Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.024374] ==================================================================
[   20.024587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.024669] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.025001] 
[   20.025055] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.025428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.025671] Hardware name: linux,dummy-virt (DT)
[   20.025723] Call trace:
[   20.025751]  show_stack+0x20/0x38 (C)
[   20.025982]  dump_stack_lvl+0x8c/0xd0
[   20.026085]  print_report+0x118/0x5d0
[   20.026186]  kasan_report+0xdc/0x128
[   20.026240]  kasan_check_range+0x100/0x1a8
[   20.026290]  __kasan_check_write+0x20/0x30
[   20.026351]  kasan_atomics_helper+0xf88/0x4858
[   20.026404]  kasan_atomics+0x198/0x2e0
[   20.026665]  kunit_try_run_case+0x170/0x3f0
[   20.026933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.027134]  kthread+0x328/0x630
[   20.027198]  ret_from_fork+0x10/0x20
[   20.027250] 
[   20.027704] Allocated by task 265:
[   20.028031]  kasan_save_stack+0x3c/0x68
[   20.028125]  kasan_save_track+0x20/0x40
[   20.028295]  kasan_save_alloc_info+0x40/0x58
[   20.028340]  __kasan_kmalloc+0xd4/0xd8
[   20.028382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.028430]  kasan_atomics+0xb8/0x2e0
[   20.028469]  kunit_try_run_case+0x170/0x3f0
[   20.028875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.029508]  kthread+0x328/0x630
[   20.029604]  ret_from_fork+0x10/0x20
[   20.030011] 
[   20.030064] The buggy address belongs to the object at fff00000c799a780
[   20.030064]  which belongs to the cache kmalloc-64 of size 64
[   20.030175] The buggy address is located 0 bytes to the right of
[   20.030175]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.030263] 
[   20.030306] The buggy address belongs to the physical page:
[   20.030582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.030974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.031414] page_type: f5(slab)
[   20.031520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.031575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.031649] page dumped because: kasan: bad access detected
[   20.031968] 
[   20.032265] Memory state around the buggy address:
[   20.032411]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.032460]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.032507] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.033176]                                      ^
[   20.033356]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.033701]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.034143] ==================================================================
[   20.194048] ==================================================================
[   20.194108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.194162] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.194214] 
[   20.194250] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.194332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.194360] Hardware name: linux,dummy-virt (DT)
[   20.194394] Call trace:
[   20.194418]  show_stack+0x20/0x38 (C)
[   20.194468]  dump_stack_lvl+0x8c/0xd0
[   20.194519]  print_report+0x118/0x5d0
[   20.195752]  kasan_report+0xdc/0x128
[   20.195826]  __asan_report_load8_noabort+0x20/0x30
[   20.195894]  kasan_atomics_helper+0x3e10/0x4858
[   20.195996]  kasan_atomics+0x198/0x2e0
[   20.196163]  kunit_try_run_case+0x170/0x3f0
[   20.196559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.196629]  kthread+0x328/0x630
[   20.196703]  ret_from_fork+0x10/0x20
[   20.196823] 
[   20.196863] Allocated by task 265:
[   20.196896]  kasan_save_stack+0x3c/0x68
[   20.196941]  kasan_save_track+0x20/0x40
[   20.196981]  kasan_save_alloc_info+0x40/0x58
[   20.197023]  __kasan_kmalloc+0xd4/0xd8
[   20.197603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.197658]  kasan_atomics+0xb8/0x2e0
[   20.197697]  kunit_try_run_case+0x170/0x3f0
[   20.197899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.197983]  kthread+0x328/0x630
[   20.198018]  ret_from_fork+0x10/0x20
[   20.198186] 
[   20.198568] The buggy address belongs to the object at fff00000c799a780
[   20.198568]  which belongs to the cache kmalloc-64 of size 64
[   20.198658] The buggy address is located 0 bytes to the right of
[   20.198658]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.198726] 
[   20.199336] The buggy address belongs to the physical page:
[   20.199405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.199464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.199539] page_type: f5(slab)
[   20.199583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.199874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.199922] page dumped because: kasan: bad access detected
[   20.200089] 
[   20.200357] Memory state around the buggy address:
[   20.200400]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.200566]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.200617] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.200657]                                      ^
[   20.200885]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.200995]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201319] ==================================================================
[   20.141206] ==================================================================
[   20.141344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.141392] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.141442] 
[   20.141472] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.141560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.141587] Hardware name: linux,dummy-virt (DT)
[   20.141618] Call trace:
[   20.141641]  show_stack+0x20/0x38 (C)
[   20.141690]  dump_stack_lvl+0x8c/0xd0
[   20.141808]  print_report+0x118/0x5d0
[   20.141868]  kasan_report+0xdc/0x128
[   20.141914]  kasan_check_range+0x100/0x1a8
[   20.141963]  __kasan_check_write+0x20/0x30
[   20.142009]  kasan_atomics_helper+0x14e4/0x4858
[   20.142057]  kasan_atomics+0x198/0x2e0
[   20.142103]  kunit_try_run_case+0x170/0x3f0
[   20.142151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.142203]  kthread+0x328/0x630
[   20.142258]  ret_from_fork+0x10/0x20
[   20.142518] 
[   20.142546] Allocated by task 265:
[   20.142635]  kasan_save_stack+0x3c/0x68
[   20.142678]  kasan_save_track+0x20/0x40
[   20.142716]  kasan_save_alloc_info+0x40/0x58
[   20.142758]  __kasan_kmalloc+0xd4/0xd8
[   20.142795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.142835]  kasan_atomics+0xb8/0x2e0
[   20.142882]  kunit_try_run_case+0x170/0x3f0
[   20.142939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.142982]  kthread+0x328/0x630
[   20.143021]  ret_from_fork+0x10/0x20
[   20.143220] 
[   20.143310] The buggy address belongs to the object at fff00000c799a780
[   20.143310]  which belongs to the cache kmalloc-64 of size 64
[   20.143436] The buggy address is located 0 bytes to the right of
[   20.143436]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.143528] 
[   20.143556] The buggy address belongs to the physical page:
[   20.143677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.143735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.144323] page_type: f5(slab)
[   20.144434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.144537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.144608] page dumped because: kasan: bad access detected
[   20.144641] 
[   20.144661] Memory state around the buggy address:
[   20.144695]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.144740]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.144783] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.144822]                                      ^
[   20.144868]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.144909]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.144948] ==================================================================
[   20.184925] ==================================================================
[   20.185591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.185801] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.185964] 
[   20.186357] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.186456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.186485] Hardware name: linux,dummy-virt (DT)
[   20.186589] Call trace:
[   20.186918]  show_stack+0x20/0x38 (C)
[   20.187086]  dump_stack_lvl+0x8c/0xd0
[   20.187140]  print_report+0x118/0x5d0
[   20.187199]  kasan_report+0xdc/0x128
[   20.187246]  kasan_check_range+0x100/0x1a8
[   20.187659]  __kasan_check_write+0x20/0x30
[   20.187721]  kasan_atomics_helper+0x16d0/0x4858
[   20.188155]  kasan_atomics+0x198/0x2e0
[   20.188473]  kunit_try_run_case+0x170/0x3f0
[   20.188523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.188578]  kthread+0x328/0x630
[   20.188622]  ret_from_fork+0x10/0x20
[   20.188804] 
[   20.188832] Allocated by task 265:
[   20.188878]  kasan_save_stack+0x3c/0x68
[   20.188926]  kasan_save_track+0x20/0x40
[   20.189508]  kasan_save_alloc_info+0x40/0x58
[   20.189690]  __kasan_kmalloc+0xd4/0xd8
[   20.189729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.189950]  kasan_atomics+0xb8/0x2e0
[   20.189987]  kunit_try_run_case+0x170/0x3f0
[   20.190028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.190073]  kthread+0x328/0x630
[   20.190110]  ret_from_fork+0x10/0x20
[   20.190641] 
[   20.190669] The buggy address belongs to the object at fff00000c799a780
[   20.190669]  which belongs to the cache kmalloc-64 of size 64
[   20.190731] The buggy address is located 0 bytes to the right of
[   20.190731]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.191394] 
[   20.191423] The buggy address belongs to the physical page:
[   20.191460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.191652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.191928] page_type: f5(slab)
[   20.192243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.192299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.192345] page dumped because: kasan: bad access detected
[   20.192409] 
[   20.192432] Memory state around the buggy address:
[   20.192467]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.192736]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.192976] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.193022]                                      ^
[   20.193060]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.193298]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.193341] ==================================================================
[   20.035213] ==================================================================
[   20.035706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.036056] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.036210] 
[   20.036279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.036572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.036608] Hardware name: linux,dummy-virt (DT)
[   20.037027] Call trace:
[   20.037144]  show_stack+0x20/0x38 (C)
[   20.037421]  dump_stack_lvl+0x8c/0xd0
[   20.037541]  print_report+0x118/0x5d0
[   20.037657]  kasan_report+0xdc/0x128
[   20.038099]  kasan_check_range+0x100/0x1a8
[   20.038391]  __kasan_check_write+0x20/0x30
[   20.038535]  kasan_atomics_helper+0xff0/0x4858
[   20.038591]  kasan_atomics+0x198/0x2e0
[   20.039199]  kunit_try_run_case+0x170/0x3f0
[   20.039411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.039632]  kthread+0x328/0x630
[   20.039728]  ret_from_fork+0x10/0x20
[   20.039863] 
[   20.039886] Allocated by task 265:
[   20.039927]  kasan_save_stack+0x3c/0x68
[   20.040309]  kasan_save_track+0x20/0x40
[   20.040610]  kasan_save_alloc_info+0x40/0x58
[   20.041084]  __kasan_kmalloc+0xd4/0xd8
[   20.041269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.041445]  kasan_atomics+0xb8/0x2e0
[   20.041507]  kunit_try_run_case+0x170/0x3f0
[   20.041555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.041599]  kthread+0x328/0x630
[   20.041643]  ret_from_fork+0x10/0x20
[   20.041685] 
[   20.041726] The buggy address belongs to the object at fff00000c799a780
[   20.041726]  which belongs to the cache kmalloc-64 of size 64
[   20.041796] The buggy address is located 0 bytes to the right of
[   20.041796]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.041898] 
[   20.041938] The buggy address belongs to the physical page:
[   20.041981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.042054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.042108] page_type: f5(slab)
[   20.042176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.042232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.042276] page dumped because: kasan: bad access detected
[   20.042311] 
[   20.042342] Memory state around the buggy address:
[   20.042379]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.042423]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.042469] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.042510]                                      ^
[   20.042547]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.042590]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.042640] ==================================================================
[   20.165644] ==================================================================
[   20.165713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.165772] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.165823] 
[   20.166605] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.166861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.167257] Hardware name: linux,dummy-virt (DT)
[   20.167444] Call trace:
[   20.167473]  show_stack+0x20/0x38 (C)
[   20.167529]  dump_stack_lvl+0x8c/0xd0
[   20.167594]  print_report+0x118/0x5d0
[   20.167643]  kasan_report+0xdc/0x128
[   20.168072]  kasan_check_range+0x100/0x1a8
[   20.168129]  __kasan_check_write+0x20/0x30
[   20.168184]  kasan_atomics_helper+0x1644/0x4858
[   20.168235]  kasan_atomics+0x198/0x2e0
[   20.168451]  kunit_try_run_case+0x170/0x3f0
[   20.168512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.168577]  kthread+0x328/0x630
[   20.168871]  ret_from_fork+0x10/0x20
[   20.169509] 
[   20.169535] Allocated by task 265:
[   20.169570]  kasan_save_stack+0x3c/0x68
[   20.169992]  kasan_save_track+0x20/0x40
[   20.170225]  kasan_save_alloc_info+0x40/0x58
[   20.170270]  __kasan_kmalloc+0xd4/0xd8
[   20.170725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.170893]  kasan_atomics+0xb8/0x2e0
[   20.170933]  kunit_try_run_case+0x170/0x3f0
[   20.171328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.171388]  kthread+0x328/0x630
[   20.171676]  ret_from_fork+0x10/0x20
[   20.171729] 
[   20.172090] The buggy address belongs to the object at fff00000c799a780
[   20.172090]  which belongs to the cache kmalloc-64 of size 64
[   20.172184] The buggy address is located 0 bytes to the right of
[   20.172184]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.172252] 
[   20.172566] The buggy address belongs to the physical page:
[   20.172628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.173135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.173229] page_type: f5(slab)
[   20.173578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.173998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.174059] page dumped because: kasan: bad access detected
[   20.174095] 
[   20.174117] Memory state around the buggy address:
[   20.174153]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.174198]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.174243] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.174283]                                      ^
[   20.174319]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.174363]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.174403] ==================================================================
[   20.133000] ==================================================================
[   20.133061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.133112] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.133252] 
[   20.133425] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.133853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.133945] Hardware name: linux,dummy-virt (DT)
[   20.133977] Call trace:
[   20.134038]  show_stack+0x20/0x38 (C)
[   20.134282]  dump_stack_lvl+0x8c/0xd0
[   20.134434]  print_report+0x118/0x5d0
[   20.134593]  kasan_report+0xdc/0x128
[   20.134694]  kasan_check_range+0x100/0x1a8
[   20.134772]  __kasan_check_write+0x20/0x30
[   20.134884]  kasan_atomics_helper+0x1414/0x4858
[   20.134934]  kasan_atomics+0x198/0x2e0
[   20.134981]  kunit_try_run_case+0x170/0x3f0
[   20.135032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.135086]  kthread+0x328/0x630
[   20.135128]  ret_from_fork+0x10/0x20
[   20.135178] 
[   20.135199] Allocated by task 265:
[   20.135229]  kasan_save_stack+0x3c/0x68
[   20.135270]  kasan_save_track+0x20/0x40
[   20.135353]  kasan_save_alloc_info+0x40/0x58
[   20.135395]  __kasan_kmalloc+0xd4/0xd8
[   20.135434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.135474]  kasan_atomics+0xb8/0x2e0
[   20.135511]  kunit_try_run_case+0x170/0x3f0
[   20.135550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.135595]  kthread+0x328/0x630
[   20.135629]  ret_from_fork+0x10/0x20
[   20.135665] 
[   20.135687] The buggy address belongs to the object at fff00000c799a780
[   20.135687]  which belongs to the cache kmalloc-64 of size 64
[   20.135771] The buggy address is located 0 bytes to the right of
[   20.135771]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.135837] 
[   20.135867] The buggy address belongs to the physical page:
[   20.135901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.135956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.136004] page_type: f5(slab)
[   20.136053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.136106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.136149] page dumped because: kasan: bad access detected
[   20.136183] 
[   20.136203] Memory state around the buggy address:
[   20.136237]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.136293]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.136470] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.136512]                                      ^
[   20.136613]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.136668]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.136708] ==================================================================
[   20.007873] ==================================================================
[   20.007937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.008003] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.008054] 
[   20.008092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.008686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.008838] Hardware name: linux,dummy-virt (DT)
[   20.009011] Call trace:
[   20.009070]  show_stack+0x20/0x38 (C)
[   20.009134]  dump_stack_lvl+0x8c/0xd0
[   20.009195]  print_report+0x118/0x5d0
[   20.009278]  kasan_report+0xdc/0x128
[   20.009329]  kasan_check_range+0x100/0x1a8
[   20.009379]  __kasan_check_write+0x20/0x30
[   20.009608]  kasan_atomics_helper+0xeb8/0x4858
[   20.009950]  kasan_atomics+0x198/0x2e0
[   20.010117]  kunit_try_run_case+0x170/0x3f0
[   20.010244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.010307]  kthread+0x328/0x630
[   20.010381]  ret_from_fork+0x10/0x20
[   20.010435] 
[   20.010456] Allocated by task 265:
[   20.010497]  kasan_save_stack+0x3c/0x68
[   20.010543]  kasan_save_track+0x20/0x40
[   20.010583]  kasan_save_alloc_info+0x40/0x58
[   20.010625]  __kasan_kmalloc+0xd4/0xd8
[   20.010662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.010704]  kasan_atomics+0xb8/0x2e0
[   20.010742]  kunit_try_run_case+0x170/0x3f0
[   20.010780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.010825]  kthread+0x328/0x630
[   20.011108]  ret_from_fork+0x10/0x20
[   20.011153] 
[   20.011459] The buggy address belongs to the object at fff00000c799a780
[   20.011459]  which belongs to the cache kmalloc-64 of size 64
[   20.012127] The buggy address is located 0 bytes to the right of
[   20.012127]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.012237] 
[   20.012294] The buggy address belongs to the physical page:
[   20.012360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.012655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.012976] page_type: f5(slab)
[   20.013303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.013763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.013973] page dumped because: kasan: bad access detected
[   20.014124] 
[   20.014337] Memory state around the buggy address:
[   20.014733]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.014979]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.015031] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.015643]                                      ^
[   20.015701]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.016050]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.016268] ==================================================================
[   20.136967] ==================================================================
[   20.137020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.137070] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.137119] 
[   20.137150] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.137232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.137259] Hardware name: linux,dummy-virt (DT)
[   20.137291] Call trace:
[   20.137315]  show_stack+0x20/0x38 (C)
[   20.137436]  dump_stack_lvl+0x8c/0xd0
[   20.137552]  print_report+0x118/0x5d0
[   20.137646]  kasan_report+0xdc/0x128
[   20.138007]  kasan_check_range+0x100/0x1a8
[   20.138061]  __kasan_check_write+0x20/0x30
[   20.138106]  kasan_atomics_helper+0x147c/0x4858
[   20.138155]  kasan_atomics+0x198/0x2e0
[   20.138201]  kunit_try_run_case+0x170/0x3f0
[   20.138249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.138302]  kthread+0x328/0x630
[   20.138345]  ret_from_fork+0x10/0x20
[   20.138391] 
[   20.138413] Allocated by task 265:
[   20.138441]  kasan_save_stack+0x3c/0x68
[   20.138483]  kasan_save_track+0x20/0x40
[   20.138521]  kasan_save_alloc_info+0x40/0x58
[   20.138563]  __kasan_kmalloc+0xd4/0xd8
[   20.138600]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.138650]  kasan_atomics+0xb8/0x2e0
[   20.138832]  kunit_try_run_case+0x170/0x3f0
[   20.139543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.139609]  kthread+0x328/0x630
[   20.139778]  ret_from_fork+0x10/0x20
[   20.139852] 
[   20.139874] The buggy address belongs to the object at fff00000c799a780
[   20.139874]  which belongs to the cache kmalloc-64 of size 64
[   20.140033] The buggy address is located 0 bytes to the right of
[   20.140033]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.140098] 
[   20.140129] The buggy address belongs to the physical page:
[   20.140275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.140328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.140376] page_type: f5(slab)
[   20.140414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.140466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.140509] page dumped because: kasan: bad access detected
[   20.140541] 
[   20.140561] Memory state around the buggy address:
[   20.140594]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.140638]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.140682] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.140721]                                      ^
[   20.140756]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.140798]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.140838] ==================================================================
[   19.955397] ==================================================================
[   19.955569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.955863] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.956053] 
[   19.956224] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.956312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.956342] Hardware name: linux,dummy-virt (DT)
[   19.956617] Call trace:
[   19.956659]  show_stack+0x20/0x38 (C)
[   19.956714]  dump_stack_lvl+0x8c/0xd0
[   19.956942]  print_report+0x118/0x5d0
[   19.957038]  kasan_report+0xdc/0x128
[   19.957200]  __asan_report_load4_noabort+0x20/0x30
[   19.957289]  kasan_atomics_helper+0x3e04/0x4858
[   19.957412]  kasan_atomics+0x198/0x2e0
[   19.957460]  kunit_try_run_case+0x170/0x3f0
[   19.957700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.957954]  kthread+0x328/0x630
[   19.958208]  ret_from_fork+0x10/0x20
[   19.958326] 
[   19.958435] Allocated by task 265:
[   19.958851]  kasan_save_stack+0x3c/0x68
[   19.958963]  kasan_save_track+0x20/0x40
[   19.959072]  kasan_save_alloc_info+0x40/0x58
[   19.959217]  __kasan_kmalloc+0xd4/0xd8
[   19.959255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.959329]  kasan_atomics+0xb8/0x2e0
[   19.959579]  kunit_try_run_case+0x170/0x3f0
[   19.959885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960056]  kthread+0x328/0x630
[   19.960133]  ret_from_fork+0x10/0x20
[   19.960181] 
[   19.960203] The buggy address belongs to the object at fff00000c799a780
[   19.960203]  which belongs to the cache kmalloc-64 of size 64
[   19.960268] The buggy address is located 0 bytes to the right of
[   19.960268]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.960482] 
[   19.960827] The buggy address belongs to the physical page:
[   19.960926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.961129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.961213] page_type: f5(slab)
[   19.961594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.961861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.962117] page dumped because: kasan: bad access detected
[   19.962183] 
[   19.962313] Memory state around the buggy address:
[   19.962395]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.962481]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.962608] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.962854]                                      ^
[   19.963116]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.963256]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.963391] ==================================================================
[   19.964162] ==================================================================
[   19.964583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.965406] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.965750] 
[   19.965811] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.965911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.965939] Hardware name: linux,dummy-virt (DT)
[   19.965973] Call trace:
[   19.965999]  show_stack+0x20/0x38 (C)
[   19.966055]  dump_stack_lvl+0x8c/0xd0
[   19.966362]  print_report+0x118/0x5d0
[   19.966439]  kasan_report+0xdc/0x128
[   19.966838]  kasan_check_range+0x100/0x1a8
[   19.966902]  __kasan_check_read+0x20/0x30
[   19.967396]  kasan_atomics_helper+0xdd4/0x4858
[   19.967798]  kasan_atomics+0x198/0x2e0
[   19.968025]  kunit_try_run_case+0x170/0x3f0
[   19.968201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.968400]  kthread+0x328/0x630
[   19.968486]  ret_from_fork+0x10/0x20
[   19.968680] 
[   19.968778] Allocated by task 265:
[   19.968969]  kasan_save_stack+0x3c/0x68
[   19.969116]  kasan_save_track+0x20/0x40
[   19.969189]  kasan_save_alloc_info+0x40/0x58
[   19.969376]  __kasan_kmalloc+0xd4/0xd8
[   19.969425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.969598]  kasan_atomics+0xb8/0x2e0
[   19.969647]  kunit_try_run_case+0x170/0x3f0
[   19.969689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.969736]  kthread+0x328/0x630
[   19.969771]  ret_from_fork+0x10/0x20
[   19.969812] 
[   19.969837] The buggy address belongs to the object at fff00000c799a780
[   19.969837]  which belongs to the cache kmalloc-64 of size 64
[   19.970624] The buggy address is located 0 bytes to the right of
[   19.970624]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.970907] 
[   19.971135] The buggy address belongs to the physical page:
[   19.971416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.971516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.971822] page_type: f5(slab)
[   19.972103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.972194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.972656] page dumped because: kasan: bad access detected
[   19.972829] 
[   19.972901] Memory state around the buggy address:
[   19.973168]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.973446]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.973667] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.974029]                                      ^
[   19.974146]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.974233]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.974309] ==================================================================
[   20.202654] ==================================================================
[   20.202727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.202788] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.203454] 
[   20.203512] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.203608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.203638] Hardware name: linux,dummy-virt (DT)
[   20.203696] Call trace:
[   20.203724]  show_stack+0x20/0x38 (C)
[   20.203787]  dump_stack_lvl+0x8c/0xd0
[   20.203839]  print_report+0x118/0x5d0
[   20.204409]  kasan_report+0xdc/0x128
[   20.204481]  kasan_check_range+0x100/0x1a8
[   20.204533]  __kasan_check_write+0x20/0x30
[   20.205115]  kasan_atomics_helper+0x175c/0x4858
[   20.205430]  kasan_atomics+0x198/0x2e0
[   20.205493]  kunit_try_run_case+0x170/0x3f0
[   20.205551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.205606]  kthread+0x328/0x630
[   20.206207]  ret_from_fork+0x10/0x20
[   20.206373] 
[   20.206397] Allocated by task 265:
[   20.206951]  kasan_save_stack+0x3c/0x68
[   20.207018]  kasan_save_track+0x20/0x40
[   20.207416]  kasan_save_alloc_info+0x40/0x58
[   20.207464]  __kasan_kmalloc+0xd4/0xd8
[   20.207503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.207696]  kasan_atomics+0xb8/0x2e0
[   20.207776]  kunit_try_run_case+0x170/0x3f0
[   20.208087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.208398]  kthread+0x328/0x630
[   20.208625]  ret_from_fork+0x10/0x20
[   20.208796] 
[   20.208950] The buggy address belongs to the object at fff00000c799a780
[   20.208950]  which belongs to the cache kmalloc-64 of size 64
[   20.209351] The buggy address is located 0 bytes to the right of
[   20.209351]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.209662] 
[   20.209694] The buggy address belongs to the physical page:
[   20.209732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.210398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.210646] page_type: f5(slab)
[   20.210803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.210899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.211064] page dumped because: kasan: bad access detected
[   20.211356] 
[   20.211386] Memory state around the buggy address:
[   20.211427]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.211474]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.211520] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.211732]                                      ^
[   20.211821]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212007]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212055] ==================================================================
[   19.880427] ==================================================================
[   19.880541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.880799] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.880871] 
[   19.881065] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.881163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.881191] Hardware name: linux,dummy-virt (DT)
[   19.881235] Call trace:
[   19.881412]  show_stack+0x20/0x38 (C)
[   19.881491]  dump_stack_lvl+0x8c/0xd0
[   19.881545]  print_report+0x118/0x5d0
[   19.882005]  kasan_report+0xdc/0x128
[   19.882165]  __asan_report_load4_noabort+0x20/0x30
[   19.883091] Allocated by task 265:
[   19.883227]  kasan_save_stack+0x3c/0x68
[   19.884247]  kunit_try_run_case+0x170/0x3f0
[   19.885545] The buggy address is located 0 bytes to the right of
[   19.885545]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.886422] page_type: f5(slab)
[   19.886868] page dumped because: kasan: bad access detected
[   19.887613]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.889945] ==================================================================
[   19.838325] ==================================================================
[   19.838387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.838442] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.839043] 
[   19.839232] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.839632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.839898] Hardware name: linux,dummy-virt (DT)
[   19.840059] Call trace:
[   19.840192]  show_stack+0x20/0x38 (C)
[   19.840313]  dump_stack_lvl+0x8c/0xd0
[   19.840407]  print_report+0x118/0x5d0
[   19.840483]  kasan_report+0xdc/0x128
[   19.840675]  kasan_check_range+0x100/0x1a8
[   19.841328]  kasan_atomics+0x198/0x2e0
[   19.841551]  kunit_try_run_case+0x170/0x3f0
[   19.841651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.841918]  kthread+0x328/0x630
[   19.842253] 
[   19.842961]  kasan_save_alloc_info+0x40/0x58
[   19.843483]  kunit_try_run_case+0x170/0x3f0
[   19.844008]  ret_from_fork+0x10/0x20
[   19.844248] The buggy address is located 0 bytes to the right of
[   19.844248]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.845761] 
[   19.846585]                                      ^
[   19.847151] ==================================================================
[   20.213365] ==================================================================
[   20.213483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.213627] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.214015] 
[   20.214192] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.214280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.214778] Hardware name: linux,dummy-virt (DT)
[   20.214917] Call trace:
[   20.214945]  show_stack+0x20/0x38 (C)
[   20.215016]  dump_stack_lvl+0x8c/0xd0
[   20.215207]  print_report+0x118/0x5d0
[   20.215257]  kasan_report+0xdc/0x128
[   20.215837]  __asan_report_load8_noabort+0x20/0x30
[   20.216018]  kasan_atomics_helper+0x3e20/0x4858
[   20.216069]  kasan_atomics+0x198/0x2e0
[   20.216118]  kunit_try_run_case+0x170/0x3f0
[   20.216168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.216224]  kthread+0x328/0x630
[   20.216386]  ret_from_fork+0x10/0x20
[   20.216466] 
[   20.216558] Allocated by task 265:
[   20.216644]  kasan_save_stack+0x3c/0x68
[   20.216718]  kasan_save_track+0x20/0x40
[   20.216757]  kasan_save_alloc_info+0x40/0x58
[   20.217303]  __kasan_kmalloc+0xd4/0xd8
[   20.217657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.218027]  kasan_atomics+0xb8/0x2e0
[   20.218141]  kunit_try_run_case+0x170/0x3f0
[   20.218331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.218601]  kthread+0x328/0x630
[   20.218928]  ret_from_fork+0x10/0x20
[   20.219392] 
[   20.219469] The buggy address belongs to the object at fff00000c799a780
[   20.219469]  which belongs to the cache kmalloc-64 of size 64
[   20.219822] The buggy address is located 0 bytes to the right of
[   20.219822]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.220174] 
[   20.220290] The buggy address belongs to the physical page:
[   20.220327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.220506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.220781] page_type: f5(slab)
[   20.220839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.221015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.221347] page dumped because: kasan: bad access detected
[   20.221458] 
[   20.221619] Memory state around the buggy address:
[   20.221873]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.221950]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.222346] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.222570]                                      ^
[   20.222858]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.222923]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.223085] ==================================================================
[   19.752307] ==================================================================
[   19.754717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   19.754923] 
[   19.755347] Hardware name: linux,dummy-virt (DT)
[   19.756444]  kasan_atomics_helper+0x5b4/0x4858
[   19.756597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.759406] 
[   19.759505] The buggy address belongs to the physical page:
[   19.760290] page_type: f5(slab)
[   19.761249]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.761418] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.761944]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.764077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   19.764645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.766216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.767869]  __kasan_kmalloc+0xd4/0xd8
[   19.769308] 
[   19.769453] The buggy address belongs to the physical page:
[   19.769821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.770099] page_type: f5(slab)
[   19.770494] page dumped because: kasan: bad access detected
[   19.771103]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.773399] ==================================================================
[   19.937659] ==================================================================
[   19.937872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.937943] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.938303] 
[   19.938552] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.938995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.939077] Hardware name: linux,dummy-virt (DT)
[   19.939188] Call trace:
[   19.939217]  show_stack+0x20/0x38 (C)
[   19.939281]  dump_stack_lvl+0x8c/0xd0
[   19.939585]  print_report+0x118/0x5d0
[   19.939783]  kasan_report+0xdc/0x128
[   19.939906]  __asan_report_load4_noabort+0x20/0x30
[   19.940290]  kasan_atomics_helper+0x3dd8/0x4858
[   19.940437]  kasan_atomics+0x198/0x2e0
[   19.940560]  kunit_try_run_case+0x170/0x3f0
[   19.940634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.941138]  kthread+0x328/0x630
[   19.941565]  ret_from_fork+0x10/0x20
[   19.941718] 
[   19.941871] Allocated by task 265:
[   19.942104]  kasan_save_stack+0x3c/0x68
[   19.942386]  kasan_save_track+0x20/0x40
[   19.942719]  kasan_save_alloc_info+0x40/0x58
[   19.942865]  __kasan_kmalloc+0xd4/0xd8
[   19.943256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.943543]  kasan_atomics+0xb8/0x2e0
[   19.943593]  kunit_try_run_case+0x170/0x3f0
[   19.943876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.944038]  kthread+0x328/0x630
[   19.944196]  ret_from_fork+0x10/0x20
[   19.944241] 
[   19.944322] The buggy address belongs to the object at fff00000c799a780
[   19.944322]  which belongs to the cache kmalloc-64 of size 64
[   19.944697] The buggy address is located 0 bytes to the right of
[   19.944697]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.944934] 
[   19.944971] The buggy address belongs to the physical page:
[   19.945212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.945279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.945576] page_type: f5(slab)
[   19.945982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.946257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.946448] page dumped because: kasan: bad access detected
[   19.946676] 
[   19.946764] Memory state around the buggy address:
[   19.946891]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.946939]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.947317] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.947380]                                      ^
[   19.947431]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.947539]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.947581] ==================================================================
[   20.155112] ==================================================================
[   20.155188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.155251] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.155625] 
[   20.155860] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.156307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.156454] Hardware name: linux,dummy-virt (DT)
[   20.156490] Call trace:
[   20.156834]  show_stack+0x20/0x38 (C)
[   20.157253]  dump_stack_lvl+0x8c/0xd0
[   20.157669]  print_report+0x118/0x5d0
[   20.157787]  kasan_report+0xdc/0x128
[   20.157835]  __asan_report_load8_noabort+0x20/0x30
[   20.158018]  kasan_atomics_helper+0x3db0/0x4858
[   20.158070]  kasan_atomics+0x198/0x2e0
[   20.158125]  kunit_try_run_case+0x170/0x3f0
[   20.158176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.158231]  kthread+0x328/0x630
[   20.158275]  ret_from_fork+0x10/0x20
[   20.158328] 
[   20.159088] Allocated by task 265:
[   20.159634]  kasan_save_stack+0x3c/0x68
[   20.159859]  kasan_save_track+0x20/0x40
[   20.159902]  kasan_save_alloc_info+0x40/0x58
[   20.159943]  __kasan_kmalloc+0xd4/0xd8
[   20.160252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.160550]  kasan_atomics+0xb8/0x2e0
[   20.161201]  kunit_try_run_case+0x170/0x3f0
[   20.161695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.161948]  kthread+0x328/0x630
[   20.161985]  ret_from_fork+0x10/0x20
[   20.162234] 
[   20.162287] The buggy address belongs to the object at fff00000c799a780
[   20.162287]  which belongs to the cache kmalloc-64 of size 64
[   20.162353] The buggy address is located 0 bytes to the right of
[   20.162353]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.162420] 
[   20.162444] The buggy address belongs to the physical page:
[   20.162480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.163014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.163086] page_type: f5(slab)
[   20.163132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.163354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.163402] page dumped because: kasan: bad access detected
[   20.163578] 
[   20.163615] Memory state around the buggy address:
[   20.163653]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.163700]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.164081] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.164131]                                      ^
[   20.164407]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.164487]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.164657] ==================================================================
[   20.223986] ==================================================================
[   20.224049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.224106] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.224158] 
[   20.224198] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.224280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.224310] Hardware name: linux,dummy-virt (DT)
[   20.224344] Call trace:
[   20.225042]  show_stack+0x20/0x38 (C)
[   20.225127]  dump_stack_lvl+0x8c/0xd0
[   20.225193]  print_report+0x118/0x5d0
[   20.225622]  kasan_report+0xdc/0x128
[   20.225807]  kasan_check_range+0x100/0x1a8
[   20.226114]  __kasan_check_write+0x20/0x30
[   20.226278]  kasan_atomics_helper+0x17ec/0x4858
[   20.226332]  kasan_atomics+0x198/0x2e0
[   20.226379]  kunit_try_run_case+0x170/0x3f0
[   20.226900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.226984]  kthread+0x328/0x630
[   20.227031]  ret_from_fork+0x10/0x20
[   20.227082] 
[   20.227104] Allocated by task 265:
[   20.227136]  kasan_save_stack+0x3c/0x68
[   20.227894]  kasan_save_track+0x20/0x40
[   20.228134]  kasan_save_alloc_info+0x40/0x58
[   20.228192]  __kasan_kmalloc+0xd4/0xd8
[   20.228269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.228322]  kasan_atomics+0xb8/0x2e0
[   20.228541]  kunit_try_run_case+0x170/0x3f0
[   20.228887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.229095]  kthread+0x328/0x630
[   20.229132]  ret_from_fork+0x10/0x20
[   20.229170] 
[   20.229195] The buggy address belongs to the object at fff00000c799a780
[   20.229195]  which belongs to the cache kmalloc-64 of size 64
[   20.229954] The buggy address is located 0 bytes to the right of
[   20.229954]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.230309] 
[   20.230494] The buggy address belongs to the physical page:
[   20.230536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.231059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.231301] page_type: f5(slab)
[   20.231520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.232068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.232334] page dumped because: kasan: bad access detected
[   20.232384] 
[   20.232406] Memory state around the buggy address:
[   20.232865]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.232917]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.233199] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.233244]                                      ^
[   20.233281]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.233788]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.234333] ==================================================================
[   20.055687] ==================================================================
[   20.055984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.056056] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.056108] 
[   20.056151] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.056893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.057030] Hardware name: linux,dummy-virt (DT)
[   20.057079] Call trace:
[   20.057237]  show_stack+0x20/0x38 (C)
[   20.057412]  dump_stack_lvl+0x8c/0xd0
[   20.057585]  print_report+0x118/0x5d0
[   20.057839]  kasan_report+0xdc/0x128
[   20.058157]  kasan_check_range+0x100/0x1a8
[   20.058411]  __kasan_check_write+0x20/0x30
[   20.058518]  kasan_atomics_helper+0x10c0/0x4858
[   20.058666]  kasan_atomics+0x198/0x2e0
[   20.058717]  kunit_try_run_case+0x170/0x3f0
[   20.059114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.059680]  kthread+0x328/0x630
[   20.059878]  ret_from_fork+0x10/0x20
[   20.060005] 
[   20.060028] Allocated by task 265:
[   20.060061]  kasan_save_stack+0x3c/0x68
[   20.060107]  kasan_save_track+0x20/0x40
[   20.060153]  kasan_save_alloc_info+0x40/0x58
[   20.060433]  __kasan_kmalloc+0xd4/0xd8
[   20.060870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.061139]  kasan_atomics+0xb8/0x2e0
[   20.061235]  kunit_try_run_case+0x170/0x3f0
[   20.061411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.061567]  kthread+0x328/0x630
[   20.061607]  ret_from_fork+0x10/0x20
[   20.061684] 
[   20.061940] The buggy address belongs to the object at fff00000c799a780
[   20.061940]  which belongs to the cache kmalloc-64 of size 64
[   20.062140] The buggy address is located 0 bytes to the right of
[   20.062140]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.062377] 
[   20.062709] The buggy address belongs to the physical page:
[   20.062771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.063075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.063223] page_type: f5(slab)
[   20.063291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.063346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.063391] page dumped because: kasan: bad access detected
[   20.063425] 
[   20.063455] Memory state around the buggy address:
[   20.063499]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.063545]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.063591] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.063633]                                      ^
[   20.063671]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.063714]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.063763] ==================================================================
[   19.995171] ==================================================================
[   19.995239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.995302] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.995354] 
[   19.995389] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.995754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.996492] Hardware name: linux,dummy-virt (DT)
[   19.996714] Call trace:
[   19.996782]  show_stack+0x20/0x38 (C)
[   19.996921]  dump_stack_lvl+0x8c/0xd0
[   19.996977]  print_report+0x118/0x5d0
[   19.997265]  kasan_report+0xdc/0x128
[   19.997437]  __asan_report_store8_noabort+0x20/0x30
[   19.997959]  kasan_atomics_helper+0x3e5c/0x4858
[   19.998075]  kasan_atomics+0x198/0x2e0
[   19.998210]  kunit_try_run_case+0x170/0x3f0
[   19.998322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.998543]  kthread+0x328/0x630
[   19.998807]  ret_from_fork+0x10/0x20
[   19.999200] 
[   19.999238] Allocated by task 265:
[   19.999400]  kasan_save_stack+0x3c/0x68
[   19.999922]  kasan_save_track+0x20/0x40
[   19.999993]  kasan_save_alloc_info+0x40/0x58
[   20.000598]  __kasan_kmalloc+0xd4/0xd8
[   20.000664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.000984]  kasan_atomics+0xb8/0x2e0
[   20.001054]  kunit_try_run_case+0x170/0x3f0
[   20.001116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.001192]  kthread+0x328/0x630
[   20.001451]  ret_from_fork+0x10/0x20
[   20.001600] 
[   20.001684] The buggy address belongs to the object at fff00000c799a780
[   20.001684]  which belongs to the cache kmalloc-64 of size 64
[   20.001933] The buggy address is located 0 bytes to the right of
[   20.001933]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.002237] 
[   20.002384] The buggy address belongs to the physical page:
[   20.002632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.003042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.003467] page_type: f5(slab)
[   20.003522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.003879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.004305] page dumped because: kasan: bad access detected
[   20.004362] 
[   20.004383] Memory state around the buggy address:
[   20.004560]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.005143]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.005490] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.005765]                                      ^
[   20.006084]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.006326]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.006392] ==================================================================
