d0
[   17.084894]  ? kasan_atomics_helper+0x218a/0x5450
[   17.084914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.084940]  ? kasan_atomics_helper+0x218a/0x5450
[   17.084963]  kasan_report+0x141/0x180
[   17.084984]  ? kasan_atomics_helper+0x218a/0x5450
[   17.085011]  kasan_check_range+0x10c/0x1c0
[   17.085036]  __kasan_check_write+0x18/0x20
[   17.085066]  kasan_atomics_helper+0x218a/0x5450
[   17.085090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.085113]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.085139]  ? kasan_atomics+0x152/0x310
[   17.085166]  kasan_atomics+0x1dc/0x310
[   17.085189]  ? __pfx_kasan_atomics+0x10/0x10
[   17.085213]  ? __pfx_read_tsc+0x10/0x10
[   17.085234]  ? ktime_get_ts64+0x86/0x230
[   17.085257]  kunit_try_run_case+0x1a5/0x480
[   17.085282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.085304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.085327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.085351]  ? __kthread_parkme+0x82/0x180
[   17.085371]  ? preempt_count_sub+0x50/0x80
[   17.085395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.085420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.085443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.085467]  kthread+0x337/0x6f0
[   17.085486]  ? trace_preempt_on+0x20/0xc0
[   17.085509]  ? __pfx_kthread+0x10/0x10
[   17.085531]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.085557]  ? calculate_sigpending+0x7b/0xa0
[   17.085581]  ? __pfx_kthread+0x10/0x10
[   17.085603]  ret_from_fork+0x116/0x1d0
[   17.085622]  ? __pfx_kthread+0x10/0x10
[   17.085643]  ret_from_fork_asm+0x1a/0x30
[   17.085674]  </TASK>
[   17.085694] 
[   17.093377] Allocated by task 282:
[   17.093618]  kasan_save_stack+0x45/0x70
[   17.093853]  kasan_save_track+0x18/0x40
[   17.094094]  kasan_save_alloc_info+0x3b/0x50
[   17.094286]  __kasan_kmalloc+0xb7/0xc0
[   17.094438]  __kmalloc_cache_noprof+0x189/0x420
[   17.094789]  kasan_atomics+0x95/0x310
[   17.094995]  kunit_try_run_case+0x1a5/0x480
[   17.095243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.095497]  kthread+0x337/0x6f0
[   17.095669]  ret_from_fork+0x116/0x1d0
[   17.095854]  ret_from_fork_asm+0x1a/0x30
[   17.096035] 
[   17.096134] The buggy address belongs to the object at ffff88810261fc00
[   17.096134]  which belongs to the cache kmalloc-64 of size 64
[   17.096683] The buggy address is located 0 bytes to the right of
[   17.096683]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.097219] 
[   17.097323] The buggy address belongs to the physical page:
[   17.097598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.097953] flags: 0x200000000000000(node=0|zone=2)
[   17.098182] page_type: f5(slab)
[   17.098382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.098805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.099028] page dumped because: kasan: bad access detected
[   17.099286] 
[   17.099379] Memory state around the buggy address:
[   17.099724]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.100051]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.100346] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.100672]                                      ^
[   17.100964]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.101291]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.101542] ==================================================================
[   16.261397] ==================================================================
[   16.261951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   16.262280] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.262695] 
[   16.262804] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.262847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.262861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.262883] Call Trace:
[   16.262899]  <TASK>
[   16.262915]  dump_stack_lvl+0x73/0xb0
[   16.262942]  print_report+0xd1/0x650
[   16.262965]  ? __virt_addr_valid+0x1db/0x2d0
[   16.262988]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.263009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.263035]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.263123]  kasan_report+0x141/0x180
[   16.263148]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.263177]  kasan_check_range+0x10c/0x1c0
[   16.263202]  __kasan_check_write+0x18/0x20
[   16.263222]  kasan_atomics_helper+0xfa9/0x5450
[   16.263245]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.263267]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.263292]  ? kasan_atomics+0x152/0x310
[   16.263320]  kasan_atomics+0x1dc/0x310
[   16.263344]  ? __pfx_kasan_atomics+0x10/0x10
[   16.263368]  ? __pfx_read_tsc+0x10/0x10
[   16.263390]  ? ktime_get_ts64+0x86/0x230
[   16.263417]  kunit_try_run_case+0x1a5/0x480
[   16.263442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.263488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.263522]  ? __kthread_parkme+0x82/0x180
[   16.263543]  ? preempt_count_sub+0x50/0x80
[   16.263567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.263614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.263638]  kthread+0x337/0x6f0
[   16.263658]  ? trace_preempt_on+0x20/0xc0
[   16.263681]  ? __pfx_kthread+0x10/0x10
[   16.263703]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.263724]  ? calculate_sigpending+0x7b/0xa0
[   16.263748]  ? __pfx_kthread+0x10/0x10
[   16.263771]  ret_from_fork+0x116/0x1d0
[   16.263789]  ? __pfx_kthread+0x10/0x10
[   16.263811]  ret_from_fork_asm+0x1a/0x30
[   16.263843]  </TASK>
[   16.263856] 
[   16.272292] Allocated by task 282:
[   16.272488]  kasan_save_stack+0x45/0x70
[   16.272695]  kasan_save_track+0x18/0x40
[   16.272887]  kasan_save_alloc_info+0x3b/0x50
[   16.273237]  __kasan_kmalloc+0xb7/0xc0
[   16.273371]  __kmalloc_cache_noprof+0x189/0x420
[   16.273526]  kasan_atomics+0x95/0x310
[   16.273742]  kunit_try_run_case+0x1a5/0x480
[   16.273954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.274222]  kthread+0x337/0x6f0
[   16.274401]  ret_from_fork+0x116/0x1d0
[   16.274620]  ret_from_fork_asm+0x1a/0x30
[   16.274820] 
[   16.274902] The buggy address belongs to the object at ffff88810261fc00
[   16.274902]  which belongs to the cache kmalloc-64 of size 64
[   16.275302] The buggy address is located 0 bytes to the right of
[   16.275302]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.275768] 
[   16.275866] The buggy address belongs to the physical page:
[   16.276208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.276639] flags: 0x200000000000000(node=0|zone=2)
[   16.276847] page_type: f5(slab)
[   16.277014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.277428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.277756] page dumped because: kasan: bad access detected
[   16.277930] 
[   16.278002] Memory state around the buggy address:
[   16.278175]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278503]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278828] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.279382]                                      ^
[   16.279675]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279994]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.280449] ==================================================================
[   16.173192] ==================================================================
[   16.173919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   16.174384] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.174642] 
[   16.174730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.174772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.174786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.174807] Call Trace:
[   16.174825]  <TASK>
[   16.174842]  dump_stack_lvl+0x73/0xb0
[   16.174869]  print_report+0xd1/0x650
[   16.174892]  ? __virt_addr_valid+0x1db/0x2d0
[   16.174914]  ? kasan_atomics_helper+0xde0/0x5450
[   16.174935]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.174962]  ? kasan_atomics_helper+0xde0/0x5450
[   16.174983]  kasan_report+0x141/0x180
[   16.175005]  ? kasan_atomics_helper+0xde0/0x5450
[   16.175032]  kasan_check_range+0x10c/0x1c0
[   16.175080]  __kasan_check_write+0x18/0x20
[   16.175101]  kasan_atomics_helper+0xde0/0x5450
[   16.175124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.175146]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.175171]  ? kasan_atomics+0x152/0x310
[   16.175199]  kasan_atomics+0x1dc/0x310
[   16.175221]  ? __pfx_kasan_atomics+0x10/0x10
[   16.175246]  ? __pfx_read_tsc+0x10/0x10
[   16.175267]  ? ktime_get_ts64+0x86/0x230
[   16.175291]  kunit_try_run_case+0x1a5/0x480
[   16.175315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.175361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.175386]  ? __kthread_parkme+0x82/0x180
[   16.175406]  ? preempt_count_sub+0x50/0x80