[   20.087164] ==================================================================
[   20.087226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.087280] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.087667] 
[   20.088046] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.088195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.088226] Hardware name: linux,dummy-virt (DT)
[   20.088393] Call trace:
[   20.088611]  show_stack+0x20/0x38 (C)
[   20.088934]  dump_stack_lvl+0x8c/0xd0
[   20.089123]  print_report+0x118/0x5d0
[   20.089240]  kasan_report+0xdc/0x128
[   20.089361]  kasan_check_range+0x100/0x1a8
[   20.089624]  __kasan_check_write+0x20/0x30
[   20.090271]  kasan_atomics_helper+0x11f8/0x4858
[   20.090434]  kasan_atomics+0x198/0x2e0
[   20.090580]  kunit_try_run_case+0x170/0x3f0
[   20.090663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.091204]  kthread+0x328/0x630
[   20.091504]  ret_from_fork+0x10/0x20
[   20.091648] 
[   20.091727] Allocated by task 265:
[   20.091803]  kasan_save_stack+0x3c/0x68
[   20.091978]  kasan_save_track+0x20/0x40
[   20.092034]  kasan_save_alloc_info+0x40/0x58
[   20.092257]  __kasan_kmalloc+0xd4/0xd8
[   20.092413]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.092538]  kasan_atomics+0xb8/0x2e0
[   20.092780]  kunit_try_run_case+0x170/0x3f0
[   20.092999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.093115]  kthread+0x328/0x630
[   20.093221]  ret_from_fork+0x10/0x20
[   20.093290] 
[   20.093472] The buggy address belongs to the object at fff00000c799a780
[   20.093472]  which belongs to the cache kmalloc-64 of size 64
[   20.093607] The buggy address is located 0 bytes to the right of
[   20.093607]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.093812] 
[   20.094031] The buggy address belongs to the physical page:
[   20.094189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.094389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.094648] page_type: f5(slab)
[   20.094979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.095275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.095363] page dumped because: kasan: bad access detected
[   20.095674] 
[   20.095762] Memory state around the buggy address:
[   20.095994]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.096079]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.096334] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.096443]                                      ^
[   20.096919]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.097001]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.097200] ==================================================================
[   20.148813] ==================================================================
[   20.148923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.148976] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.149026] 
[   20.149060] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.149142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.149169] Hardware name: linux,dummy-virt (DT)
[   20.149201] Call trace:
[   20.149224]  show_stack+0x20/0x38 (C)
[   20.149273]  dump_stack_lvl+0x8c/0xd0
[   20.149332]  print_report+0x118/0x5d0
[   20.149381]  kasan_report+0xdc/0x128
[   20.149426]  kasan_check_range+0x100/0x1a8
[   20.149482]  __kasan_check_write+0x20/0x30
[   20.149529]  kasan_atomics_helper+0x15b4/0x4858
[   20.149577]  kasan_atomics+0x198/0x2e0
[   20.149707]  kunit_try_run_case+0x170/0x3f0
[   20.149758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.149811]  kthread+0x328/0x630
[   20.149864]  ret_from_fork+0x10/0x20
[   20.149913] 
[   20.149934] Allocated by task 265:
[   20.149971]  kasan_save_stack+0x3c/0x68
[   20.150014]  kasan_save_track+0x20/0x40
[   20.150052]  kasan_save_alloc_info+0x40/0x58
[   20.150094]  __kasan_kmalloc+0xd4/0xd8
[   20.150131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.150172]  kasan_atomics+0xb8/0x2e0
[   20.150239]  kunit_try_run_case+0x170/0x3f0
[   20.150444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.150670]  kthread+0x328/0x630
[   20.150920]  ret_from_fork+0x10/0x20
[   20.151136] 
[   20.151240] The buggy address belongs to the object at fff00000c799a780
[   20.151240]  which belongs to the cache kmalloc-64 of size 64
[   20.151570] The buggy address is located 0 bytes to the right of
[   20.151570]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.151641] 
[   20.151708] The buggy address belongs to the physical page:
[   20.151802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.151913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.152067] page_type: f5(slab)
[   20.152108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.152676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.152735] page dumped because: kasan: bad access detected
[   20.152771] 
[   20.152791] Memory state around the buggy address:
[   20.152828]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.153169]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.153216] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.153329]                                      ^
[   20.153368]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.153595]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.153636] ==================================================================
[   20.107624] ==================================================================
[   20.108022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.108111] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.108164] 
[   20.108307] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.108404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.108516] Hardware name: linux,dummy-virt (DT)
[   20.108553] Call trace:
[   20.108589]  show_stack+0x20/0x38 (C)
[   20.108643]  dump_stack_lvl+0x8c/0xd0
[   20.109162]  print_report+0x118/0x5d0
[   20.109293]  kasan_report+0xdc/0x128
[   20.109582]  kasan_check_range+0x100/0x1a8
[   20.109710]  __kasan_check_write+0x20/0x30
[   20.109773]  kasan_atomics_helper+0x12d8/0x4858
[   20.110156]  kasan_atomics+0x198/0x2e0
[   20.110339]  kunit_try_run_case+0x170/0x3f0
[   20.110570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.110919]  kthread+0x328/0x630
[   20.110989]  ret_from_fork+0x10/0x20
[   20.111043] 
[   20.111226] Allocated by task 265:
[   20.111277]  kasan_save_stack+0x3c/0x68
[   20.111746]  kasan_save_track+0x20/0x40
[   20.111972]  kasan_save_alloc_info+0x40/0x58
[   20.112174]  __kasan_kmalloc+0xd4/0xd8
[   20.112393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.112496]  kasan_atomics+0xb8/0x2e0
[   20.112596]  kunit_try_run_case+0x170/0x3f0
[   20.112637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.112685]  kthread+0x328/0x630
[   20.112727]  ret_from_fork+0x10/0x20
[   20.112937] 
[   20.113082] The buggy address belongs to the object at fff00000c799a780
[   20.113082]  which belongs to the cache kmalloc-64 of size 64
[   20.113335] The buggy address is located 0 bytes to the right of
[   20.113335]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.113596] 
[   20.113626] The buggy address belongs to the physical page:
[   20.113939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.114473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.114726] page_type: f5(slab)
[   20.114998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.115283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.115542] page dumped because: kasan: bad access detected
[   20.115714] 
[   20.115787] Memory state around the buggy address:
[   20.115916]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.116163]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.116421] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.116668]                                      ^
[   20.116806]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.117065]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.117113] ==================================================================
[   19.869982] ==================================================================
[   19.870357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.870748] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.870823] 
[   19.871115] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.871346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.871383] Hardware name: linux,dummy-virt (DT)
[   19.871417] Call trace:
[   19.871748]  show_stack+0x20/0x38 (C)
[   19.871885]  dump_stack_lvl+0x8c/0xd0
[   19.871972]  print_report+0x118/0x5d0
[   19.872196]  kasan_report+0xdc/0x128
[   19.872397]  kasan_check_range+0x100/0x1a8
[   19.872458]  __kasan_check_write+0x20/0x30
[   19.872710]  kasan_atomics_helper+0xad4/0x4858
[   19.873162]  kasan_atomics+0x198/0x2e0
[   19.873358]  kunit_try_run_case+0x170/0x3f0
[   19.873419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.873683]  kthread+0x328/0x630
[   19.873797]  ret_from_fork+0x10/0x20
[   19.873993] 
[   19.874145] Allocated by task 265:
[   19.874230]  kasan_save_stack+0x3c/0x68
[   19.874284]  kasan_save_track+0x20/0x40
[   19.874480]  kasan_save_alloc_info+0x40/0x58
[   19.874531]  __kasan_kmalloc+0xd4/0xd8
[   19.874581]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.874634]  kasan_atomics+0xb8/0x2e0
[   19.874673]  kunit_try_run_case+0x170/0x3f0
[   19.874724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.874770]  kthread+0x328/0x630
[   19.874814]  ret_from_fork+0x10/0x20
[   19.874874] 
[   19.874906] The buggy address belongs to the object at fff00000c799a780
[   19.874906]  which belongs to the cache kmalloc-64 of size 64
[   19.874979] The buggy address is located 0 bytes to the right of
[   19.874979]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.875045] 
[   19.875079] The buggy address belongs to the physical page:
[   19.875124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.875195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.875248] page_type: f5(slab)
[   19.875300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.875382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.875863] page dumped because: kasan: bad access detected
[   19.876157] 
[   19.876231] Memory state around the buggy address:
[   19.876305]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.876552]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.876956] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.877287]                                      ^
[   19.877575]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.877720]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.878145] ==================================================================
[   19.859496] ==================================================================
[   19.859824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.860047] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.860345] 
[   19.860410] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.860603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.860673] Hardware name: linux,dummy-virt (DT)
[   19.860943] Call trace:
[   19.860991]  show_stack+0x20/0x38 (C)
[   19.861312]  dump_stack_lvl+0x8c/0xd0
[   19.861425]  print_report+0x118/0x5d0
[   19.861520]  kasan_report+0xdc/0x128
[   19.861679]  kasan_check_range+0x100/0x1a8
[   19.861765]  __kasan_check_write+0x20/0x30
[   19.862146]  kasan_atomics_helper+0xa6c/0x4858
[   19.862332]  kasan_atomics+0x198/0x2e0
[   19.862441]  kunit_try_run_case+0x170/0x3f0
[   19.862699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.862955]  kthread+0x328/0x630
[   19.863205]  ret_from_fork+0x10/0x20
[   19.863494] 
[   19.863573] Allocated by task 265:
[   19.863704]  kasan_save_stack+0x3c/0x68
[   19.863802]  kasan_save_track+0x20/0x40
[   19.863901]  kasan_save_alloc_info+0x40/0x58
[   19.864152]  __kasan_kmalloc+0xd4/0xd8
[   19.864202]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.864332]  kasan_atomics+0xb8/0x2e0
[   19.864629]  kunit_try_run_case+0x170/0x3f0
[   19.864686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.864880]  kthread+0x328/0x630
[   19.864952]  ret_from_fork+0x10/0x20
[   19.865077] 
[   19.865103] The buggy address belongs to the object at fff00000c799a780
[   19.865103]  which belongs to the cache kmalloc-64 of size 64
[   19.865332] The buggy address is located 0 bytes to the right of
[   19.865332]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.865552] 
[   19.865655] The buggy address belongs to the physical page:
[   19.865736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.865944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.866001] page_type: f5(slab)
[   19.866205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.866946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.867029] page dumped because: kasan: bad access detected
[   19.867311] 
[   19.867381] Memory state around the buggy address:
[   19.867422]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.867483]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.867536] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.867603]                                      ^
[   19.867665]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867729]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.868213] ==================================================================
[   19.977001] ==================================================================
[   19.977069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.977134] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.977187] 
[   19.977228] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.977515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.977568] Hardware name: linux,dummy-virt (DT)
[   19.977604] Call trace:
[   19.977629]  show_stack+0x20/0x38 (C)
[   19.977688]  dump_stack_lvl+0x8c/0xd0
[   19.977739]  print_report+0x118/0x5d0
[   19.977789]  kasan_report+0xdc/0x128
[   19.977836]  __asan_report_load8_noabort+0x20/0x30
[   19.979201]  kasan_atomics_helper+0x3f58/0x4858
[   19.979317]  kasan_atomics+0x198/0x2e0
[   19.979398]  kunit_try_run_case+0x170/0x3f0
[   19.979542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.979604]  kthread+0x328/0x630
[   19.979650]  ret_from_fork+0x10/0x20
[   19.979703] 
[   19.979724] Allocated by task 265:
[   19.979757]  kasan_save_stack+0x3c/0x68
[   19.980240]  kasan_save_track+0x20/0x40
[   19.980895]  kasan_save_alloc_info+0x40/0x58
[   19.981290]  __kasan_kmalloc+0xd4/0xd8
[   19.981359]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.981572]  kasan_atomics+0xb8/0x2e0
[   19.981641]  kunit_try_run_case+0x170/0x3f0
[   19.981996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.982717]  kthread+0x328/0x630
[   19.982801]  ret_from_fork+0x10/0x20
[   19.983275] 
[   19.983370] The buggy address belongs to the object at fff00000c799a780
[   19.983370]  which belongs to the cache kmalloc-64 of size 64
[   19.983523] The buggy address is located 0 bytes to the right of
[   19.983523]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.983833] 
[   19.983923] The buggy address belongs to the physical page:
[   19.984044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.984194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.984310] page_type: f5(slab)
[   19.984383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.984737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.984868] page dumped because: kasan: bad access detected
[   19.984986] 
[   19.985056] Memory state around the buggy address:
[   19.985333]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.985584]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.985711] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.985866]                                      ^
[   19.986135]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.986225]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.986481] ==================================================================
[   20.125994] ==================================================================
[   20.126251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.126319] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.126370] 
[   20.126627] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.127034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.127183] Hardware name: linux,dummy-virt (DT)
[   20.127228] Call trace:
[   20.127253]  show_stack+0x20/0x38 (C)
[   20.127747]  dump_stack_lvl+0x8c/0xd0
[   20.127912]  print_report+0x118/0x5d0
[   20.128076]  kasan_report+0xdc/0x128
[   20.128151]  __asan_report_load8_noabort+0x20/0x30
[   20.128827]  kasan_atomics_helper+0x3f04/0x4858
[   20.128948]  kasan_atomics+0x198/0x2e0
[   20.129124]  kunit_try_run_case+0x170/0x3f0
[   20.129241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.129445]  kthread+0x328/0x630
[   20.129504]  ret_from_fork+0x10/0x20
[   20.129873] 
[   20.130262] Allocated by task 265:
[   20.130368]  kasan_save_stack+0x3c/0x68
[   20.130475]  kasan_save_track+0x20/0x40
[   20.130607]  kasan_save_alloc_info+0x40/0x58
[   20.130702]  __kasan_kmalloc+0xd4/0xd8
[   20.130743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.130859]  kasan_atomics+0xb8/0x2e0
[   20.130923]  kunit_try_run_case+0x170/0x3f0
[   20.130965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.131011]  kthread+0x328/0x630
[   20.131045]  ret_from_fork+0x10/0x20
[   20.131082] 
[   20.131105] The buggy address belongs to the object at fff00000c799a780
[   20.131105]  which belongs to the cache kmalloc-64 of size 64
[   20.131166] The buggy address is located 0 bytes to the right of
[   20.131166]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.131232] 
[   20.131253] The buggy address belongs to the physical page:
[   20.131288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.131354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.131405] page_type: f5(slab)
[   20.131447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.131500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.131544] page dumped because: kasan: bad access detected
[   20.131577] 
[   20.131598] Memory state around the buggy address:
[   20.131632]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.131677]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.131721] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.131762]                                      ^
[   20.131797]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.131849]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.131988] ==================================================================
[   20.145145] ==================================================================
[   20.145194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.145241] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.145291] 
[   20.145375] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.145467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.145822] Hardware name: linux,dummy-virt (DT)
[   20.145966] Call trace:
[   20.145989]  show_stack+0x20/0x38 (C)
[   20.146113]  dump_stack_lvl+0x8c/0xd0
[   20.146162]  print_report+0x118/0x5d0
[   20.146210]  kasan_report+0xdc/0x128
[   20.146255]  kasan_check_range+0x100/0x1a8
[   20.146304]  __kasan_check_write+0x20/0x30
[   20.146360]  kasan_atomics_helper+0x154c/0x4858
[   20.146415]  kasan_atomics+0x198/0x2e0
[   20.146461]  kunit_try_run_case+0x170/0x3f0
[   20.146509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.146561]  kthread+0x328/0x630
[   20.146603]  ret_from_fork+0x10/0x20
[   20.146650] 
[   20.146671] Allocated by task 265:
[   20.146699]  kasan_save_stack+0x3c/0x68
[   20.146742]  kasan_save_track+0x20/0x40
[   20.146781]  kasan_save_alloc_info+0x40/0x58
[   20.146823]  __kasan_kmalloc+0xd4/0xd8
[   20.146869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.146911]  kasan_atomics+0xb8/0x2e0
[   20.146988]  kunit_try_run_case+0x170/0x3f0
[   20.147110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.147173]  kthread+0x328/0x630
[   20.147312]  ret_from_fork+0x10/0x20
[   20.147350] 
[   20.147371] The buggy address belongs to the object at fff00000c799a780
[   20.147371]  which belongs to the cache kmalloc-64 of size 64
[   20.147430] The buggy address is located 0 bytes to the right of
[   20.147430]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.147494] 
[   20.147516] The buggy address belongs to the physical page:
[   20.147551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.147657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.147902] page_type: f5(slab)
[   20.148019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.148156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.148207] page dumped because: kasan: bad access detected
[   20.148241] 
[   20.148260] Memory state around the buggy address:
[   20.148317]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.148368]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.148412] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.148452]                                      ^
[   20.148487]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.148528]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.148567] ==================================================================
[   20.175771] ==================================================================
[   20.175833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.175903] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.175954] 
[   20.175996] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.176078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.176109] Hardware name: linux,dummy-virt (DT)
[   20.176141] Call trace:
[   20.176167]  show_stack+0x20/0x38 (C)
[   20.176216]  dump_stack_lvl+0x8c/0xd0
[   20.176269]  print_report+0x118/0x5d0
[   20.176999]  kasan_report+0xdc/0x128
[   20.177109]  __asan_report_load8_noabort+0x20/0x30
[   20.177466]  kasan_atomics_helper+0x3df4/0x4858
[   20.177832]  kasan_atomics+0x198/0x2e0
[   20.178252]  kunit_try_run_case+0x170/0x3f0
[   20.178671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.178733]  kthread+0x328/0x630
[   20.178779]  ret_from_fork+0x10/0x20
[   20.179413] 
[   20.179451] Allocated by task 265:
[   20.179761]  kasan_save_stack+0x3c/0x68
[   20.179894]  kasan_save_track+0x20/0x40
[   20.179933]  kasan_save_alloc_info+0x40/0x58
[   20.179976]  __kasan_kmalloc+0xd4/0xd8
[   20.180013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.180247]  kasan_atomics+0xb8/0x2e0
[   20.180297]  kunit_try_run_case+0x170/0x3f0
[   20.180339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.180677]  kthread+0x328/0x630
[   20.180716]  ret_from_fork+0x10/0x20
[   20.181150] 
[   20.181176] The buggy address belongs to the object at fff00000c799a780
[   20.181176]  which belongs to the cache kmalloc-64 of size 64
[   20.181238] The buggy address is located 0 bytes to the right of
[   20.181238]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.181307] 
[   20.181611] The buggy address belongs to the physical page:
[   20.181654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.181892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.181950] page_type: f5(slab)
[   20.181995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.182507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.182559] page dumped because: kasan: bad access detected
[   20.182594] 
[   20.182616] Memory state around the buggy address:
[   20.182992]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.183049]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.183142] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.183362]                                      ^
[   20.183546]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.183700]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.183788] ==================================================================
[   19.989074] ==================================================================
[   19.989136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.989566] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.989637] 
[   19.989855] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.990028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.990068] Hardware name: linux,dummy-virt (DT)
[   19.990102] Call trace:
[   19.990153]  show_stack+0x20/0x38 (C)
[   19.990216]  dump_stack_lvl+0x8c/0xd0
[   19.990410]  print_report+0x118/0x5d0
[   19.990652]  kasan_report+0xdc/0x128
[   19.990727]  kasan_check_range+0x100/0x1a8
[   19.990781]  __kasan_check_write+0x20/0x30
[   19.990827]  kasan_atomics_helper+0xe44/0x4858
[   19.990887]  kasan_atomics+0x198/0x2e0
[   19.990932]  kunit_try_run_case+0x170/0x3f0
[   19.991295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.991674]  kthread+0x328/0x630
[   19.991816]  ret_from_fork+0x10/0x20
[   19.992057] 
[   19.992257] Allocated by task 265:
[   19.992321]  kasan_save_stack+0x3c/0x68
[   19.992445]  kasan_save_track+0x20/0x40
[   19.992515]  kasan_save_alloc_info+0x40/0x58
[   19.992568]  __kasan_kmalloc+0xd4/0xd8
[   19.992616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.992658]  kasan_atomics+0xb8/0x2e0
[   19.992697]  kunit_try_run_case+0x170/0x3f0
[   19.992737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.992783]  kthread+0x328/0x630
[   19.992828]  ret_from_fork+0x10/0x20
[   19.992879] 
[   19.992912] The buggy address belongs to the object at fff00000c799a780
[   19.992912]  which belongs to the cache kmalloc-64 of size 64
[   19.992982] The buggy address is located 0 bytes to the right of
[   19.992982]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.993046] 
[   19.993070] The buggy address belongs to the physical page:
[   19.993105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.993169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.993220] page_type: f5(slab)
[   19.993263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.993315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.993358] page dumped because: kasan: bad access detected
[   19.993407] 
[   19.993433] Memory state around the buggy address:
[   19.993467]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.993518]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.993573] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.993620]                                      ^
[   19.993665]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.993726]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.993782] ==================================================================
[   20.065285] ==================================================================
[   20.065563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.065750] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.065877] 
[   20.065921] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.066100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066149] Hardware name: linux,dummy-virt (DT)
[   20.066185] Call trace:
[   20.066210]  show_stack+0x20/0x38 (C)
[   20.066272]  dump_stack_lvl+0x8c/0xd0
[   20.066465]  print_report+0x118/0x5d0
[   20.066717]  kasan_report+0xdc/0x128
[   20.066786]  kasan_check_range+0x100/0x1a8
[   20.066838]  __kasan_check_write+0x20/0x30
[   20.067229]  kasan_atomics_helper+0x1128/0x4858
[   20.067305]  kasan_atomics+0x198/0x2e0
[   20.067354]  kunit_try_run_case+0x170/0x3f0
[   20.067588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.067830]  kthread+0x328/0x630
[   20.067987]  ret_from_fork+0x10/0x20
[   20.068085] 
[   20.068472] Allocated by task 265:
[   20.068542]  kasan_save_stack+0x3c/0x68
[   20.068713]  kasan_save_track+0x20/0x40
[   20.068809]  kasan_save_alloc_info+0x40/0x58
[   20.069078]  __kasan_kmalloc+0xd4/0xd8
[   20.069498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.069697]  kasan_atomics+0xb8/0x2e0
[   20.069822]  kunit_try_run_case+0x170/0x3f0
[   20.070015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.070079]  kthread+0x328/0x630
[   20.070120]  ret_from_fork+0x10/0x20
[   20.070352] 
[   20.070473] The buggy address belongs to the object at fff00000c799a780
[   20.070473]  which belongs to the cache kmalloc-64 of size 64
[   20.071000] The buggy address is located 0 bytes to the right of
[   20.071000]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.071222] 
[   20.071416] The buggy address belongs to the physical page:
[   20.071472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.071857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.072375] page_type: f5(slab)
[   20.072473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.072836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.072917] page dumped because: kasan: bad access detected
[   20.072983] 
[   20.073219] Memory state around the buggy address:
[   20.073320]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.073473]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.074101] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.074231]                                      ^
[   20.074301]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.074589]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.074678] ==================================================================
[   19.949146] ==================================================================
[   19.949211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.949697] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.949771] 
[   19.949822] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.950150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.950366] Hardware name: linux,dummy-virt (DT)
[   19.950431] Call trace:
[   19.950459]  show_stack+0x20/0x38 (C)
[   19.950553]  dump_stack_lvl+0x8c/0xd0
[   19.950758]  print_report+0x118/0x5d0
[   19.950812]  kasan_report+0xdc/0x128
[   19.951051]  kasan_check_range+0x100/0x1a8
[   19.951123]  __kasan_check_write+0x20/0x30
[   19.951230]  kasan_atomics_helper+0xd3c/0x4858
[   19.951528]  kasan_atomics+0x198/0x2e0
[   19.951683]  kunit_try_run_case+0x170/0x3f0
[   19.951886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.951999]  kthread+0x328/0x630
[   19.952183]  ret_from_fork+0x10/0x20
[   19.952250] 
[   19.952271] Allocated by task 265:
[   19.952304]  kasan_save_stack+0x3c/0x68
[   19.952803]  kasan_save_track+0x20/0x40
[   19.952888]  kasan_save_alloc_info+0x40/0x58
[   19.953050]  __kasan_kmalloc+0xd4/0xd8
[   19.953101]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.953144]  kasan_atomics+0xb8/0x2e0
[   19.953223]  kunit_try_run_case+0x170/0x3f0
[   19.953267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.953324]  kthread+0x328/0x630
[   19.953362]  ret_from_fork+0x10/0x20
[   19.953400] 
[   19.953430] The buggy address belongs to the object at fff00000c799a780
[   19.953430]  which belongs to the cache kmalloc-64 of size 64
[   19.953499] The buggy address is located 0 bytes to the right of
[   19.953499]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.953564] 
[   19.953605] The buggy address belongs to the physical page:
[   19.953642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.953700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.953758] page_type: f5(slab)
[   19.953806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.953882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.953925] page dumped because: kasan: bad access detected
[   19.953969] 
[   19.953998] Memory state around the buggy address:
[   19.954043]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.954088]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.954139] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.954176]                                      ^
[   19.954212]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.954256]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.954312] ==================================================================
[   20.098170] ==================================================================
[   20.098240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.098303] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.098358] 
[   20.098814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.099087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.099123] Hardware name: linux,dummy-virt (DT)
[   20.099373] Call trace:
[   20.099787]  show_stack+0x20/0x38 (C)
[   20.100012]  dump_stack_lvl+0x8c/0xd0
[   20.100156]  print_report+0x118/0x5d0
[   20.100272]  kasan_report+0xdc/0x128
[   20.100323]  kasan_check_range+0x100/0x1a8
[   20.100393]  __kasan_check_write+0x20/0x30
[   20.100439]  kasan_atomics_helper+0x126c/0x4858
[   20.101081]  kasan_atomics+0x198/0x2e0
[   20.101368]  kunit_try_run_case+0x170/0x3f0
[   20.101454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.101559]  kthread+0x328/0x630
[   20.101872]  ret_from_fork+0x10/0x20
[   20.102213] 
[   20.102241] Allocated by task 265:
[   20.102423]  kasan_save_stack+0x3c/0x68
[   20.102573]  kasan_save_track+0x20/0x40
[   20.102656]  kasan_save_alloc_info+0x40/0x58
[   20.102705]  __kasan_kmalloc+0xd4/0xd8
[   20.102745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.102795]  kasan_atomics+0xb8/0x2e0
[   20.102835]  kunit_try_run_case+0x170/0x3f0
[   20.102895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.102955]  kthread+0x328/0x630
[   20.102993]  ret_from_fork+0x10/0x20
[   20.103031] 
[   20.103055] The buggy address belongs to the object at fff00000c799a780
[   20.103055]  which belongs to the cache kmalloc-64 of size 64
[   20.103137] The buggy address is located 0 bytes to the right of
[   20.103137]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.103204] 
[   20.103228] The buggy address belongs to the physical page:
[   20.103264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.103870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.103959] page_type: f5(slab)
[   20.104130] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.104195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.104241] page dumped because: kasan: bad access detected
[   20.104276] 
[   20.104298] Memory state around the buggy address:
[   20.105221]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.105573]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.105645] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.105718]                                      ^
[   20.105791]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.105881]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.106093] ==================================================================
[   20.017465] ==================================================================
[   20.017541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.017603] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.017654] 
[   20.017694] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.017779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.017806] Hardware name: linux,dummy-virt (DT)
[   20.017853] Call trace:
[   20.017878]  show_stack+0x20/0x38 (C)
[   20.017956]  dump_stack_lvl+0x8c/0xd0
[   20.018007]  print_report+0x118/0x5d0
[   20.018056]  kasan_report+0xdc/0x128
[   20.018101]  kasan_check_range+0x100/0x1a8
[   20.018152]  __kasan_check_write+0x20/0x30
[   20.018200]  kasan_atomics_helper+0xf20/0x4858
[   20.018249]  kasan_atomics+0x198/0x2e0
[   20.018305]  kunit_try_run_case+0x170/0x3f0
[   20.018356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.018424]  kthread+0x328/0x630
[   20.018475]  ret_from_fork+0x10/0x20
[   20.018526] 
[   20.018547] Allocated by task 265:
[   20.018579]  kasan_save_stack+0x3c/0x68
[   20.018633]  kasan_save_track+0x20/0x40
[   20.018690]  kasan_save_alloc_info+0x40/0x58
[   20.018734]  __kasan_kmalloc+0xd4/0xd8
[   20.018772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.018815]  kasan_atomics+0xb8/0x2e0
[   20.018863]  kunit_try_run_case+0x170/0x3f0
[   20.018902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.018947]  kthread+0x328/0x630
[   20.018984]  ret_from_fork+0x10/0x20
[   20.019023] 
[   20.019046] The buggy address belongs to the object at fff00000c799a780
[   20.019046]  which belongs to the cache kmalloc-64 of size 64
[   20.019117] The buggy address is located 0 bytes to the right of
[   20.019117]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.019182] 
[   20.019207] The buggy address belongs to the physical page:
[   20.019249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.020260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.020362] page_type: f5(slab)
[   20.020439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.020527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.020573] page dumped because: kasan: bad access detected
[   20.020829] 
[   20.020938] Memory state around the buggy address:
[   20.021238]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.021292]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.021614] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.021834]                                      ^
[   20.022051]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.022178]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.022235] ==================================================================
[   20.044354] ==================================================================
[   20.044422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.044481] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.044531] 
[   20.044573] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.044672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.045110] Hardware name: linux,dummy-virt (DT)
[   20.045678] Call trace:
[   20.045837]  show_stack+0x20/0x38 (C)
[   20.046408]  dump_stack_lvl+0x8c/0xd0
[   20.046674]  print_report+0x118/0x5d0
[   20.046746]  kasan_report+0xdc/0x128
[   20.046915]  kasan_check_range+0x100/0x1a8
[   20.046978]  __kasan_check_write+0x20/0x30
[   20.047026]  kasan_atomics_helper+0x1058/0x4858
[   20.047127]  kasan_atomics+0x198/0x2e0
[   20.047178]  kunit_try_run_case+0x170/0x3f0
[   20.047228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.047562]  kthread+0x328/0x630
[   20.047932]  ret_from_fork+0x10/0x20
[   20.048138] 
[   20.048199] Allocated by task 265:
[   20.048294]  kasan_save_stack+0x3c/0x68
[   20.048371]  kasan_save_track+0x20/0x40
[   20.048412]  kasan_save_alloc_info+0x40/0x58
[   20.048463]  __kasan_kmalloc+0xd4/0xd8
[   20.048806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.049156]  kasan_atomics+0xb8/0x2e0
[   20.049358]  kunit_try_run_case+0x170/0x3f0
[   20.049526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.049674]  kthread+0x328/0x630
[   20.049761]  ret_from_fork+0x10/0x20
[   20.049878] 
[   20.050098] The buggy address belongs to the object at fff00000c799a780
[   20.050098]  which belongs to the cache kmalloc-64 of size 64
[   20.050477] The buggy address is located 0 bytes to the right of
[   20.050477]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.050913] 
[   20.051175] The buggy address belongs to the physical page:
[   20.051245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.051307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.051704] page_type: f5(slab)
[   20.051840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.052039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.052091] page dumped because: kasan: bad access detected
[   20.052126] 
[   20.052147] Memory state around the buggy address:
[   20.052517]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.052581]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.052925] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.053001]                                      ^
[   20.053041]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.053693]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.053938] ==================================================================
[   20.075091] ==================================================================
[   20.075148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.075204] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.075273] 
[   20.075874] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.076166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.076354] Hardware name: linux,dummy-virt (DT)
[   20.076695] Call trace:
[   20.076794]  show_stack+0x20/0x38 (C)
[   20.077225]  dump_stack_lvl+0x8c/0xd0
[   20.077408]  print_report+0x118/0x5d0
[   20.077563]  kasan_report+0xdc/0x128
[   20.077661]  kasan_check_range+0x100/0x1a8
[   20.077914]  __kasan_check_write+0x20/0x30
[   20.078126]  kasan_atomics_helper+0x1190/0x4858
[   20.078455]  kasan_atomics+0x198/0x2e0
[   20.078680]  kunit_try_run_case+0x170/0x3f0
[   20.078853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.079114]  kthread+0x328/0x630
[   20.079320]  ret_from_fork+0x10/0x20
[   20.079755] 
[   20.079822] Allocated by task 265:
[   20.079906]  kasan_save_stack+0x3c/0x68
[   20.080005]  kasan_save_track+0x20/0x40
[   20.080141]  kasan_save_alloc_info+0x40/0x58
[   20.080187]  __kasan_kmalloc+0xd4/0xd8
[   20.080383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.080910]  kasan_atomics+0xb8/0x2e0
[   20.081070]  kunit_try_run_case+0x170/0x3f0
[   20.081244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.081692]  kthread+0x328/0x630
[   20.081973]  ret_from_fork+0x10/0x20
[   20.082075] 
[   20.082130] The buggy address belongs to the object at fff00000c799a780
[   20.082130]  which belongs to the cache kmalloc-64 of size 64
[   20.082369] The buggy address is located 0 bytes to the right of
[   20.082369]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.082789] 
[   20.082995] The buggy address belongs to the physical page:
[   20.083121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.083218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.083463] page_type: f5(slab)
[   20.083679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.084044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.084275] page dumped because: kasan: bad access detected
[   20.084405] 
[   20.084574] Memory state around the buggy address:
[   20.084642]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.084922]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.085346] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.085849]                                      ^
[   20.086070]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.086132]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.086173] ==================================================================
[   19.822098] ==================================================================
[   19.822286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.822422] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   19.822763] 
[   19.822823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.822993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.823053] Hardware name: linux,dummy-virt (DT)
[   19.823109] Call trace:
[   19.823135]  show_stack+0x20/0x38 (C)
[   19.823245]  dump_stack_lvl+0x8c/0xd0
[   19.823298]  print_report+0x118/0x5d0
[   19.823651]  kasan_report+0xdc/0x128
[   19.823883]  __asan_report_load4_noabort+0x20/0x30
[   19.824197]  kasan_atomics_helper+0x42d8/0x4858
[   19.824674] 
[   19.825350] 
[   19.825380] The buggy address belongs to the physical page:
[   19.825424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.825487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.825538] page_type: f5(slab)
[   19.829939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.829976] Hardware name: linux,dummy-virt (DT)
[   19.830010] Call trace:
[   19.830085]  show_stack+0x20/0x38 (C)
[   19.830160]  dump_stack_lvl+0x8c/0xd0
[   19.830228]  print_report+0x118/0x5d0
[   19.830663]  kasan_report+0xdc/0x128
[   19.830740]  kasan_check_range+0x100/0x1a8
[   19.830794]  __kasan_check_write+0x20/0x30
[   19.830904]  kasan_atomics_helper+0x934/0x4858
[   19.830957]  kasan_atomics+0x198/0x2e0
[   19.831004]  kunit_try_run_case+0x170/0x3f0
[   19.831284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.831537]  kthread+0x328/0x630
[   19.831654]  ret_from_fork+0x10/0x20
[   19.831872] 
[   19.831944] Allocated by task 265:
[   19.832207]  kasan_save_stack+0x3c/0x68
[   19.832377]  kasan_save_track+0x20/0x40
[   19.832448]  kasan_save_alloc_info+0x40/0x58
[   19.832907]  __kasan_kmalloc+0xd4/0xd8
[   19.833221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.833294]  kasan_atomics+0xb8/0x2e0
[   19.833362]  kunit_try_run_case+0x170/0x3f0
[   19.833435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.833833]  kthread+0x328/0x630
[   19.834051]  ret_from_fork+0x10/0x20
[   19.834409] 
[   19.834545] The buggy address belongs to the object at fff00000c799a780
[   19.834545]  which belongs to the cache kmalloc-64 of size 64
[   19.834730] The buggy address is located 0 bytes to the right of
[   19.834730]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   19.834832] 
[   19.834972] The buggy address belongs to the physical page:
[   19.835006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   19.835325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.835569] page_type: f5(slab)
[   19.835660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.835751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.835894] page dumped because: kasan: bad access detected
[   19.835966] 
[   19.836032] Memory state around the buggy address:
[   19.836141]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.836237]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.836339] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.836408]                                      ^
[   19.836482]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.836687]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.836875] ==================================================================
[   20.118656] ==================================================================
[   20.119009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.119110] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265
[   20.119164] 
[   20.119254] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.119415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.119445] Hardware name: linux,dummy-virt (DT)
[   20.119897] Call trace:
[   20.119941]  show_stack+0x20/0x38 (C)
[   20.120283]  dump_stack_lvl+0x8c/0xd0
[   20.120497]  print_report+0x118/0x5d0
[   20.120603]  kasan_report+0xdc/0x128
[   20.120655]  kasan_check_range+0x100/0x1a8
[   20.120925]  __kasan_check_write+0x20/0x30
[   20.121101]  kasan_atomics_helper+0x1384/0x4858
[   20.121578]  kasan_atomics+0x198/0x2e0
[   20.121753]  kunit_try_run_case+0x170/0x3f0
[   20.121810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.121878]  kthread+0x328/0x630
[   20.121938]  ret_from_fork+0x10/0x20
[   20.122006] 
[   20.122049] Allocated by task 265:
[   20.122087]  kasan_save_stack+0x3c/0x68
[   20.122147]  kasan_save_track+0x20/0x40
[   20.122189]  kasan_save_alloc_info+0x40/0x58
[   20.122242]  __kasan_kmalloc+0xd4/0xd8
[   20.122297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.122346]  kasan_atomics+0xb8/0x2e0
[   20.122392]  kunit_try_run_case+0x170/0x3f0
[   20.122432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.122479]  kthread+0x328/0x630
[   20.122522]  ret_from_fork+0x10/0x20
[   20.122562] 
[   20.122585] The buggy address belongs to the object at fff00000c799a780
[   20.122585]  which belongs to the cache kmalloc-64 of size 64
[   20.122669] The buggy address is located 0 bytes to the right of
[   20.122669]  allocated 48-byte region [fff00000c799a780, fff00000c799a7b0)
[   20.122735] 
[   20.122781] The buggy address belongs to the physical page:
[   20.122817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a
[   20.123566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.123656] page_type: f5(slab)
[   20.123725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.123796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.124021] page dumped because: kasan: bad access detected
[   20.124066] 
[   20.124087] Memory state around the buggy address:
[   20.124153]  fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.124208]  fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.124368] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.124866]                                      ^
[   20.124967]  fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.125169]  fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.125223] ==================================================================

[   19.527627] ==================================================================
[   19.527681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.527734] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.528220] 
[   19.528286] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.529029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.529078] Hardware name: linux,dummy-virt (DT)
[   19.529149] Call trace:
[   19.529197]  show_stack+0x20/0x38 (C)
[   19.529253]  dump_stack_lvl+0x8c/0xd0
[   19.529302]  print_report+0x118/0x5d0
[   19.529363]  kasan_report+0xdc/0x128
[   19.529563]  kasan_check_range+0x100/0x1a8
[   19.529912]  __kasan_check_write+0x20/0x30
[   19.530149]  kasan_atomics_helper+0xff0/0x4858
[   19.530675]  kasan_atomics+0x198/0x2e0
[   19.530934]  kunit_try_run_case+0x170/0x3f0
[   19.531483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.531619]  kthread+0x328/0x630
[   19.531846]  ret_from_fork+0x10/0x20
[   19.531986] 
[   19.532239] Allocated by task 265:
[   19.532332]  kasan_save_stack+0x3c/0x68
[   19.532510]  kasan_save_track+0x20/0x40
[   19.532771]  kasan_save_alloc_info+0x40/0x58
[   19.532974]  __kasan_kmalloc+0xd4/0xd8
[   19.533115]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.533162]  kasan_atomics+0xb8/0x2e0
[   19.533210]  kunit_try_run_case+0x170/0x3f0
[   19.533298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533515]  kthread+0x328/0x630
[   19.533927]  ret_from_fork+0x10/0x20
[   19.534018] 
[   19.534199] The buggy address belongs to the object at fff00000c7ab9600
[   19.534199]  which belongs to the cache kmalloc-64 of size 64
[   19.534431] The buggy address is located 0 bytes to the right of
[   19.534431]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.534654] 
[   19.534700] The buggy address belongs to the physical page:
[   19.534754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.535003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.535150] page_type: f5(slab)
[   19.535406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.535468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.535545] page dumped because: kasan: bad access detected
[   19.535742] 
[   19.535771] Memory state around the buggy address:
[   19.535808]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535865]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535910] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.535947]                                      ^
[   19.535983]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536027]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536075] ==================================================================