[   16.175431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.175479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.175502]  kthread+0x337/0x6f0
[   16.175567]  ? trace_preempt_on+0x20/0xc0
[   16.175590]  ? __pfx_kthread+0x10/0x10
[   16.175612]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.175633]  ? calculate_sigpending+0x7b/0xa0
[   16.175657]  ? __pfx_kthread+0x10/0x10
[   16.175679]  ret_from_fork+0x116/0x1d0
[   16.175698]  ? __pfx_kthread+0x10/0x10
[   16.175719]  ret_from_fork_asm+0x1a/0x30
[   16.175751]  </TASK>
[   16.175763] 
[   16.190987] Allocated by task 282:
[   16.191360]  kasan_save_stack+0x45/0x70
[   16.191743]  kasan_save_track+0x18/0x40
[   16.192139]  kasan_save_alloc_info+0x3b/0x50
[   16.192482]  __kasan_kmalloc+0xb7/0xc0
[   16.192847]  __kmalloc_cache_noprof+0x189/0x420
[   16.193215]  kasan_atomics+0x95/0x310
[   16.193778]  kunit_try_run_case+0x1a5/0x480
[   16.194174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.194654]  kthread+0x337/0x6f0
[   16.194894]  ret_from_fork+0x116/0x1d0
[   16.195029]  ret_from_fork_asm+0x1a/0x30
[   16.195431] 
[   16.195591] The buggy address belongs to the object at ffff88810261fc00
[   16.195591]  which belongs to the cache kmalloc-64 of size 64
[   16.196744] The buggy address is located 0 bytes to the right of
[   16.196744]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.197269] 
[   16.197433] The buggy address belongs to the physical page:
[   16.197991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.198893] flags: 0x200000000000000(node=0|zone=2)
[   16.199441] page_type: f5(slab)
[   16.199770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.200314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.201137] page dumped because: kasan: bad access detected
[   16.201686] 
[   16.201849] Memory state around the buggy address:
[   16.202009]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.202746]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.203605] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.204249]                                      ^
[   16.204413]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.204872]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205568] ==================================================================
[   16.596650] ==================================================================
[   16.596906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.597152] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.597414] 
[   16.597821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.597872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.597890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.597912] Call Trace:
[   16.597929]  <TASK>
[   16.597944]  dump_stack_lvl+0x73/0xb0
[   16.597973]  print_report+0xd1/0x650
[   16.597995]  ? __virt_addr_valid+0x1db/0x2d0
[   16.598018]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.598052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.598079]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.598102]  kasan_report+0x141/0x180
[   16.598125]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.598153]  kasan_check_range+0x10c/0x1c0
[   16.598178]  __kasan_check_write+0x18/0x20
[   16.598197]  kasan_atomics_helper+0x15b6/0x5450
[   16.598221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.598243]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.598268]  ? kasan_atomics+0x152/0x310
[   16.598295]  kasan_atomics+0x1dc/0x310
[   16.598318]  ? __pfx_kasan_atomics+0x10/0x10
[   16.598343]  ? __pfx_read_tsc+0x10/0x10
[   16.598365]  ? ktime_get_ts64+0x86/0x230
[   16.598389]  kunit_try_run_case+0x1a5/0x480
[   16.598415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.598438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.598461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.598485]  ? __kthread_parkme+0x82/0x180
[   16.598517]  ? preempt_count_sub+0x50/0x80
[   16.598541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.598565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.598590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.598614]  kthread+0x337/0x6f0
[   16.598634]  ? trace_preempt_on+0x20/0xc0
[   16.598657]  ? __pfx_kthread+0x10/0x10
[   16.598680]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.598703]  ? calculate_sigpending+0x7b/0xa0
[   16.598729]  ? __pfx_kthread+0x10/0x10
[   16.598752]  ret_from_fork+0x116/0x1d0
[   16.598772]  ? __pfx_kthread+0x10/0x10