[   19.507329] ==================================================================
[   19.507439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.507562] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.507663] 
[   19.507699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.507783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.507981] Hardware name: linux,dummy-virt (DT)
[   19.508245] Call trace:
[   19.508289]  show_stack+0x20/0x38 (C)
[   19.508650]  dump_stack_lvl+0x8c/0xd0
[   19.508780]  print_report+0x118/0x5d0
[   19.508908]  kasan_report+0xdc/0x128
[   19.508970]  kasan_check_range+0x100/0x1a8
[   19.509288]  __kasan_check_write+0x20/0x30
[   19.509590]  kasan_atomics_helper+0xf20/0x4858
[   19.509774]  kasan_atomics+0x198/0x2e0
[   19.509960]  kunit_try_run_case+0x170/0x3f0
[   19.510090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.510214]  kthread+0x328/0x630
[   19.510501]  ret_from_fork+0x10/0x20
[   19.510884] 
[   19.510912] Allocated by task 265:
[   19.511070]  kasan_save_stack+0x3c/0x68
[   19.512075]  kasan_save_track+0x20/0x40
[   19.512483]  kasan_save_alloc_info+0x40/0x58
[   19.512591]  __kasan_kmalloc+0xd4/0xd8
[   19.512697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.512947]  kasan_atomics+0xb8/0x2e0
[   19.513118]  kunit_try_run_case+0x170/0x3f0
[   19.513343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.513552]  kthread+0x328/0x630
[   19.513622]  ret_from_fork+0x10/0x20
[   19.513660] 
[   19.513731] The buggy address belongs to the object at fff00000c7ab9600
[   19.513731]  which belongs to the cache kmalloc-64 of size 64
[   19.514164] The buggy address is located 0 bytes to the right of
[   19.514164]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.514378] 
[   19.514522] The buggy address belongs to the physical page:
[   19.514758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.515115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.515455] page_type: f5(slab)
[   19.515578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.515765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.516021] page dumped because: kasan: bad access detected
[   19.516129] 
[   19.516250] Memory state around the buggy address:
[   19.516317]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516606]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516799] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.516849]                                      ^
[   19.517159]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517214]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517600] ==================================================================
[   19.711228] ==================================================================
[   19.711351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.711406] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.711481] 
[   19.711521] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.711614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.711652] Hardware name: linux,dummy-virt (DT)
[   19.711684] Call trace:
[   19.711709]  show_stack+0x20/0x38 (C)
[   19.711759]  dump_stack_lvl+0x8c/0xd0
[   19.711808]  print_report+0x118/0x5d0
[   19.711855]  kasan_report+0xdc/0x128
[   19.711902]  kasan_check_range+0x100/0x1a8
[   19.711953]  __kasan_check_write+0x20/0x30
[   19.712001]  kasan_atomics_helper+0x175c/0x4858
[   19.712068]  kasan_atomics+0x198/0x2e0
[   19.712114]  kunit_try_run_case+0x170/0x3f0
[   19.712167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.712230]  kthread+0x328/0x630
[   19.712273]  ret_from_fork+0x10/0x20
[   19.712673] 
[   19.712707] Allocated by task 265:
[   19.712902]  kasan_save_stack+0x3c/0x68
[   19.713105]  kasan_save_track+0x20/0x40
[   19.713169]  kasan_save_alloc_info+0x40/0x58
[   19.713278]  __kasan_kmalloc+0xd4/0xd8
[   19.713721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.713866]  kasan_atomics+0xb8/0x2e0
[   19.713947]  kunit_try_run_case+0x170/0x3f0
[   19.714303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714489]  kthread+0x328/0x630
[   19.714814]  ret_from_fork+0x10/0x20
[   19.715046] 
[   19.715114] The buggy address belongs to the object at fff00000c7ab9600
[   19.715114]  which belongs to the cache kmalloc-64 of size 64
[   19.715452] The buggy address is located 0 bytes to the right of
[   19.715452]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.715718] 
[   19.715763] The buggy address belongs to the physical page:
[   19.716296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.716385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.716552] page_type: f5(slab)
[   19.716598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.716650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.716995] page dumped because: kasan: bad access detected
[   19.717481] 
[   19.717511] Memory state around the buggy address:
[   19.717550]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.717785]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.717851] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.718184]                                      ^
[   19.718280]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.718393]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.718731] ==================================================================
[   19.657661] ==================================================================
[   19.657956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.658055] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.658162] 
[   19.658376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.658531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.658566] Hardware name: linux,dummy-virt (DT)
[   19.658908] Call trace:
[   19.659045]  show_stack+0x20/0x38 (C)
[   19.659107]  dump_stack_lvl+0x8c/0xd0
[   19.659154]  print_report+0x118/0x5d0
[   19.659514]  kasan_report+0xdc/0x128
[   19.659586]  kasan_check_range+0x100/0x1a8
[   19.659699]  __kasan_check_write+0x20/0x30
[   19.659766]  kasan_atomics_helper+0x15b4/0x4858
[   19.659819]  kasan_atomics+0x198/0x2e0
[   19.660003]  kunit_try_run_case+0x170/0x3f0
[   19.660056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.660111]  kthread+0x328/0x630
[   19.660432]  ret_from_fork+0x10/0x20
[   19.660672] 
[   19.660746] Allocated by task 265:
[   19.660892]  kasan_save_stack+0x3c/0x68
[   19.660952]  kasan_save_track+0x20/0x40
[   19.661048]  kasan_save_alloc_info+0x40/0x58
[   19.661122]  __kasan_kmalloc+0xd4/0xd8
[   19.661162]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.661227]  kasan_atomics+0xb8/0x2e0
[   19.661267]  kunit_try_run_case+0x170/0x3f0
[   19.661469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.661618]  kthread+0x328/0x630
[   19.661685]  ret_from_fork+0x10/0x20
[   19.662051] 
[   19.662105] The buggy address belongs to the object at fff00000c7ab9600
[   19.662105]  which belongs to the cache kmalloc-64 of size 64
[   19.662436] The buggy address is located 0 bytes to the right of
[   19.662436]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.662547] 
[   19.662703] The buggy address belongs to the physical page:
[   19.663011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.663079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.663513] page_type: f5(slab)
[   19.663690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.664088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.664331] page dumped because: kasan: bad access detected
[   19.664631] 
[   19.664753] Memory state around the buggy address:
[   19.664969]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.665209]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.665306] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.665530]                                      ^
[   19.665592]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665685]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665858] ==================================================================
[   19.676053] ==================================================================
[   19.676139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.676196] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.676302] 
[   19.676346] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.676435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.676464] Hardware name: linux,dummy-virt (DT)
[   19.676496] Call trace:
[   19.676526]  show_stack+0x20/0x38 (C)
[   19.677034]  dump_stack_lvl+0x8c/0xd0
[   19.677195]  print_report+0x118/0x5d0
[   19.677305]  kasan_report+0xdc/0x128
[   19.677487]  kasan_check_range+0x100/0x1a8
[   19.677541]  __kasan_check_write+0x20/0x30
[   19.677588]  kasan_atomics_helper+0x1644/0x4858
[   19.677639]  kasan_atomics+0x198/0x2e0
[   19.677684]  kunit_try_run_case+0x170/0x3f0
[   19.678228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.678440]  kthread+0x328/0x630
[   19.678575]  ret_from_fork+0x10/0x20
[   19.678706] 
[   19.678778] Allocated by task 265:
[   19.678876]  kasan_save_stack+0x3c/0x68
[   19.678921]  kasan_save_track+0x20/0x40
[   19.678960]  kasan_save_alloc_info+0x40/0x58
[   19.679002]  __kasan_kmalloc+0xd4/0xd8
[   19.679050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.679092]  kasan_atomics+0xb8/0x2e0
[   19.679140]  kunit_try_run_case+0x170/0x3f0
[   19.679180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.679239]  kthread+0x328/0x630
[   19.679275]  ret_from_fork+0x10/0x20
[   19.679314] 
[   19.679479] The buggy address belongs to the object at fff00000c7ab9600
[   19.679479]  which belongs to the cache kmalloc-64 of size 64
[   19.679929] The buggy address is located 0 bytes to the right of
[   19.679929]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.680197] 
[   19.680529] The buggy address belongs to the physical page:
[   19.680964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.681030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.681090] page_type: f5(slab)
[   19.681464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.681855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.681907] page dumped because: kasan: bad access detected
[   19.681944] 
[   19.681965] Memory state around the buggy address:
[   19.682407]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.682746]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.682996] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.683099]                                      ^
[   19.683298]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.683367]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.683406] ==================================================================
[   19.603447] ==================================================================
[   19.603750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.603992] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.604054] 
[   19.604090] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.604345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.604387] Hardware name: linux,dummy-virt (DT)
[   19.604421] Call trace:
[   19.604483]  show_stack+0x20/0x38 (C)
[   19.605135]  dump_stack_lvl+0x8c/0xd0
[   19.605246]  print_report+0x118/0x5d0
[   19.605512]  kasan_report+0xdc/0x128
[   19.605691]  kasan_check_range+0x100/0x1a8
[   19.606081]  __kasan_check_write+0x20/0x30
[   19.606272]  kasan_atomics_helper+0x1384/0x4858
[   19.606674]  kasan_atomics+0x198/0x2e0
[   19.606786]  kunit_try_run_case+0x170/0x3f0
[   19.607069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.607204]  kthread+0x328/0x630
[   19.607480]  ret_from_fork+0x10/0x20
[   19.607625] 
[   19.607709] Allocated by task 265:
[   19.607741]  kasan_save_stack+0x3c/0x68
[   19.607851]  kasan_save_track+0x20/0x40
[   19.608165]  kasan_save_alloc_info+0x40/0x58
[   19.608550]  __kasan_kmalloc+0xd4/0xd8
[   19.608684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.608842]  kasan_atomics+0xb8/0x2e0
[   19.608940]  kunit_try_run_case+0x170/0x3f0
[   19.609182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.609400]  kthread+0x328/0x630
[   19.609507]  ret_from_fork+0x10/0x20
[   19.609764] 
[   19.609820] The buggy address belongs to the object at fff00000c7ab9600
[   19.609820]  which belongs to the cache kmalloc-64 of size 64
[   19.610056] The buggy address is located 0 bytes to the right of
[   19.610056]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.610350] 
[   19.610482] The buggy address belongs to the physical page:
[   19.610769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.610920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.611363] page_type: f5(slab)
[   19.611430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.611842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.611915] page dumped because: kasan: bad access detected
[   19.611951] 
[   19.611972] Memory state around the buggy address:
[   19.612008]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612483]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612654] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.612841]                                      ^
[   19.612888]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612935]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612974] ==================================================================
[   19.562921] ==================================================================
[   19.562974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.563200] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.563280] 
[   19.563315] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.563831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.563892] Hardware name: linux,dummy-virt (DT)
[   19.563981] Call trace:
[   19.564009]  show_stack+0x20/0x38 (C)
[   19.564064]  dump_stack_lvl+0x8c/0xd0
[   19.564187]  print_report+0x118/0x5d0
[   19.564244]  kasan_report+0xdc/0x128
[   19.564291]  kasan_check_range+0x100/0x1a8
[   19.564352]  __kasan_check_write+0x20/0x30
[   19.564397]  kasan_atomics_helper+0x1190/0x4858
[   19.564675]  kasan_atomics+0x198/0x2e0
[   19.565193]  kunit_try_run_case+0x170/0x3f0
[   19.565297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.565479]  kthread+0x328/0x630
[   19.565527]  ret_from_fork+0x10/0x20
[   19.565576] 
[   19.565873] Allocated by task 265:
[   19.566010]  kasan_save_stack+0x3c/0x68
[   19.566108]  kasan_save_track+0x20/0x40
[   19.566553]  kasan_save_alloc_info+0x40/0x58
[   19.566658]  __kasan_kmalloc+0xd4/0xd8
[   19.566772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.566903]  kasan_atomics+0xb8/0x2e0
[   19.566990]  kunit_try_run_case+0x170/0x3f0
[   19.567207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.567461]  kthread+0x328/0x630
[   19.567760]  ret_from_fork+0x10/0x20
[   19.568011] 
[   19.568069] The buggy address belongs to the object at fff00000c7ab9600
[   19.568069]  which belongs to the cache kmalloc-64 of size 64
[   19.568593] The buggy address is located 0 bytes to the right of
[   19.568593]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.568819] 
[   19.568944] The buggy address belongs to the physical page:
[   19.569076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.569346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.569592] page_type: f5(slab)
[   19.569675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.569730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.570152] page dumped because: kasan: bad access detected
[   19.570458] 
[   19.570600] Memory state around the buggy address:
[   19.570640]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.570882]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.571337] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.571893]                                      ^
[   19.572108]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.572438]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.572539] ==================================================================
[   19.455989] ==================================================================
[   19.456044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.456096] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.456147] 
[   19.456184] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.456877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.457114] Hardware name: linux,dummy-virt (DT)
[   19.457178] Call trace:
[   19.457295]  show_stack+0x20/0x38 (C)
[   19.457533]  dump_stack_lvl+0x8c/0xd0
[   19.457746]  print_report+0x118/0x5d0
[   19.457838]  kasan_report+0xdc/0x128
[   19.458102]  kasan_check_range+0x100/0x1a8
[   19.458373]  __kasan_check_read+0x20/0x30
[   19.458683]  kasan_atomics_helper+0xdd4/0x4858
[   19.458763]  kasan_atomics+0x198/0x2e0
[   19.458811]  kunit_try_run_case+0x170/0x3f0
[   19.459447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.459668]  kthread+0x328/0x630
[   19.459734]  ret_from_fork+0x10/0x20
[   19.460000] 
[   19.460194] Allocated by task 265:
[   19.460261]  kasan_save_stack+0x3c/0x68
[   19.460329]  kasan_save_track+0x20/0x40
[   19.460372]  kasan_save_alloc_info+0x40/0x58
[   19.460421]  __kasan_kmalloc+0xd4/0xd8
[   19.460475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.460795]  kasan_atomics+0xb8/0x2e0
[   19.460847]  kunit_try_run_case+0x170/0x3f0
[   19.460888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.460940]  kthread+0x328/0x630
[   19.460976]  ret_from_fork+0x10/0x20
[   19.461144] 
[   19.461223] The buggy address belongs to the object at fff00000c7ab9600
[   19.461223]  which belongs to the cache kmalloc-64 of size 64
[   19.461690] The buggy address is located 0 bytes to the right of
[   19.461690]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.462269] 
[   19.462426] The buggy address belongs to the physical page:
[   19.462524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.462609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.462965] page_type: f5(slab)
[   19.463308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.463652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.463902] page dumped because: kasan: bad access detected
[   19.464177] 
[   19.464253] Memory state around the buggy address:
[   19.464384]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464712]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464766] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.464945]                                      ^
[   19.465025]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.465188]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.465267] ==================================================================
[   19.614758] ==================================================================
[   19.615153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.615252] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.615441] 
[   19.615485] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.615568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.615598] Hardware name: linux,dummy-virt (DT)
[   19.615932] Call trace:
[   19.615974]  show_stack+0x20/0x38 (C)
[   19.616030]  dump_stack_lvl+0x8c/0xd0
[   19.616498]  print_report+0x118/0x5d0
[   19.616922]  kasan_report+0xdc/0x128
[   19.617049]  __asan_report_load8_noabort+0x20/0x30
[   19.617168]  kasan_atomics_helper+0x3f04/0x4858
[   19.617337]  kasan_atomics+0x198/0x2e0
[   19.617410]  kunit_try_run_case+0x170/0x3f0
[   19.617468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.617523]  kthread+0x328/0x630
[   19.617731]  ret_from_fork+0x10/0x20
[   19.617859] 
[   19.617888] Allocated by task 265:
[   19.618027]  kasan_save_stack+0x3c/0x68
[   19.618079]  kasan_save_track+0x20/0x40
[   19.618145]  kasan_save_alloc_info+0x40/0x58
[   19.618204]  __kasan_kmalloc+0xd4/0xd8
[   19.618243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.618298]  kasan_atomics+0xb8/0x2e0
[   19.618357]  kunit_try_run_case+0x170/0x3f0
[   19.618397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.618440]  kthread+0x328/0x630
[   19.618489]  ret_from_fork+0x10/0x20
[   19.618527] 
[   19.618565] The buggy address belongs to the object at fff00000c7ab9600
[   19.618565]  which belongs to the cache kmalloc-64 of size 64
[   19.618626] The buggy address is located 0 bytes to the right of
[   19.618626]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.618692] 
[   19.618738] The buggy address belongs to the physical page:
[   19.618795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.618849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.618901] page_type: f5(slab)
[   19.618950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.619005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.619047] page dumped because: kasan: bad access detected
[   19.619092] 
[   19.619120] Memory state around the buggy address:
[   19.619162]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.619208]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.619253] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.619292]                                      ^
[   19.619336]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.620158]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.620228] ==================================================================
[   19.621412] ==================================================================
[   19.621467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.621523] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.621765] 
[   19.621925] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.622156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.622326] Hardware name: linux,dummy-virt (DT)
[   19.622392] Call trace:
[   19.622558]  show_stack+0x20/0x38 (C)
[   19.622619]  dump_stack_lvl+0x8c/0xd0
[   19.622675]  print_report+0x118/0x5d0
[   19.622768]  kasan_report+0xdc/0x128
[   19.622866]  kasan_check_range+0x100/0x1a8
[   19.623070]  __kasan_check_write+0x20/0x30
[   19.623280]  kasan_atomics_helper+0x1414/0x4858
[   19.623366]  kasan_atomics+0x198/0x2e0
[   19.623575]  kunit_try_run_case+0x170/0x3f0
[   19.623655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.623729]  kthread+0x328/0x630
[   19.623773]  ret_from_fork+0x10/0x20
[   19.624042] 
[   19.624129] Allocated by task 265:
[   19.624170]  kasan_save_stack+0x3c/0x68
[   19.624237]  kasan_save_track+0x20/0x40
[   19.624483]  kasan_save_alloc_info+0x40/0x58
[   19.624651]  __kasan_kmalloc+0xd4/0xd8
[   19.624728]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.624963]  kasan_atomics+0xb8/0x2e0
[   19.625191]  kunit_try_run_case+0x170/0x3f0
[   19.625368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.625452]  kthread+0x328/0x630
[   19.625489]  ret_from_fork+0x10/0x20
[   19.625797] 
[   19.625850] The buggy address belongs to the object at fff00000c7ab9600
[   19.625850]  which belongs to the cache kmalloc-64 of size 64
[   19.626251] The buggy address is located 0 bytes to the right of
[   19.626251]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.627054] 
[   19.627425] The buggy address belongs to the physical page:
[   19.627580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.628017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.628266] page_type: f5(slab)
[   19.628333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.628512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.628708] page dumped because: kasan: bad access detected
[   19.629014] 
[   19.629041] Memory state around the buggy address:
[   19.629079]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.629126]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.629557] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.629871]                                      ^
[   19.630059]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630345]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630549] ==================================================================
[   19.476254] ==================================================================
[   19.476335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.476390] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.476442] 
[   19.476478] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.476942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.477143] Hardware name: linux,dummy-virt (DT)
[   19.477222] Call trace:
[   19.477250]  show_stack+0x20/0x38 (C)
[   19.477313]  dump_stack_lvl+0x8c/0xd0
[   19.477373]  print_report+0x118/0x5d0
[   19.477426]  kasan_report+0xdc/0x128
[   19.478202]  kasan_check_range+0x100/0x1a8
[   19.478382]  __kasan_check_write+0x20/0x30
[   19.478524]  kasan_atomics_helper+0xe44/0x4858
[   19.478646]  kasan_atomics+0x198/0x2e0
[   19.478834]  kunit_try_run_case+0x170/0x3f0
[   19.479063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.479349]  kthread+0x328/0x630
[   19.479580]  ret_from_fork+0x10/0x20
[   19.479687] 
[   19.479757] Allocated by task 265:
[   19.479851]  kasan_save_stack+0x3c/0x68
[   19.479898]  kasan_save_track+0x20/0x40
[   19.480119]  kasan_save_alloc_info+0x40/0x58
[   19.480237]  __kasan_kmalloc+0xd4/0xd8
[   19.480465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.480697]  kasan_atomics+0xb8/0x2e0
[   19.480990]  kunit_try_run_case+0x170/0x3f0
[   19.481085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.481539]  kthread+0x328/0x630
[   19.481737]  ret_from_fork+0x10/0x20
[   19.481864] 
[   19.481946] The buggy address belongs to the object at fff00000c7ab9600
[   19.481946]  which belongs to the cache kmalloc-64 of size 64
[   19.482356] The buggy address is located 0 bytes to the right of
[   19.482356]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.482621] 
[   19.482756] The buggy address belongs to the physical page:
[   19.482821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.483167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.483587] page_type: f5(slab)
[   19.483640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.484048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.484338] page dumped because: kasan: bad access detected
[   19.484498] 
[   19.484702] Memory state around the buggy address:
[   19.484807]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.485247]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.485303] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.485356]                                      ^
[   19.485393]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.485437]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.485574] ==================================================================
[   19.701277] ==================================================================
[   19.701495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.701576] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.701670] 
[   19.701780] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.701869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.701897] Hardware name: linux,dummy-virt (DT)
[   19.701930] Call trace:
[   19.701954]  show_stack+0x20/0x38 (C)
[   19.702005]  dump_stack_lvl+0x8c/0xd0
[   19.702054]  print_report+0x118/0x5d0
[   19.702103]  kasan_report+0xdc/0x128
[   19.702478]  __asan_report_load8_noabort+0x20/0x30
[   19.702765]  kasan_atomics_helper+0x3e10/0x4858
[   19.702980]  kasan_atomics+0x198/0x2e0
[   19.703117]  kunit_try_run_case+0x170/0x3f0
[   19.703201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.703362]  kthread+0x328/0x630
[   19.703414]  ret_from_fork+0x10/0x20
[   19.703806] 
[   19.703842] Allocated by task 265:
[   19.704026]  kasan_save_stack+0x3c/0x68
[   19.704114]  kasan_save_track+0x20/0x40
[   19.704387]  kasan_save_alloc_info+0x40/0x58
[   19.704478]  __kasan_kmalloc+0xd4/0xd8
[   19.704587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.704684]  kasan_atomics+0xb8/0x2e0
[   19.704750]  kunit_try_run_case+0x170/0x3f0
[   19.704925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.705168]  kthread+0x328/0x630
[   19.705562]  ret_from_fork+0x10/0x20
[   19.705846] 
[   19.705915] The buggy address belongs to the object at fff00000c7ab9600
[   19.705915]  which belongs to the cache kmalloc-64 of size 64
[   19.706125] The buggy address is located 0 bytes to the right of
[   19.706125]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.706375] 
[   19.706402] The buggy address belongs to the physical page:
[   19.706673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.706848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.707057] page_type: f5(slab)
[   19.707147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.707462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.707535] page dumped because: kasan: bad access detected
[   19.707635] 
[   19.707776] Memory state around the buggy address:
[   19.708132]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.708192]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.708583] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.709064]                                      ^
[   19.709116]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.709173]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.709213] ==================================================================
[   19.545721] ==================================================================
[   19.545774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.546051] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.546270] 
[   19.546306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.546628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.546715] Hardware name: linux,dummy-virt (DT)
[   19.547017] Call trace:
[   19.547071]  show_stack+0x20/0x38 (C)
[   19.547295]  dump_stack_lvl+0x8c/0xd0
[   19.547457]  print_report+0x118/0x5d0
[   19.547751]  kasan_report+0xdc/0x128
[   19.548211]  kasan_check_range+0x100/0x1a8
[   19.548384]  __kasan_check_write+0x20/0x30
[   19.548482]  kasan_atomics_helper+0x10c0/0x4858
[   19.548634]  kasan_atomics+0x198/0x2e0
[   19.548742]  kunit_try_run_case+0x170/0x3f0
[   19.548794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.548849]  kthread+0x328/0x630
[   19.548892]  ret_from_fork+0x10/0x20
[   19.549304] 
[   19.549366] Allocated by task 265:
[   19.549607]  kasan_save_stack+0x3c/0x68
[   19.549793]  kasan_save_track+0x20/0x40
[   19.549976]  kasan_save_alloc_info+0x40/0x58
[   19.550099]  __kasan_kmalloc+0xd4/0xd8
[   19.550152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.550195]  kasan_atomics+0xb8/0x2e0
[   19.550422]  kunit_try_run_case+0x170/0x3f0
[   19.550626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.551546]  kthread+0x328/0x630
[   19.551638]  ret_from_fork+0x10/0x20
[   19.551703] 
[   19.551727] The buggy address belongs to the object at fff00000c7ab9600
[   19.551727]  which belongs to the cache kmalloc-64 of size 64
[   19.551805] The buggy address is located 0 bytes to the right of
[   19.551805]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.551911] 
[   19.552507] The buggy address belongs to the physical page:
[   19.552671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.552729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.552781] page_type: f5(slab)
[   19.552823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.553436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.553513] page dumped because: kasan: bad access detected
[   19.553678] 
[   19.553705] Memory state around the buggy address:
[   19.553743]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.553966]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.554033] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.554288]                                      ^
[   19.554473]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554695]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554961] ==================================================================
[   19.666604] ==================================================================
[   19.666825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.666978] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.667083] 
[   19.667118] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.667241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.667271] Hardware name: linux,dummy-virt (DT)
[   19.667473] Call trace:
[   19.667510]  show_stack+0x20/0x38 (C)
[   19.667952]  dump_stack_lvl+0x8c/0xd0
[   19.668014]  print_report+0x118/0x5d0
[   19.668116]  kasan_report+0xdc/0x128
[   19.668174]  __asan_report_load8_noabort+0x20/0x30
[   19.668228]  kasan_atomics_helper+0x3db0/0x4858
[   19.668457]  kasan_atomics+0x198/0x2e0
[   19.668792]  kunit_try_run_case+0x170/0x3f0
[   19.669072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.669233]  kthread+0x328/0x630
[   19.669375]  ret_from_fork+0x10/0x20
[   19.669481] 
[   19.669559] Allocated by task 265:
[   19.669590]  kasan_save_stack+0x3c/0x68
[   19.669918]  kasan_save_track+0x20/0x40
[   19.670080]  kasan_save_alloc_info+0x40/0x58
[   19.670162]  __kasan_kmalloc+0xd4/0xd8
[   19.670390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.670607]  kasan_atomics+0xb8/0x2e0
[   19.670677]  kunit_try_run_case+0x170/0x3f0
[   19.670809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.671067]  kthread+0x328/0x630
[   19.671280]  ret_from_fork+0x10/0x20
[   19.671494] 
[   19.671706] The buggy address belongs to the object at fff00000c7ab9600
[   19.671706]  which belongs to the cache kmalloc-64 of size 64
[   19.671840] The buggy address is located 0 bytes to the right of
[   19.671840]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.671911] 
[   19.671995] The buggy address belongs to the physical page:
[   19.672378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.672610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.672817] page_type: f5(slab)
[   19.672865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.672920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.672964] page dumped because: kasan: bad access detected
[   19.673465] 
[   19.673750] Memory state around the buggy address:
[   19.673860]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.673912]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.674074] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.674259]                                      ^
[   19.674304]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.674762]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.674918] ==================================================================
[   19.369509] ==================================================================
[   19.369674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.369734] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.369787] 
[   19.370102] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.370489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.371303]  print_report+0x118/0x5d0
[   19.372889]  kasan_save_alloc_info+0x40/0x58
[   19.374571] 
[   19.375043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.376748]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.378543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.378573] Hardware name: linux,dummy-virt (DT)
[   19.378604] Call trace:
[   19.378629]  show_stack+0x20/0x38 (C)
[   19.378951]  dump_stack_lvl+0x8c/0xd0
[   19.379077]  print_report+0x118/0x5d0
[   19.379408]  kasan_report+0xdc/0x128
[   19.379711]  kasan_check_range+0x100/0x1a8
[   19.379908]  __kasan_check_write+0x20/0x30
[   19.380107]  kasan_atomics_helper+0x934/0x4858
[   19.380465]  kasan_atomics+0x198/0x2e0
[   19.380578]  kunit_try_run_case+0x170/0x3f0
[   19.380785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381000]  kthread+0x328/0x630
[   19.381156]  ret_from_fork+0x10/0x20
[   19.381273] 
[   19.381374] Allocated by task 265:
[   19.381406]  kasan_save_stack+0x3c/0x68
[   19.381455]  kasan_save_track+0x20/0x40
[   19.381495]  kasan_save_alloc_info+0x40/0x58
[   19.381536]  __kasan_kmalloc+0xd4/0xd8
[   19.381573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.381615]  kasan_atomics+0xb8/0x2e0
[   19.381652]  kunit_try_run_case+0x170/0x3f0
[   19.381691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381736]  kthread+0x328/0x630
[   19.381771]  ret_from_fork+0x10/0x20
[   19.381808] 
[   19.381829] The buggy address belongs to the object at fff00000c7ab9600
[   19.381829]  which belongs to the cache kmalloc-64 of size 64
[   19.381887] The buggy address is located 0 bytes to the right of
[   19.381887]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.381952] 
[   19.381974] The buggy address belongs to the physical page:
[   19.382007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.382060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.382110] page_type: f5(slab)
[   19.382148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.382201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.382244] page dumped because: kasan: bad access detected
[   19.382278] 
[   19.382298] Memory state around the buggy address:
[   19.382354]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.382536]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.382581] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.382646]                                      ^
[   19.382683]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.382728]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.382767] ==================================================================
[   19.446912] ==================================================================
[   19.447336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.447515] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.447579] 
[   19.447623] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.447979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.448264] Hardware name: linux,dummy-virt (DT)
[   19.448349] Call trace:
[   19.448485]  show_stack+0x20/0x38 (C)
[   19.448633]  dump_stack_lvl+0x8c/0xd0
[   19.448721]  print_report+0x118/0x5d0
[   19.448866]  kasan_report+0xdc/0x128
[   19.448977]  __asan_report_load4_noabort+0x20/0x30
[   19.449035]  kasan_atomics_helper+0x3e04/0x4858
[   19.449300]  kasan_atomics+0x198/0x2e0
[   19.449504]  kunit_try_run_case+0x170/0x3f0
[   19.449606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449666]  kthread+0x328/0x630
[   19.449712]  ret_from_fork+0x10/0x20
[   19.449781] 
[   19.449809] Allocated by task 265:
[   19.449858]  kasan_save_stack+0x3c/0x68
[   19.449921]  kasan_save_track+0x20/0x40
[   19.449970]  kasan_save_alloc_info+0x40/0x58
[   19.450011]  __kasan_kmalloc+0xd4/0xd8
[   19.450056]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.450101]  kasan_atomics+0xb8/0x2e0
[   19.450139]  kunit_try_run_case+0x170/0x3f0
[   19.450179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.450223]  kthread+0x328/0x630
[   19.450259]  ret_from_fork+0x10/0x20
[   19.450297] 
[   19.450518] The buggy address belongs to the object at fff00000c7ab9600
[   19.450518]  which belongs to the cache kmalloc-64 of size 64
[   19.450845] The buggy address is located 0 bytes to the right of
[   19.450845]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.451389] 
[   19.451661] The buggy address belongs to the physical page:
[   19.451735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.451828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.452095] page_type: f5(slab)
[   19.452338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.452528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.453448] page dumped because: kasan: bad access detected
[   19.453528] 
[   19.453579] Memory state around the buggy address:
[   19.453644]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.453702]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.453778] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.453846]                                      ^
[   19.453908]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454406]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454515] ==================================================================
[   19.728846] ==================================================================
[   19.728902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.729230] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.729394] 
[   19.730091] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.730196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.730292] Hardware name: linux,dummy-virt (DT)
[   19.730387] Call trace:
[   19.730532]  show_stack+0x20/0x38 (C)
[   19.730652]  dump_stack_lvl+0x8c/0xd0
[   19.730705]  print_report+0x118/0x5d0
[   19.730957]  kasan_report+0xdc/0x128
[   19.731378]  kasan_check_range+0x100/0x1a8
[   19.731669]  __kasan_check_write+0x20/0x30
[   19.732109]  kasan_atomics_helper+0x17ec/0x4858
[   19.732265]  kasan_atomics+0x198/0x2e0
[   19.732438]  kunit_try_run_case+0x170/0x3f0
[   19.732807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.733091]  kthread+0x328/0x630
[   19.733476]  ret_from_fork+0x10/0x20
[   19.733728] 
[   19.733951] Allocated by task 265:
[   19.734274]  kasan_save_stack+0x3c/0x68
[   19.734445]  kasan_save_track+0x20/0x40
[   19.734674]  kasan_save_alloc_info+0x40/0x58
[   19.734828]  __kasan_kmalloc+0xd4/0xd8
[   19.735087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.735296]  kasan_atomics+0xb8/0x2e0
[   19.735376]  kunit_try_run_case+0x170/0x3f0
[   19.735449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.735524]  kthread+0x328/0x630
[   19.735700]  ret_from_fork+0x10/0x20
[   19.735946] 
[   19.735991] The buggy address belongs to the object at fff00000c7ab9600
[   19.735991]  which belongs to the cache kmalloc-64 of size 64
[   19.736440] The buggy address is located 0 bytes to the right of
[   19.736440]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.736626] 
[   19.736841] The buggy address belongs to the physical page:
[   19.736910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.737104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.737506] page_type: f5(slab)
[   19.737593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.737812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.737981] page dumped because: kasan: bad access detected
[   19.738268] 
[   19.738296] Memory state around the buggy address:
[   19.738353]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738552]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738617] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.738668]                                      ^
[   19.738724]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.738781]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.738819] ==================================================================
[   19.539002] ==================================================================
[   19.539063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.539145] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.539379] 
[   19.539415] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.539669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.539713] Hardware name: linux,dummy-virt (DT)
[   19.539879] Call trace:
[   19.539915]  show_stack+0x20/0x38 (C)
[   19.539970]  dump_stack_lvl+0x8c/0xd0
[   19.540018]  print_report+0x118/0x5d0
[   19.540330]  kasan_report+0xdc/0x128
[   19.540402]  kasan_check_range+0x100/0x1a8
[   19.540455]  __kasan_check_write+0x20/0x30
[   19.540653]  kasan_atomics_helper+0x1058/0x4858
[   19.540935]  kasan_atomics+0x198/0x2e0
[   19.541073]  kunit_try_run_case+0x170/0x3f0
[   19.541122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.541177]  kthread+0x328/0x630
[   19.541221]  ret_from_fork+0x10/0x20
[   19.541808] 
[   19.541995] Allocated by task 265:
[   19.542072]  kasan_save_stack+0x3c/0x68
[   19.542604]  kasan_save_track+0x20/0x40
[   19.542672]  kasan_save_alloc_info+0x40/0x58
[   19.542716]  __kasan_kmalloc+0xd4/0xd8
[   19.542911]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.543021]  kasan_atomics+0xb8/0x2e0
[   19.543162]  kunit_try_run_case+0x170/0x3f0
[   19.543237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.543316]  kthread+0x328/0x630
[   19.543391]  ret_from_fork+0x10/0x20
[   19.543441] 
[   19.543475] The buggy address belongs to the object at fff00000c7ab9600
[   19.543475]  which belongs to the cache kmalloc-64 of size 64
[   19.543544] The buggy address is located 0 bytes to the right of
[   19.543544]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.543609] 
[   19.543630] The buggy address belongs to the physical page:
[   19.543664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.543735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.543786] page_type: f5(slab)
[   19.543823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.543886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.543953] page dumped because: kasan: bad access detected
[   19.543995] 
[   19.544064] Memory state around the buggy address:
[   19.544110]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544158]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544203] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.544250]                                      ^
[   19.544291]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544813]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.545247] ==================================================================
[   19.558025] ==================================================================
[   19.558148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.558249] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.558301] 
[   19.558351] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.558482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.558540] Hardware name: linux,dummy-virt (DT)
[   19.558575] Call trace:
[   19.558602]  show_stack+0x20/0x38 (C)
[   19.558698]  dump_stack_lvl+0x8c/0xd0
[   19.558751]  print_report+0x118/0x5d0
[   19.558806]  kasan_report+0xdc/0x128
[   19.558862]  kasan_check_range+0x100/0x1a8
[   19.558911]  __kasan_check_write+0x20/0x30
[   19.558957]  kasan_atomics_helper+0x1128/0x4858
[   19.559007]  kasan_atomics+0x198/0x2e0
[   19.559052]  kunit_try_run_case+0x170/0x3f0
[   19.559100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.559152]  kthread+0x328/0x630
[   19.559196]  ret_from_fork+0x10/0x20
[   19.559244] 
[   19.559266] Allocated by task 265:
[   19.559294]  kasan_save_stack+0x3c/0x68
[   19.559349]  kasan_save_track+0x20/0x40
[   19.559388]  kasan_save_alloc_info+0x40/0x58
[   19.559440]  __kasan_kmalloc+0xd4/0xd8
[   19.559478]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.559519]  kasan_atomics+0xb8/0x2e0
[   19.559571]  kunit_try_run_case+0x170/0x3f0
[   19.559616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.559663]  kthread+0x328/0x630
[   19.559705]  ret_from_fork+0x10/0x20
[   19.559752] 
[   19.559775] The buggy address belongs to the object at fff00000c7ab9600
[   19.559775]  which belongs to the cache kmalloc-64 of size 64
[   19.559843] The buggy address is located 0 bytes to the right of
[   19.559843]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.559910] 
[   19.559940] The buggy address belongs to the physical page:
[   19.559983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.560037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.560088] page_type: f5(slab)
[   19.560127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.560184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.560232] page dumped because: kasan: bad access detected
[   19.560267] 
[   19.560287] Memory state around the buggy address:
[   19.560685]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.560809]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.560857] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.561911]                                      ^
[   19.561978]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.562046]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.562112] ==================================================================
[   19.487553] ==================================================================
[   19.487608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.487660] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.487856] 
[   19.488303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.488638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.488842] Hardware name: linux,dummy-virt (DT)
[   19.488993] Call trace:
[   19.489096]  show_stack+0x20/0x38 (C)
[   19.489289]  dump_stack_lvl+0x8c/0xd0
[   19.489362]  print_report+0x118/0x5d0
[   19.489606]  kasan_report+0xdc/0x128
[   19.489725]  __asan_report_store8_noabort+0x20/0x30
[   19.489953]  kasan_atomics_helper+0x3e5c/0x4858
[   19.490121]  kasan_atomics+0x198/0x2e0
[   19.490174]  kunit_try_run_case+0x170/0x3f0
[   19.490225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490278]  kthread+0x328/0x630
[   19.490776]  ret_from_fork+0x10/0x20
[   19.491413] 
[   19.491463] Allocated by task 265:
[   19.491645]  kasan_save_stack+0x3c/0x68
[   19.492047]  kasan_save_track+0x20/0x40
[   19.492172]  kasan_save_alloc_info+0x40/0x58
[   19.492250]  __kasan_kmalloc+0xd4/0xd8
[   19.492292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.492510]  kasan_atomics+0xb8/0x2e0
[   19.492834]  kunit_try_run_case+0x170/0x3f0
[   19.492945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493099]  kthread+0x328/0x630
[   19.493140]  ret_from_fork+0x10/0x20
[   19.493485] 
[   19.493609] The buggy address belongs to the object at fff00000c7ab9600
[   19.493609]  which belongs to the cache kmalloc-64 of size 64
[   19.493960] The buggy address is located 0 bytes to the right of
[   19.493960]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.494303] 
[   19.494603] The buggy address belongs to the physical page:
[   19.494650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.494848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.495002] page_type: f5(slab)
[   19.495145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.495216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.495266] page dumped because: kasan: bad access detected
[   19.495302] 
[   19.495335] Memory state around the buggy address:
[   19.495376]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495424]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495477] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.495517]                                      ^
[   19.495560]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495621]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495663] ==================================================================
[   19.593963] ==================================================================
[   19.594076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.594171] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.594345] 
[   19.594385] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.594471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.594825] Hardware name: linux,dummy-virt (DT)
[   19.594917] Call trace:
[   19.595101]  show_stack+0x20/0x38 (C)
[   19.595290]  dump_stack_lvl+0x8c/0xd0
[   19.595410]  print_report+0x118/0x5d0
[   19.595463]  kasan_report+0xdc/0x128
[   19.595549]  kasan_check_range+0x100/0x1a8
[   19.595778]  __kasan_check_write+0x20/0x30
[   19.595995]  kasan_atomics_helper+0x12d8/0x4858
[   19.596064]  kasan_atomics+0x198/0x2e0
[   19.596330]  kunit_try_run_case+0x170/0x3f0
[   19.596411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.596606]  kthread+0x328/0x630
[   19.596700]  ret_from_fork+0x10/0x20
[   19.596838] 
[   19.596870] Allocated by task 265:
[   19.596907]  kasan_save_stack+0x3c/0x68
[   19.597424]  kasan_save_track+0x20/0x40
[   19.597672]  kasan_save_alloc_info+0x40/0x58
[   19.597749]  __kasan_kmalloc+0xd4/0xd8
[   19.597924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.598386]  kasan_atomics+0xb8/0x2e0
[   19.598493]  kunit_try_run_case+0x170/0x3f0
[   19.598557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.598892]  kthread+0x328/0x630
[   19.599035]  ret_from_fork+0x10/0x20
[   19.599702] 
[   19.599898] The buggy address belongs to the object at fff00000c7ab9600
[   19.599898]  which belongs to the cache kmalloc-64 of size 64
[   19.600471] The buggy address is located 0 bytes to the right of
[   19.600471]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.600557] 
[   19.600582] The buggy address belongs to the physical page:
[   19.600617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.600672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.600730] page_type: f5(slab)
[   19.601068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.601127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.601306] page dumped because: kasan: bad access detected
[   19.601362] 
[   19.601403] Memory state around the buggy address:
[   19.601469]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.601530]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.601576] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.601616]                                      ^
[   19.601659]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601719]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601757] ==================================================================
[   19.496138] ==================================================================
[   19.496199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.496250] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.496317] 
[   19.496361] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.496904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.497366] Hardware name: linux,dummy-virt (DT)
[   19.497403] Call trace:
[   19.497427]  show_stack+0x20/0x38 (C)
[   19.497483]  dump_stack_lvl+0x8c/0xd0
[   19.497583]  print_report+0x118/0x5d0
[   19.497867]  kasan_report+0xdc/0x128
[   19.498167]  kasan_check_range+0x100/0x1a8
[   19.498294]  __kasan_check_write+0x20/0x30
[   19.498519]  kasan_atomics_helper+0xeb8/0x4858
[   19.498655]  kasan_atomics+0x198/0x2e0
[   19.498943]  kunit_try_run_case+0x170/0x3f0
[   19.499211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.499569]  kthread+0x328/0x630
[   19.499729]  ret_from_fork+0x10/0x20
[   19.499846] 
[   19.500203] Allocated by task 265:
[   19.500423]  kasan_save_stack+0x3c/0x68
[   19.500715]  kasan_save_track+0x20/0x40
[   19.500984]  kasan_save_alloc_info+0x40/0x58
[   19.501147]  __kasan_kmalloc+0xd4/0xd8
[   19.501336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.501443]  kasan_atomics+0xb8/0x2e0
[   19.501597]  kunit_try_run_case+0x170/0x3f0
[   19.501734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501815]  kthread+0x328/0x630
[   19.501849]  ret_from_fork+0x10/0x20
[   19.502054] 
[   19.502196] The buggy address belongs to the object at fff00000c7ab9600
[   19.502196]  which belongs to the cache kmalloc-64 of size 64
[   19.502364] The buggy address is located 0 bytes to the right of
[   19.502364]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.502831] 
[   19.502871] The buggy address belongs to the physical page:
[   19.503111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.503459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.503643] page_type: f5(slab)
[   19.503747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.503969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.504182] page dumped because: kasan: bad access detected
[   19.504427] 
[   19.504498] Memory state around the buggy address:
[   19.504809]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.505014]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.505427] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.505625]                                      ^
[   19.505860]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506022]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506135] ==================================================================
[   19.466751] ==================================================================
[   19.466804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.466858] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.466909] 
[   19.467117] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.467338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.467371] Hardware name: linux,dummy-virt (DT)
[   19.467405] Call trace:
[   19.467429]  show_stack+0x20/0x38 (C)
[   19.467488]  dump_stack_lvl+0x8c/0xd0
[   19.467538]  print_report+0x118/0x5d0
[   19.467593]  kasan_report+0xdc/0x128
[   19.467650]  __asan_report_load8_noabort+0x20/0x30
[   19.467704]  kasan_atomics_helper+0x3f58/0x4858
[   19.467752]  kasan_atomics+0x198/0x2e0
[   19.467801]  kunit_try_run_case+0x170/0x3f0
[   19.467852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.467908]  kthread+0x328/0x630
[   19.467951]  ret_from_fork+0x10/0x20
[   19.468000] 
[   19.468021] Allocated by task 265:
[   19.468068]  kasan_save_stack+0x3c/0x68
[   19.468120]  kasan_save_track+0x20/0x40
[   19.468175]  kasan_save_alloc_info+0x40/0x58
[   19.468217]  __kasan_kmalloc+0xd4/0xd8
[   19.468256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.468297]  kasan_atomics+0xb8/0x2e0
[   19.468804]  kunit_try_run_case+0x170/0x3f0
[   19.469076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.470020]  kthread+0x328/0x630
[   19.470094]  ret_from_fork+0x10/0x20
[   19.470157] 
[   19.470218] The buggy address belongs to the object at fff00000c7ab9600
[   19.470218]  which belongs to the cache kmalloc-64 of size 64
[   19.470505] The buggy address is located 0 bytes to the right of
[   19.470505]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.470796] 
[   19.471207] The buggy address belongs to the physical page:
[   19.471419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.471795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.471879] page_type: f5(slab)
[   19.472408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.472472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.472514] page dumped because: kasan: bad access detected
[   19.473263] 
[   19.473384] Memory state around the buggy address:
[   19.473519]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.473788]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.474152] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.474297]                                      ^
[   19.474390]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474441]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474479] ==================================================================
[   19.574119] ==================================================================
[   19.574183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.574439] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.574501] 
[   19.574622] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.574711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.574740] Hardware name: linux,dummy-virt (DT)
[   19.574844] Call trace:
[   19.574872]  show_stack+0x20/0x38 (C)
[   19.574926]  dump_stack_lvl+0x8c/0xd0
[   19.574983]  print_report+0x118/0x5d0
[   19.575030]  kasan_report+0xdc/0x128
[   19.575336]  kasan_check_range+0x100/0x1a8
[   19.575742]  __kasan_check_write+0x20/0x30
[   19.575861]  kasan_atomics_helper+0x11f8/0x4858
[   19.575994]  kasan_atomics+0x198/0x2e0
[   19.576241]  kunit_try_run_case+0x170/0x3f0
[   19.576494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.576712]  kthread+0x328/0x630
[   19.576798]  ret_from_fork+0x10/0x20
[   19.577044] 
[   19.577155] Allocated by task 265:
[   19.577234]  kasan_save_stack+0x3c/0x68
[   19.577578]  kasan_save_track+0x20/0x40
[   19.577827]  kasan_save_alloc_info+0x40/0x58
[   19.577911]  __kasan_kmalloc+0xd4/0xd8
[   19.578342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.578449]  kasan_atomics+0xb8/0x2e0
[   19.578790]  kunit_try_run_case+0x170/0x3f0
[   19.579005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.579103]  kthread+0x328/0x630
[   19.579287]  ret_from_fork+0x10/0x20
[   19.579472] 
[   19.579526] The buggy address belongs to the object at fff00000c7ab9600
[   19.579526]  which belongs to the cache kmalloc-64 of size 64
[   19.579860] The buggy address is located 0 bytes to the right of
[   19.579860]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.579963] 
[   19.580094] The buggy address belongs to the physical page:
[   19.580183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.580262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.580314] page_type: f5(slab)
[   19.580367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.580430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.580472] page dumped because: kasan: bad access detected
[   19.580516] 
[   19.580537] Memory state around the buggy address:
[   19.580578]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.580624]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.580669] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.580717]                                      ^
[   19.580752]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.580796]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.580835] ==================================================================
[   19.684157] ==================================================================
[   19.684249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.684438] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.684513] 
[   19.684709] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.684967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.685020] Hardware name: linux,dummy-virt (DT)
[   19.685177] Call trace:
[   19.685254]  show_stack+0x20/0x38 (C)
[   19.685328]  dump_stack_lvl+0x8c/0xd0
[   19.685572]  print_report+0x118/0x5d0
[   19.685919]  kasan_report+0xdc/0x128
[   19.686199]  __asan_report_load8_noabort+0x20/0x30
[   19.686426]  kasan_atomics_helper+0x3df4/0x4858
[   19.686565]  kasan_atomics+0x198/0x2e0
[   19.686619]  kunit_try_run_case+0x170/0x3f0
[   19.686677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.686746]  kthread+0x328/0x630
[   19.686808]  ret_from_fork+0x10/0x20
[   19.686867] 
[   19.686897] Allocated by task 265:
[   19.686942]  kasan_save_stack+0x3c/0x68
[   19.686995]  kasan_save_track+0x20/0x40
[   19.687045]  kasan_save_alloc_info+0x40/0x58
[   19.687086]  __kasan_kmalloc+0xd4/0xd8
[   19.687135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.687191]  kasan_atomics+0xb8/0x2e0
[   19.687227]  kunit_try_run_case+0x170/0x3f0
[   19.687276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.687332]  kthread+0x328/0x630
[   19.687374]  ret_from_fork+0x10/0x20
[   19.687413] 
[   19.687449] The buggy address belongs to the object at fff00000c7ab9600
[   19.687449]  which belongs to the cache kmalloc-64 of size 64
[   19.687510] The buggy address is located 0 bytes to the right of
[   19.687510]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.687577] 
[   19.687607] The buggy address belongs to the physical page:
[   19.687639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.687702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.687755] page_type: f5(slab)
[   19.687794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.687857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.687915] page dumped because: kasan: bad access detected
[   19.687950] 
[   19.687969] Memory state around the buggy address:
[   19.688003]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.688058]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.688105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.688145]                                      ^
[   19.688197]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688254]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688302] ==================================================================
[   19.690616] ==================================================================
[   19.690679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.690732] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.690965] 
[   19.691027] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.691121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.691149] Hardware name: linux,dummy-virt (DT)
[   19.691477] Call trace:
[   19.691530]  show_stack+0x20/0x38 (C)
[   19.691957]  dump_stack_lvl+0x8c/0xd0
[   19.692034]  print_report+0x118/0x5d0
[   19.692238]  kasan_report+0xdc/0x128
[   19.692398]  kasan_check_range+0x100/0x1a8
[   19.692616]  __kasan_check_write+0x20/0x30
[   19.692729]  kasan_atomics_helper+0x16d0/0x4858
[   19.692938]  kasan_atomics+0x198/0x2e0
[   19.693130]  kunit_try_run_case+0x170/0x3f0
[   19.693233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.693406]  kthread+0x328/0x630
[   19.693478]  ret_from_fork+0x10/0x20
[   19.693551] 
[   19.693572] Allocated by task 265:
[   19.693788]  kasan_save_stack+0x3c/0x68
[   19.693997]  kasan_save_track+0x20/0x40
[   19.694069]  kasan_save_alloc_info+0x40/0x58
[   19.694475]  __kasan_kmalloc+0xd4/0xd8
[   19.694559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.694751]  kasan_atomics+0xb8/0x2e0
[   19.694842]  kunit_try_run_case+0x170/0x3f0
[   19.694890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.695130]  kthread+0x328/0x630
[   19.695351]  ret_from_fork+0x10/0x20
[   19.695913] 
[   19.696222] The buggy address belongs to the object at fff00000c7ab9600
[   19.696222]  which belongs to the cache kmalloc-64 of size 64
[   19.696332] The buggy address is located 0 bytes to the right of
[   19.696332]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.696509] 
[   19.696705] The buggy address belongs to the physical page:
[   19.696893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.696979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.697316] page_type: f5(slab)
[   19.697450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.697881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.698263] page dumped because: kasan: bad access detected
[   19.698436] 
[   19.698542] Memory state around the buggy address:
[   19.698891]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.699021]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.699072] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.699533]                                      ^
[   19.699797]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700114]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700200] ==================================================================
[   19.582710] ==================================================================
[   19.582772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.582899] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.582974] 
[   19.583173] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.583716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.583872] Hardware name: linux,dummy-virt (DT)
[   19.583905] Call trace:
[   19.583932]  show_stack+0x20/0x38 (C)
[   19.583985]  dump_stack_lvl+0x8c/0xd0
[   19.584035]  print_report+0x118/0x5d0
[   19.584081]  kasan_report+0xdc/0x128
[   19.584128]  kasan_check_range+0x100/0x1a8
[   19.584183]  __kasan_check_write+0x20/0x30
[   19.584230]  kasan_atomics_helper+0x126c/0x4858
[   19.584280]  kasan_atomics+0x198/0x2e0
[   19.584336]  kunit_try_run_case+0x170/0x3f0
[   19.586054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.586433]  kthread+0x328/0x630
[   19.586541]  ret_from_fork+0x10/0x20
[   19.586686] 
[   19.586822] Allocated by task 265:
[   19.586884]  kasan_save_stack+0x3c/0x68
[   19.586941]  kasan_save_track+0x20/0x40
[   19.587169]  kasan_save_alloc_info+0x40/0x58
[   19.587299]  __kasan_kmalloc+0xd4/0xd8
[   19.587409]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.587887]  kasan_atomics+0xb8/0x2e0
[   19.588203]  kunit_try_run_case+0x170/0x3f0
[   19.588280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588365]  kthread+0x328/0x630
[   19.588448]  ret_from_fork+0x10/0x20
[   19.588490] 
[   19.588513] The buggy address belongs to the object at fff00000c7ab9600
[   19.588513]  which belongs to the cache kmalloc-64 of size 64
[   19.588934] The buggy address is located 0 bytes to the right of
[   19.588934]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.589235] 
[   19.589276] The buggy address belongs to the physical page:
[   19.589312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.589378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.589862] page_type: f5(slab)
[   19.590174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.590363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.590419] page dumped because: kasan: bad access detected
[   19.590813] 
[   19.590864] Memory state around the buggy address:
[   19.591355]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591414]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591756] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.592165]                                      ^
[   19.592308]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.592370]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.592410] ==================================================================
[   19.429102] ==================================================================
[   19.429179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.429275] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.429408] 
[   19.429441] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.429529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.429585] Hardware name: linux,dummy-virt (DT)
[   19.429617] Call trace:
[   19.429640]  show_stack+0x20/0x38 (C)
[   19.429716]  dump_stack_lvl+0x8c/0xd0
[   19.429765]  print_report+0x118/0x5d0
[   19.429971]  kasan_report+0xdc/0x128
[   19.430021]  __asan_report_load4_noabort+0x20/0x30
[   19.430076]  kasan_atomics_helper+0x3dd8/0x4858
[   19.430127]  kasan_atomics+0x198/0x2e0
[   19.430174]  kunit_try_run_case+0x170/0x3f0
[   19.430234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430379]  kthread+0x328/0x630
[   19.430472]  ret_from_fork+0x10/0x20
[   19.430541] 
[   19.430564] Allocated by task 265:
[   19.430593]  kasan_save_stack+0x3c/0x68
[   19.430636]  kasan_save_track+0x20/0x40
[   19.430676]  kasan_save_alloc_info+0x40/0x58
[   19.430718]  __kasan_kmalloc+0xd4/0xd8
[   19.430766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.430807]  kasan_atomics+0xb8/0x2e0
[   19.430846]  kunit_try_run_case+0x170/0x3f0
[   19.430896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430952]  kthread+0x328/0x630
[   19.430988]  ret_from_fork+0x10/0x20
[   19.431038] 
[   19.431062] The buggy address belongs to the object at fff00000c7ab9600
[   19.431062]  which belongs to the cache kmalloc-64 of size 64
[   19.431121] The buggy address is located 0 bytes to the right of
[   19.431121]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.431187] 
[   19.431210] The buggy address belongs to the physical page:
[   19.431245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.431300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.431359] page_type: f5(slab)
[   19.431397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.431459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.431510] page dumped because: kasan: bad access detected
[   19.431542] 
[   19.431563] Memory state around the buggy address:
[   19.431594]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.431640]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.431689] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.431728]                                      ^
[   19.431764]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431809]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431857] ==================================================================
[   19.652009] ==================================================================
[   19.652439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.652519] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.652817] 
[   19.652862] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.653260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.653315] Hardware name: linux,dummy-virt (DT)
[   19.653364] Call trace:
[   19.653389]  show_stack+0x20/0x38 (C)
[   19.653444]  dump_stack_lvl+0x8c/0xd0
[   19.653493]  print_report+0x118/0x5d0
[   19.653922]  kasan_report+0xdc/0x128
[   19.653994]  kasan_check_range+0x100/0x1a8
[   19.654194]  __kasan_check_write+0x20/0x30
[   19.654380]  kasan_atomics_helper+0x154c/0x4858
[   19.654516]  kasan_atomics+0x198/0x2e0
[   19.654590]  kunit_try_run_case+0x170/0x3f0
[   19.654651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.654705]  kthread+0x328/0x630
[   19.654775]  ret_from_fork+0x10/0x20
[   19.654841] 
[   19.654867] Allocated by task 265:
[   19.654918]  kasan_save_stack+0x3c/0x68
[   19.654983]  kasan_save_track+0x20/0x40
[   19.655024]  kasan_save_alloc_info+0x40/0x58
[   19.655064]  __kasan_kmalloc+0xd4/0xd8
[   19.655122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.655165]  kasan_atomics+0xb8/0x2e0
[   19.655204]  kunit_try_run_case+0x170/0x3f0
[   19.655242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655287]  kthread+0x328/0x630
[   19.655343]  ret_from_fork+0x10/0x20
[   19.655381] 
[   19.655404] The buggy address belongs to the object at fff00000c7ab9600
[   19.655404]  which belongs to the cache kmalloc-64 of size 64
[   19.655465] The buggy address is located 0 bytes to the right of
[   19.655465]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.655551] 
[   19.655588] The buggy address belongs to the physical page:
[   19.655630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.655708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.655758] page_type: f5(slab)
[   19.655798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.655851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.655894] page dumped because: kasan: bad access detected
[   19.655944] 
[   19.655972] Memory state around the buggy address:
[   19.656015]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656060]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.656164]                                      ^
[   19.656206]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.656258]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.656329] ==================================================================
[   19.519108] ==================================================================
[   19.519162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.519214] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.519267] 
[   19.519302] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.519400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.519429] Hardware name: linux,dummy-virt (DT)
[   19.519460] Call trace:
[   19.519797]  show_stack+0x20/0x38 (C)
[   19.519890]  dump_stack_lvl+0x8c/0xd0
[   19.519941]  print_report+0x118/0x5d0
[   19.519998]  kasan_report+0xdc/0x128
[   19.520055]  kasan_check_range+0x100/0x1a8
[   19.520104]  __kasan_check_write+0x20/0x30
[   19.520157]  kasan_atomics_helper+0xf88/0x4858
[   19.520207]  kasan_atomics+0x198/0x2e0
[   19.520252]  kunit_try_run_case+0x170/0x3f0
[   19.520300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520891]  kthread+0x328/0x630
[   19.521080]  ret_from_fork+0x10/0x20
[   19.521159] 
[   19.521188] Allocated by task 265:
[   19.521221]  kasan_save_stack+0x3c/0x68
[   19.521264]  kasan_save_track+0x20/0x40
[   19.521305]  kasan_save_alloc_info+0x40/0x58
[   19.521356]  __kasan_kmalloc+0xd4/0xd8
[   19.521395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.521989]  kasan_atomics+0xb8/0x2e0
[   19.522181]  kunit_try_run_case+0x170/0x3f0
[   19.522254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522644]  kthread+0x328/0x630
[   19.522857]  ret_from_fork+0x10/0x20
[   19.523004] 
[   19.523251] The buggy address belongs to the object at fff00000c7ab9600
[   19.523251]  which belongs to the cache kmalloc-64 of size 64
[   19.523388] The buggy address is located 0 bytes to the right of
[   19.523388]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.523832] 
[   19.523873] The buggy address belongs to the physical page:
[   19.524006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.524107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.524293] page_type: f5(slab)
[   19.524410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.524874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.524944] page dumped because: kasan: bad access detected
[   19.524979] 
[   19.525000] Memory state around the buggy address:
[   19.525038]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525084]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525374] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.525915]                                      ^
[   19.526094]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526176]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526564] ==================================================================
[   19.632706] ==================================================================
[   19.632903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.632996] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.633148] 
[   19.633216] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.633378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.633433] Hardware name: linux,dummy-virt (DT)
[   19.633475] Call trace:
[   19.633501]  show_stack+0x20/0x38 (C)
[   19.633792]  dump_stack_lvl+0x8c/0xd0
[   19.633962]  print_report+0x118/0x5d0
[   19.634368]  kasan_report+0xdc/0x128
[   19.634514]  kasan_check_range+0x100/0x1a8
[   19.634619]  __kasan_check_write+0x20/0x30
[   19.634696]  kasan_atomics_helper+0x147c/0x4858
[   19.635106]  kasan_atomics+0x198/0x2e0
[   19.635350]  kunit_try_run_case+0x170/0x3f0
[   19.635712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.635837]  kthread+0x328/0x630
[   19.635908]  ret_from_fork+0x10/0x20
[   19.636327] 
[   19.636380] Allocated by task 265:
[   19.636619]  kasan_save_stack+0x3c/0x68
[   19.636690]  kasan_save_track+0x20/0x40
[   19.637006]  kasan_save_alloc_info+0x40/0x58
[   19.637118]  __kasan_kmalloc+0xd4/0xd8
[   19.637285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.637346]  kasan_atomics+0xb8/0x2e0
[   19.637497]  kunit_try_run_case+0x170/0x3f0
[   19.637546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637666]  kthread+0x328/0x630
[   19.637913]  ret_from_fork+0x10/0x20
[   19.637981] 
[   19.638015] The buggy address belongs to the object at fff00000c7ab9600
[   19.638015]  which belongs to the cache kmalloc-64 of size 64
[   19.638082] The buggy address is located 0 bytes to the right of
[   19.638082]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.638148] 
[   19.638172] The buggy address belongs to the physical page:
[   19.638206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.638271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.638333] page_type: f5(slab)
[   19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.638775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.639005] page dumped because: kasan: bad access detected
[   19.639080] 
[   19.639287] Memory state around the buggy address:
[   19.639435]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.639581]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.639953] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.640027]                                      ^
[   19.640296]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640372]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640412] ==================================================================
[   19.642504] ==================================================================
[   19.642794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.642986] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.643050] 
[   19.643086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.643297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.643364] Hardware name: linux,dummy-virt (DT)
[   19.643400] Call trace:
[   19.643712]  show_stack+0x20/0x38 (C)
[   19.643976]  dump_stack_lvl+0x8c/0xd0
[   19.644232]  print_report+0x118/0x5d0
[   19.644300]  kasan_report+0xdc/0x128
[   19.644427]  kasan_check_range+0x100/0x1a8
[   19.644482]  __kasan_check_write+0x20/0x30
[   19.644692]  kasan_atomics_helper+0x14e4/0x4858
[   19.644750]  kasan_atomics+0x198/0x2e0
[   19.644798]  kunit_try_run_case+0x170/0x3f0
[   19.644846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.644900]  kthread+0x328/0x630
[   19.645595]  ret_from_fork+0x10/0x20
[   19.645746] 
[   19.645812] Allocated by task 265:
[   19.645853]  kasan_save_stack+0x3c/0x68
[   19.645904]  kasan_save_track+0x20/0x40
[   19.645945]  kasan_save_alloc_info+0x40/0x58
[   19.646002]  __kasan_kmalloc+0xd4/0xd8
[   19.646041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.646092]  kasan_atomics+0xb8/0x2e0
[   19.646139]  kunit_try_run_case+0x170/0x3f0
[   19.646187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.646233]  kthread+0x328/0x630
[   19.646268]  ret_from_fork+0x10/0x20
[   19.646305] 
[   19.646704] The buggy address belongs to the object at fff00000c7ab9600
[   19.646704]  which belongs to the cache kmalloc-64 of size 64
[   19.646777] The buggy address is located 0 bytes to the right of
[   19.646777]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.647632] 
[   19.647867] The buggy address belongs to the physical page:
[   19.647935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.648027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.648101] page_type: f5(slab)
[   19.648373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.648578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.648956] page dumped because: kasan: bad access detected
[   19.649267] 
[   19.649394] Memory state around the buggy address:
[   19.649682]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.649855]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.650011] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.650059]                                      ^
[   19.650113]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650338]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650859] ==================================================================
[   19.383243] ==================================================================
[   19.383299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.383365] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.383417] 
[   19.383450] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.383533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.383563] Hardware name: linux,dummy-virt (DT)
[   19.383596] Call trace:
[   19.383621]  show_stack+0x20/0x38 (C)
[   19.383668]  dump_stack_lvl+0x8c/0xd0
[   19.383716]  print_report+0x118/0x5d0
[   19.383765]  kasan_report+0xdc/0x128
[   19.383831]  kasan_check_range+0x100/0x1a8
[   19.383943]  __kasan_check_write+0x20/0x30
[   19.384012]  kasan_atomics_helper+0x99c/0x4858
[   19.384062]  kasan_atomics+0x198/0x2e0
[   19.384109]  kunit_try_run_case+0x170/0x3f0
[   19.384162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.384225]  kthread+0x328/0x630
[   19.384270]  ret_from_fork+0x10/0x20
[   19.384328] 
[   19.384349] Allocated by task 265:
[   19.384387]  kasan_save_stack+0x3c/0x68
[   19.384440]  kasan_save_track+0x20/0x40
[   19.384515]  kasan_save_alloc_info+0x40/0x58
[   19.384562]  __kasan_kmalloc+0xd4/0xd8
[   19.384601]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.384643]  kasan_atomics+0xb8/0x2e0
[   19.384681]  kunit_try_run_case+0x170/0x3f0
[   19.384720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.384766]  kthread+0x328/0x630
[   19.384800]  ret_from_fork+0x10/0x20
[   19.384838] 
[   19.384859] The buggy address belongs to the object at fff00000c7ab9600
[   19.384859]  which belongs to the cache kmalloc-64 of size 64
[   19.384917] The buggy address is located 0 bytes to the right of
[   19.384917]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.385034] 
[   19.385122] The buggy address belongs to the physical page:
[   19.385162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.385287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.385472] page_type: f5(slab)
[   19.385512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.385567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.385608] page dumped because: kasan: bad access detected
[   19.385643] 
[   19.385663] Memory state around the buggy address:
[   19.385698]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.386804] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.387914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.387968]  kthread+0x328/0x630
[   19.388012]  ret_from_fork+0x10/0x20
[   19.388059] 
[   19.388080] Allocated by task 265:
[   19.388120]  kasan_save_stack+0x3c/0x68
[   19.388169]  kasan_save_track+0x20/0x40
[   19.388209]  kasan_save_alloc_info+0x40/0x58
[   19.388250]  __kasan_kmalloc+0xd4/0xd8
[   19.388432]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.388500]  kasan_atomics+0xb8/0x2e0
[   19.388540]  kunit_try_run_case+0x170/0x3f0
[   19.388580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388626]  kthread+0x328/0x630
[   19.388660]  ret_from_fork+0x10/0x20
[   19.388696] 
[   19.388718] The buggy address belongs to the object at fff00000c7ab9600
[   19.388718]  which belongs to the cache kmalloc-64 of size 64
[   19.388776] The buggy address is located 0 bytes to the right of
[   19.388776]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.388842] 
[   19.388885] The buggy address belongs to the physical page:
[   19.388920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.388972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.389021] page_type: f5(slab)
[   19.389059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.389110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.389152] page dumped because: kasan: bad access detected
[   19.389186] 
[   19.389205] Memory state around the buggy address:
[   19.389508] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.390473] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.391380]  __kasan_check_write+0x20/0x30
[   19.391904] 
[   19.391943] Allocated by task 265:
[   19.392001]  kasan_save_stack+0x3c/0x68
[   19.392046]  kasan_save_track+0x20/0x40
[   19.392118]  kasan_save_alloc_info+0x40/0x58
[   19.392196]  __kasan_kmalloc+0xd4/0xd8
[   19.392281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.392332]  kasan_atomics+0xb8/0x2e0
[   19.392379]  kunit_try_run_case+0x170/0x3f0
[   19.392419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.392473]  kthread+0x328/0x630
[   19.392539]  ret_from_fork+0x10/0x20
[   19.392576] 
[   19.392599] The buggy address belongs to the object at fff00000c7ab9600
[   19.392599]  which belongs to the cache kmalloc-64 of size 64
[   19.392776] The buggy address is located 0 bytes to the right of
[   19.392776]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.392919] 
[   19.393047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.394087]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394315] ==================================================================
[   19.719765] ==================================================================
[   19.720143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.720218] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.720507] 
[   19.720806] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.720938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.721235] Hardware name: linux,dummy-virt (DT)
[   19.721292] Call trace:
[   19.721316]  show_stack+0x20/0x38 (C)
[   19.721383]  dump_stack_lvl+0x8c/0xd0
[   19.721834]  print_report+0x118/0x5d0
[   19.722302]  kasan_report+0xdc/0x128
[   19.722731]  __asan_report_load8_noabort+0x20/0x30
[   19.722897]  kasan_atomics_helper+0x3e20/0x4858
[   19.723057]  kasan_atomics+0x198/0x2e0
[   19.723199]  kunit_try_run_case+0x170/0x3f0
[   19.723250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.723492]  kthread+0x328/0x630
[   19.723704]  ret_from_fork+0x10/0x20
[   19.723988] 
[   19.724148] Allocated by task 265:
[   19.724197]  kasan_save_stack+0x3c/0x68
[   19.724444]  kasan_save_track+0x20/0x40
[   19.724646]  kasan_save_alloc_info+0x40/0x58
[   19.725130]  __kasan_kmalloc+0xd4/0xd8
[   19.725297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.725412]  kasan_atomics+0xb8/0x2e0
[   19.725451]  kunit_try_run_case+0x170/0x3f0
[   19.725492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.725536]  kthread+0x328/0x630
[   19.725572]  ret_from_fork+0x10/0x20
[   19.725608] 
[   19.725925] The buggy address belongs to the object at fff00000c7ab9600
[   19.725925]  which belongs to the cache kmalloc-64 of size 64
[   19.726412] The buggy address is located 0 bytes to the right of
[   19.726412]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.726499] 
[   19.726522] The buggy address belongs to the physical page:
[   19.727100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.727185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.727249] page_type: f5(slab)
[   19.727303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.727368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.727422] page dumped because: kasan: bad access detected
[   19.727457] 
[   19.727487] Memory state around the buggy address:
[   19.727532]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727585]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727641] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.727681]                                      ^
[   19.727717]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727763]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727812] ==================================================================
[   19.273888] ==================================================================
[   19.274899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   19.276181]  kasan_atomics_helper+0x414/0x4858
[   19.276240]  kasan_atomics+0x198/0x2e0
[   19.276845] 
[   19.278895]  __kasan_kmalloc+0xd4/0xd8
[   19.281364] The buggy address is located 0 bytes to the right of
[   19.281364]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.281786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.283145]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.284038]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.286315] Hardware name: linux,dummy-virt (DT)
[   19.287051] 
[   19.288765] 
[   19.289707] 
[   19.289944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.291719]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.292690]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.295024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.295819]  kasan_report+0xdc/0x128
[   19.296866]  kthread+0x328/0x630
[   19.297656]  kasan_save_track+0x20/0x40
[   19.298091]  kunit_try_run_case+0x170/0x3f0
[   19.299615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.300157] page dumped because: kasan: bad access detected
[   19.301013]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.303655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   19.304391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.305344]  __kasan_check_write+0x20/0x30
[   19.305834]  kasan_save_alloc_info+0x40/0x58
[   19.306042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.306372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.306571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.306866]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.307110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   19.307778]  print_report+0x118/0x5d0
[   19.308821]  __kasan_check_write+0x20/0x30
[   19.309505]  kthread+0x328/0x630
[   19.309878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.310115]  ret_from_fork+0x10/0x20
[   19.311844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.313272]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.314128]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.315898] 
[   19.316440]  __kasan_check_write+0x20/0x30
[   19.318665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.320201] 
[   19.320230] The buggy address belongs to the physical page:
[   19.320403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.320663] page dumped because: kasan: bad access detected
[   19.320803]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.321052] ==================================================================
[   19.431979] ==================================================================
[   19.432020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.432065] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.432115] 
[   19.432144] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.432235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.432262] Hardware name: linux,dummy-virt (DT)
[   19.432295] Call trace:
[   19.436129]  show_stack+0x20/0x38 (C)
[   19.436335]  dump_stack_lvl+0x8c/0xd0
[   19.436392]  print_report+0x118/0x5d0
[   19.436830]  kasan_report+0xdc/0x128
[   19.436895]  kasan_check_range+0x100/0x1a8
[   19.437388]  __kasan_check_write+0x20/0x30
[   19.437902]  kasan_atomics_helper+0xd3c/0x4858
[   19.438154]  kasan_atomics+0x198/0x2e0
[   19.438548]  kunit_try_run_case+0x170/0x3f0
[   19.438785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.438878]  kthread+0x328/0x630
[   19.438980]  ret_from_fork+0x10/0x20
[   19.439374] 
[   19.439605] Allocated by task 265:
[   19.439769]  kasan_save_stack+0x3c/0x68
[   19.439912]  kasan_save_track+0x20/0x40
[   19.440054]  kasan_save_alloc_info+0x40/0x58
[   19.440313]  __kasan_kmalloc+0xd4/0xd8
[   19.440577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.440667]  kasan_atomics+0xb8/0x2e0
[   19.440720]  kunit_try_run_case+0x170/0x3f0
[   19.440774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.440821]  kthread+0x328/0x630
[   19.440860]  ret_from_fork+0x10/0x20
[   19.441418] 
[   19.441649] The buggy address belongs to the object at fff00000c7ab9600
[   19.441649]  which belongs to the cache kmalloc-64 of size 64
[   19.441988] The buggy address is located 0 bytes to the right of
[   19.441988]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.442117] 
[   19.442495] The buggy address belongs to the physical page:
[   19.442555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.442754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443282] page_type: f5(slab)
[   19.443403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443918] page dumped because: kasan: bad access detected
[   19.444074] 
[   19.444121] Memory state around the buggy address:
[   19.444464]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444713]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444780] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.445011]                                      ^
[   19.445057]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445317]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445573] ==================================================================

[   19.223040] ==================================================================
[   19.223096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.223149] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.223200] 
[   19.223231] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.223313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.223342] Hardware name: linux,dummy-virt (DT)
[   19.223375] Call trace:
[   19.223398]  show_stack+0x20/0x38 (C)
[   19.223448]  dump_stack_lvl+0x8c/0xd0
[   19.223494]  print_report+0x118/0x5d0
[   19.223543]  kasan_report+0xdc/0x128
[   19.223588]  kasan_check_range+0x100/0x1a8
[   19.223638]  __kasan_check_write+0x20/0x30
[   19.223685]  kasan_atomics_helper+0xf20/0x4858
[   19.223749]  kasan_atomics+0x198/0x2e0
[   19.223797]  kunit_try_run_case+0x170/0x3f0
[   19.223843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.223897]  kthread+0x328/0x630
[   19.223940]  ret_from_fork+0x10/0x20
[   19.223987] 
[   19.224007] Allocated by task 265:
[   19.224038]  kasan_save_stack+0x3c/0x68
[   19.224079]  kasan_save_track+0x20/0x40
[   19.224119]  kasan_save_alloc_info+0x40/0x58
[   19.224160]  __kasan_kmalloc+0xd4/0xd8
[   19.224199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.224240]  kasan_atomics+0xb8/0x2e0
[   19.224277]  kunit_try_run_case+0x170/0x3f0
[   19.224316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.224388]  kthread+0x328/0x630
[   19.224427]  ret_from_fork+0x10/0x20
[   19.224465] 
[   19.224487] The buggy address belongs to the object at fff00000c63aa000
[   19.224487]  which belongs to the cache kmalloc-64 of size 64
[   19.224546] The buggy address is located 0 bytes to the right of
[   19.224546]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.224855] 
[   19.224883] The buggy address belongs to the physical page:
[   19.224918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.224996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.225046] page_type: f5(slab)
[   19.225131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.225339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.225386] page dumped because: kasan: bad access detected
[   19.226885] 
[   19.226914] Memory state around the buggy address:
[   19.226954]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.227210]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.227265] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.227307]                                      ^
[   19.227342]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.227387]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.227428] ==================================================================
[   19.329064] ==================================================================
[   19.329146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.329266] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.329343] 
[   19.329440] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.329797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.329859] Hardware name: linux,dummy-virt (DT)
[   19.329895] Call trace:
[   19.329919]  show_stack+0x20/0x38 (C)
[   19.329973]  dump_stack_lvl+0x8c/0xd0
[   19.330384]  print_report+0x118/0x5d0
[   19.330485]  kasan_report+0xdc/0x128
[   19.330673]  __asan_report_load8_noabort+0x20/0x30
[   19.330886]  kasan_atomics_helper+0x3db0/0x4858
[   19.330955]  kasan_atomics+0x198/0x2e0
[   19.331388]  kunit_try_run_case+0x170/0x3f0
[   19.331479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.331632]  kthread+0x328/0x630
[   19.331838]  ret_from_fork+0x10/0x20
[   19.331905] 
[   19.331926] Allocated by task 265:
[   19.332319]  kasan_save_stack+0x3c/0x68
[   19.332418]  kasan_save_track+0x20/0x40
[   19.332915]  kasan_save_alloc_info+0x40/0x58
[   19.333059]  __kasan_kmalloc+0xd4/0xd8
[   19.333148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.333299]  kasan_atomics+0xb8/0x2e0
[   19.333400]  kunit_try_run_case+0x170/0x3f0
[   19.333494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.333554]  kthread+0x328/0x630
[   19.333588]  ret_from_fork+0x10/0x20
[   19.333633] 
[   19.333657] The buggy address belongs to the object at fff00000c63aa000
[   19.333657]  which belongs to the cache kmalloc-64 of size 64
[   19.333738] The buggy address is located 0 bytes to the right of
[   19.333738]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.333805] 
[   19.333829] The buggy address belongs to the physical page:
[   19.333864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.333927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.333978] page_type: f5(slab)
[   19.334019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.334083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.334135] page dumped because: kasan: bad access detected
[   19.334177] 
[   19.334199] Memory state around the buggy address:
[   19.334247]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.334304]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.334351] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.334391]                                      ^
[   19.334439]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.334484]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.334526] ==================================================================
[   19.240145] ==================================================================
[   19.240290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.240465] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.240539] 
[   19.240598] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.240680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.240753] Hardware name: linux,dummy-virt (DT)
[   19.240789] Call trace:
[   19.240816]  show_stack+0x20/0x38 (C)
[   19.240868]  dump_stack_lvl+0x8c/0xd0
[   19.240968]  print_report+0x118/0x5d0
[   19.241023]  kasan_report+0xdc/0x128
[   19.241125]  kasan_check_range+0x100/0x1a8
[   19.241175]  __kasan_check_write+0x20/0x30
[   19.241221]  kasan_atomics_helper+0x10c0/0x4858
[   19.241276]  kasan_atomics+0x198/0x2e0
[   19.241344]  kunit_try_run_case+0x170/0x3f0
[   19.241394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.241447]  kthread+0x328/0x630
[   19.241489]  ret_from_fork+0x10/0x20
[   19.241557] 
[   19.241779] Allocated by task 265:
[   19.241819]  kasan_save_stack+0x3c/0x68
[   19.241865]  kasan_save_track+0x20/0x40
[   19.241974]  kasan_save_alloc_info+0x40/0x58
[   19.242048]  __kasan_kmalloc+0xd4/0xd8
[   19.242093]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.242136]  kasan_atomics+0xb8/0x2e0
[   19.242342]  kunit_try_run_case+0x170/0x3f0
[   19.242427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.242492]  kthread+0x328/0x630
[   19.242544]  ret_from_fork+0x10/0x20
[   19.242601] 
[   19.242682] The buggy address belongs to the object at fff00000c63aa000
[   19.242682]  which belongs to the cache kmalloc-64 of size 64
[   19.242857] The buggy address is located 0 bytes to the right of
[   19.242857]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.243005] 
[   19.243105] The buggy address belongs to the physical page:
[   19.243188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.243245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.243306] page_type: f5(slab)