[   16.598793]  ret_from_fork_asm+0x1a/0x30
[   16.598826]  </TASK>
[   16.598838] 
[   16.606101] Allocated by task 282:
[   16.606281]  kasan_save_stack+0x45/0x70
[   16.606479]  kasan_save_track+0x18/0x40
[   16.606717]  kasan_save_alloc_info+0x3b/0x50
[   16.606868]  __kasan_kmalloc+0xb7/0xc0
[   16.607035]  __kmalloc_cache_noprof+0x189/0x420
[   16.607276]  kasan_atomics+0x95/0x310
[   16.607468]  kunit_try_run_case+0x1a5/0x480
[   16.607803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.608026]  kthread+0x337/0x6f0
[   16.608206]  ret_from_fork+0x116/0x1d0
[   16.608373]  ret_from_fork_asm+0x1a/0x30
[   16.608583] 
[   16.608674] The buggy address belongs to the object at ffff88810261fc00
[   16.608674]  which belongs to the cache kmalloc-64 of size 64
[   16.609056] The buggy address is located 0 bytes to the right of
[   16.609056]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.609621] 
[   16.609782] The buggy address belongs to the physical page:
[   16.609964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.610222] flags: 0x200000000000000(node=0|zone=2)
[   16.610389] page_type: f5(slab)
[   16.610512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.610780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.611126] page dumped because: kasan: bad access detected
[   16.611378] 
[   16.611487] Memory state around the buggy address:
[   16.611832]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.612061]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.612278] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.612492]                                      ^
[   16.612728]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.613059]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.613378] ==================================================================
[   15.588737] ==================================================================
[   15.588983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.589829] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   15.590572] 
[   15.590761] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.590804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.590816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.590838] Call Trace:
[   15.590862]  <TASK>
[   15.590878]  dump_stack_lvl+0x73/0xb0
[   15.590907]  print_report+0xd1/0x650
[   15.590940]  ? __virt_addr_valid+0x1db/0x2d0
[   15.590971]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.590991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.591016]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.591057]  kasan_report+0x141/0x180
[   15.591079]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.591103]  __asan_report_store4_noabort+0x1b/0x30
[   15.591128]  kasan_atomics_helper+0x4ba2/0x5450
[   15.591150]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.591171]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.591196]  ? kasan_atomics+0x152/0x310
[   15.591221]  kasan_atomics+0x1dc/0x310
[   15.591244]  ? __pfx_kasan_atomics+0x10/0x10
[   15.591268]  ? __pfx_read_tsc+0x10/0x10
[   15.591288]  ? ktime_get_ts64+0x86/0x230
[   15.591312]  kunit_try_run_case+0x1a5/0x480
[   15.591336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.591357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.591383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.591406]  ? __kthread_parkme+0x82/0x180
[   15.591425]  ? preempt_count_sub+0x50/0x80
[   15.591448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.591471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.591494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.591516]  kthread+0x337/0x6f0
[   15.591535]  ? trace_preempt_on+0x20/0xc0
[   15.591556]  ? __pfx_kthread+0x10/0x10
[   15.591577]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.591597]  ? calculate_sigpending+0x7b/0xa0
[   15.591620]  ? __pfx_kthread+0x10/0x10
[   15.591641]  ret_from_fork+0x116/0x1d0
[   15.591658]  ? __pfx_kthread+0x10/0x10
[   15.591678]  ret_from_fork_asm+0x1a/0x30
[   15.591708]  </TASK>
[   15.591719] 
[   15.608975] Allocated by task 282:
[   15.609948]  kasan_save_stack+0x45/0x70
[   15.610748]  kasan_save_track+0x18/0x40
[   15.611445]  kasan_save_alloc_info+0x3b/0x50
[   15.612264]  __kasan_kmalloc+0xb7/0xc0
[   15.612979]  __kmalloc_cache_noprof+0x189/0x420
[   15.613868]  kasan_atomics+0x95/0x310
[   15.614465]  kunit_try_run_case+0x1a5/0x480