[   19.243346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.243400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.243691] page dumped because: kasan: bad access detected
[   19.243743] 
[   19.243766] Memory state around the buggy address:
[   19.243801]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.243847]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.243891] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.243931]                                      ^
[   19.243967]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.244010]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.244050] ==================================================================
[   19.335612] ==================================================================
[   19.336004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.336079] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.336133] 
[   19.336167] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.336640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.336923] Hardware name: linux,dummy-virt (DT)
[   19.336967] Call trace:
[   19.336994]  show_stack+0x20/0x38 (C)
[   19.337442]  dump_stack_lvl+0x8c/0xd0
[   19.337579]  print_report+0x118/0x5d0
[   19.337632]  kasan_report+0xdc/0x128
[   19.337688]  kasan_check_range+0x100/0x1a8
[   19.338033]  __kasan_check_write+0x20/0x30
[   19.338104]  kasan_atomics_helper+0x1644/0x4858
[   19.338156]  kasan_atomics+0x198/0x2e0
[   19.338201]  kunit_try_run_case+0x170/0x3f0
[   19.338596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.338789]  kthread+0x328/0x630
[   19.338847]  ret_from_fork+0x10/0x20
[   19.339032] 
[   19.339097] Allocated by task 265:
[   19.339134]  kasan_save_stack+0x3c/0x68
[   19.339387]  kasan_save_track+0x20/0x40
[   19.339583]  kasan_save_alloc_info+0x40/0x58
[   19.339633]  __kasan_kmalloc+0xd4/0xd8
[   19.339674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.339733]  kasan_atomics+0xb8/0x2e0
[   19.339937]  kunit_try_run_case+0x170/0x3f0
[   19.340024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.340073]  kthread+0x328/0x630
[   19.340107]  ret_from_fork+0x10/0x20
[   19.340144] 
[   19.340179] The buggy address belongs to the object at fff00000c63aa000
[   19.340179]  which belongs to the cache kmalloc-64 of size 64
[   19.340254] The buggy address is located 0 bytes to the right of
[   19.340254]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.340320] 
[   19.340344] The buggy address belongs to the physical page:
[   19.340386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.340449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.340507] page_type: f5(slab)
[   19.340559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.340611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.340664] page dumped because: kasan: bad access detected
[   19.340707] 
[   19.340758] Memory state around the buggy address:
[   19.340793]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.340846]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.340892] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.340932]                                      ^
[   19.340968]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.341021]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.341062] ==================================================================
[   19.232646] ==================================================================
[   19.232700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.232765] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.232816] 
[   19.232867] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.232950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.232977] Hardware name: linux,dummy-virt (DT)
[   19.233146] Call trace:
[   19.233204]  show_stack+0x20/0x38 (C)
[   19.233277]  dump_stack_lvl+0x8c/0xd0
[   19.233359]  print_report+0x118/0x5d0
[   19.233414]  kasan_report+0xdc/0x128
[   19.233468]  kasan_check_range+0x100/0x1a8
[   19.233525]  __kasan_check_write+0x20/0x30
[   19.233608]  kasan_atomics_helper+0xff0/0x4858
[   19.233662]  kasan_atomics+0x198/0x2e0
[   19.233709]  kunit_try_run_case+0x170/0x3f0
[   19.233770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.233824]  kthread+0x328/0x630
[   19.233875]  ret_from_fork+0x10/0x20
[   19.233923] 
[   19.233945] Allocated by task 265:
[   19.233983]  kasan_save_stack+0x3c/0x68
[   19.234028]  kasan_save_track+0x20/0x40
[   19.234066]  kasan_save_alloc_info+0x40/0x58
[   19.234107]  __kasan_kmalloc+0xd4/0xd8
[   19.234149]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.234201]  kasan_atomics+0xb8/0x2e0
[   19.234240]  kunit_try_run_case+0x170/0x3f0
[   19.234287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.234333]  kthread+0x328/0x630
[   19.234369]  ret_from_fork+0x10/0x20
[   19.234406] 
[   19.234428] The buggy address belongs to the object at fff00000c63aa000
[   19.234428]  which belongs to the cache kmalloc-64 of size 64
[   19.234488] The buggy address is located 0 bytes to the right of
[   19.234488]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.234554] 
[   19.234587] The buggy address belongs to the physical page:
[   19.234619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.234671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.234729] page_type: f5(slab)
[   19.234769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.234865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.234926] page dumped because: kasan: bad access detected
[   19.234974] 
[   19.235008] Memory state around the buggy address:
[   19.235044]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.235336]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.235385] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.235449]                                      ^
[   19.235485]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.235530]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.235590] ==================================================================
[   19.368958] ==================================================================
[   19.369023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.369078] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.369320] 
[   19.369375] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.369791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.369875] Hardware name: linux,dummy-virt (DT)
[   19.370101] Call trace:
[   19.370245]  show_stack+0x20/0x38 (C)
[   19.370307]  dump_stack_lvl+0x8c/0xd0
[   19.370539]  print_report+0x118/0x5d0
[   19.370601]  kasan_report+0xdc/0x128
[   19.370668]  kasan_check_range+0x100/0x1a8
[   19.370802]  __kasan_check_write+0x20/0x30
[   19.370877]  kasan_atomics_helper+0x175c/0x4858
[   19.371052]  kasan_atomics+0x198/0x2e0
[   19.371589]  kunit_try_run_case+0x170/0x3f0
[   19.371704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.371938]  kthread+0x328/0x630
[   19.372037]  ret_from_fork+0x10/0x20
[   19.372160] 
[   19.372182] Allocated by task 265:
[   19.372237]  kasan_save_stack+0x3c/0x68
[   19.372312]  kasan_save_track+0x20/0x40
[   19.372583]  kasan_save_alloc_info+0x40/0x58
[   19.372793]  __kasan_kmalloc+0xd4/0xd8
[   19.373226]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.373402]  kasan_atomics+0xb8/0x2e0
[   19.373517]  kunit_try_run_case+0x170/0x3f0
[   19.373559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.373742]  kthread+0x328/0x630
[   19.374105]  ret_from_fork+0x10/0x20
[   19.374250] 
[   19.374421] The buggy address belongs to the object at fff00000c63aa000
[   19.374421]  which belongs to the cache kmalloc-64 of size 64
[   19.374515] The buggy address is located 0 bytes to the right of
[   19.374515]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.374734] 
[   19.374779] The buggy address belongs to the physical page:
[   19.375068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.375198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.375569] page_type: f5(slab)
[   19.375751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.375809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.375860] page dumped because: kasan: bad access detected
[   19.375896] 
[   19.375918] Memory state around the buggy address:
[   19.376558]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.376753]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.376804] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.377025]                                      ^
[   19.377086]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.377140]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.377191] ==================================================================
[   19.387735] ==================================================================
[   19.387799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.387853] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.387904] 
[   19.387936] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.388017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.388047] Hardware name: linux,dummy-virt (DT)
[   19.388079] Call trace:
[   19.388103]  show_stack+0x20/0x38 (C)
[   19.388152]  dump_stack_lvl+0x8c/0xd0
[   19.388200]  print_report+0x118/0x5d0
[   19.388248]  kasan_report+0xdc/0x128
[   19.388293]  kasan_check_range+0x100/0x1a8
[   19.388343]  __kasan_check_write+0x20/0x30
[   19.388390]  kasan_atomics_helper+0x17ec/0x4858
[   19.388438]  kasan_atomics+0x198/0x2e0
[   19.388484]  kunit_try_run_case+0x170/0x3f0
[   19.388531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388584]  kthread+0x328/0x630
[   19.388627]  ret_from_fork+0x10/0x20
[   19.388674] 
[   19.388696] Allocated by task 265:
[   19.388736]  kasan_save_stack+0x3c/0x68
[   19.389176]  kasan_save_track+0x20/0x40
[   19.389438]  kasan_save_alloc_info+0x40/0x58
[   19.389508]  __kasan_kmalloc+0xd4/0xd8
[   19.389573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.390167]  kasan_atomics+0xb8/0x2e0
[   19.390216]  kunit_try_run_case+0x170/0x3f0
[   19.390257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390303]  kthread+0x328/0x630
[   19.390338]  ret_from_fork+0x10/0x20
[   19.390377] 
[   19.390556] The buggy address belongs to the object at fff00000c63aa000
[   19.390556]  which belongs to the cache kmalloc-64 of size 64
[   19.390639] The buggy address is located 0 bytes to the right of
[   19.390639]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.390780] 
[   19.391126] The buggy address belongs to the physical page:
[   19.391270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.391476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.391548] page_type: f5(slab)
[   19.391679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.391744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.391810] page dumped because: kasan: bad access detected
[   19.391845] 
[   19.391867] Memory state around the buggy address:
[   19.391918]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.391964]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.392009] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.392086]                                      ^
[   19.392135]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.392183]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.392225] ==================================================================
[   19.202470] ==================================================================
[   19.202524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.202574] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.202626] 
[   19.202659] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.202752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.202782] Hardware name: linux,dummy-virt (DT)
[   19.202813] Call trace:
[   19.203529]  show_stack+0x20/0x38 (C)
[   19.203588]  dump_stack_lvl+0x8c/0xd0
[   19.203636]  print_report+0x118/0x5d0
[   19.203683]  kasan_report+0xdc/0x128
[   19.203743]  __asan_report_load8_noabort+0x20/0x30
[   19.203796]  kasan_atomics_helper+0x3f58/0x4858
[   19.203845]  kasan_atomics+0x198/0x2e0
[   19.203894]  kunit_try_run_case+0x170/0x3f0
[   19.203941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.203995]  kthread+0x328/0x630
[   19.204037]  ret_from_fork+0x10/0x20
[   19.204087] 
[   19.204107] Allocated by task 265:
[   19.204137]  kasan_save_stack+0x3c/0x68
[   19.204180]  kasan_save_track+0x20/0x40
[   19.204218]  kasan_save_alloc_info+0x40/0x58
[   19.204259]  __kasan_kmalloc+0xd4/0xd8
[   19.204298]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.204339]  kasan_atomics+0xb8/0x2e0
[   19.204376]  kunit_try_run_case+0x170/0x3f0
[   19.204417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.204462]  kthread+0x328/0x630
[   19.204497]  ret_from_fork+0x10/0x20
[   19.204534] 
[   19.204554] The buggy address belongs to the object at fff00000c63aa000
[   19.204554]  which belongs to the cache kmalloc-64 of size 64
[   19.204613] The buggy address is located 0 bytes to the right of
[   19.204613]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.204680] 
[   19.204702] The buggy address belongs to the physical page:
[   19.204784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.204862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.204911] page_type: f5(slab)
[   19.204958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.205028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.205073] page dumped because: kasan: bad access detected
[   19.205106] 
[   19.205126] Memory state around the buggy address:
[   19.205163]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.205220]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.205268] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.205318]                                      ^
[   19.205373]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.205426]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.205467] ==================================================================
[   19.292845] ==================================================================
[   19.292894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.292942] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.292993] 
[   19.293025] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.293105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.293132] Hardware name: linux,dummy-virt (DT)
[   19.293167] Call trace:
[   19.293190]  show_stack+0x20/0x38 (C)
[   19.293239]  dump_stack_lvl+0x8c/0xd0
[   19.293286]  print_report+0x118/0x5d0
[   19.293339]  kasan_report+0xdc/0x128
[   19.293387]  kasan_check_range+0x100/0x1a8
[   19.294708]  __kasan_check_write+0x20/0x30
[   19.294815]  kasan_atomics_helper+0x147c/0x4858
[   19.295012]  kasan_atomics+0x198/0x2e0
[   19.295204]  kunit_try_run_case+0x170/0x3f0
[   19.295317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295422]  kthread+0x328/0x630
[   19.295820]  ret_from_fork+0x10/0x20
[   19.296335] 
[   19.296452] Allocated by task 265:
[   19.296541]  kasan_save_stack+0x3c/0x68
[   19.296751]  kasan_save_track+0x20/0x40
[   19.296872]  kasan_save_alloc_info+0x40/0x58
[   19.296918]  __kasan_kmalloc+0xd4/0xd8
[   19.297241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.297420]  kasan_atomics+0xb8/0x2e0
[   19.297614]  kunit_try_run_case+0x170/0x3f0
[   19.297802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.297954]  kthread+0x328/0x630
[   19.298055]  ret_from_fork+0x10/0x20
[   19.298143] 
[   19.298167] The buggy address belongs to the object at fff00000c63aa000
[   19.298167]  which belongs to the cache kmalloc-64 of size 64
[   19.298664] The buggy address is located 0 bytes to the right of
[   19.298664]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.298967] 
[   19.299005] The buggy address belongs to the physical page:
[   19.299197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.299321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.299424] page_type: f5(slab)
[   19.299810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.299885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.299930] page dumped because: kasan: bad access detected
[   19.300238] 
[   19.300289] Memory state around the buggy address:
[   19.300337]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.300392]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.300437] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.300479]                                      ^
[   19.300516]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300559]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300656] ==================================================================
[   19.318875] ==================================================================
[   19.318974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.319084] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.319332] 
[   19.319380] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.319646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.319754] Hardware name: linux,dummy-virt (DT)
[   19.319975] Call trace:
[   19.320336]  show_stack+0x20/0x38 (C)
[   19.320418]  dump_stack_lvl+0x8c/0xd0
[   19.320514]  print_report+0x118/0x5d0
[   19.320596]  kasan_report+0xdc/0x128
[   19.320645]  kasan_check_range+0x100/0x1a8
[   19.320883]  __kasan_check_write+0x20/0x30
[   19.321075]  kasan_atomics_helper+0x15b4/0x4858
[   19.321428]  kasan_atomics+0x198/0x2e0
[   19.321571]  kunit_try_run_case+0x170/0x3f0
[   19.321797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.321855]  kthread+0x328/0x630
[   19.322085]  ret_from_fork+0x10/0x20
[   19.322582] 
[   19.322634] Allocated by task 265:
[   19.322793]  kasan_save_stack+0x3c/0x68
[   19.322875]  kasan_save_track+0x20/0x40
[   19.323013]  kasan_save_alloc_info+0x40/0x58
[   19.323089]  __kasan_kmalloc+0xd4/0xd8
[   19.323128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.323344]  kasan_atomics+0xb8/0x2e0
[   19.323577]  kunit_try_run_case+0x170/0x3f0
[   19.323646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.323699]  kthread+0x328/0x630
[   19.323745]  ret_from_fork+0x10/0x20
[   19.323784] 
[   19.323808] The buggy address belongs to the object at fff00000c63aa000
[   19.323808]  which belongs to the cache kmalloc-64 of size 64
[   19.324463] The buggy address is located 0 bytes to the right of
[   19.324463]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.324686] 
[   19.325244] The buggy address belongs to the physical page:
[   19.325313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.325404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.325477] page_type: f5(slab)
[   19.325942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.326330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.326438] page dumped because: kasan: bad access detected
[   19.326475] 
[   19.326800] Memory state around the buggy address:
[   19.326882]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.326948]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.327392] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.327443]                                      ^
[   19.327491]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.327546]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.327828] ==================================================================
[   19.217303] ==================================================================
[   19.217355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.217403] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.217453] 
[   19.217483] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.217564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.217593] Hardware name: linux,dummy-virt (DT)
[   19.217625] Call trace:
[   19.217648]  show_stack+0x20/0x38 (C)
[   19.217698]  dump_stack_lvl+0x8c/0xd0
[   19.217757]  print_report+0x118/0x5d0
[   19.217805]  kasan_report+0xdc/0x128
[   19.217851]  kasan_check_range+0x100/0x1a8
[   19.217901]  __kasan_check_write+0x20/0x30
[   19.218077]  kasan_atomics_helper+0xeb8/0x4858
[   19.218267]  kasan_atomics+0x198/0x2e0
[   19.218498]  kunit_try_run_case+0x170/0x3f0
[   19.218574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.218655]  kthread+0x328/0x630
[   19.218853]  ret_from_fork+0x10/0x20
[   19.219054] 
[   19.219136] Allocated by task 265:
[   19.219257]  kasan_save_stack+0x3c/0x68
[   19.219361]  kasan_save_track+0x20/0x40
[   19.219621]  kasan_save_alloc_info+0x40/0x58
[   19.219724]  __kasan_kmalloc+0xd4/0xd8
[   19.219788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.219837]  kasan_atomics+0xb8/0x2e0
[   19.219875]  kunit_try_run_case+0x170/0x3f0
[   19.219915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.219982]  kthread+0x328/0x630
[   19.220034]  ret_from_fork+0x10/0x20
[   19.220079] 
[   19.220103] The buggy address belongs to the object at fff00000c63aa000
[   19.220103]  which belongs to the cache kmalloc-64 of size 64
[   19.220187] The buggy address is located 0 bytes to the right of
[   19.220187]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.220252] 
[   19.220294] The buggy address belongs to the physical page:
[   19.220328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.220434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.220742] page_type: f5(slab)
[   19.220827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.220945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.220989] page dumped because: kasan: bad access detected
[   19.221023] 
[   19.221043] Memory state around the buggy address:
[   19.221192]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.221332]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.221395] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.221433]                                      ^
[   19.221469]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.221512]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.221553] ==================================================================
[   19.358155] ==================================================================
[   19.358212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.358263] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.358322] 
[   19.358354] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.358444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.358481] Hardware name: linux,dummy-virt (DT)
[   19.358514] Call trace:
[   19.358537]  show_stack+0x20/0x38 (C)
[   19.358586]  dump_stack_lvl+0x8c/0xd0
[   19.358639]  print_report+0x118/0x5d0
[   19.358697]  kasan_report+0xdc/0x128
[   19.358833]  __asan_report_load8_noabort+0x20/0x30
[   19.359012]  kasan_atomics_helper+0x3e10/0x4858
[   19.359080]  kasan_atomics+0x198/0x2e0
[   19.360088]  kunit_try_run_case+0x170/0x3f0
[   19.360179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.360442]  kthread+0x328/0x630
[   19.360614]  ret_from_fork+0x10/0x20
[   19.360907] 
[   19.361052] Allocated by task 265:
[   19.361120]  kasan_save_stack+0x3c/0x68
[   19.361354]  kasan_save_track+0x20/0x40
[   19.361596]  kasan_save_alloc_info+0x40/0x58
[   19.361831]  __kasan_kmalloc+0xd4/0xd8
[   19.361971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.362095]  kasan_atomics+0xb8/0x2e0
[   19.362134]  kunit_try_run_case+0x170/0x3f0
[   19.362215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.362344]  kthread+0x328/0x630
[   19.362457]  ret_from_fork+0x10/0x20
[   19.362558] 
[   19.362603] The buggy address belongs to the object at fff00000c63aa000
[   19.362603]  which belongs to the cache kmalloc-64 of size 64
[   19.362684] The buggy address is located 0 bytes to the right of
[   19.362684]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.363907] 
[   19.363963] The buggy address belongs to the physical page:
[   19.364315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.364375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.364579] page_type: f5(slab)
[   19.364647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.365163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.365582] page dumped because: kasan: bad access detected
[   19.365765] 
[   19.365913] Memory state around the buggy address:
[   19.365986]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.366451]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.366558] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.366659]                                      ^
[   19.367038]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.367114]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.367165] ==================================================================
[   19.286678] ==================================================================
[   19.287150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.287294] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.287402] 
[   19.287489] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.287692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.287934] Hardware name: linux,dummy-virt (DT)
[   19.287973] Call trace:
[   19.288139]  show_stack+0x20/0x38 (C)
[   19.288230]  dump_stack_lvl+0x8c/0xd0
[   19.288594]  print_report+0x118/0x5d0
[   19.288731]  kasan_report+0xdc/0x128
[   19.288922]  kasan_check_range+0x100/0x1a8
[   19.289046]  __kasan_check_write+0x20/0x30
[   19.289096]  kasan_atomics_helper+0x1414/0x4858
[   19.289438]  kasan_atomics+0x198/0x2e0
[   19.289535]  kunit_try_run_case+0x170/0x3f0
[   19.289878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.290057]  kthread+0x328/0x630
[   19.290178]  ret_from_fork+0x10/0x20
[   19.290306] 
[   19.290352] Allocated by task 265:
[   19.290612]  kasan_save_stack+0x3c/0x68
[   19.291174]  kasan_save_track+0x20/0x40
[   19.291282]  kasan_save_alloc_info+0x40/0x58
[   19.291327]  __kasan_kmalloc+0xd4/0xd8
[   19.291399]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.291440]  kasan_atomics+0xb8/0x2e0
[   19.291488]  kunit_try_run_case+0x170/0x3f0
[   19.291527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.291573]  kthread+0x328/0x630
[   19.291618]  ret_from_fork+0x10/0x20
[   19.291655] 
[   19.291696] The buggy address belongs to the object at fff00000c63aa000
[   19.291696]  which belongs to the cache kmalloc-64 of size 64
[   19.291790] The buggy address is located 0 bytes to the right of
[   19.291790]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.291857] 
[   19.291890] The buggy address belongs to the physical page:
[   19.291940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.292013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.292063] page_type: f5(slab)
[   19.292104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.292159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.292201] page dumped because: kasan: bad access detected
[   19.292245] 
[   19.292266] Memory state around the buggy address:
[   19.292301]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.292346]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.292390] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.292446]                                      ^
[   19.292494]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292547]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292612] ==================================================================
[   19.377785] ==================================================================
[   19.377957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.378253] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.378544] 
[   19.378589] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.378672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.378703] Hardware name: linux,dummy-virt (DT)
[   19.378890] Call trace:
[   19.378950]  show_stack+0x20/0x38 (C)
[   19.379257]  dump_stack_lvl+0x8c/0xd0
[   19.379454]  print_report+0x118/0x5d0
[   19.379745]  kasan_report+0xdc/0x128
[   19.379826]  __asan_report_load8_noabort+0x20/0x30
[   19.379888]  kasan_atomics_helper+0x3e20/0x4858
[   19.379961]  kasan_atomics+0x198/0x2e0
[   19.380367]  kunit_try_run_case+0x170/0x3f0
[   19.380645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.380858]  kthread+0x328/0x630
[   19.381007]  ret_from_fork+0x10/0x20
[   19.381085] 
[   19.381123] Allocated by task 265:
[   19.381327]  kasan_save_stack+0x3c/0x68
[   19.381581]  kasan_save_track+0x20/0x40
[   19.381651]  kasan_save_alloc_info+0x40/0x58
[   19.381868]  __kasan_kmalloc+0xd4/0xd8
[   19.382109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.382186]  kasan_atomics+0xb8/0x2e0
[   19.382337]  kunit_try_run_case+0x170/0x3f0
[   19.382396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.382634]  kthread+0x328/0x630
[   19.382734]  ret_from_fork+0x10/0x20
[   19.382898] 
[   19.382958] The buggy address belongs to the object at fff00000c63aa000
[   19.382958]  which belongs to the cache kmalloc-64 of size 64
[   19.383263] The buggy address is located 0 bytes to the right of
[   19.383263]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.383557] 
[   19.383596] The buggy address belongs to the physical page:
[   19.383647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.383810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.383909] page_type: f5(slab)
[   19.383977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.384114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.384158] page dumped because: kasan: bad access detected
[   19.384214] 
[   19.384242] Memory state around the buggy address:
[   19.384458]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.384687]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.385077] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.385125]                                      ^
[   19.385163]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.385540]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.386009] ==================================================================
[   19.227696] ==================================================================
[   19.227771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.227823] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.227897] 
[   19.227929] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.228113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.228250] Hardware name: linux,dummy-virt (DT)
[   19.228292] Call trace:
[   19.228318]  show_stack+0x20/0x38 (C)
[   19.228384]  dump_stack_lvl+0x8c/0xd0
[   19.228438]  print_report+0x118/0x5d0
[   19.228494]  kasan_report+0xdc/0x128
[   19.228542]  kasan_check_range+0x100/0x1a8
[   19.228728]  __kasan_check_write+0x20/0x30
[   19.228875]  kasan_atomics_helper+0xf88/0x4858
[   19.228994]  kasan_atomics+0x198/0x2e0
[   19.229085]  kunit_try_run_case+0x170/0x3f0
[   19.229152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.229226]  kthread+0x328/0x630
[   19.229279]  ret_from_fork+0x10/0x20
[   19.229341] 
[   19.229410] Allocated by task 265:
[   19.229484]  kasan_save_stack+0x3c/0x68
[   19.229529]  kasan_save_track+0x20/0x40
[   19.229596]  kasan_save_alloc_info+0x40/0x58
[   19.229645]  __kasan_kmalloc+0xd4/0xd8
[   19.229692]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.229745]  kasan_atomics+0xb8/0x2e0
[   19.229784]  kunit_try_run_case+0x170/0x3f0
[   19.229845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.229971]  kthread+0x328/0x630
[   19.230136]  ret_from_fork+0x10/0x20
[   19.230182] 
[   19.230223] The buggy address belongs to the object at fff00000c63aa000
[   19.230223]  which belongs to the cache kmalloc-64 of size 64
[   19.230324] The buggy address is located 0 bytes to the right of
[   19.230324]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.230396] 
[   19.230421] The buggy address belongs to the physical page:
[   19.230475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.230592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.230731] page_type: f5(slab)
[   19.230784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.230871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.230949] page dumped because: kasan: bad access detected
[   19.230984] 
[   19.231004] Memory state around the buggy address:
[   19.231226]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.231273]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.231318] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.231359]                                      ^
[   19.231393]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.231705]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.231850] ==================================================================
[   19.181062] ==================================================================
[   19.181116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.181168] Read of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.181219] 
[   19.181252] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.182794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.182889] Hardware name: linux,dummy-virt (DT)
[   19.182972] Call trace:
[   19.182997]  show_stack+0x20/0x38 (C)
[   19.183442]  dump_stack_lvl+0x8c/0xd0
[   19.183504]  print_report+0x118/0x5d0
[   19.183555]  kasan_report+0xdc/0x128
[   19.183915]  __asan_report_load4_noabort+0x20/0x30
[   19.184018]  kasan_atomics_helper+0x3e04/0x4858
[   19.184076]  kasan_atomics+0x198/0x2e0
[   19.184615]  kunit_try_run_case+0x170/0x3f0
[   19.184693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.185040]  kthread+0x328/0x630
[   19.185098]  ret_from_fork+0x10/0x20
[   19.185514] 
[   19.185546] Allocated by task 265:
[   19.185671]  kasan_save_stack+0x3c/0x68
[   19.185730]  kasan_save_track+0x20/0x40
[   19.186036]  kasan_save_alloc_info+0x40/0x58
[   19.186144]  __kasan_kmalloc+0xd4/0xd8
[   19.186414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.186916]  kasan_atomics+0xb8/0x2e0
[   19.186973]  kunit_try_run_case+0x170/0x3f0
[   19.187147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.187200]  kthread+0x328/0x630
[   19.187235]  ret_from_fork+0x10/0x20
[   19.187274] 
[   19.187295] The buggy address belongs to the object at fff00000c63aa000
[   19.187295]  which belongs to the cache kmalloc-64 of size 64
[   19.187357] The buggy address is located 0 bytes to the right of
[   19.187357]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.187423] 
[   19.187947] The buggy address belongs to the physical page:
[   19.187989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.188271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.188414] page_type: f5(slab)
[   19.188500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.188883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.188952] page dumped because: kasan: bad access detected
[   19.188987] 
[   19.189008] Memory state around the buggy address:
[   19.189412]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.189892]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.190332] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.190478]                                      ^
[   19.190772]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.191229]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.191274] ==================================================================
[   19.192372] ==================================================================
[   19.194228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.194540] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.194809] 
[   19.194899] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.194985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.195452] Hardware name: linux,dummy-virt (DT)
[   19.195504] Call trace:
[   19.195530]  show_stack+0x20/0x38 (C)
[   19.195593]  dump_stack_lvl+0x8c/0xd0
[   19.195641]  print_report+0x118/0x5d0
[   19.196003]  kasan_report+0xdc/0x128
[   19.196324]  kasan_check_range+0x100/0x1a8
[   19.196491]  __kasan_check_read+0x20/0x30
[   19.196541]  kasan_atomics_helper+0xdd4/0x4858
[   19.196590]  kasan_atomics+0x198/0x2e0
[   19.196638]  kunit_try_run_case+0x170/0x3f0
[   19.196687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.196748]  kthread+0x328/0x630
[   19.196792]  ret_from_fork+0x10/0x20
[   19.196840] 
[   19.196861] Allocated by task 265:
[   19.196896]  kasan_save_stack+0x3c/0x68
[   19.196938]  kasan_save_track+0x20/0x40
[   19.196976]  kasan_save_alloc_info+0x40/0x58
[   19.197019]  __kasan_kmalloc+0xd4/0xd8
[   19.197057]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.197100]  kasan_atomics+0xb8/0x2e0
[   19.197138]  kunit_try_run_case+0x170/0x3f0
[   19.197178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.197224]  kthread+0x328/0x630
[   19.197258]  ret_from_fork+0x10/0x20
[   19.197295] 
[   19.197322] The buggy address belongs to the object at fff00000c63aa000
[   19.197322]  which belongs to the cache kmalloc-64 of size 64
[   19.197381] The buggy address is located 0 bytes to the right of
[   19.197381]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.197447] 
[   19.197469] The buggy address belongs to the physical page:
[   19.197503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.197557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.197607] page_type: f5(slab)
[   19.197646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.197698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.197748] page dumped because: kasan: bad access detected
[   19.197784] 
[   19.197805] Memory state around the buggy address:
[   19.197839]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.197882]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.197926] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.197966]                                      ^
[   19.198000]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.198044]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.198084] ==================================================================
[   19.271454] ==================================================================
[   19.271674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.271757] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.271828] 
[   19.271866] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.271950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.271979] Hardware name: linux,dummy-virt (DT)
[   19.272010] Call trace:
[   19.272036]  show_stack+0x20/0x38 (C)
[   19.272095]  dump_stack_lvl+0x8c/0xd0
[   19.272146]  print_report+0x118/0x5d0
[   19.272194]  kasan_report+0xdc/0x128
[   19.272239]  kasan_check_range+0x100/0x1a8
[   19.272289]  __kasan_check_write+0x20/0x30
[   19.272334]  kasan_atomics_helper+0x1384/0x4858
[   19.272383]  kasan_atomics+0x198/0x2e0
[   19.272429]  kunit_try_run_case+0x170/0x3f0
[   19.272478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.272532]  kthread+0x328/0x630
[   19.272582]  ret_from_fork+0x10/0x20
[   19.272632] 
[   19.272652] Allocated by task 265:
[   19.272688]  kasan_save_stack+0x3c/0x68
[   19.273141]  kasan_save_track+0x20/0x40
[   19.273422]  kasan_save_alloc_info+0x40/0x58
[   19.273727]  __kasan_kmalloc+0xd4/0xd8
[   19.273789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.273832]  kasan_atomics+0xb8/0x2e0
[   19.274230]  kunit_try_run_case+0x170/0x3f0
[   19.274335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.274387]  kthread+0x328/0x630
[   19.274654]  ret_from_fork+0x10/0x20
[   19.274725] 
[   19.274751] The buggy address belongs to the object at fff00000c63aa000
[   19.274751]  which belongs to the cache kmalloc-64 of size 64
[   19.274812] The buggy address is located 0 bytes to the right of
[   19.274812]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.275368] 
[   19.276153] The buggy address belongs to the physical page:
[   19.276251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.276355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.276438] page_type: f5(slab)
[   19.276515] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.276780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.277089] page dumped because: kasan: bad access detected
[   19.277168] 
[   19.277342] Memory state around the buggy address:
[   19.277529]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.277627]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.277673] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.277906]                                      ^
[   19.278086]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278370]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278568] ==================================================================
[   19.263621] ==================================================================
[   19.263666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.263724] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.263774] 
[   19.263805] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.263886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.263915] Hardware name: linux,dummy-virt (DT)
[   19.263946] Call trace:
[   19.263971]  show_stack+0x20/0x38 (C)
[   19.264018]  dump_stack_lvl+0x8c/0xd0
[   19.264409]  print_report+0x118/0x5d0
[   19.264483]  kasan_report+0xdc/0x128
[   19.264886]  kasan_check_range+0x100/0x1a8
[   19.265083]  __kasan_check_write+0x20/0x30
[   19.265152]  kasan_atomics_helper+0x12d8/0x4858
[   19.265249]  kasan_atomics+0x198/0x2e0
[   19.265403]  kunit_try_run_case+0x170/0x3f0
[   19.265532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.265596]  kthread+0x328/0x630
[   19.265639]  ret_from_fork+0x10/0x20
[   19.265689] 
[   19.265709] Allocated by task 265:
[   19.265751]  kasan_save_stack+0x3c/0x68
[   19.265792]  kasan_save_track+0x20/0x40
[   19.265832]  kasan_save_alloc_info+0x40/0x58
[   19.265991]  __kasan_kmalloc+0xd4/0xd8
[   19.266038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.266079]  kasan_atomics+0xb8/0x2e0
[   19.266117]  kunit_try_run_case+0x170/0x3f0
[   19.266231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.266316]  kthread+0x328/0x630
[   19.266359]  ret_from_fork+0x10/0x20
[   19.266456] 
[   19.266580] The buggy address belongs to the object at fff00000c63aa000
[   19.266580]  which belongs to the cache kmalloc-64 of size 64
[   19.266686] The buggy address is located 0 bytes to the right of
[   19.266686]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.266874] 
[   19.266935] The buggy address belongs to the physical page:
[   19.267590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.267652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.267702] page_type: f5(slab)
[   19.267756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.267818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.267863] page dumped because: kasan: bad access detected
[   19.267896] 
[   19.268214] Memory state around the buggy address:
[   19.268422]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.268792]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.268909] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.268952]                                      ^
[   19.268992]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.269330]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.269552] ==================================================================
[   19.166174] ==================================================================
[   19.166260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.166410] Read of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.166497] 
[   19.166534] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.166626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.166817] Hardware name: linux,dummy-virt (DT)
[   19.166902] Call trace:
[   19.167109]  show_stack+0x20/0x38 (C)
[   19.167355]  dump_stack_lvl+0x8c/0xd0
[   19.167463]  print_report+0x118/0x5d0
[   19.167692]  kasan_report+0xdc/0x128
[   19.167793]  __asan_report_load4_noabort+0x20/0x30
[   19.168019]  kasan_atomics_helper+0x3dd8/0x4858
[   19.168100]  kasan_atomics+0x198/0x2e0
[   19.168259]  kunit_try_run_case+0x170/0x3f0
[   19.168328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.168558]  kthread+0x328/0x630
[   19.168687]  ret_from_fork+0x10/0x20
[   19.168761] 
[   19.168781] Allocated by task 265:
[   19.168811]  kasan_save_stack+0x3c/0x68
[   19.168855]  kasan_save_track+0x20/0x40
[   19.168893]  kasan_save_alloc_info+0x40/0x58
[   19.168935]  __kasan_kmalloc+0xd4/0xd8
[   19.168975]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.169016]  kasan_atomics+0xb8/0x2e0
[   19.169053]  kunit_try_run_case+0x170/0x3f0
[   19.169093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.169138]  kthread+0x328/0x630
[   19.169172]  ret_from_fork+0x10/0x20
[   19.169214] 
[   19.169236] The buggy address belongs to the object at fff00000c63aa000
[   19.169236]  which belongs to the cache kmalloc-64 of size 64
[   19.169295] The buggy address is located 0 bytes to the right of
[   19.169295]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.169367] 
[   19.169392] The buggy address belongs to the physical page:
[   19.169426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.169480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.169531] page_type: f5(slab)
[   19.169570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.169736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.169812] page dumped because: kasan: bad access detected
[   19.170122] 
[   19.170156] Memory state around the buggy address:
[   19.170191]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.170238]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.170398] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.170465]                                      ^
[   19.170637]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.170707]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.171046] ==================================================================
[   19.300979] ==================================================================
[   19.301039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.301091] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.301141] 
[   19.301184] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.301266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.301294] Hardware name: linux,dummy-virt (DT)
[   19.301333] Call trace:
[   19.301356]  show_stack+0x20/0x38 (C)
[   19.301406]  dump_stack_lvl+0x8c/0xd0
[   19.301462]  print_report+0x118/0x5d0
[   19.301510]  kasan_report+0xdc/0x128
[   19.301558]  kasan_check_range+0x100/0x1a8
[   19.301615]  __kasan_check_write+0x20/0x30
[   19.301663]  kasan_atomics_helper+0x14e4/0x4858
[   19.301723]  kasan_atomics+0x198/0x2e0
[   19.301770]  kunit_try_run_case+0x170/0x3f0
[   19.301826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.301881]  kthread+0x328/0x630
[   19.301923]  ret_from_fork+0x10/0x20
[   19.301970] 
[   19.301991] Allocated by task 265:
[   19.302020]  kasan_save_stack+0x3c/0x68
[   19.302073]  kasan_save_track+0x20/0x40
[   19.302112]  kasan_save_alloc_info+0x40/0x58
[   19.302154]  __kasan_kmalloc+0xd4/0xd8
[   19.302191]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.302242]  kasan_atomics+0xb8/0x2e0
[   19.302279]  kunit_try_run_case+0x170/0x3f0
[   19.302320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.302363]  kthread+0x328/0x630
[   19.302396]  ret_from_fork+0x10/0x20
[   19.302434] 
[   19.302456] The buggy address belongs to the object at fff00000c63aa000
[   19.302456]  which belongs to the cache kmalloc-64 of size 64
[   19.302515] The buggy address is located 0 bytes to the right of
[   19.302515]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.302581] 
[   19.302611] The buggy address belongs to the physical page:
[   19.302652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.303352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.303892] page_type: f5(slab)
[   19.303961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.304040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.304098] page dumped because: kasan: bad access detected
[   19.304133] 
[   19.304443] Memory state around the buggy address:
[   19.304851]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.305037]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.305090] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.305536]                                      ^
[   19.305785]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305833]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305874] ==================================================================
[   19.352033] ==================================================================
[   19.352108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.352223] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.352487] 
[   19.352625] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.352895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.352982] Hardware name: linux,dummy-virt (DT)
[   19.353039] Call trace:
[   19.353121]  show_stack+0x20/0x38 (C)
[   19.353176]  dump_stack_lvl+0x8c/0xd0
[   19.353224]  print_report+0x118/0x5d0
[   19.353313]  kasan_report+0xdc/0x128
[   19.353367]  kasan_check_range+0x100/0x1a8
[   19.353417]  __kasan_check_write+0x20/0x30
[   19.353810]  kasan_atomics_helper+0x16d0/0x4858
[   19.354072]  kasan_atomics+0x198/0x2e0
[   19.354217]  kunit_try_run_case+0x170/0x3f0
[   19.354420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.354538]  kthread+0x328/0x630
[   19.354591]  ret_from_fork+0x10/0x20
[   19.354639] 
[   19.354662] Allocated by task 265:
[   19.354937]  kasan_save_stack+0x3c/0x68
[   19.355449]  kasan_save_track+0x20/0x40
[   19.355531]  kasan_save_alloc_info+0x40/0x58
[   19.355697]  __kasan_kmalloc+0xd4/0xd8
[   19.355848]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.355895]  kasan_atomics+0xb8/0x2e0
[   19.355934]  kunit_try_run_case+0x170/0x3f0
[   19.355975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.356028]  kthread+0x328/0x630
[   19.356461]  ret_from_fork+0x10/0x20
[   19.356693] 
[   19.356829] The buggy address belongs to the object at fff00000c63aa000
[   19.356829]  which belongs to the cache kmalloc-64 of size 64
[   19.357012] The buggy address is located 0 bytes to the right of
[   19.357012]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.357159] 
[   19.357205] The buggy address belongs to the physical page:
[   19.357241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.357303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.357369] page_type: f5(slab)
[   19.357409] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.357462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.357513] page dumped because: kasan: bad access detected
[   19.357557] 
[   19.357579] Memory state around the buggy address:
[   19.357627]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.357681]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.357739] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.357779]                                      ^
[   19.357815]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.357860]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.357908] ==================================================================
[   19.235891] ==================================================================
[   19.235970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.236025] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.236078] 