[   15.615024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.615227]  kthread+0x337/0x6f0
[   15.615352]  ret_from_fork+0x116/0x1d0
[   15.615487]  ret_from_fork_asm+0x1a/0x30
[   15.615627] 
[   15.615701] The buggy address belongs to the object at ffff88810261fc00
[   15.615701]  which belongs to the cache kmalloc-64 of size 64
[   15.616075] The buggy address is located 0 bytes to the right of
[   15.616075]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   15.617838] 
[   15.618010] The buggy address belongs to the physical page:
[   15.618749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   15.619755] flags: 0x200000000000000(node=0|zone=2)
[   15.620374] page_type: f5(slab)
[   15.620796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.621694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.621991] page dumped because: kasan: bad access detected
[   15.622727] 
[   15.623088] Memory state around the buggy address:
[   15.623523]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.623750]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.623968] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.624245]                                      ^
[   15.625065]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.625873]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.626675] ==================================================================
[   16.206471] ==================================================================
[   16.206944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   16.207187] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.207886] 
[   16.208085] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.208130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.208182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.208205] Call Trace:
[   16.208223]  <TASK>
[   16.208240]  dump_stack_lvl+0x73/0xb0
[   16.208268]  print_report+0xd1/0x650
[   16.208291]  ? __virt_addr_valid+0x1db/0x2d0
[   16.208314]  ? kasan_atomics_helper+0xe78/0x5450
[   16.208335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.208361]  ? kasan_atomics_helper+0xe78/0x5450
[   16.208383]  kasan_report+0x141/0x180
[   16.208406]  ? kasan_atomics_helper+0xe78/0x5450
[   16.208432]  kasan_check_range+0x10c/0x1c0
[   16.208456]  __kasan_check_write+0x18/0x20
[   16.208476]  kasan_atomics_helper+0xe78/0x5450
[   16.208501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.208524]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.208549]  ? kasan_atomics+0x152/0x310
[   16.208576]  kasan_atomics+0x1dc/0x310
[   16.208599]  ? __pfx_kasan_atomics+0x10/0x10
[   16.208623]  ? __pfx_read_tsc+0x10/0x10
[   16.208645]  ? ktime_get_ts64+0x86/0x230
[   16.208670]  kunit_try_run_case+0x1a5/0x480
[   16.208695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.208718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.208741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.208764]  ? __kthread_parkme+0x82/0x180
[   16.208785]  ? preempt_count_sub+0x50/0x80
[   16.208810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.208834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.208858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.208882]  kthread+0x337/0x6f0
[   16.208902]  ? trace_preempt_on+0x20/0xc0
[   16.208925]  ? __pfx_kthread+0x10/0x10
[   16.208947]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.208969]  ? calculate_sigpending+0x7b/0xa0
[   16.208994]  ? __pfx_kthread+0x10/0x10
[   16.209016]  ret_from_fork+0x116/0x1d0
[   16.209035]  ? __pfx_kthread+0x10/0x10
[   16.209078]  ret_from_fork_asm+0x1a/0x30
[   16.209111]  </TASK>
[   16.209123] 
[   16.222945] Allocated by task 282:
[   16.223273]  kasan_save_stack+0x45/0x70
[   16.223760]  kasan_save_track+0x18/0x40
[   16.224185]  kasan_save_alloc_info+0x3b/0x50
[   16.224655]  __kasan_kmalloc+0xb7/0xc0
[   16.224987]  __kmalloc_cache_noprof+0x189/0x420
[   16.225525]  kasan_atomics+0x95/0x310
[   16.225687]  kunit_try_run_case+0x1a5/0x480
[   16.225836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.226012]  kthread+0x337/0x6f0
[   16.226289]  ret_from_fork+0x116/0x1d0
[   16.226670]  ret_from_fork_asm+0x1a/0x30
[   16.227320] 
[   16.227491] The buggy address belongs to the object at ffff88810261fc00
[   16.227491]  which belongs to the cache kmalloc-64 of size 64
[   16.228689] The buggy address is located 0 bytes to the right of
[   16.228689]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.230008] 