[   19.236155] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.236265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.236412] Hardware name: linux,dummy-virt (DT)
[   19.236445] Call trace:
[   19.236549]  show_stack+0x20/0x38 (C)
[   19.236635]  dump_stack_lvl+0x8c/0xd0
[   19.236685]  print_report+0x118/0x5d0
[   19.236776]  kasan_report+0xdc/0x128
[   19.236853]  kasan_check_range+0x100/0x1a8
[   19.236908]  __kasan_check_write+0x20/0x30
[   19.236983]  kasan_atomics_helper+0x1058/0x4858
[   19.237040]  kasan_atomics+0x198/0x2e0
[   19.237087]  kunit_try_run_case+0x170/0x3f0
[   19.237153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237217]  kthread+0x328/0x630
[   19.237261]  ret_from_fork+0x10/0x20
[   19.237325] 
[   19.237381] Allocated by task 265:
[   19.237412]  kasan_save_stack+0x3c/0x68
[   19.237454]  kasan_save_track+0x20/0x40
[   19.237495]  kasan_save_alloc_info+0x40/0x58
[   19.237537]  __kasan_kmalloc+0xd4/0xd8
[   19.237575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.237808]  kasan_atomics+0xb8/0x2e0
[   19.237879]  kunit_try_run_case+0x170/0x3f0
[   19.237923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237967]  kthread+0x328/0x630
[   19.238002]  ret_from_fork+0x10/0x20
[   19.238053] 
[   19.238077] The buggy address belongs to the object at fff00000c63aa000
[   19.238077]  which belongs to the cache kmalloc-64 of size 64
[   19.238143] The buggy address is located 0 bytes to the right of
[   19.238143]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.238314] 
[   19.238337] The buggy address belongs to the physical page:
[   19.238404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.238518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.238572] page_type: f5(slab)
[   19.238674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.238799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.238936] page dumped because: kasan: bad access detected
[   19.239075] 
[   19.239165] Memory state around the buggy address:
[   19.239232]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.239285]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.239330] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.239371]                                      ^
[   19.239407]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.239449]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.239525] ==================================================================
[   19.213273] ==================================================================
[   19.213372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.213425] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.213477] 
[   19.213517] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.213864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.213923] Hardware name: linux,dummy-virt (DT)
[   19.214075] Call trace:
[   19.214101]  show_stack+0x20/0x38 (C)
[   19.214207]  dump_stack_lvl+0x8c/0xd0
[   19.214293]  print_report+0x118/0x5d0
[   19.214352]  kasan_report+0xdc/0x128
[   19.214419]  __asan_report_store8_noabort+0x20/0x30
[   19.214491]  kasan_atomics_helper+0x3e5c/0x4858
[   19.214548]  kasan_atomics+0x198/0x2e0
[   19.214659]  kunit_try_run_case+0x170/0x3f0
[   19.214709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.214774]  kthread+0x328/0x630
[   19.214989]  ret_from_fork+0x10/0x20
[   19.215072] 
[   19.215096] Allocated by task 265:
[   19.215127]  kasan_save_stack+0x3c/0x68
[   19.215183]  kasan_save_track+0x20/0x40
[   19.215391]  kasan_save_alloc_info+0x40/0x58
[   19.215521]  __kasan_kmalloc+0xd4/0xd8
[   19.215914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.216006]  kasan_atomics+0xb8/0x2e0
[   19.216113]  kunit_try_run_case+0x170/0x3f0
[   19.216154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.216200]  kthread+0x328/0x630
[   19.216236]  ret_from_fork+0x10/0x20
[   19.216274] 
[   19.216314] The buggy address belongs to the object at fff00000c63aa000
[   19.216314]  which belongs to the cache kmalloc-64 of size 64
[   19.216375] The buggy address is located 0 bytes to the right of
[   19.216375]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.216440] 
[   19.216462] The buggy address belongs to the physical page:
[   19.216495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.216549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.216598] page_type: f5(slab)
[   19.216638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.216692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.216770] page dumped because: kasan: bad access detected
[   19.216804] 
[   19.216825] Memory state around the buggy address:
[   19.216859]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.216905]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.216950] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.216989]                                      ^
[   19.217023]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.217064]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.217106] ==================================================================
[   19.279356] ==================================================================
[   19.279417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.279469] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.279932] 
[   19.279986] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.280137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.280208] Hardware name: linux,dummy-virt (DT)
[   19.280243] Call trace:
[   19.280268]  show_stack+0x20/0x38 (C)
[   19.280408]  dump_stack_lvl+0x8c/0xd0
[   19.280473]  print_report+0x118/0x5d0
[   19.280540]  kasan_report+0xdc/0x128
[   19.280588]  __asan_report_load8_noabort+0x20/0x30
[   19.280963]  kasan_atomics_helper+0x3f04/0x4858
[   19.281033]  kasan_atomics+0x198/0x2e0
[   19.281115]  kunit_try_run_case+0x170/0x3f0
[   19.281167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.281222]  kthread+0x328/0x630
[   19.281565]  ret_from_fork+0x10/0x20
[   19.281732] 
[   19.281803] Allocated by task 265:
[   19.281837]  kasan_save_stack+0x3c/0x68
[   19.282228]  kasan_save_track+0x20/0x40
[   19.282487]  kasan_save_alloc_info+0x40/0x58
[   19.282626]  __kasan_kmalloc+0xd4/0xd8
[   19.282854]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.283052]  kasan_atomics+0xb8/0x2e0
[   19.283137]  kunit_try_run_case+0x170/0x3f0
[   19.283177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.283223]  kthread+0x328/0x630
[   19.283257]  ret_from_fork+0x10/0x20
[   19.283293] 
[   19.283317] The buggy address belongs to the object at fff00000c63aa000
[   19.283317]  which belongs to the cache kmalloc-64 of size 64
[   19.283378] The buggy address is located 0 bytes to the right of
[   19.283378]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.283704] 
[   19.284230] The buggy address belongs to the physical page:
[   19.284315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.284393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.284706] page_type: f5(slab)
[   19.284794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.284849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.284913] page dumped because: kasan: bad access detected
[   19.284947] 
[   19.284969] Memory state around the buggy address:
[   19.285022]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.285069]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.285114] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.285154]                                      ^
[   19.285191]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.285246]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.285287] ==================================================================
[   19.306473] ==================================================================
[   19.306527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.307264] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.307408] 
[   19.307495] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.307655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.307787] Hardware name: linux,dummy-virt (DT)
[   19.307855] Call trace:
[   19.307880]  show_stack+0x20/0x38 (C)
[   19.308271]  dump_stack_lvl+0x8c/0xd0
[   19.308407]  print_report+0x118/0x5d0
[   19.308674]  kasan_report+0xdc/0x128
[   19.309075]  kasan_check_range+0x100/0x1a8
[   19.309446]  __kasan_check_write+0x20/0x30
[   19.309546]  kasan_atomics_helper+0x154c/0x4858
[   19.309742]  kasan_atomics+0x198/0x2e0
[   19.309931]  kunit_try_run_case+0x170/0x3f0
[   19.309985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.310095]  kthread+0x328/0x630
[   19.310760]  ret_from_fork+0x10/0x20
[   19.310941] 
[   19.311052] Allocated by task 265:
[   19.311162]  kasan_save_stack+0x3c/0x68
[   19.311389]  kasan_save_track+0x20/0x40
[   19.311577]  kasan_save_alloc_info+0x40/0x58
[   19.311667]  __kasan_kmalloc+0xd4/0xd8
[   19.312029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.312167]  kasan_atomics+0xb8/0x2e0
[   19.312382]  kunit_try_run_case+0x170/0x3f0
[   19.312609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.313255]  kthread+0x328/0x630
[   19.313345]  ret_from_fork+0x10/0x20
[   19.313414] 
[   19.313472] The buggy address belongs to the object at fff00000c63aa000
[   19.313472]  which belongs to the cache kmalloc-64 of size 64
[   19.313677] The buggy address is located 0 bytes to the right of
[   19.313677]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.313997] 
[   19.314213] The buggy address belongs to the physical page:
[   19.314287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.314690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.314764] page_type: f5(slab)
[   19.315031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.315262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.316106] page dumped because: kasan: bad access detected
[   19.316283] 
[   19.316414] Memory state around the buggy address:
[   19.316455]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.316769]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.317151] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.317300]                                      ^
[   19.317358]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.317752]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.317987] ==================================================================
[   19.244252] ==================================================================
[   19.244298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.244346] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.244396] 
[   19.244427] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.244509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.244537] Hardware name: linux,dummy-virt (DT)
[   19.244570] Call trace:
[   19.244594]  show_stack+0x20/0x38 (C)
[   19.244642]  dump_stack_lvl+0x8c/0xd0
[   19.244690]  print_report+0x118/0x5d0
[   19.244753]  kasan_report+0xdc/0x128
[   19.244814]  kasan_check_range+0x100/0x1a8
[   19.244903]  __kasan_check_write+0x20/0x30
[   19.244954]  kasan_atomics_helper+0x1128/0x4858
[   19.245021]  kasan_atomics+0x198/0x2e0
[   19.245096]  kunit_try_run_case+0x170/0x3f0
[   19.245147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.245312]  kthread+0x328/0x630
[   19.245363]  ret_from_fork+0x10/0x20
[   19.245412] 
[   19.245531] Allocated by task 265:
[   19.245612]  kasan_save_stack+0x3c/0x68
[   19.245676]  kasan_save_track+0x20/0x40
[   19.245731]  kasan_save_alloc_info+0x40/0x58
[   19.245772]  __kasan_kmalloc+0xd4/0xd8
[   19.245811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.246006]  kasan_atomics+0xb8/0x2e0
[   19.246085]  kunit_try_run_case+0x170/0x3f0
[   19.246146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.246231]  kthread+0x328/0x630
[   19.246303]  ret_from_fork+0x10/0x20
[   19.246476] 
[   19.246637] The buggy address belongs to the object at fff00000c63aa000
[   19.246637]  which belongs to the cache kmalloc-64 of size 64
[   19.246782] The buggy address is located 0 bytes to the right of
[   19.246782]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.246853] 
[   19.246877] The buggy address belongs to the physical page:
[   19.246909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.246972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.247023] page_type: f5(slab)
[   19.247062] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.247115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.247159] page dumped because: kasan: bad access detected
[   19.247192] 
[   19.247214] Memory state around the buggy address:
[   19.247248]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.247293]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.247340] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.247379]                                      ^
[   19.247415]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.247471]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.247518] ==================================================================
[   19.205656] ==================================================================
[   19.205710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.205774] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.205825] 
[   19.205855] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.206266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.206358] Hardware name: linux,dummy-virt (DT)
[   19.206442] Call trace:
[   19.206503]  show_stack+0x20/0x38 (C)
[   19.206554]  dump_stack_lvl+0x8c/0xd0
[   19.206638]  print_report+0x118/0x5d0
[   19.206867]  kasan_report+0xdc/0x128
[   19.206922]  kasan_check_range+0x100/0x1a8
[   19.207392]  __kasan_check_write+0x20/0x30
[   19.207455]  kasan_atomics_helper+0xe44/0x4858
[   19.207536]  kasan_atomics+0x198/0x2e0
[   19.207721]  kunit_try_run_case+0x170/0x3f0
[   19.207794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.207849]  kthread+0x328/0x630
[   19.207908]  ret_from_fork+0x10/0x20
[   19.208136] 
[   19.208326] Allocated by task 265:
[   19.208475]  kasan_save_stack+0x3c/0x68
[   19.208607]  kasan_save_track+0x20/0x40
[   19.209017]  kasan_save_alloc_info+0x40/0x58
[   19.209192]  __kasan_kmalloc+0xd4/0xd8
[   19.209348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.209531]  kasan_atomics+0xb8/0x2e0
[   19.209636]  kunit_try_run_case+0x170/0x3f0
[   19.209705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.209762]  kthread+0x328/0x630
[   19.209988]  ret_from_fork+0x10/0x20
[   19.210138] 
[   19.210330] The buggy address belongs to the object at fff00000c63aa000
[   19.210330]  which belongs to the cache kmalloc-64 of size 64
[   19.210455] The buggy address is located 0 bytes to the right of
[   19.210455]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.210731] 
[   19.210973] The buggy address belongs to the physical page:
[   19.211030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.211085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.211153] page_type: f5(slab)
[   19.211450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.211678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.211777] page dumped because: kasan: bad access detected
[   19.211861] 
[   19.212147] Memory state around the buggy address:
[   19.212263]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.212320]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.212363] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.212404]                                      ^
[   19.212440]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.212485]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.212533] ==================================================================
[   19.172009] ==================================================================
[   19.172073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.172126] Write of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.172177] 
[   19.172459] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.172567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.172597] Hardware name: linux,dummy-virt (DT)
[   19.172651] Call trace:
[   19.172679]  show_stack+0x20/0x38 (C)
[   19.172742]  dump_stack_lvl+0x8c/0xd0
[   19.173028]  print_report+0x118/0x5d0
[   19.173095]  kasan_report+0xdc/0x128
[   19.173222]  kasan_check_range+0x100/0x1a8
[   19.173276]  __kasan_check_write+0x20/0x30
[   19.173358]  kasan_atomics_helper+0xd3c/0x4858
[   19.173420]  kasan_atomics+0x198/0x2e0
[   19.173466]  kunit_try_run_case+0x170/0x3f0
[   19.173570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.173628]  kthread+0x328/0x630
[   19.173672]  ret_from_fork+0x10/0x20
[   19.173742] 
[   19.173764] Allocated by task 265:
[   19.173795]  kasan_save_stack+0x3c/0x68
[   19.173839]  kasan_save_track+0x20/0x40
[   19.173881]  kasan_save_alloc_info+0x40/0x58
[   19.174250]  __kasan_kmalloc+0xd4/0xd8
[   19.174350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.174758]  kasan_atomics+0xb8/0x2e0
[   19.175146]  kunit_try_run_case+0x170/0x3f0
[   19.175239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.175413]  kthread+0x328/0x630
[   19.175495]  ret_from_fork+0x10/0x20
[   19.175882] 
[   19.175910] The buggy address belongs to the object at fff00000c63aa000
[   19.175910]  which belongs to the cache kmalloc-64 of size 64
[   19.176407] The buggy address is located 0 bytes to the right of
[   19.176407]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.176635] 
[   19.176958] The buggy address belongs to the physical page:
[   19.177120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.177582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.177692] page_type: f5(slab)
[   19.178255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.178315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.178366] page dumped because: kasan: bad access detected
[   19.178665] 
[   19.178687] Memory state around the buggy address:
[   19.178732]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.179136]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.179187] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.179228]                                      ^
[   19.179850]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.179901]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.180194] ==================================================================
[   19.247629] ==================================================================
[   19.247672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.247744] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.247797] 
[   19.247829] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.247910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.247938] Hardware name: linux,dummy-virt (DT)
[   19.247971] Call trace:
[   19.247995]  show_stack+0x20/0x38 (C)
[   19.248043]  dump_stack_lvl+0x8c/0xd0
[   19.248089]  print_report+0x118/0x5d0
[   19.248372]  kasan_report+0xdc/0x128
[   19.248436]  kasan_check_range+0x100/0x1a8
[   19.248489]  __kasan_check_write+0x20/0x30
[   19.248802]  kasan_atomics_helper+0x1190/0x4858
[   19.248928]  kasan_atomics+0x198/0x2e0
[   19.248983]  kunit_try_run_case+0x170/0x3f0
[   19.249031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.249358]  kthread+0x328/0x630
[   19.249409]  ret_from_fork+0x10/0x20
[   19.249536] 
[   19.249606] Allocated by task 265:
[   19.249677]  kasan_save_stack+0x3c/0x68
[   19.249783]  kasan_save_track+0x20/0x40
[   19.249874]  kasan_save_alloc_info+0x40/0x58
[   19.250138]  __kasan_kmalloc+0xd4/0xd8
[   19.250298]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.250421]  kasan_atomics+0xb8/0x2e0
[   19.250532]  kunit_try_run_case+0x170/0x3f0
[   19.250653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.250735]  kthread+0x328/0x630
[   19.250806]  ret_from_fork+0x10/0x20
[   19.250959] 
[   19.251012] The buggy address belongs to the object at fff00000c63aa000
[   19.251012]  which belongs to the cache kmalloc-64 of size 64
[   19.251073] The buggy address is located 0 bytes to the right of
[   19.251073]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.251139] 
[   19.251164] The buggy address belongs to the physical page:
[   19.251196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.251250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.251299] page_type: f5(slab)
[   19.251339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.251391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.251434] page dumped because: kasan: bad access detected
[   19.251468] 
[   19.251661] Memory state around the buggy address:
[   19.251793]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.251915]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.252239] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.252306]                                      ^
[   19.252358]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.252434]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.252557] ==================================================================
[   19.260149] ==================================================================
[   19.260210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.260264] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.260315] 
[   19.260370] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.260481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.260512] Hardware name: linux,dummy-virt (DT)
[   19.260572] Call trace:
[   19.260599]  show_stack+0x20/0x38 (C)
[   19.260647]  dump_stack_lvl+0x8c/0xd0
[   19.260703]  print_report+0x118/0x5d0
[   19.261062]  kasan_report+0xdc/0x128
[   19.261131]  kasan_check_range+0x100/0x1a8
[   19.261183]  __kasan_check_write+0x20/0x30
[   19.261229]  kasan_atomics_helper+0x126c/0x4858
[   19.261278]  kasan_atomics+0x198/0x2e0
[   19.261402]  kunit_try_run_case+0x170/0x3f0
[   19.261455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.261508]  kthread+0x328/0x630
[   19.261550]  ret_from_fork+0x10/0x20
[   19.261724] 
[   19.261755] Allocated by task 265:
[   19.261789]  kasan_save_stack+0x3c/0x68
[   19.261988]  kasan_save_track+0x20/0x40
[   19.262035]  kasan_save_alloc_info+0x40/0x58
[   19.262077]  __kasan_kmalloc+0xd4/0xd8
[   19.262300]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.262436]  kasan_atomics+0xb8/0x2e0
[   19.262478]  kunit_try_run_case+0x170/0x3f0
[   19.262527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.262576]  kthread+0x328/0x630
[   19.262611]  ret_from_fork+0x10/0x20
[   19.262648] 
[   19.262671] The buggy address belongs to the object at fff00000c63aa000
[   19.262671]  which belongs to the cache kmalloc-64 of size 64
[   19.262742] The buggy address is located 0 bytes to the right of
[   19.262742]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.262808] 
[   19.262831] The buggy address belongs to the physical page:
[   19.262864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.262925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.262976] page_type: f5(slab)
[   19.263017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.263069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.263123] page dumped because: kasan: bad access detected
[   19.263165] 
[   19.263194] Memory state around the buggy address:
[   19.263231]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.263276]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.263321] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.263360]                                      ^
[   19.263396]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.263441]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.263487] ==================================================================
[   19.109634] ==================================================================
[   19.109687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.109763] Write of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.109815] 
[   19.109848] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.109931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.109960] Hardware name: linux,dummy-virt (DT)
[   19.109993] Call trace:
[   19.110017]  show_stack+0x20/0x38 (C)
[   19.110066]  dump_stack_lvl+0x8c/0xd0
[   19.110114]  print_report+0x118/0x5d0
[   19.110315]  kasan_atomics_helper+0xa6c/0x4858
[   19.110554]  ret_from_fork+0x10/0x20
[   19.110602] 
[   19.110627] Allocated by task 265:
[   19.110658]  kasan_save_stack+0x3c/0x68
[   19.110700]  kasan_save_track+0x20/0x40
[   19.110751]  kasan_save_alloc_info+0x40/0x58
[   19.111281]  __kasan_kmalloc+0xd4/0xd8
[   19.111341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.111385]  kasan_atomics+0xb8/0x2e0
[   19.111434]  kunit_try_run_case+0x170/0x3f0
[   19.111476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.112164]  kthread+0x328/0x630
[   19.112349]  ret_from_fork+0x10/0x20
[   19.112468] 
[   19.112809] The buggy address belongs to the object at fff00000c63aa000
[   19.112809]  which belongs to the cache kmalloc-64 of size 64
[   19.113113] The buggy address is located 0 bytes to the right of
[   19.113113]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.113322] 
[   19.113784] The buggy address belongs to the physical page:
[   19.114521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.117829] Write of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.120876]  ret_from_fork+0x10/0x20
[   19.121020] 
[   19.121170] Allocated by task 265:
[   19.121322]  kasan_save_stack+0x3c/0x68
[   19.121402]  kasan_save_track+0x20/0x40
[   19.121562]  kasan_save_alloc_info+0x40/0x58
[   19.121666]  __kasan_kmalloc+0xd4/0xd8
[   19.121809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.121925]  kasan_atomics+0xb8/0x2e0
[   19.122082]  kunit_try_run_case+0x170/0x3f0
[   19.122300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.122548]  kthread+0x328/0x630
[   19.122739]  ret_from_fork+0x10/0x20
[   19.122918] 
[   19.122974] The buggy address belongs to the object at fff00000c63aa000
[   19.122974]  which belongs to the cache kmalloc-64 of size 64
[   19.123218] The buggy address is located 0 bytes to the right of
[   19.123218]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.123326] 
[   19.123350] The buggy address belongs to the physical page:
[   19.123545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.125834] page dumped because: kasan: bad access detected
[   19.127060] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.129087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.130547]  kasan_save_stack+0x3c/0x68
[   19.131487]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.132478] 
[   19.132852] page_type: f5(slab)
[   19.133360] page dumped because: kasan: bad access detected
[   19.134622] ==================================================================
[   19.341504] ==================================================================
[   19.341936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.342026] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.342081] 
[   19.342115] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.342648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.342828] Hardware name: linux,dummy-virt (DT)
[   19.343196] Call trace:
[   19.343591]  show_stack+0x20/0x38 (C)
[   19.343680]  dump_stack_lvl+0x8c/0xd0
[   19.343760]  print_report+0x118/0x5d0
[   19.343835]  kasan_report+0xdc/0x128
[   19.344230]  __asan_report_load8_noabort+0x20/0x30
[   19.344446]  kasan_atomics_helper+0x3df4/0x4858
[   19.344538]  kasan_atomics+0x198/0x2e0
[   19.344707]  kunit_try_run_case+0x170/0x3f0
[   19.345099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.345189]  kthread+0x328/0x630
[   19.345339]  ret_from_fork+0x10/0x20
[   19.345449] 
[   19.345548] Allocated by task 265:
[   19.345580]  kasan_save_stack+0x3c/0x68
[   19.345625]  kasan_save_track+0x20/0x40
[   19.345990]  kasan_save_alloc_info+0x40/0x58
[   19.346486]  __kasan_kmalloc+0xd4/0xd8
[   19.346635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.346803]  kasan_atomics+0xb8/0x2e0
[   19.346845]  kunit_try_run_case+0x170/0x3f0
[   19.346945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346993]  kthread+0x328/0x630
[   19.347028]  ret_from_fork+0x10/0x20
[   19.347064] 
[   19.347086] The buggy address belongs to the object at fff00000c63aa000
[   19.347086]  which belongs to the cache kmalloc-64 of size 64
[   19.347480] The buggy address is located 0 bytes to the right of
[   19.347480]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.347702] 
[   19.347913] The buggy address belongs to the physical page:
[   19.348055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.348116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.348451] page_type: f5(slab)
[   19.348792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.348867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.349093] page dumped because: kasan: bad access detected
[   19.349606] 
[   19.349648] Memory state around the buggy address:
[   19.349722]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.349957]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.350008] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.350050]                                      ^
[   19.350525]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.350610]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.350650] ==================================================================
[   19.253543] ==================================================================
[   19.253604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.253782] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265
[   19.253894] 
[   19.253952] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.254083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.254130] Hardware name: linux,dummy-virt (DT)
[   19.254163] Call trace:
[   19.254189]  show_stack+0x20/0x38 (C)
[   19.254245]  dump_stack_lvl+0x8c/0xd0
[   19.254300]  print_report+0x118/0x5d0
[   19.254374]  kasan_report+0xdc/0x128
[   19.254422]  kasan_check_range+0x100/0x1a8
[   19.254471]  __kasan_check_write+0x20/0x30
[   19.254516]  kasan_atomics_helper+0x11f8/0x4858
[   19.254565]  kasan_atomics+0x198/0x2e0
[   19.255090]  kunit_try_run_case+0x170/0x3f0
[   19.255244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.255391]  kthread+0x328/0x630
[   19.255479]  ret_from_fork+0x10/0x20
[   19.255884] 
[   19.256518] Allocated by task 265:
[   19.256554]  kasan_save_stack+0x3c/0x68
[   19.256655]  kasan_save_track+0x20/0x40
[   19.256696]  kasan_save_alloc_info+0x40/0x58
[   19.256748]  __kasan_kmalloc+0xd4/0xd8
[   19.256788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.256869]  kasan_atomics+0xb8/0x2e0
[   19.256955]  kunit_try_run_case+0x170/0x3f0
[   19.257355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.257416]  kthread+0x328/0x630
[   19.257451]  ret_from_fork+0x10/0x20
[   19.257489] 
[   19.257513] The buggy address belongs to the object at fff00000c63aa000
[   19.257513]  which belongs to the cache kmalloc-64 of size 64
[   19.257574] The buggy address is located 0 bytes to the right of
[   19.257574]  allocated 48-byte region [fff00000c63aa000, fff00000c63aa030)
[   19.257640] 
[   19.257664] The buggy address belongs to the physical page:
[   19.257697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa
[   19.257763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.257812] page_type: f5(slab)
[   19.257854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.257906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.258012] page dumped because: kasan: bad access detected
[   19.258071] 
[   19.258181] Memory state around the buggy address:
[   19.258258]  fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.258309]  fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.258360] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.258399]                                      ^
[   19.258436]  fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.258482]  fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.258523] ==================================================================

[   15.360480] ==================================================================
[   15.360848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.361320] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.362022] 
[   15.362132] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.362175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.362391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.362414] Call Trace:
[   15.362428]  <TASK>
[   15.362454]  dump_stack_lvl+0x73/0xb0
[   15.362484]  print_report+0xd1/0x610
[   15.362506]  ? __virt_addr_valid+0x1db/0x2d0
[   15.362528]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.362561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.362585]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.362607]  kasan_report+0x141/0x180
[   15.362630]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.362658]  kasan_check_range+0x10c/0x1c0
[   15.362682]  __kasan_check_write+0x18/0x20
[   15.362702]  kasan_atomics_helper+0x16e7/0x5450
[   15.362726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.362749]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.362776]  ? kasan_atomics+0x152/0x310
[   15.362803]  kasan_atomics+0x1dc/0x310
[   15.362826]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362851]  ? __pfx_read_tsc+0x10/0x10
[   15.362872]  ? ktime_get_ts64+0x86/0x230
[   15.362897]  kunit_try_run_case+0x1a5/0x480
[   15.362922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.362969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.362994]  ? __kthread_parkme+0x82/0x180
[   15.363015]  ? preempt_count_sub+0x50/0x80
[   15.363040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.363115]  kthread+0x337/0x6f0
[   15.363135]  ? trace_preempt_on+0x20/0xc0
[   15.363158]  ? __pfx_kthread+0x10/0x10
[   15.363179]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.363202]  ? calculate_sigpending+0x7b/0xa0
[   15.363226]  ? __pfx_kthread+0x10/0x10
[   15.363248]  ret_from_fork+0x116/0x1d0
[   15.363267]  ? __pfx_kthread+0x10/0x10
[   15.363288]  ret_from_fork_asm+0x1a/0x30
[   15.363322]  </TASK>
[   15.363332] 
[   15.374045] Allocated by task 283:
[   15.374406]  kasan_save_stack+0x45/0x70
[   15.374680]  kasan_save_track+0x18/0x40
[   15.374861]  kasan_save_alloc_info+0x3b/0x50
[   15.375062]  __kasan_kmalloc+0xb7/0xc0
[   15.375243]  __kmalloc_cache_noprof+0x189/0x420
[   15.375462]  kasan_atomics+0x95/0x310
[   15.375931]  kunit_try_run_case+0x1a5/0x480
[   15.376190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.376501]  kthread+0x337/0x6f0
[   15.376765]  ret_from_fork+0x116/0x1d0
[   15.376960]  ret_from_fork_asm+0x1a/0x30
[   15.377285] 
[   15.377362] The buggy address belongs to the object at ffff8881026f3680
[   15.377362]  which belongs to the cache kmalloc-64 of size 64
[   15.378311] The buggy address is located 0 bytes to the right of
[   15.378311]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.378929] 
[   15.379164] The buggy address belongs to the physical page:
[   15.379473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.380044] flags: 0x200000000000000(node=0|zone=2)
[   15.380296] page_type: f5(slab)
[   15.380578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.380997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.381366] page dumped because: kasan: bad access detected
[   15.381672] 
[   15.381772] Memory state around the buggy address:
[   15.382158]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.382469]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.382935] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.383338]                                      ^
[   15.383680]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.384064]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.384365] ==================================================================
[   15.006377] ==================================================================
[   15.007032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.007357] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.007716] 
[   15.007806] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.007848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.007860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.007881] Call Trace:
[   15.007907]  <TASK>
[   15.007922]  dump_stack_lvl+0x73/0xb0
[   15.007949]  print_report+0xd1/0x610
[   15.007982]  ? __virt_addr_valid+0x1db/0x2d0
[   15.008004]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.008027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.008050]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.008073]  kasan_report+0x141/0x180
[   15.008096]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.008123]  kasan_check_range+0x10c/0x1c0
[   15.008148]  __kasan_check_write+0x18/0x20
[   15.008168]  kasan_atomics_helper+0xfa9/0x5450
[   15.008192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.008215]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.008241]  ? kasan_atomics+0x152/0x310
[   15.008268]  kasan_atomics+0x1dc/0x310
[   15.008291]  ? __pfx_kasan_atomics+0x10/0x10
[   15.008316]  ? __pfx_read_tsc+0x10/0x10
[   15.008337]  ? ktime_get_ts64+0x86/0x230
[   15.008364]  kunit_try_run_case+0x1a5/0x480
[   15.008388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.008413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.008446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.008470]  ? __kthread_parkme+0x82/0x180
[   15.008491]  ? preempt_count_sub+0x50/0x80
[   15.008516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.008560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.008585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.008609]  kthread+0x337/0x6f0
[   15.008630]  ? trace_preempt_on+0x20/0xc0
[   15.008653]  ? __pfx_kthread+0x10/0x10
[   15.008675]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.008697]  ? calculate_sigpending+0x7b/0xa0
[   15.008722]  ? __pfx_kthread+0x10/0x10
[   15.008744]  ret_from_fork+0x116/0x1d0
[   15.008772]  ? __pfx_kthread+0x10/0x10
[   15.008794]  ret_from_fork_asm+0x1a/0x30
[   15.008827]  </TASK>
[   15.008848] 
[   15.016123] Allocated by task 283:
[   15.016305]  kasan_save_stack+0x45/0x70
[   15.016514]  kasan_save_track+0x18/0x40
[   15.016751]  kasan_save_alloc_info+0x3b/0x50
[   15.016925]  __kasan_kmalloc+0xb7/0xc0
[   15.017116]  __kmalloc_cache_noprof+0x189/0x420
[   15.017339]  kasan_atomics+0x95/0x310
[   15.017558]  kunit_try_run_case+0x1a5/0x480
[   15.017741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.017993]  kthread+0x337/0x6f0
[   15.018163]  ret_from_fork+0x116/0x1d0
[   15.018331]  ret_from_fork_asm+0x1a/0x30
[   15.018581] 
[   15.018673] The buggy address belongs to the object at ffff8881026f3680
[   15.018673]  which belongs to the cache kmalloc-64 of size 64
[   15.019188] The buggy address is located 0 bytes to the right of
[   15.019188]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.019738] 
[   15.019860] The buggy address belongs to the physical page:
[   15.020074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.020412] flags: 0x200000000000000(node=0|zone=2)
[   15.020640] page_type: f5(slab)
[   15.020789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.021148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.021430] page dumped because: kasan: bad access detected
[   15.021687] 
[   15.021799] Memory state around the buggy address:
[   15.021983]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.022239]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.022462] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.022698]                                      ^
[   15.022853]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023069]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023282] ==================================================================
[   15.122668] ==================================================================
[   15.123019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.123296] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.123808] 
[   15.123925] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.123968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.123980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.124001] Call Trace:
[   15.124015]  <TASK>
[   15.124031]  dump_stack_lvl+0x73/0xb0
[   15.124059]  print_report+0xd1/0x610
[   15.124082]  ? __virt_addr_valid+0x1db/0x2d0
[   15.124105]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.124127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.124151]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.124174]  kasan_report+0x141/0x180
[   15.124197]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.124225]  __asan_report_load4_noabort+0x18/0x20
[   15.124250]  kasan_atomics_helper+0x4a02/0x5450
[   15.124274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.124297]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.124322]  ? kasan_atomics+0x152/0x310
[   15.124349]  kasan_atomics+0x1dc/0x310
[   15.124372]  ? __pfx_kasan_atomics+0x10/0x10
[   15.124397]  ? __pfx_read_tsc+0x10/0x10
[   15.124429]  ? ktime_get_ts64+0x86/0x230
[   15.124470]  kunit_try_run_case+0x1a5/0x480
[   15.124494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.124517]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.124549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.124574]  ? __kthread_parkme+0x82/0x180
[   15.124594]  ? preempt_count_sub+0x50/0x80
[   15.124619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.124644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.124668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.124693]  kthread+0x337/0x6f0
[   15.124713]  ? trace_preempt_on+0x20/0xc0
[   15.124737]  ? __pfx_kthread+0x10/0x10
[   15.124758]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.124780]  ? calculate_sigpending+0x7b/0xa0
[   15.124805]  ? __pfx_kthread+0x10/0x10
[   15.124826]  ret_from_fork+0x116/0x1d0
[   15.124845]  ? __pfx_kthread+0x10/0x10
[   15.124867]  ret_from_fork_asm+0x1a/0x30
[   15.124900]  </TASK>
[   15.124910] 
[   15.132124] Allocated by task 283:
[   15.132291]  kasan_save_stack+0x45/0x70
[   15.132480]  kasan_save_track+0x18/0x40
[   15.132663]  kasan_save_alloc_info+0x3b/0x50
[   15.132812]  __kasan_kmalloc+0xb7/0xc0
[   15.132945]  __kmalloc_cache_noprof+0x189/0x420
[   15.133100]  kasan_atomics+0x95/0x310
[   15.133330]  kunit_try_run_case+0x1a5/0x480
[   15.133573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.133839]  kthread+0x337/0x6f0
[   15.134010]  ret_from_fork+0x116/0x1d0
[   15.134199]  ret_from_fork_asm+0x1a/0x30
[   15.134375] 
[   15.134456] The buggy address belongs to the object at ffff8881026f3680
[   15.134456]  which belongs to the cache kmalloc-64 of size 64
[   15.135276] The buggy address is located 0 bytes to the right of
[   15.135276]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.135790] 
[   15.135877] The buggy address belongs to the physical page:
[   15.136137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.136457] flags: 0x200000000000000(node=0|zone=2)
[   15.136675] page_type: f5(slab)
[   15.136844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.137150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.137485] page dumped because: kasan: bad access detected
[   15.137729] 
[   15.137829] Memory state around the buggy address:
[   15.138010]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.138227]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.138456] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.138676]                                      ^
[   15.138840]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.139127]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.139706] ==================================================================
[   14.556034] ==================================================================
[   14.556358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.557388] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.558078] 
[   14.558204] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.558252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.558264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.558287] Call Trace:
[   14.558304]  <TASK>
[   14.558321]  dump_stack_lvl+0x73/0xb0
[   14.558352]  print_report+0xd1/0x610
[   14.558374]  ? __virt_addr_valid+0x1db/0x2d0
[   14.558397]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.558609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.558634]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.558672]  kasan_report+0x141/0x180
[   14.558697]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.558732]  __asan_report_store4_noabort+0x1b/0x30
[   14.558757]  kasan_atomics_helper+0x4b6e/0x5450
[   14.558784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.558810]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.558835]  ? kasan_atomics+0x152/0x310
[   14.558863]  kasan_atomics+0x1dc/0x310
[   14.558886]  ? __pfx_kasan_atomics+0x10/0x10
[   14.558910]  ? __pfx_read_tsc+0x10/0x10
[   14.558932]  ? ktime_get_ts64+0x86/0x230
[   14.558958]  kunit_try_run_case+0x1a5/0x480
[   14.558983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.559031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.559055]  ? __kthread_parkme+0x82/0x180
[   14.559076]  ? preempt_count_sub+0x50/0x80
[   14.559101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.559177]  kthread+0x337/0x6f0
[   14.559197]  ? trace_preempt_on+0x20/0xc0
[   14.559221]  ? __pfx_kthread+0x10/0x10
[   14.559242]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.559264]  ? calculate_sigpending+0x7b/0xa0
[   14.559289]  ? __pfx_kthread+0x10/0x10
[   14.559311]  ret_from_fork+0x116/0x1d0
[   14.559330]  ? __pfx_kthread+0x10/0x10
[   14.559351]  ret_from_fork_asm+0x1a/0x30
[   14.559384]  </TASK>
[   14.559395] 
[   14.567678] Allocated by task 283:
[   14.567808]  kasan_save_stack+0x45/0x70
[   14.568143]  kasan_save_track+0x18/0x40
[   14.568340]  kasan_save_alloc_info+0x3b/0x50
[   14.568615]  __kasan_kmalloc+0xb7/0xc0
[   14.568802]  __kmalloc_cache_noprof+0x189/0x420
[   14.569015]  kasan_atomics+0x95/0x310
[   14.569153]  kunit_try_run_case+0x1a5/0x480
[   14.569300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.569497]  kthread+0x337/0x6f0
[   14.569849]  ret_from_fork+0x116/0x1d0
[   14.570039]  ret_from_fork_asm+0x1a/0x30
[   14.570240] 
[   14.570348] The buggy address belongs to the object at ffff8881026f3680
[   14.570348]  which belongs to the cache kmalloc-64 of size 64
[   14.570844] The buggy address is located 0 bytes to the right of
[   14.570844]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.571230] 
[   14.571317] The buggy address belongs to the physical page:
[   14.571610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.571981] flags: 0x200000000000000(node=0|zone=2)
[   14.572215] page_type: f5(slab)
[   14.572383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.572781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.573025] page dumped because: kasan: bad access detected
[   14.573204] 
[   14.573274] Memory state around the buggy address:
[   14.573499]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.574213]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.574722] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.575028]                                      ^
[   14.575235]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575568]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575945] ==================================================================
[   15.197204] ==================================================================
[   15.197794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.198135] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.198556] 
[   15.198667] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.198707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.198719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.198739] Call Trace:
[   15.198751]  <TASK>
[   15.198766]  dump_stack_lvl+0x73/0xb0
[   15.198793]  print_report+0xd1/0x610
[   15.198815]  ? __virt_addr_valid+0x1db/0x2d0
[   15.198838]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.198860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.198884]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.198907]  kasan_report+0x141/0x180
[   15.198929]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.198957]  __asan_report_load4_noabort+0x18/0x20
[   15.198982]  kasan_atomics_helper+0x49ce/0x5450
[   15.199006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.199030]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.199055]  ? kasan_atomics+0x152/0x310
[   15.199083]  kasan_atomics+0x1dc/0x310
[   15.199106]  ? __pfx_kasan_atomics+0x10/0x10
[   15.199131]  ? __pfx_read_tsc+0x10/0x10
[   15.199152]  ? ktime_get_ts64+0x86/0x230
[   15.199177]  kunit_try_run_case+0x1a5/0x480
[   15.199202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.199226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.199250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.199275]  ? __kthread_parkme+0x82/0x180
[   15.199296]  ? preempt_count_sub+0x50/0x80
[   15.199321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.199345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.199370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.199395]  kthread+0x337/0x6f0
[   15.199414]  ? trace_preempt_on+0x20/0xc0
[   15.199449]  ? __pfx_kthread+0x10/0x10
[   15.199469]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.199492]  ? calculate_sigpending+0x7b/0xa0
[   15.199516]  ? __pfx_kthread+0x10/0x10
[   15.199538]  ret_from_fork+0x116/0x1d0
[   15.199558]  ? __pfx_kthread+0x10/0x10
[   15.199579]  ret_from_fork_asm+0x1a/0x30
[   15.199614]  </TASK>
[   15.199624] 
[   15.206887] Allocated by task 283:
[   15.207072]  kasan_save_stack+0x45/0x70
[   15.207276]  kasan_save_track+0x18/0x40
[   15.207478]  kasan_save_alloc_info+0x3b/0x50
[   15.207850]  __kasan_kmalloc+0xb7/0xc0
[   15.208045]  __kmalloc_cache_noprof+0x189/0x420
[   15.208273]  kasan_atomics+0x95/0x310
[   15.208451]  kunit_try_run_case+0x1a5/0x480
[   15.208646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.208890]  kthread+0x337/0x6f0
[   15.209016]  ret_from_fork+0x116/0x1d0
[   15.209205]  ret_from_fork_asm+0x1a/0x30
[   15.209405] 
[   15.209513] The buggy address belongs to the object at ffff8881026f3680
[   15.209513]  which belongs to the cache kmalloc-64 of size 64
[   15.209989] The buggy address is located 0 bytes to the right of
[   15.209989]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.210486] 
[   15.210608] The buggy address belongs to the physical page:
[   15.210843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.211138] flags: 0x200000000000000(node=0|zone=2)
[   15.211354] page_type: f5(slab)
[   15.211529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.211836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.212144] page dumped because: kasan: bad access detected
[   15.212346] 