[   16.230137] The buggy address belongs to the physical page:
[   16.230593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.231271] flags: 0x200000000000000(node=0|zone=2)
[   16.231448] page_type: f5(slab)
[   16.231645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.232489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.233229] page dumped because: kasan: bad access detected
[   16.233796] 
[   16.234005] Memory state around the buggy address:
[   16.234402]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.234899]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.235319] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.235928]                                      ^
[   16.236407]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.236985]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.237602] ==================================================================
[   17.007672] ==================================================================
[   17.008419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   17.008804] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   17.009182] 
[   17.009290] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.009362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.009375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.009397] Call Trace:
[   17.009411]  <TASK>
[   17.009426]  dump_stack_lvl+0x73/0xb0
[   17.009484]  print_report+0xd1/0x650
[   17.009506]  ? __virt_addr_valid+0x1db/0x2d0
[   17.009528]  ? kasan_atomics_helper+0x2006/0x5450
[   17.009549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.009579]  ? kasan_atomics_helper+0x2006/0x5450
[   17.009602]  kasan_report+0x141/0x180
[   17.009624]  ? kasan_atomics_helper+0x2006/0x5450
[   17.009652]  kasan_check_range+0x10c/0x1c0
[   17.009675]  __kasan_check_write+0x18/0x20
[   17.009695]  kasan_atomics_helper+0x2006/0x5450
[   17.009719]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.009743]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.009768]  ? kasan_atomics+0x152/0x310
[   17.009795]  kasan_atomics+0x1dc/0x310
[   17.009817]  ? __pfx_kasan_atomics+0x10/0x10
[   17.009841]  ? __pfx_read_tsc+0x10/0x10
[   17.009862]  ? ktime_get_ts64+0x86/0x230
[   17.009886]  kunit_try_run_case+0x1a5/0x480
[   17.009910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.009933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.009955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.009980]  ? __kthread_parkme+0x82/0x180
[   17.010001]  ? preempt_count_sub+0x50/0x80
[   17.010025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.010059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.010082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.010106]  kthread+0x337/0x6f0
[   17.010126]  ? trace_preempt_on+0x20/0xc0
[   17.010149]  ? __pfx_kthread+0x10/0x10
[   17.010170]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.010192]  ? calculate_sigpending+0x7b/0xa0
[   17.010215]  ? __pfx_kthread+0x10/0x10
[   17.010237]  ret_from_fork+0x116/0x1d0
[   17.010256]  ? __pfx_kthread+0x10/0x10
[   17.010277]  ret_from_fork_asm+0x1a/0x30
[   17.010320]  </TASK>
[   17.010333] 
[   17.018678] Allocated by task 282:
[   17.018850]  kasan_save_stack+0x45/0x70
[   17.019037]  kasan_save_track+0x18/0x40
[   17.019271]  kasan_save_alloc_info+0x3b/0x50
[   17.019452]  __kasan_kmalloc+0xb7/0xc0
[   17.019703]  __kmalloc_cache_noprof+0x189/0x420
[   17.019911]  kasan_atomics+0x95/0x310
[   17.020142]  kunit_try_run_case+0x1a5/0x480
[   17.020352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.020628]  kthread+0x337/0x6f0
[   17.020810]  ret_from_fork+0x116/0x1d0
[   17.021000]  ret_from_fork_asm+0x1a/0x30
[   17.021211] 
[   17.021310] The buggy address belongs to the object at ffff88810261fc00
[   17.021310]  which belongs to the cache kmalloc-64 of size 64
[   17.021917] The buggy address is located 0 bytes to the right of
[   17.021917]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   17.022366] 
[   17.022498] The buggy address belongs to the physical page:
[   17.022754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   17.023134] flags: 0x200000000000000(node=0|zone=2)
[   17.023375] page_type: f5(slab)
[   17.023553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.023905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.024235] page dumped because: kasan: bad access detected
[   17.024483] 
[   17.024607] Memory state around the buggy address:
[   17.024813]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025138]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025444] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.025813]                                      ^
[   17.026054]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.026349]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.026866] ==================================================================
[   16.672454] ==================================================================
[   16.672792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.673027] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282
[   16.673372] 
[   16.673497] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.673538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.673558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.673580] Call Trace:
[   16.673594]  <TASK>
[   16.673609]  dump_stack_lvl+0x73/0xb0
[   16.673635]  print_report+0xd1/0x650
[   16.673656]  ? __virt_addr_valid+0x1db/0x2d0
[   16.673679]  ? kasan_atomics_helper+0x1818/0x5450
[   16.673700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.673726]  ? kasan_atomics_helper+0x1818/0x5450
[   16.673748]  kasan_report+0x141/0x180
[   16.673770]  ? kasan_atomics_helper+0x1818/0x5450
[   16.673797]  kasan_check_range+0x10c/0x1c0
[   16.673820]  __kasan_check_write+0x18/0x20
[   16.673839]  kasan_atomics_helper+0x1818/0x5450
[   16.673862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.673884]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.673909]  ? kasan_atomics+0x152/0x310
[   16.673937]  kasan_atomics+0x1dc/0x310
[   16.673960]  ? __pfx_kasan_atomics+0x10/0x10
[   16.673984]  ? __pfx_read_tsc+0x10/0x10
[   16.674005]  ? ktime_get_ts64+0x86/0x230
[   16.674028]  kunit_try_run_case+0x1a5/0x480
[   16.674063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.674085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.674109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.674132]  ? __kthread_parkme+0x82/0x180
[   16.674153]  ? preempt_count_sub+0x50/0x80
[   16.674178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.674204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.674227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.674251]  kthread+0x337/0x6f0
[   16.674270]  ? trace_preempt_on+0x20/0xc0
[   16.674292]  ? __pfx_kthread+0x10/0x10
[   16.674314]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.674334]  ? calculate_sigpending+0x7b/0xa0
[   16.674358]  ? __pfx_kthread+0x10/0x10
[   16.674381]  ret_from_fork+0x116/0x1d0
[   16.674401]  ? __pfx_kthread+0x10/0x10
[   16.674422]  ret_from_fork_asm+0x1a/0x30
[   16.674454]  </TASK>
[   16.674466] 
[   16.681939] Allocated by task 282:
[   16.682104]  kasan_save_stack+0x45/0x70
[   16.682297]  kasan_save_track+0x18/0x40
[   16.682433]  kasan_save_alloc_info+0x3b/0x50
[   16.682584]  __kasan_kmalloc+0xb7/0xc0
[   16.682777]  __kmalloc_cache_noprof+0x189/0x420
[   16.683161]  kasan_atomics+0x95/0x310
[   16.683333]  kunit_try_run_case+0x1a5/0x480
[   16.683527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.683740]  kthread+0x337/0x6f0
[   16.683901]  ret_from_fork+0x116/0x1d0
[   16.684057]  ret_from_fork_asm+0x1a/0x30
[   16.684261] 
[   16.684359] The buggy address belongs to the object at ffff88810261fc00
[   16.684359]  which belongs to the cache kmalloc-64 of size 64
[   16.684852] The buggy address is located 0 bytes to the right of
[   16.684852]  allocated 48-byte region [ffff88810261fc00, ffff88810261fc30)
[   16.685230] 
[   16.685303] The buggy address belongs to the physical page:
[   16.685477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   16.685722] flags: 0x200000000000000(node=0|zone=2)
[   16.685885] page_type: f5(slab)
[   16.686024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.686656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.686992] page dumped because: kasan: bad access detected
[   16.687252] 
[   16.687347] Memory state around the buggy address:
[   16.687534]  ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.687800]  ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.688019] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.688242]                                      ^
[   16.688398]  ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.688616]  ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.689073] ==================================================================