[   15.212415] Memory state around the buggy address:
[   15.212643]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212956]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.213227] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.213531]                                      ^
[   15.213721]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.213938]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214152] ==================================================================
[   15.232234] ==================================================================
[   15.232679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.233033] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.233332] 
[   15.233415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.233467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.233479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.233500] Call Trace:
[   15.233513]  <TASK>
[   15.233527]  dump_stack_lvl+0x73/0xb0
[   15.233554]  print_report+0xd1/0x610
[   15.233588]  ? __virt_addr_valid+0x1db/0x2d0
[   15.233612]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.233634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.233658]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.233680]  kasan_report+0x141/0x180
[   15.233703]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.233732]  __asan_report_load8_noabort+0x18/0x20
[   15.233757]  kasan_atomics_helper+0x4eae/0x5450
[   15.233780]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.233803]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.233829]  ? kasan_atomics+0x152/0x310
[   15.233857]  kasan_atomics+0x1dc/0x310
[   15.233880]  ? __pfx_kasan_atomics+0x10/0x10
[   15.233905]  ? __pfx_read_tsc+0x10/0x10
[   15.233926]  ? ktime_get_ts64+0x86/0x230
[   15.233952]  kunit_try_run_case+0x1a5/0x480
[   15.233977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.234024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.234049]  ? __kthread_parkme+0x82/0x180
[   15.234070]  ? preempt_count_sub+0x50/0x80
[   15.234095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.234143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.234169]  kthread+0x337/0x6f0
[   15.234189]  ? trace_preempt_on+0x20/0xc0
[   15.234213]  ? __pfx_kthread+0x10/0x10
[   15.234233]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.234256]  ? calculate_sigpending+0x7b/0xa0
[   15.234281]  ? __pfx_kthread+0x10/0x10
[   15.234303]  ret_from_fork+0x116/0x1d0
[   15.234322]  ? __pfx_kthread+0x10/0x10
[   15.234344]  ret_from_fork_asm+0x1a/0x30
[   15.234377]  </TASK>
[   15.234387] 
[   15.241468] Allocated by task 283:
[   15.241706]  kasan_save_stack+0x45/0x70
[   15.241908]  kasan_save_track+0x18/0x40
[   15.242061]  kasan_save_alloc_info+0x3b/0x50
[   15.242243]  __kasan_kmalloc+0xb7/0xc0
[   15.242443]  __kmalloc_cache_noprof+0x189/0x420
[   15.242692]  kasan_atomics+0x95/0x310
[   15.242878]  kunit_try_run_case+0x1a5/0x480
[   15.243063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.243288]  kthread+0x337/0x6f0
[   15.243432]  ret_from_fork+0x116/0x1d0
[   15.243632]  ret_from_fork_asm+0x1a/0x30
[   15.243823] 
[   15.243909] The buggy address belongs to the object at ffff8881026f3680
[   15.243909]  which belongs to the cache kmalloc-64 of size 64
[   15.244368] The buggy address is located 0 bytes to the right of
[   15.244368]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.244875] 
[   15.244973] The buggy address belongs to the physical page:
[   15.245185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.245428] flags: 0x200000000000000(node=0|zone=2)
[   15.245601] page_type: f5(slab)
[   15.245722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.245957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.246187] page dumped because: kasan: bad access detected
[   15.246476] 
[   15.246575] Memory state around the buggy address:
[   15.246798]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.247111]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.247421] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.247781]                                      ^
[   15.247937]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.248153]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.248368] ==================================================================
[   15.599159] ==================================================================
[   15.599757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.600095] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.600325] 
[   15.600414] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.600470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.600482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.600505] Call Trace:
[   15.600525]  <TASK>
[   15.600544]  dump_stack_lvl+0x73/0xb0
[   15.600574]  print_report+0xd1/0x610
[   15.600597]  ? __virt_addr_valid+0x1db/0x2d0
[   15.600620]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.600642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.600666]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.600689]  kasan_report+0x141/0x180
[   15.600712]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.600740]  kasan_check_range+0x10c/0x1c0
[   15.600765]  __kasan_check_write+0x18/0x20
[   15.600785]  kasan_atomics_helper+0x1d7a/0x5450
[   15.600810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.600833]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.600859]  ? kasan_atomics+0x152/0x310
[   15.600886]  kasan_atomics+0x1dc/0x310
[   15.600909]  ? __pfx_kasan_atomics+0x10/0x10
[   15.600935]  ? __pfx_read_tsc+0x10/0x10
[   15.600956]  ? ktime_get_ts64+0x86/0x230
[   15.600982]  kunit_try_run_case+0x1a5/0x480
[   15.601007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.601031]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.601056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.601081]  ? __kthread_parkme+0x82/0x180
[   15.601101]  ? preempt_count_sub+0x50/0x80
[   15.601127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.601156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.601180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.601205]  kthread+0x337/0x6f0
[   15.601224]  ? trace_preempt_on+0x20/0xc0
[   15.601247]  ? __pfx_kthread+0x10/0x10
[   15.601269]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.601291]  ? calculate_sigpending+0x7b/0xa0
[   15.601316]  ? __pfx_kthread+0x10/0x10
[   15.601338]  ret_from_fork+0x116/0x1d0
[   15.601357]  ? __pfx_kthread+0x10/0x10
[   15.601378]  ret_from_fork_asm+0x1a/0x30
[   15.601412]  </TASK>
[   15.601423] 
[   15.609756] Allocated by task 283:
[   15.609973]  kasan_save_stack+0x45/0x70
[   15.610231]  kasan_save_track+0x18/0x40
[   15.610471]  kasan_save_alloc_info+0x3b/0x50
[   15.610726]  __kasan_kmalloc+0xb7/0xc0
[   15.610916]  __kmalloc_cache_noprof+0x189/0x420
[   15.611170]  kasan_atomics+0x95/0x310
[   15.611360]  kunit_try_run_case+0x1a5/0x480
[   15.611708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.611969]  kthread+0x337/0x6f0
[   15.612116]  ret_from_fork+0x116/0x1d0
[   15.612251]  ret_from_fork_asm+0x1a/0x30
[   15.612428] 
[   15.612537] The buggy address belongs to the object at ffff8881026f3680
[   15.612537]  which belongs to the cache kmalloc-64 of size 64
[   15.613099] The buggy address is located 0 bytes to the right of
[   15.613099]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.613529] 
[   15.613612] The buggy address belongs to the physical page:
[   15.613789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.614156] flags: 0x200000000000000(node=0|zone=2)
[   15.614390] page_type: f5(slab)
[   15.614589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.614949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.615250] page dumped because: kasan: bad access detected
[   15.615528] 
[   15.615632] Memory state around the buggy address:
[   15.615837]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.616188]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.616525] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.616932]                                      ^
[   15.617157]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.617521]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.617845] ==================================================================
[   15.714417] ==================================================================
[   15.715176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.715503] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.715798] 
[   15.715883] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.715925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.715937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.715959] Call Trace:
[   15.715976]  <TASK>
[   15.715991]  dump_stack_lvl+0x73/0xb0
[   15.716018]  print_report+0xd1/0x610
[   15.716040]  ? __virt_addr_valid+0x1db/0x2d0
[   15.716063]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.716085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.716109]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.716132]  kasan_report+0x141/0x180
[   15.716155]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.716183]  __asan_report_load8_noabort+0x18/0x20
[   15.716208]  kasan_atomics_helper+0x4f98/0x5450
[   15.716232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.716255]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.716281]  ? kasan_atomics+0x152/0x310
[   15.716308]  kasan_atomics+0x1dc/0x310
[   15.716332]  ? __pfx_kasan_atomics+0x10/0x10
[   15.716356]  ? __pfx_read_tsc+0x10/0x10
[   15.716378]  ? ktime_get_ts64+0x86/0x230
[   15.716404]  kunit_try_run_case+0x1a5/0x480
[   15.716428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.716462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.716487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.716512]  ? __kthread_parkme+0x82/0x180
[   15.716533]  ? preempt_count_sub+0x50/0x80
[   15.716566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.716591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.716616]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.716641]  kthread+0x337/0x6f0
[   15.716661]  ? trace_preempt_on+0x20/0xc0
[   15.716684]  ? __pfx_kthread+0x10/0x10
[   15.716705]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.716773]  ? calculate_sigpending+0x7b/0xa0
[   15.716825]  ? __pfx_kthread+0x10/0x10
[   15.716847]  ret_from_fork+0x116/0x1d0
[   15.716895]  ? __pfx_kthread+0x10/0x10
[   15.716917]  ret_from_fork_asm+0x1a/0x30
[   15.716976]  </TASK>
[   15.716987] 
[   15.728615] Allocated by task 283:
[   15.728793]  kasan_save_stack+0x45/0x70
[   15.729004]  kasan_save_track+0x18/0x40
[   15.729189]  kasan_save_alloc_info+0x3b/0x50
[   15.729342]  __kasan_kmalloc+0xb7/0xc0
[   15.729501]  __kmalloc_cache_noprof+0x189/0x420
[   15.729741]  kasan_atomics+0x95/0x310
[   15.729929]  kunit_try_run_case+0x1a5/0x480
[   15.730137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.730348]  kthread+0x337/0x6f0
[   15.730546]  ret_from_fork+0x116/0x1d0
[   15.730724]  ret_from_fork_asm+0x1a/0x30
[   15.730917] 
[   15.731014] The buggy address belongs to the object at ffff8881026f3680
[   15.731014]  which belongs to the cache kmalloc-64 of size 64
[   15.731486] The buggy address is located 0 bytes to the right of
[   15.731486]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.731979] 
[   15.732083] The buggy address belongs to the physical page:
[   15.732338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.732617] flags: 0x200000000000000(node=0|zone=2)
[   15.732786] page_type: f5(slab)
[   15.732909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.733261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.733630] page dumped because: kasan: bad access detected
[   15.733881] 
[   15.733974] Memory state around the buggy address:
[   15.734197]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.734474]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.734736] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.735029]                                      ^
[   15.735254]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.735563]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.735843] ==================================================================
[   15.559687] ==================================================================
[   15.560074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.560338] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.561036] 
[   15.561141] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.561187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.561200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.561222] Call Trace:
[   15.561238]  <TASK>
[   15.561255]  dump_stack_lvl+0x73/0xb0
[   15.561285]  print_report+0xd1/0x610
[   15.561307]  ? __virt_addr_valid+0x1db/0x2d0
[   15.561330]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.561353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.561376]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.561399]  kasan_report+0x141/0x180
[   15.561422]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.561464]  __asan_report_load8_noabort+0x18/0x20
[   15.561490]  kasan_atomics_helper+0x4f30/0x5450
[   15.561514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.561538]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.561563]  ? kasan_atomics+0x152/0x310
[   15.561613]  kasan_atomics+0x1dc/0x310
[   15.561637]  ? __pfx_kasan_atomics+0x10/0x10
[   15.561661]  ? __pfx_read_tsc+0x10/0x10
[   15.561683]  ? ktime_get_ts64+0x86/0x230
[   15.561710]  kunit_try_run_case+0x1a5/0x480
[   15.561734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.561757]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.561781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.561823]  ? __kthread_parkme+0x82/0x180
[   15.561844]  ? preempt_count_sub+0x50/0x80
[   15.561869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.561894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.561918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.561943]  kthread+0x337/0x6f0
[   15.561963]  ? trace_preempt_on+0x20/0xc0
[   15.562002]  ? __pfx_kthread+0x10/0x10
[   15.562022]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.562045]  ? calculate_sigpending+0x7b/0xa0
[   15.562069]  ? __pfx_kthread+0x10/0x10
[   15.562091]  ret_from_fork+0x116/0x1d0
[   15.562109]  ? __pfx_kthread+0x10/0x10
[   15.562131]  ret_from_fork_asm+0x1a/0x30
[   15.562164]  </TASK>
[   15.562175] 
[   15.570146] Allocated by task 283:
[   15.570362]  kasan_save_stack+0x45/0x70
[   15.570564]  kasan_save_track+0x18/0x40
[   15.570751]  kasan_save_alloc_info+0x3b/0x50
[   15.570959]  __kasan_kmalloc+0xb7/0xc0
[   15.571163]  __kmalloc_cache_noprof+0x189/0x420
[   15.571314]  kasan_atomics+0x95/0x310
[   15.571627]  kunit_try_run_case+0x1a5/0x480
[   15.571837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.572052]  kthread+0x337/0x6f0
[   15.572170]  ret_from_fork+0x116/0x1d0
[   15.572299]  ret_from_fork_asm+0x1a/0x30
[   15.572446] 
[   15.572539] The buggy address belongs to the object at ffff8881026f3680
[   15.572539]  which belongs to the cache kmalloc-64 of size 64
[   15.573072] The buggy address is located 0 bytes to the right of
[   15.573072]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.573852] 
[   15.574004] The buggy address belongs to the physical page:
[   15.574276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.574705] flags: 0x200000000000000(node=0|zone=2)
[   15.574868] page_type: f5(slab)
[   15.574986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.575213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.575478] page dumped because: kasan: bad access detected
[   15.575968] 
[   15.576098] Memory state around the buggy address:
[   15.576352]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.576735]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.577102] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.577430]                                      ^
[   15.577674]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.577979]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.578283] ==================================================================
[   15.770265] ==================================================================
[   15.770774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.771218] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.771540] 
[   15.771654] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.771695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.771706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.771727] Call Trace:
[   15.771742]  <TASK>
[   15.771757]  dump_stack_lvl+0x73/0xb0
[   15.771783]  print_report+0xd1/0x610
[   15.771805]  ? __virt_addr_valid+0x1db/0x2d0
[   15.771829]  ? kasan_atomics_helper+0x218a/0x5450
[   15.771850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.771873]  ? kasan_atomics_helper+0x218a/0x5450
[   15.771896]  kasan_report+0x141/0x180
[   15.771918]  ? kasan_atomics_helper+0x218a/0x5450
[   15.771946]  kasan_check_range+0x10c/0x1c0
[   15.771971]  __kasan_check_write+0x18/0x20
[   15.771991]  kasan_atomics_helper+0x218a/0x5450
[   15.772014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.772037]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.772063]  ? kasan_atomics+0x152/0x310
[   15.772090]  kasan_atomics+0x1dc/0x310
[   15.772113]  ? __pfx_kasan_atomics+0x10/0x10
[   15.772138]  ? __pfx_read_tsc+0x10/0x10
[   15.772159]  ? ktime_get_ts64+0x86/0x230
[   15.772185]  kunit_try_run_case+0x1a5/0x480
[   15.772209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.772232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.772256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.772284]  ? __kthread_parkme+0x82/0x180
[   15.772305]  ? preempt_count_sub+0x50/0x80
[   15.772329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.772354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.772378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.772403]  kthread+0x337/0x6f0
[   15.772422]  ? trace_preempt_on+0x20/0xc0
[   15.772455]  ? __pfx_kthread+0x10/0x10
[   15.772476]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.772498]  ? calculate_sigpending+0x7b/0xa0
[   15.772541]  ? __pfx_kthread+0x10/0x10
[   15.772564]  ret_from_fork+0x116/0x1d0
[   15.772582]  ? __pfx_kthread+0x10/0x10
[   15.772603]  ret_from_fork_asm+0x1a/0x30
[   15.772636]  </TASK>
[   15.772646] 
[   15.784123] Allocated by task 283:
[   15.784301]  kasan_save_stack+0x45/0x70
[   15.784523]  kasan_save_track+0x18/0x40
[   15.785023]  kasan_save_alloc_info+0x3b/0x50
[   15.785208]  __kasan_kmalloc+0xb7/0xc0
[   15.785570]  __kmalloc_cache_noprof+0x189/0x420
[   15.785874]  kasan_atomics+0x95/0x310
[   15.786159]  kunit_try_run_case+0x1a5/0x480
[   15.786320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.786816]  kthread+0x337/0x6f0
[   15.787079]  ret_from_fork+0x116/0x1d0
[   15.787336]  ret_from_fork_asm+0x1a/0x30
[   15.787504] 
[   15.787603] The buggy address belongs to the object at ffff8881026f3680
[   15.787603]  which belongs to the cache kmalloc-64 of size 64
[   15.788495] The buggy address is located 0 bytes to the right of
[   15.788495]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.789107] 
[   15.789195] The buggy address belongs to the physical page:
[   15.789613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.790043] flags: 0x200000000000000(node=0|zone=2)
[   15.790355] page_type: f5(slab)
[   15.790532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.790943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.791277] page dumped because: kasan: bad access detected
[   15.791693] 
[   15.791792] Memory state around the buggy address:
[   15.792137]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792521]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792951] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.793303]                                      ^
[   15.793481]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793954]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.794324] ==================================================================
[   15.430637] ==================================================================
[   15.431105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.431703] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.432009] 
[   15.432109] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.432154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.432167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.432189] Call Trace:
[   15.432204]  <TASK>
[   15.432220]  dump_stack_lvl+0x73/0xb0
[   15.432248]  print_report+0xd1/0x610
[   15.432270]  ? __virt_addr_valid+0x1db/0x2d0
[   15.432293]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.432315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.432339]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.432361]  kasan_report+0x141/0x180
[   15.432384]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.432411]  kasan_check_range+0x10c/0x1c0
[   15.432447]  __kasan_check_write+0x18/0x20
[   15.432468]  kasan_atomics_helper+0x18b1/0x5450
[   15.432492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.432514]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.432539]  ? kasan_atomics+0x152/0x310
[   15.432567]  kasan_atomics+0x1dc/0x310
[   15.432591]  ? __pfx_kasan_atomics+0x10/0x10
[   15.432615]  ? __pfx_read_tsc+0x10/0x10
[   15.432636]  ? ktime_get_ts64+0x86/0x230
[   15.432662]  kunit_try_run_case+0x1a5/0x480
[   15.432687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.432710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.432734]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.432759]  ? __kthread_parkme+0x82/0x180
[   15.432779]  ? preempt_count_sub+0x50/0x80
[   15.433037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.433067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.433183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.433211]  kthread+0x337/0x6f0
[   15.433231]  ? trace_preempt_on+0x20/0xc0
[   15.433254]  ? __pfx_kthread+0x10/0x10
[   15.433276]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.433297]  ? calculate_sigpending+0x7b/0xa0
[   15.433322]  ? __pfx_kthread+0x10/0x10
[   15.433344]  ret_from_fork+0x116/0x1d0
[   15.433363]  ? __pfx_kthread+0x10/0x10
[   15.433383]  ret_from_fork_asm+0x1a/0x30
[   15.433416]  </TASK>
[   15.433427] 
[   15.443311] Allocated by task 283:
[   15.443493]  kasan_save_stack+0x45/0x70
[   15.443846]  kasan_save_track+0x18/0x40
[   15.444016]  kasan_save_alloc_info+0x3b/0x50
[   15.444330]  __kasan_kmalloc+0xb7/0xc0
[   15.444503]  __kmalloc_cache_noprof+0x189/0x420
[   15.444865]  kasan_atomics+0x95/0x310
[   15.445046]  kunit_try_run_case+0x1a5/0x480
[   15.445237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445494]  kthread+0x337/0x6f0
[   15.445875]  ret_from_fork+0x116/0x1d0
[   15.446051]  ret_from_fork_asm+0x1a/0x30
[   15.446298] 
[   15.446461] The buggy address belongs to the object at ffff8881026f3680
[   15.446461]  which belongs to the cache kmalloc-64 of size 64
[   15.447008] The buggy address is located 0 bytes to the right of
[   15.447008]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.447727] 
[   15.447813] The buggy address belongs to the physical page:
[   15.448033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.448372] flags: 0x200000000000000(node=0|zone=2)
[   15.448595] page_type: f5(slab)
[   15.449030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.449432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.449888] page dumped because: kasan: bad access detected
[   15.450208] 
[   15.450304] Memory state around the buggy address:
[   15.450654]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.451036]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.451391] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.451779]                                      ^
[   15.452057]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.452318]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.452845] ==================================================================
[   15.508702] ==================================================================
[   15.509405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.509757] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.510081] 
[   15.510190] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.510233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.510246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.510268] Call Trace:
[   15.510284]  <TASK>
[   15.510301]  dump_stack_lvl+0x73/0xb0
[   15.510328]  print_report+0xd1/0x610
[   15.510349]  ? __virt_addr_valid+0x1db/0x2d0
[   15.510372]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.510393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.510416]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.510447]  kasan_report+0x141/0x180
[   15.510470]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.510496]  kasan_check_range+0x10c/0x1c0
[   15.510520]  __kasan_check_write+0x18/0x20
[   15.510539]  kasan_atomics_helper+0x1b22/0x5450
[   15.510562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.510585]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.510610]  ? kasan_atomics+0x152/0x310
[   15.510636]  kasan_atomics+0x1dc/0x310
[   15.510658]  ? __pfx_kasan_atomics+0x10/0x10
[   15.510682]  ? __pfx_read_tsc+0x10/0x10
[   15.510702]  ? ktime_get_ts64+0x86/0x230
[   15.510728]  kunit_try_run_case+0x1a5/0x480
[   15.510751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.510774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.510798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.510821]  ? __kthread_parkme+0x82/0x180
[   15.510840]  ? preempt_count_sub+0x50/0x80
[   15.510865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.510888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.510911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.510935]  kthread+0x337/0x6f0
[   15.510953]  ? trace_preempt_on+0x20/0xc0
[   15.510976]  ? __pfx_kthread+0x10/0x10
[   15.510997]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.511018]  ? calculate_sigpending+0x7b/0xa0
[   15.511042]  ? __pfx_kthread+0x10/0x10
[   15.511063]  ret_from_fork+0x116/0x1d0
[   15.511081]  ? __pfx_kthread+0x10/0x10
[   15.511101]  ret_from_fork_asm+0x1a/0x30
[   15.511134]  </TASK>
[   15.511157] 
[   15.519728] Allocated by task 283:
[   15.519935]  kasan_save_stack+0x45/0x70
[   15.520172]  kasan_save_track+0x18/0x40
[   15.520390]  kasan_save_alloc_info+0x3b/0x50
[   15.520619]  __kasan_kmalloc+0xb7/0xc0
[   15.520828]  __kmalloc_cache_noprof+0x189/0x420
[   15.520982]  kasan_atomics+0x95/0x310
[   15.521112]  kunit_try_run_case+0x1a5/0x480
[   15.521257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.521428]  kthread+0x337/0x6f0
[   15.521657]  ret_from_fork+0x116/0x1d0
[   15.521867]  ret_from_fork_asm+0x1a/0x30
[   15.522093] 
[   15.522205] The buggy address belongs to the object at ffff8881026f3680
[   15.522205]  which belongs to the cache kmalloc-64 of size 64
[   15.522796] The buggy address is located 0 bytes to the right of
[   15.522796]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.523422] 
[   15.523529] The buggy address belongs to the physical page:
[   15.524085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.524429] flags: 0x200000000000000(node=0|zone=2)
[   15.525184] page_type: f5(slab)
[   15.525345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.526497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.528633] page dumped because: kasan: bad access detected
[   15.529123] 
[   15.529208] Memory state around the buggy address:
[   15.529370]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.530000]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.530740] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.531433]                                      ^
[   15.531956]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532404]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532949] ==================================================================
[   14.523972] ==================================================================
[   14.524725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.524967] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.525196] 
[   14.525282] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.525324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.525336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.525357] Call Trace:
[   14.525368]  <TASK>
[   14.525384]  dump_stack_lvl+0x73/0xb0
[   14.525428]  print_report+0xd1/0x610
[   14.525461]  ? __virt_addr_valid+0x1db/0x2d0
[   14.525484]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.525504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.525527]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.525548]  kasan_report+0x141/0x180
[   14.525570]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.525596]  __asan_report_load4_noabort+0x18/0x20
[   14.525620]  kasan_atomics_helper+0x4b88/0x5450
[   14.525643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.525665]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.525689]  ? kasan_atomics+0x152/0x310
[   14.525716]  kasan_atomics+0x1dc/0x310
[   14.525738]  ? __pfx_kasan_atomics+0x10/0x10
[   14.525761]  ? __pfx_read_tsc+0x10/0x10
[   14.525781]  ? ktime_get_ts64+0x86/0x230
[   14.525806]  kunit_try_run_case+0x1a5/0x480
[   14.525874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.525898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.525923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.525946]  ? __kthread_parkme+0x82/0x180
[   14.525967]  ? preempt_count_sub+0x50/0x80
[   14.525990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.526040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.526064]  kthread+0x337/0x6f0
[   14.526082]  ? trace_preempt_on+0x20/0xc0
[   14.526106]  ? __pfx_kthread+0x10/0x10
[   14.526126]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.526148]  ? calculate_sigpending+0x7b/0xa0
[   14.526172]  ? __pfx_kthread+0x10/0x10
[   14.526193]  ret_from_fork+0x116/0x1d0
[   14.526211]  ? __pfx_kthread+0x10/0x10
[   14.526231]  ret_from_fork_asm+0x1a/0x30
[   14.526264]  </TASK>
[   14.526274] 
[   14.540755] Allocated by task 283:
[   14.541000]  kasan_save_stack+0x45/0x70
[   14.541153]  kasan_save_track+0x18/0x40
[   14.541288]  kasan_save_alloc_info+0x3b/0x50
[   14.541528]  __kasan_kmalloc+0xb7/0xc0
[   14.541873]  __kmalloc_cache_noprof+0x189/0x420
[   14.542376]  kasan_atomics+0x95/0x310
[   14.542838]  kunit_try_run_case+0x1a5/0x480
[   14.543264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.543765]  kthread+0x337/0x6f0
[   14.544160]  ret_from_fork+0x116/0x1d0
[   14.544552]  ret_from_fork_asm+0x1a/0x30
[   14.545106] 
[   14.545211] The buggy address belongs to the object at ffff8881026f3680
[   14.545211]  which belongs to the cache kmalloc-64 of size 64
[   14.546188] The buggy address is located 0 bytes to the right of
[   14.546188]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.547554] 
[   14.547750] The buggy address belongs to the physical page:
[   14.548246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.548850] flags: 0x200000000000000(node=0|zone=2)
[   14.549132] page_type: f5(slab)
[   14.549257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.549780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.550597] page dumped because: kasan: bad access detected
[   14.551294] 
[   14.551755] Memory state around the buggy address:
[   14.552507]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.552754]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.552975] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.553199]                                      ^
[   14.553358]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.554256]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555123] ==================================================================
[   14.658865] ==================================================================
[   14.659260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.659854] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.660274] 
[   14.660372] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.660414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.660427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.660458] Call Trace:
[   14.660473]  <TASK>
[   14.660488]  dump_stack_lvl+0x73/0xb0
[   14.660516]  print_report+0xd1/0x610
[   14.660538]  ? __virt_addr_valid+0x1db/0x2d0
[   14.660562]  ? kasan_atomics_helper+0x565/0x5450
[   14.660583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.660607]  ? kasan_atomics_helper+0x565/0x5450
[   14.660629]  kasan_report+0x141/0x180
[   14.660654]  ? kasan_atomics_helper+0x565/0x5450
[   14.660692]  kasan_check_range+0x10c/0x1c0
[   14.660717]  __kasan_check_write+0x18/0x20
[   14.660737]  kasan_atomics_helper+0x565/0x5450
[   14.660760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.660784]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.660810]  ? kasan_atomics+0x152/0x310
[   14.660837]  kasan_atomics+0x1dc/0x310
[   14.660860]  ? __pfx_kasan_atomics+0x10/0x10
[   14.660886]  ? __pfx_read_tsc+0x10/0x10
[   14.660907]  ? ktime_get_ts64+0x86/0x230
[   14.660932]  kunit_try_run_case+0x1a5/0x480
[   14.660958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.660981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.661007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.661030]  ? __kthread_parkme+0x82/0x180
[   14.661050]  ? preempt_count_sub+0x50/0x80
[   14.661075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.661099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.661125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.661155]  kthread+0x337/0x6f0
[   14.661175]  ? trace_preempt_on+0x20/0xc0
[   14.661199]  ? __pfx_kthread+0x10/0x10
[   14.661220]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.661242]  ? calculate_sigpending+0x7b/0xa0
[   14.661266]  ? __pfx_kthread+0x10/0x10
[   14.661288]  ret_from_fork+0x116/0x1d0
[   14.661307]  ? __pfx_kthread+0x10/0x10
[   14.661328]  ret_from_fork_asm+0x1a/0x30
[   14.661361]  </TASK>
[   14.661371] 
[   14.668736] Allocated by task 283:
[   14.668922]  kasan_save_stack+0x45/0x70
[   14.669123]  kasan_save_track+0x18/0x40
[   14.669324]  kasan_save_alloc_info+0x3b/0x50
[   14.669547]  __kasan_kmalloc+0xb7/0xc0
[   14.669787]  __kmalloc_cache_noprof+0x189/0x420
[   14.670014]  kasan_atomics+0x95/0x310
[   14.670215]  kunit_try_run_case+0x1a5/0x480
[   14.670410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.670753]  kthread+0x337/0x6f0
[   14.670916]  ret_from_fork+0x116/0x1d0
[   14.671066]  ret_from_fork_asm+0x1a/0x30
[   14.671207] 
[   14.671277] The buggy address belongs to the object at ffff8881026f3680
[   14.671277]  which belongs to the cache kmalloc-64 of size 64
[   14.671969] The buggy address is located 0 bytes to the right of
[   14.671969]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.672406] 
[   14.672488] The buggy address belongs to the physical page:
[   14.672662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.672903] flags: 0x200000000000000(node=0|zone=2)
[   14.673066] page_type: f5(slab)
[   14.673189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.673474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.673848] page dumped because: kasan: bad access detected
[   14.674097] 
[   14.674188] Memory state around the buggy address:
[   14.674407]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674739]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.675062] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.675510]                                      ^
[   14.675745]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.675965]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.676180] ==================================================================
[   15.334621] ==================================================================
[   15.334982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.335322] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.335834] 
[   15.338499] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.338547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.338559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.338581] Call Trace:
[   15.338596]  <TASK>
[   15.338611]  dump_stack_lvl+0x73/0xb0
[   15.338670]  print_report+0xd1/0x610
[   15.338692]  ? __virt_addr_valid+0x1db/0x2d0
[   15.338714]  ? kasan_atomics_helper+0x164f/0x5450
[   15.338755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.338778]  ? kasan_atomics_helper+0x164f/0x5450
[   15.338802]  kasan_report+0x141/0x180
[   15.338839]  ? kasan_atomics_helper+0x164f/0x5450
[   15.338867]  kasan_check_range+0x10c/0x1c0
[   15.338906]  __kasan_check_write+0x18/0x20
[   15.338925]  kasan_atomics_helper+0x164f/0x5450
[   15.338949]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.338986]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.339025]  ? kasan_atomics+0x152/0x310
[   15.339053]  kasan_atomics+0x1dc/0x310
[   15.339076]  ? __pfx_kasan_atomics+0x10/0x10
[   15.339102]  ? __pfx_read_tsc+0x10/0x10
[   15.339124]  ? ktime_get_ts64+0x86/0x230
[   15.339149]  kunit_try_run_case+0x1a5/0x480
[   15.339174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339197]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.339223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.339248]  ? __kthread_parkme+0x82/0x180
[   15.339268]  ? preempt_count_sub+0x50/0x80
[   15.339293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.339342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.339367]  kthread+0x337/0x6f0
[   15.339388]  ? trace_preempt_on+0x20/0xc0
[   15.339411]  ? __pfx_kthread+0x10/0x10
[   15.339433]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.339465]  ? calculate_sigpending+0x7b/0xa0
[   15.339490]  ? __pfx_kthread+0x10/0x10
[   15.339512]  ret_from_fork+0x116/0x1d0
[   15.339531]  ? __pfx_kthread+0x10/0x10
[   15.339563]  ret_from_fork_asm+0x1a/0x30
[   15.339596]  </TASK>
[   15.339607] 
[   15.349554] Allocated by task 283:
[   15.349950]  kasan_save_stack+0x45/0x70
[   15.350123]  kasan_save_track+0x18/0x40
[   15.350458]  kasan_save_alloc_info+0x3b/0x50
[   15.350752]  __kasan_kmalloc+0xb7/0xc0
[   15.351073]  __kmalloc_cache_noprof+0x189/0x420
[   15.351278]  kasan_atomics+0x95/0x310
[   15.351421]  kunit_try_run_case+0x1a5/0x480
[   15.351724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.351957]  kthread+0x337/0x6f0
[   15.352125]  ret_from_fork+0x116/0x1d0
[   15.352316]  ret_from_fork_asm+0x1a/0x30
[   15.352515] 
[   15.352988] The buggy address belongs to the object at ffff8881026f3680
[   15.352988]  which belongs to the cache kmalloc-64 of size 64
[   15.353570] The buggy address is located 0 bytes to the right of
[   15.353570]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.354247] 
[   15.354351] The buggy address belongs to the physical page:
[   15.354698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.355115] flags: 0x200000000000000(node=0|zone=2)
[   15.355481] page_type: f5(slab)
[   15.355818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.356203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.356657] page dumped because: kasan: bad access detected
[   15.356988] 
[   15.357062] Memory state around the buggy address:
[   15.357319]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.357835]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358155] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.358645]                                      ^
[   15.358962]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359340]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359767] ==================================================================
[   15.676338] ==================================================================
[   15.676696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.677458] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.677735] 
[   15.677820] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.677863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.677875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.677898] Call Trace:
[   15.677914]  <TASK>
[   15.677930]  dump_stack_lvl+0x73/0xb0
[   15.677957]  print_report+0xd1/0x610
[   15.677979]  ? __virt_addr_valid+0x1db/0x2d0
[   15.678002]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.678024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.678048]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.678072]  kasan_report+0x141/0x180
[   15.678095]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.678124]  __asan_report_load8_noabort+0x18/0x20
[   15.678149]  kasan_atomics_helper+0x4f71/0x5450
[   15.678221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.678244]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.678269]  ? kasan_atomics+0x152/0x310
[   15.678297]  kasan_atomics+0x1dc/0x310
[   15.678320]  ? __pfx_kasan_atomics+0x10/0x10
[   15.678346]  ? __pfx_read_tsc+0x10/0x10
[   15.678368]  ? ktime_get_ts64+0x86/0x230
[   15.678393]  kunit_try_run_case+0x1a5/0x480
[   15.678418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.678452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.678477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.678502]  ? __kthread_parkme+0x82/0x180
[   15.678523]  ? preempt_count_sub+0x50/0x80
[   15.678582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.678608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.678633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.678659]  kthread+0x337/0x6f0
[   15.678678]  ? trace_preempt_on+0x20/0xc0
[   15.678702]  ? __pfx_kthread+0x10/0x10
[   15.678723]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.678746]  ? calculate_sigpending+0x7b/0xa0
[   15.678771]  ? __pfx_kthread+0x10/0x10
[   15.678794]  ret_from_fork+0x116/0x1d0
[   15.678845]  ? __pfx_kthread+0x10/0x10
[   15.678866]  ret_from_fork_asm+0x1a/0x30
[   15.678900]  </TASK>
[   15.678910] 
[   15.686664] Allocated by task 283:
[   15.686904]  kasan_save_stack+0x45/0x70
[   15.687208]  kasan_save_track+0x18/0x40
[   15.687466]  kasan_save_alloc_info+0x3b/0x50
[   15.687741]  __kasan_kmalloc+0xb7/0xc0
[   15.687934]  __kmalloc_cache_noprof+0x189/0x420
[   15.688152]  kasan_atomics+0x95/0x310
[   15.688286]  kunit_try_run_case+0x1a5/0x480
[   15.688493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.688795]  kthread+0x337/0x6f0
[   15.689000]  ret_from_fork+0x116/0x1d0
[   15.689195]  ret_from_fork_asm+0x1a/0x30
[   15.689416] 
[   15.689523] The buggy address belongs to the object at ffff8881026f3680
[   15.689523]  which belongs to the cache kmalloc-64 of size 64
[   15.690053] The buggy address is located 0 bytes to the right of
[   15.690053]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.690638] 
[   15.690753] The buggy address belongs to the physical page:
[   15.691023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.691389] flags: 0x200000000000000(node=0|zone=2)
[   15.691636] page_type: f5(slab)
[   15.691812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.692189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.692550] page dumped because: kasan: bad access detected
[   15.692800] 
[   15.692893] Memory state around the buggy address:
[   15.693119]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.693460]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.693764] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.694065]                                      ^
[   15.694308]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694650]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694984] ==================================================================
[   15.214728] ==================================================================
[   15.215078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.215661] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.216007] 
[   15.216115] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.216157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.216170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.216191] Call Trace:
[   15.216206]  <TASK>
[   15.216220]  dump_stack_lvl+0x73/0xb0
[   15.216249]  print_report+0xd1/0x610
[   15.216271]  ? __virt_addr_valid+0x1db/0x2d0
[   15.216293]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.216315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.216338]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.216362]  kasan_report+0x141/0x180
[   15.216384]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.216422]  kasan_check_range+0x10c/0x1c0
[   15.216459]  __kasan_check_read+0x15/0x20
[   15.216480]  kasan_atomics_helper+0x13b5/0x5450
[   15.216503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.216526]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.216559]  ? kasan_atomics+0x152/0x310
[   15.216587]  kasan_atomics+0x1dc/0x310
[   15.216610]  ? __pfx_kasan_atomics+0x10/0x10
[   15.216635]  ? __pfx_read_tsc+0x10/0x10
[   15.216656]  ? ktime_get_ts64+0x86/0x230
[   15.216681]  kunit_try_run_case+0x1a5/0x480
[   15.216706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.216730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.216754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.216778]  ? __kthread_parkme+0x82/0x180
[   15.216799]  ? preempt_count_sub+0x50/0x80
[   15.216824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.216848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.216874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.216899]  kthread+0x337/0x6f0
[   15.216918]  ? trace_preempt_on+0x20/0xc0
[   15.216941]  ? __pfx_kthread+0x10/0x10
[   15.216963]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.216985]  ? calculate_sigpending+0x7b/0xa0
[   15.217010]  ? __pfx_kthread+0x10/0x10
[   15.217033]  ret_from_fork+0x116/0x1d0
[   15.217052]  ? __pfx_kthread+0x10/0x10
[   15.217074]  ret_from_fork_asm+0x1a/0x30
[   15.217107]  </TASK>
[   15.217117] 
[   15.224300] Allocated by task 283:
[   15.224430]  kasan_save_stack+0x45/0x70
[   15.224680]  kasan_save_track+0x18/0x40
[   15.224874]  kasan_save_alloc_info+0x3b/0x50
[   15.225086]  __kasan_kmalloc+0xb7/0xc0
[   15.225277]  __kmalloc_cache_noprof+0x189/0x420
[   15.225513]  kasan_atomics+0x95/0x310
[   15.225703]  kunit_try_run_case+0x1a5/0x480
[   15.225916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.226172]  kthread+0x337/0x6f0
[   15.226322]  ret_from_fork+0x116/0x1d0
[   15.226503]  ret_from_fork_asm+0x1a/0x30
[   15.226679] 
[   15.226752] The buggy address belongs to the object at ffff8881026f3680
[   15.226752]  which belongs to the cache kmalloc-64 of size 64
[   15.227108] The buggy address is located 0 bytes to the right of
[   15.227108]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.227485] 
[   15.227588] The buggy address belongs to the physical page:
[   15.227839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.228185] flags: 0x200000000000000(node=0|zone=2)
[   15.228424] page_type: f5(slab)
[   15.228657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.228916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.229151] page dumped because: kasan: bad access detected
[   15.229326] 
[   15.229396] Memory state around the buggy address:
[   15.229622]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.229947]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.230265] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.230651]                                      ^
[   15.230875]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.231204]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.231528] ==================================================================
[   15.071293] ==================================================================
[   15.071860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.072157] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.072474] 
[   15.072596] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.072638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.072650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.072670] Call Trace:
[   15.072685]  <TASK>
[   15.072700]  dump_stack_lvl+0x73/0xb0
[   15.072726]  print_report+0xd1/0x610
[   15.072748]  ? __virt_addr_valid+0x1db/0x2d0
[   15.072772]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.072794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.072817]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.072839]  kasan_report+0x141/0x180
[   15.072862]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.072891]  __asan_report_load4_noabort+0x18/0x20
[   15.072915]  kasan_atomics_helper+0x4a1c/0x5450
[   15.072966]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.072989]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.073014]  ? kasan_atomics+0x152/0x310
[   15.073064]  kasan_atomics+0x1dc/0x310
[   15.073087]  ? __pfx_kasan_atomics+0x10/0x10
[   15.073113]  ? __pfx_read_tsc+0x10/0x10
[   15.073139]  ? ktime_get_ts64+0x86/0x230
[   15.073164]  kunit_try_run_case+0x1a5/0x480
[   15.073190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.073213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.073238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.073280]  ? __kthread_parkme+0x82/0x180
[   15.073301]  ? preempt_count_sub+0x50/0x80
[   15.073326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.073350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.073376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.073402]  kthread+0x337/0x6f0
[   15.073422]  ? trace_preempt_on+0x20/0xc0
[   15.073455]  ? __pfx_kthread+0x10/0x10
[   15.073477]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.073498]  ? calculate_sigpending+0x7b/0xa0
[   15.073523]  ? __pfx_kthread+0x10/0x10
[   15.073557]  ret_from_fork+0x116/0x1d0
[   15.073577]  ? __pfx_kthread+0x10/0x10
[   15.073598]  ret_from_fork_asm+0x1a/0x30
[   15.073651]  </TASK>
[   15.073660] 
[   15.083884] Allocated by task 283:
[   15.084200]  kasan_save_stack+0x45/0x70
[   15.084493]  kasan_save_track+0x18/0x40
[   15.084650]  kasan_save_alloc_info+0x3b/0x50
[   15.085006]  __kasan_kmalloc+0xb7/0xc0
[   15.085199]  __kmalloc_cache_noprof+0x189/0x420
[   15.085415]  kasan_atomics+0x95/0x310
[   15.085790]  kunit_try_run_case+0x1a5/0x480
[   15.086091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086433]  kthread+0x337/0x6f0
[   15.086632]  ret_from_fork+0x116/0x1d0
[   15.086886]  ret_from_fork_asm+0x1a/0x30
[   15.087074] 
[   15.087164] The buggy address belongs to the object at ffff8881026f3680
[   15.087164]  which belongs to the cache kmalloc-64 of size 64
[   15.087928] The buggy address is located 0 bytes to the right of
[   15.087928]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.088584] 
[   15.088686] The buggy address belongs to the physical page:
[   15.088992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.089425] flags: 0x200000000000000(node=0|zone=2)
[   15.089775] page_type: f5(slab)
[   15.089950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.090420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.090847] page dumped because: kasan: bad access detected
[   15.091184] 
[   15.091260] Memory state around the buggy address:
[   15.091710]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.092014]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.092314] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.092853]                                      ^
[   15.093172]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093616]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093975] ==================================================================
[   15.453630] ==================================================================
[   15.453958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.454345] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.454888] 
[   15.454984] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.455029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.455041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.455063] Call Trace:
[   15.455078]  <TASK>
[   15.455095]  dump_stack_lvl+0x73/0xb0
[   15.455124]  print_report+0xd1/0x610
[   15.455145]  ? __virt_addr_valid+0x1db/0x2d0
[   15.455169]  ? kasan_atomics_helper+0x194a/0x5450
[   15.455190]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.455216]  ? kasan_atomics_helper+0x194a/0x5450
[   15.455239]  kasan_report+0x141/0x180
[   15.455262]  ? kasan_atomics_helper+0x194a/0x5450
[   15.455289]  kasan_check_range+0x10c/0x1c0
[   15.455314]  __kasan_check_write+0x18/0x20
[   15.455333]  kasan_atomics_helper+0x194a/0x5450
[   15.455361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.455384]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.455410]  ? kasan_atomics+0x152/0x310
[   15.455447]  kasan_atomics+0x1dc/0x310
[   15.455471]  ? __pfx_kasan_atomics+0x10/0x10
[   15.455496]  ? __pfx_read_tsc+0x10/0x10
[   15.455518]  ? ktime_get_ts64+0x86/0x230
[   15.455555]  kunit_try_run_case+0x1a5/0x480
[   15.455580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.455602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.455627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.455651]  ? __kthread_parkme+0x82/0x180
[   15.455672]  ? preempt_count_sub+0x50/0x80
[   15.455697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.455722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.455746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.455770]  kthread+0x337/0x6f0
[   15.455790]  ? trace_preempt_on+0x20/0xc0
[   15.455813]  ? __pfx_kthread+0x10/0x10
[   15.455834]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.455856]  ? calculate_sigpending+0x7b/0xa0
[   15.455881]  ? __pfx_kthread+0x10/0x10
[   15.455902]  ret_from_fork+0x116/0x1d0
[   15.455921]  ? __pfx_kthread+0x10/0x10
[   15.455942]  ret_from_fork_asm+0x1a/0x30
[   15.455975]  </TASK>
[   15.455985] 
[   15.463185] Allocated by task 283:
[   15.463323]  kasan_save_stack+0x45/0x70
[   15.463483]  kasan_save_track+0x18/0x40
[   15.463627]  kasan_save_alloc_info+0x3b/0x50
[   15.464035]  __kasan_kmalloc+0xb7/0xc0
[   15.464226]  __kmalloc_cache_noprof+0x189/0x420
[   15.464474]  kasan_atomics+0x95/0x310
[   15.464681]  kunit_try_run_case+0x1a5/0x480
[   15.464915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465141]  kthread+0x337/0x6f0
[   15.465311]  ret_from_fork+0x116/0x1d0
[   15.465503]  ret_from_fork_asm+0x1a/0x30
[   15.465698] 
[   15.465792] The buggy address belongs to the object at ffff8881026f3680
[   15.465792]  which belongs to the cache kmalloc-64 of size 64
[   15.466273] The buggy address is located 0 bytes to the right of
[   15.466273]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.466807] 
[   15.466905] The buggy address belongs to the physical page:
[   15.467134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.467464] flags: 0x200000000000000(node=0|zone=2)
[   15.467713] page_type: f5(slab)
[   15.467904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.468220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.468509] page dumped because: kasan: bad access detected
[   15.468762] 
[   15.468864] Memory state around the buggy address:
[   15.469061]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.469357]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.469579] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.469787]                                      ^
[   15.469954]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.470266]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.470784] ==================================================================
[   15.736577] ==================================================================
[   15.736891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.737186] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.737509] 
[   15.737638] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.737683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.737695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.737716] Call Trace:
[   15.737733]  <TASK>
[   15.737750]  dump_stack_lvl+0x73/0xb0
[   15.737778]  print_report+0xd1/0x610
[   15.737801]  ? __virt_addr_valid+0x1db/0x2d0
[   15.737825]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.737847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.737871]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.737893]  kasan_report+0x141/0x180
[   15.737915]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.737943]  kasan_check_range+0x10c/0x1c0
[   15.737968]  __kasan_check_write+0x18/0x20
[   15.737988]  kasan_atomics_helper+0x20c8/0x5450
[   15.738012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.738035]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.738060]  ? kasan_atomics+0x152/0x310
[   15.738087]  kasan_atomics+0x1dc/0x310
[   15.738110]  ? __pfx_kasan_atomics+0x10/0x10
[   15.738135]  ? __pfx_read_tsc+0x10/0x10
[   15.738157]  ? ktime_get_ts64+0x86/0x230
[   15.738182]  kunit_try_run_case+0x1a5/0x480
[   15.738209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.738233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.738258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.738282]  ? __kthread_parkme+0x82/0x180
[   15.738303]  ? preempt_count_sub+0x50/0x80
[   15.738329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.738353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.738378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.738402]  kthread+0x337/0x6f0
[   15.738422]  ? trace_preempt_on+0x20/0xc0
[   15.738456]  ? __pfx_kthread+0x10/0x10
[   15.738476]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.738498]  ? calculate_sigpending+0x7b/0xa0
[   15.738542]  ? __pfx_kthread+0x10/0x10
[   15.738565]  ret_from_fork+0x116/0x1d0
[   15.738584]  ? __pfx_kthread+0x10/0x10
[   15.738605]  ret_from_fork_asm+0x1a/0x30
[   15.738639]  </TASK>
[   15.738650] 
[   15.745822] Allocated by task 283:
[   15.745954]  kasan_save_stack+0x45/0x70
[   15.746153]  kasan_save_track+0x18/0x40
[   15.746344]  kasan_save_alloc_info+0x3b/0x50
[   15.746572]  __kasan_kmalloc+0xb7/0xc0
[   15.746708]  __kmalloc_cache_noprof+0x189/0x420
[   15.746930]  kasan_atomics+0x95/0x310
[   15.747118]  kunit_try_run_case+0x1a5/0x480
[   15.747327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.747585]  kthread+0x337/0x6f0
[   15.747751]  ret_from_fork+0x116/0x1d0
[   15.747898]  ret_from_fork_asm+0x1a/0x30
[   15.748101] 
[   15.748196] The buggy address belongs to the object at ffff8881026f3680
[   15.748196]  which belongs to the cache kmalloc-64 of size 64
[   15.748665] The buggy address is located 0 bytes to the right of
[   15.748665]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.749036] 
[   15.749109] The buggy address belongs to the physical page:
[   15.749290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.749612] flags: 0x200000000000000(node=0|zone=2)
[   15.749847] page_type: f5(slab)
[   15.750017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.750355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.750682] page dumped because: kasan: bad access detected
[   15.750857] 
[   15.750926] Memory state around the buggy address:
[   15.751085]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.751404]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.751747] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.752069]                                      ^
[   15.752278]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.752614]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.752913] ==================================================================
[   14.902648] ==================================================================
[   14.903105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.903770] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.904069] 
[   14.904174] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.904217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.904230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.904250] Call Trace:
[   14.904266]  <TASK>
[   14.904281]  dump_stack_lvl+0x73/0xb0
[   14.904310]  print_report+0xd1/0x610
[   14.904333]  ? __virt_addr_valid+0x1db/0x2d0
[   14.904358]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.904380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.904404]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.904427]  kasan_report+0x141/0x180
[   14.904463]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.904491]  __asan_report_load4_noabort+0x18/0x20
[   14.904517]  kasan_atomics_helper+0x4a84/0x5450
[   14.904555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.904578]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.904605]  ? kasan_atomics+0x152/0x310
[   14.904632]  kasan_atomics+0x1dc/0x310
[   14.904655]  ? __pfx_kasan_atomics+0x10/0x10
[   14.904680]  ? __pfx_read_tsc+0x10/0x10
[   14.904700]  ? ktime_get_ts64+0x86/0x230
[   14.904725]  kunit_try_run_case+0x1a5/0x480
[   14.904751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.904773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.904798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.904823]  ? __kthread_parkme+0x82/0x180
[   14.904844]  ? preempt_count_sub+0x50/0x80
[   14.904869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.904893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.904918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.904943]  kthread+0x337/0x6f0
[   14.904963]  ? trace_preempt_on+0x20/0xc0
[   14.904987]  ? __pfx_kthread+0x10/0x10
[   14.905009]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.905030]  ? calculate_sigpending+0x7b/0xa0
[   14.905055]  ? __pfx_kthread+0x10/0x10
[   14.905077]  ret_from_fork+0x116/0x1d0
[   14.905096]  ? __pfx_kthread+0x10/0x10
[   14.905117]  ret_from_fork_asm+0x1a/0x30
[   14.905156]  </TASK>
[   14.905166] 
[   14.912356] Allocated by task 283:
[   14.912530]  kasan_save_stack+0x45/0x70
[   14.912700]  kasan_save_track+0x18/0x40
[   14.912895]  kasan_save_alloc_info+0x3b/0x50
[   14.913059]  __kasan_kmalloc+0xb7/0xc0
[   14.913250]  __kmalloc_cache_noprof+0x189/0x420
[   14.913452]  kasan_atomics+0x95/0x310
[   14.913675]  kunit_try_run_case+0x1a5/0x480
[   14.913876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914115]  kthread+0x337/0x6f0
[   14.914294]  ret_from_fork+0x116/0x1d0
[   14.914482]  ret_from_fork_asm+0x1a/0x30
[   14.914682] 
[   14.914786] The buggy address belongs to the object at ffff8881026f3680
[   14.914786]  which belongs to the cache kmalloc-64 of size 64
[   14.915208] The buggy address is located 0 bytes to the right of
[   14.915208]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.915891] 
[   14.915965] The buggy address belongs to the physical page:
[   14.916415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.916665] flags: 0x200000000000000(node=0|zone=2)
[   14.916828] page_type: f5(slab)
[   14.916947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.917183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.917524] page dumped because: kasan: bad access detected
[   14.917786] 
[   14.917878] Memory state around the buggy address:
[   14.918100]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.918414]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.918857] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.919149]                                      ^
[   14.919348]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.919657]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.919873] ==================================================================
[   14.694631] ==================================================================
[   14.695021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.695334] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.695712] 
[   14.695796] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.695838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.695851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.695871] Call Trace:
[   14.695883]  <TASK>
[   14.695898]  dump_stack_lvl+0x73/0xb0
[   14.695925]  print_report+0xd1/0x610
[   14.695947]  ? __virt_addr_valid+0x1db/0x2d0
[   14.695970]  ? kasan_atomics_helper+0x697/0x5450
[   14.695992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.696017]  ? kasan_atomics_helper+0x697/0x5450
[   14.696039]  kasan_report+0x141/0x180
[   14.696062]  ? kasan_atomics_helper+0x697/0x5450
[   14.696090]  kasan_check_range+0x10c/0x1c0
[   14.696115]  __kasan_check_write+0x18/0x20
[   14.696134]  kasan_atomics_helper+0x697/0x5450
[   14.696159]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.696182]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.696207]  ? kasan_atomics+0x152/0x310
[   14.696235]  kasan_atomics+0x1dc/0x310
[   14.696258]  ? __pfx_kasan_atomics+0x10/0x10
[   14.696284]  ? __pfx_read_tsc+0x10/0x10
[   14.696304]  ? ktime_get_ts64+0x86/0x230
[   14.696329]  kunit_try_run_case+0x1a5/0x480
[   14.696353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.696400]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.696425]  ? __kthread_parkme+0x82/0x180
[   14.696457]  ? preempt_count_sub+0x50/0x80
[   14.696481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.696531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.696565]  kthread+0x337/0x6f0
[   14.696584]  ? trace_preempt_on+0x20/0xc0
[   14.696608]  ? __pfx_kthread+0x10/0x10
[   14.696628]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.696651]  ? calculate_sigpending+0x7b/0xa0
[   14.696675]  ? __pfx_kthread+0x10/0x10
[   14.696696]  ret_from_fork+0x116/0x1d0
[   14.696715]  ? __pfx_kthread+0x10/0x10
[   14.696736]  ret_from_fork_asm+0x1a/0x30
[   14.696770]  </TASK>
[   14.696780] 
[   14.704950] Allocated by task 283:
[   14.705137]  kasan_save_stack+0x45/0x70
[   14.705303]  kasan_save_track+0x18/0x40
[   14.705493]  kasan_save_alloc_info+0x3b/0x50
[   14.705679]  __kasan_kmalloc+0xb7/0xc0
[   14.705814]  __kmalloc_cache_noprof+0x189/0x420
[   14.705970]  kasan_atomics+0x95/0x310
[   14.706103]  kunit_try_run_case+0x1a5/0x480
[   14.706250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.706429]  kthread+0x337/0x6f0
[   14.706611]  ret_from_fork+0x116/0x1d0
[   14.706802]  ret_from_fork_asm+0x1a/0x30
[   14.707171] 
[   14.707269] The buggy address belongs to the object at ffff8881026f3680
[   14.707269]  which belongs to the cache kmalloc-64 of size 64
[   14.707983] The buggy address is located 0 bytes to the right of
[   14.707983]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.708482] 
[   14.708594] The buggy address belongs to the physical page:
[   14.708775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.709019] flags: 0x200000000000000(node=0|zone=2)
[   14.709257] page_type: f5(slab)
[   14.709421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.710106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.710343] page dumped because: kasan: bad access detected
[   14.710595] 
[   14.710690] Memory state around the buggy address:
[   14.710922]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711207]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711425] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.711963]                                      ^
[   14.712190]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712517]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712749] ==================================================================
[   15.023885] ==================================================================
[   15.024227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.024627] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.024954] 
[   15.025254] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.025301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.025555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.025578] Call Trace:
[   15.025591]  <TASK>
[   15.025605]  dump_stack_lvl+0x73/0xb0
[   15.025650]  print_report+0xd1/0x610
[   15.025672]  ? __virt_addr_valid+0x1db/0x2d0
[   15.025695]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.025718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.025742]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.025767]  kasan_report+0x141/0x180
[   15.025790]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.025818]  __asan_report_load4_noabort+0x18/0x20
[   15.025844]  kasan_atomics_helper+0x4a36/0x5450
[   15.025867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.025890]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.025915]  ? kasan_atomics+0x152/0x310
[   15.025942]  kasan_atomics+0x1dc/0x310
[   15.025964]  ? __pfx_kasan_atomics+0x10/0x10
[   15.025990]  ? __pfx_read_tsc+0x10/0x10
[   15.026010]  ? ktime_get_ts64+0x86/0x230
[   15.026036]  kunit_try_run_case+0x1a5/0x480
[   15.026061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.026109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.026134]  ? __kthread_parkme+0x82/0x180
[   15.026155]  ? preempt_count_sub+0x50/0x80
[   15.026180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.026255]  kthread+0x337/0x6f0
[   15.026275]  ? trace_preempt_on+0x20/0xc0
[   15.026299]  ? __pfx_kthread+0x10/0x10
[   15.026320]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.026342]  ? calculate_sigpending+0x7b/0xa0
[   15.026366]  ? __pfx_kthread+0x10/0x10
[   15.026406]  ret_from_fork+0x116/0x1d0
[   15.026426]  ? __pfx_kthread+0x10/0x10
[   15.026456]  ret_from_fork_asm+0x1a/0x30
[   15.026489]  </TASK>
[   15.026499] 
[   15.033900] Allocated by task 283:
[   15.034083]  kasan_save_stack+0x45/0x70
[   15.034285]  kasan_save_track+0x18/0x40
[   15.034486]  kasan_save_alloc_info+0x3b/0x50
[   15.034717]  __kasan_kmalloc+0xb7/0xc0
[   15.034896]  __kmalloc_cache_noprof+0x189/0x420
[   15.035120]  kasan_atomics+0x95/0x310
[   15.035280]  kunit_try_run_case+0x1a5/0x480
[   15.035426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.035635]  kthread+0x337/0x6f0
[   15.035758]  ret_from_fork+0x116/0x1d0
[   15.035889]  ret_from_fork_asm+0x1a/0x30
[   15.036027] 
[   15.036098] The buggy address belongs to the object at ffff8881026f3680
[   15.036098]  which belongs to the cache kmalloc-64 of size 64
[   15.036459] The buggy address is located 0 bytes to the right of
[   15.036459]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.036999] 
[   15.037097] The buggy address belongs to the physical page:
[   15.037361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.037747] flags: 0x200000000000000(node=0|zone=2)
[   15.037980] page_type: f5(slab)
[   15.038145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.038496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.038830] page dumped because: kasan: bad access detected
[   15.039076] 
[   15.039173] Memory state around the buggy address:
[   15.039392]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.039711]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.040022] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.040333]                                      ^
[   15.041709]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.042568]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.042875] ==================================================================
[   14.576527] ==================================================================
[   14.576889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.577360] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.577781] 
[   14.577922] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.577965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.577977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.577999] Call Trace:
[   14.578014]  <TASK>
[   14.578032]  dump_stack_lvl+0x73/0xb0
[   14.578060]  print_report+0xd1/0x610
[   14.578082]  ? __virt_addr_valid+0x1db/0x2d0
[   14.578106]  ? kasan_atomics_helper+0x3df/0x5450
[   14.578128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.578152]  ? kasan_atomics_helper+0x3df/0x5450
[   14.578174]  kasan_report+0x141/0x180
[   14.578197]  ? kasan_atomics_helper+0x3df/0x5450
[   14.578246]  kasan_check_range+0x10c/0x1c0
[   14.578272]  __kasan_check_read+0x15/0x20
[   14.578303]  kasan_atomics_helper+0x3df/0x5450
[   14.578326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.578350]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.578375]  ? kasan_atomics+0x152/0x310
[   14.578403]  kasan_atomics+0x1dc/0x310
[   14.578425]  ? __pfx_kasan_atomics+0x10/0x10
[   14.578459]  ? __pfx_read_tsc+0x10/0x10
[   14.578479]  ? ktime_get_ts64+0x86/0x230
[   14.578506]  kunit_try_run_case+0x1a5/0x480
[   14.578531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.578555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.578601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.578627]  ? __kthread_parkme+0x82/0x180
[   14.578658]  ? preempt_count_sub+0x50/0x80
[   14.578694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.578726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.578753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.578790]  kthread+0x337/0x6f0
[   14.578809]  ? trace_preempt_on+0x20/0xc0
[   14.578833]  ? __pfx_kthread+0x10/0x10
[   14.578855]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.578888]  ? calculate_sigpending+0x7b/0xa0
[   14.578913]  ? __pfx_kthread+0x10/0x10
[   14.578935]  ret_from_fork+0x116/0x1d0
[   14.578965]  ? __pfx_kthread+0x10/0x10
[   14.578987]  ret_from_fork_asm+0x1a/0x30
[   14.579019]  </TASK>
[   14.579029] 
[   14.591152] Allocated by task 283:
[   14.591530]  kasan_save_stack+0x45/0x70
[   14.591995]  kasan_save_track+0x18/0x40
[   14.592383]  kasan_save_alloc_info+0x3b/0x50
[   14.592854]  __kasan_kmalloc+0xb7/0xc0
[   14.593234]  __kmalloc_cache_noprof+0x189/0x420
[   14.593537]  kasan_atomics+0x95/0x310
[   14.593882]  kunit_try_run_case+0x1a5/0x480
[   14.594027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.594199]  kthread+0x337/0x6f0
[   14.594315]  ret_from_fork+0x116/0x1d0
[   14.594455]  ret_from_fork_asm+0x1a/0x30
[   14.594699] 
[   14.594799] The buggy address belongs to the object at ffff8881026f3680
[   14.594799]  which belongs to the cache kmalloc-64 of size 64
[   14.595300] The buggy address is located 0 bytes to the right of
[   14.595300]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.596010] 
[   14.596187] The buggy address belongs to the physical page:
[   14.596422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.596865] flags: 0x200000000000000(node=0|zone=2)
[   14.597098] page_type: f5(slab)
[   14.597276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.597528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.597929] page dumped because: kasan: bad access detected
[   14.598168] 
[   14.598237] Memory state around the buggy address:
[   14.598417]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.598946]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.599274] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.599598]                                      ^
[   14.599842]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.600197]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.600513] ==================================================================
[   14.856557] ==================================================================
[   14.856931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.857356] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.857752] 
[   14.857903] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.857957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.857970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.857990] Call Trace:
[   14.858003]  <TASK>
[   14.858018]  dump_stack_lvl+0x73/0xb0
[   14.858044]  print_report+0xd1/0x610
[   14.858066]  ? __virt_addr_valid+0x1db/0x2d0
[   14.858108]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.858145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.858181]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.858205]  kasan_report+0x141/0x180
[   14.858241]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.858283]  kasan_check_range+0x10c/0x1c0
[   14.858321]  __kasan_check_write+0x18/0x20
[   14.858354]  kasan_atomics_helper+0xb6a/0x5450
[   14.858392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.858428]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.858479]  ? kasan_atomics+0x152/0x310
[   14.858553]  kasan_atomics+0x1dc/0x310
[   14.858587]  ? __pfx_kasan_atomics+0x10/0x10
[   14.858612]  ? __pfx_read_tsc+0x10/0x10
[   14.858644]  ? ktime_get_ts64+0x86/0x230
[   14.858670]  kunit_try_run_case+0x1a5/0x480
[   14.858694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.858729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.858754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.858778]  ? __kthread_parkme+0x82/0x180
[   14.858810]  ? preempt_count_sub+0x50/0x80
[   14.858835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.858860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.858895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.858920]  kthread+0x337/0x6f0
[   14.858939]  ? trace_preempt_on+0x20/0xc0
[   14.858962]  ? __pfx_kthread+0x10/0x10
[   14.858983]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.859006]  ? calculate_sigpending+0x7b/0xa0
[   14.859030]  ? __pfx_kthread+0x10/0x10
[   14.859051]  ret_from_fork+0x116/0x1d0
[   14.859071]  ? __pfx_kthread+0x10/0x10
[   14.859092]  ret_from_fork_asm+0x1a/0x30
[   14.859124]  </TASK>
[   14.859134] 
[   14.867989] Allocated by task 283:
[   14.868138]  kasan_save_stack+0x45/0x70
[   14.868478]  kasan_save_track+0x18/0x40
[   14.868814]  kasan_save_alloc_info+0x3b/0x50
[   14.869059]  __kasan_kmalloc+0xb7/0xc0
[   14.869198]  __kmalloc_cache_noprof+0x189/0x420
[   14.869352]  kasan_atomics+0x95/0x310
[   14.869747]  kunit_try_run_case+0x1a5/0x480
[   14.869962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.870268]  kthread+0x337/0x6f0
[   14.870451]  ret_from_fork+0x116/0x1d0
[   14.870739]  ret_from_fork_asm+0x1a/0x30
[   14.870956] 
[   14.871101] The buggy address belongs to the object at ffff8881026f3680
[   14.871101]  which belongs to the cache kmalloc-64 of size 64
[   14.871706] The buggy address is located 0 bytes to the right of
[   14.871706]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.872212] 
[   14.872466] The buggy address belongs to the physical page:
[   14.872761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.873108] flags: 0x200000000000000(node=0|zone=2)
[   14.873372] page_type: f5(slab)
[   14.873600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.873986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.874294] page dumped because: kasan: bad access detected
[   14.874631] 
[   14.874727] Memory state around the buggy address:
[   14.874919]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.875325]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.875666] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.875922]                                      ^
[   14.876152]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.876511]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.876802] ==================================================================
[   15.753460] ==================================================================
[   15.753865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.754186] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.754587] 
[   15.754695] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.754736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.754748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.754770] Call Trace:
[   15.754785]  <TASK>
[   15.754801]  dump_stack_lvl+0x73/0xb0
[   15.754827]  print_report+0xd1/0x610
[   15.754848]  ? __virt_addr_valid+0x1db/0x2d0
[   15.754871]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.754893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.754917]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.754940]  kasan_report+0x141/0x180
[   15.754962]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.754990]  __asan_report_load8_noabort+0x18/0x20
[   15.755016]  kasan_atomics_helper+0x4fb2/0x5450
[   15.755039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.755062]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.755087]  ? kasan_atomics+0x152/0x310
[   15.755115]  kasan_atomics+0x1dc/0x310
[   15.755137]  ? __pfx_kasan_atomics+0x10/0x10
[   15.755162]  ? __pfx_read_tsc+0x10/0x10
[   15.755183]  ? ktime_get_ts64+0x86/0x230
[   15.755209]  kunit_try_run_case+0x1a5/0x480
[   15.755234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.755257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.755282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.755306]  ? __kthread_parkme+0x82/0x180
[   15.755327]  ? preempt_count_sub+0x50/0x80
[   15.755352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.755376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.755401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.755426]  kthread+0x337/0x6f0
[   15.755455]  ? trace_preempt_on+0x20/0xc0
[   15.755479]  ? __pfx_kthread+0x10/0x10
[   15.755500]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.755541]  ? calculate_sigpending+0x7b/0xa0
[   15.755566]  ? __pfx_kthread+0x10/0x10
[   15.755588]  ret_from_fork+0x116/0x1d0
[   15.755607]  ? __pfx_kthread+0x10/0x10
[   15.755628]  ret_from_fork_asm+0x1a/0x30
[   15.755661]  </TASK>
[   15.755672] 
[   15.762715] Allocated by task 283:
[   15.762896]  kasan_save_stack+0x45/0x70
[   15.763060]  kasan_save_track+0x18/0x40
[   15.763256]  kasan_save_alloc_info+0x3b/0x50
[   15.763427]  __kasan_kmalloc+0xb7/0xc0
[   15.763643]  __kmalloc_cache_noprof+0x189/0x420
[   15.763842]  kasan_atomics+0x95/0x310
[   15.764025]  kunit_try_run_case+0x1a5/0x480
[   15.764212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.764474]  kthread+0x337/0x6f0
[   15.764634]  ret_from_fork+0x116/0x1d0
[   15.764824]  ret_from_fork_asm+0x1a/0x30
[   15.765001] 
[   15.765074] The buggy address belongs to the object at ffff8881026f3680
[   15.765074]  which belongs to the cache kmalloc-64 of size 64
[   15.765603] The buggy address is located 0 bytes to the right of
[   15.765603]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.766081] 
[   15.766174] The buggy address belongs to the physical page:
[   15.766378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.766737] flags: 0x200000000000000(node=0|zone=2)
[   15.766943] page_type: f5(slab)
[   15.767093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.767377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.767639] page dumped because: kasan: bad access detected
[   15.767814] 
[   15.767885] Memory state around the buggy address:
[   15.768041]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.768258]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.768498] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.768838]                                      ^
[   15.769058]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.769379]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.769726] ==================================================================
[   15.842272] ==================================================================
[   15.842669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.843160] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.843455] 
[   15.843950] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.844000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.844013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.844037] Call Trace:
[   15.844055]  <TASK>
[   15.844074]  dump_stack_lvl+0x73/0xb0
[   15.844206]  print_report+0xd1/0x610
[   15.844232]  ? __virt_addr_valid+0x1db/0x2d0
[   15.844255]  ? kasan_atomics_helper+0x5115/0x5450
[   15.844277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.844301]  ? kasan_atomics_helper+0x5115/0x5450
[   15.844324]  kasan_report+0x141/0x180
[   15.844347]  ? kasan_atomics_helper+0x5115/0x5450
[   15.844376]  __asan_report_load8_noabort+0x18/0x20
[   15.844402]  kasan_atomics_helper+0x5115/0x5450
[   15.844426]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.844465]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.844492]  ? kasan_atomics+0x152/0x310
[   15.844520]  kasan_atomics+0x1dc/0x310
[   15.844557]  ? __pfx_kasan_atomics+0x10/0x10
[   15.844582]  ? __pfx_read_tsc+0x10/0x10
[   15.844604]  ? ktime_get_ts64+0x86/0x230
[   15.844631]  kunit_try_run_case+0x1a5/0x480
[   15.844657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.844707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.844732]  ? __kthread_parkme+0x82/0x180
[   15.844753]  ? preempt_count_sub+0x50/0x80
[   15.844779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.844828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.844853]  kthread+0x337/0x6f0
[   15.844873]  ? trace_preempt_on+0x20/0xc0
[   15.844897]  ? __pfx_kthread+0x10/0x10
[   15.844919]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.844941]  ? calculate_sigpending+0x7b/0xa0
[   15.844966]  ? __pfx_kthread+0x10/0x10
[   15.844987]  ret_from_fork+0x116/0x1d0
[   15.845007]  ? __pfx_kthread+0x10/0x10
[   15.845028]  ret_from_fork_asm+0x1a/0x30
[   15.845061]  </TASK>
[   15.845073] 
[   15.854288] Allocated by task 283:
[   15.854506]  kasan_save_stack+0x45/0x70
[   15.855095]  kasan_save_track+0x18/0x40
[   15.855248]  kasan_save_alloc_info+0x3b/0x50
[   15.855550]  __kasan_kmalloc+0xb7/0xc0
[   15.855811]  __kmalloc_cache_noprof+0x189/0x420
[   15.856140]  kasan_atomics+0x95/0x310
[   15.856288]  kunit_try_run_case+0x1a5/0x480
[   15.856639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.856980]  kthread+0x337/0x6f0
[   15.857113]  ret_from_fork+0x116/0x1d0
[   15.857315]  ret_from_fork_asm+0x1a/0x30
[   15.857503] 
[   15.857602] The buggy address belongs to the object at ffff8881026f3680
[   15.857602]  which belongs to the cache kmalloc-64 of size 64
[   15.858089] The buggy address is located 0 bytes to the right of
[   15.858089]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.859031] 
[   15.859117] The buggy address belongs to the physical page:
[   15.859375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.859940] flags: 0x200000000000000(node=0|zone=2)
[   15.860150] page_type: f5(slab)
[   15.860326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.860818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.861218] page dumped because: kasan: bad access detected
[   15.861425] 
[   15.861614] Memory state around the buggy address:
[   15.861891]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.862269]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.862635] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.863009]                                      ^
[   15.863183]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863653]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863966] ==================================================================
[   14.601340] ==================================================================
[   14.602077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.602311] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.602662] 
[   14.602768] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.602811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.602824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.602845] Call Trace:
[   14.602856]  <TASK>
[   14.602871]  dump_stack_lvl+0x73/0xb0
[   14.602898]  print_report+0xd1/0x610
[   14.602920]  ? __virt_addr_valid+0x1db/0x2d0
[   14.602943]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.602966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.602988]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.603011]  kasan_report+0x141/0x180
[   14.603034]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.603062]  __asan_report_load4_noabort+0x18/0x20
[   14.603087]  kasan_atomics_helper+0x4b54/0x5450
[   14.603111]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.603134]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.603159]  ? kasan_atomics+0x152/0x310
[   14.603186]  kasan_atomics+0x1dc/0x310
[   14.603209]  ? __pfx_kasan_atomics+0x10/0x10
[   14.603234]  ? __pfx_read_tsc+0x10/0x10
[   14.603255]  ? ktime_get_ts64+0x86/0x230
[   14.603279]  kunit_try_run_case+0x1a5/0x480
[   14.603303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.603326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.603351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.603375]  ? __kthread_parkme+0x82/0x180
[   14.603397]  ? preempt_count_sub+0x50/0x80
[   14.603421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.603457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.603482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.603506]  kthread+0x337/0x6f0
[   14.603525]  ? trace_preempt_on+0x20/0xc0
[   14.603559]  ? __pfx_kthread+0x10/0x10
[   14.603580]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.603602]  ? calculate_sigpending+0x7b/0xa0
[   14.603629]  ? __pfx_kthread+0x10/0x10
[   14.603651]  ret_from_fork+0x116/0x1d0
[   14.603670]  ? __pfx_kthread+0x10/0x10
[   14.603691]  ret_from_fork_asm+0x1a/0x30
[   14.603723]  </TASK>
[   14.603733] 
[   14.610506] Allocated by task 283:
[   14.610691]  kasan_save_stack+0x45/0x70
[   14.610893]  kasan_save_track+0x18/0x40
[   14.611090]  kasan_save_alloc_info+0x3b/0x50
[   14.611301]  __kasan_kmalloc+0xb7/0xc0
[   14.611498]  __kmalloc_cache_noprof+0x189/0x420
[   14.611729]  kasan_atomics+0x95/0x310
[   14.611918]  kunit_try_run_case+0x1a5/0x480
[   14.612067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612321]  kthread+0x337/0x6f0
[   14.612490]  ret_from_fork+0x116/0x1d0
[   14.612667]  ret_from_fork_asm+0x1a/0x30
[   14.612833] 
[   14.612908] The buggy address belongs to the object at ffff8881026f3680
[   14.612908]  which belongs to the cache kmalloc-64 of size 64
[   14.613369] The buggy address is located 0 bytes to the right of
[   14.613369]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.613888] 
[   14.613976] The buggy address belongs to the physical page:
[   14.614156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.614515] flags: 0x200000000000000(node=0|zone=2)
[   14.614706] page_type: f5(slab)
[   14.614869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.615175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.615477] page dumped because: kasan: bad access detected
[   14.615714] 
[   14.615803] Memory state around the buggy address:
[   14.615989]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.616268]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.616532] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.616820]                                      ^
[   14.616987]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617199]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617404] ==================================================================
[   15.043980] ==================================================================
[   15.044605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.044935] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.045942] 
[   15.046182] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.046344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.046359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.046392] Call Trace:
[   15.046407]  <TASK>
[   15.046422]  dump_stack_lvl+0x73/0xb0
[   15.046499]  print_report+0xd1/0x610
[   15.046545]  ? __virt_addr_valid+0x1db/0x2d0
[   15.046568]  ? kasan_atomics_helper+0x1079/0x5450
[   15.046590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.046613]  ? kasan_atomics_helper+0x1079/0x5450
[   15.046636]  kasan_report+0x141/0x180
[   15.046659]  ? kasan_atomics_helper+0x1079/0x5450
[   15.046687]  kasan_check_range+0x10c/0x1c0
[   15.046712]  __kasan_check_write+0x18/0x20
[   15.046734]  kasan_atomics_helper+0x1079/0x5450
[   15.046757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.046780]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.046805]  ? kasan_atomics+0x152/0x310
[   15.046833]  kasan_atomics+0x1dc/0x310
[   15.046856]  ? __pfx_kasan_atomics+0x10/0x10
[   15.046881]  ? __pfx_read_tsc+0x10/0x10
[   15.046902]  ? ktime_get_ts64+0x86/0x230
[   15.046926]  kunit_try_run_case+0x1a5/0x480
[   15.046950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.046997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.047022]  ? __kthread_parkme+0x82/0x180
[   15.047042]  ? preempt_count_sub+0x50/0x80
[   15.047067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.047092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.047116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.047141]  kthread+0x337/0x6f0
[   15.047160]  ? trace_preempt_on+0x20/0xc0
[   15.047183]  ? __pfx_kthread+0x10/0x10
[   15.047204]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.047226]  ? calculate_sigpending+0x7b/0xa0
[   15.047252]  ? __pfx_kthread+0x10/0x10
[   15.047274]  ret_from_fork+0x116/0x1d0
[   15.047292]  ? __pfx_kthread+0x10/0x10
[   15.047313]  ret_from_fork_asm+0x1a/0x30
[   15.047348]  </TASK>
[   15.047359] 
[   15.060103] Allocated by task 283:
[   15.060276]  kasan_save_stack+0x45/0x70
[   15.060724]  kasan_save_track+0x18/0x40
[   15.060929]  kasan_save_alloc_info+0x3b/0x50
[   15.061134]  __kasan_kmalloc+0xb7/0xc0
[   15.061310]  __kmalloc_cache_noprof+0x189/0x420
[   15.061522]  kasan_atomics+0x95/0x310
[   15.061694]  kunit_try_run_case+0x1a5/0x480
[   15.061883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.062100]  kthread+0x337/0x6f0
[   15.062258]  ret_from_fork+0x116/0x1d0
[   15.062432]  ret_from_fork_asm+0x1a/0x30
[   15.063154] 
[   15.063700] The buggy address belongs to the object at ffff8881026f3680
[   15.063700]  which belongs to the cache kmalloc-64 of size 64
[   15.064390] The buggy address is located 0 bytes to the right of
[   15.064390]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.064916] 
[   15.064992] The buggy address belongs to the physical page:
[   15.065171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.065405] flags: 0x200000000000000(node=0|zone=2)
[   15.065620] page_type: f5(slab)
[   15.065873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.066365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.067069] page dumped because: kasan: bad access detected
[   15.067247] 
[   15.067318] Memory state around the buggy address:
[   15.067481]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.068113]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.068889] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.069677]                                      ^
[   15.070223]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.070645]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.070857] ==================================================================
[   15.795157] ==================================================================
[   15.795603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.796106] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.796709] 
[   15.796970] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.797019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.797033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.797055] Call Trace:
[   15.797073]  <TASK>
[   15.797091]  dump_stack_lvl+0x73/0xb0
[   15.797120]  print_report+0xd1/0x610
[   15.797149]  ? __virt_addr_valid+0x1db/0x2d0
[   15.797172]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.797193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.797217]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.797239]  kasan_report+0x141/0x180
[   15.797263]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.797292]  __asan_report_load8_noabort+0x18/0x20
[   15.797318]  kasan_atomics_helper+0x4fa5/0x5450
[   15.797342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.797365]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.797391]  ? kasan_atomics+0x152/0x310
[   15.797419]  kasan_atomics+0x1dc/0x310
[   15.797454]  ? __pfx_kasan_atomics+0x10/0x10
[   15.797479]  ? __pfx_read_tsc+0x10/0x10
[   15.797501]  ? ktime_get_ts64+0x86/0x230
[   15.797528]  kunit_try_run_case+0x1a5/0x480
[   15.797564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.797588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.797612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.797637]  ? __kthread_parkme+0x82/0x180
[   15.797658]  ? preempt_count_sub+0x50/0x80
[   15.797685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.797711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.797735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.797761]  kthread+0x337/0x6f0
[   15.797780]  ? trace_preempt_on+0x20/0xc0
[   15.797805]  ? __pfx_kthread+0x10/0x10
[   15.797827]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.797853]  ? calculate_sigpending+0x7b/0xa0
[   15.797880]  ? __pfx_kthread+0x10/0x10
[   15.797903]  ret_from_fork+0x116/0x1d0
[   15.797922]  ? __pfx_kthread+0x10/0x10
[   15.797943]  ret_from_fork_asm+0x1a/0x30
[   15.797976]  </TASK>
[   15.797987] 
[   15.807913] Allocated by task 283:
[   15.808092]  kasan_save_stack+0x45/0x70
[   15.808279]  kasan_save_track+0x18/0x40
[   15.808469]  kasan_save_alloc_info+0x3b/0x50
[   15.809031]  __kasan_kmalloc+0xb7/0xc0
[   15.809182]  __kmalloc_cache_noprof+0x189/0x420
[   15.809548]  kasan_atomics+0x95/0x310
[   15.809874]  kunit_try_run_case+0x1a5/0x480
[   15.810086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.810407]  kthread+0x337/0x6f0
[   15.810599]  ret_from_fork+0x116/0x1d0
[   15.810913]  ret_from_fork_asm+0x1a/0x30
[   15.811197] 
[   15.811274] The buggy address belongs to the object at ffff8881026f3680
[   15.811274]  which belongs to the cache kmalloc-64 of size 64
[   15.812013] The buggy address is located 0 bytes to the right of
[   15.812013]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.812630] 
[   15.812820] The buggy address belongs to the physical page:
[   15.813147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.813581] flags: 0x200000000000000(node=0|zone=2)
[   15.813829] page_type: f5(slab)
[   15.813960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.814288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.814863] page dumped because: kasan: bad access detected
[   15.815166] 
[   15.815266] Memory state around the buggy address:
[   15.815661]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.816024]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.816331] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.816767]                                      ^
[   15.817026]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817403]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817852] ==================================================================
[   14.796945] ==================================================================
[   14.797304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.797721] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.798342] 
[   14.798804] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.798852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.798865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.798888] Call Trace:
[   14.798903]  <TASK>
[   14.798919]  dump_stack_lvl+0x73/0xb0
[   14.798947]  print_report+0xd1/0x610
[   14.798969]  ? __virt_addr_valid+0x1db/0x2d0
[   14.798992]  ? kasan_atomics_helper+0x992/0x5450
[   14.799014]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.799037]  ? kasan_atomics_helper+0x992/0x5450
[   14.799060]  kasan_report+0x141/0x180
[   14.799083]  ? kasan_atomics_helper+0x992/0x5450
[   14.799111]  kasan_check_range+0x10c/0x1c0
[   14.799137]  __kasan_check_write+0x18/0x20
[   14.799157]  kasan_atomics_helper+0x992/0x5450
[   14.799181]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.799204]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.799230]  ? kasan_atomics+0x152/0x310
[   14.799257]  kasan_atomics+0x1dc/0x310
[   14.799280]  ? __pfx_kasan_atomics+0x10/0x10
[   14.799305]  ? __pfx_read_tsc+0x10/0x10
[   14.799326]  ? ktime_get_ts64+0x86/0x230
[   14.799351]  kunit_try_run_case+0x1a5/0x480
[   14.799374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.799422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.799459]  ? __kthread_parkme+0x82/0x180
[   14.799481]  ? preempt_count_sub+0x50/0x80
[   14.799506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.799563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.799588]  kthread+0x337/0x6f0
[   14.799608]  ? trace_preempt_on+0x20/0xc0
[   14.799631]  ? __pfx_kthread+0x10/0x10
[   14.799653]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.799675]  ? calculate_sigpending+0x7b/0xa0
[   14.799700]  ? __pfx_kthread+0x10/0x10
[   14.799722]  ret_from_fork+0x116/0x1d0
[   14.799742]  ? __pfx_kthread+0x10/0x10
[   14.799763]  ret_from_fork_asm+0x1a/0x30
[   14.799796]  </TASK>
[   14.799807] 
[   14.808156] Allocated by task 283:
[   14.808345]  kasan_save_stack+0x45/0x70
[   14.808607]  kasan_save_track+0x18/0x40
[   14.808811]  kasan_save_alloc_info+0x3b/0x50
[   14.809052]  __kasan_kmalloc+0xb7/0xc0
[   14.809257]  __kmalloc_cache_noprof+0x189/0x420
[   14.809511]  kasan_atomics+0x95/0x310
[   14.809775]  kunit_try_run_case+0x1a5/0x480
[   14.810036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.810316]  kthread+0x337/0x6f0
[   14.810535]  ret_from_fork+0x116/0x1d0
[   14.810711]  ret_from_fork_asm+0x1a/0x30
[   14.810951] 
[   14.811085] The buggy address belongs to the object at ffff8881026f3680
[   14.811085]  which belongs to the cache kmalloc-64 of size 64
[   14.811649] The buggy address is located 0 bytes to the right of
[   14.811649]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.812184] 
[   14.812261] The buggy address belongs to the physical page:
[   14.812555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.812966] flags: 0x200000000000000(node=0|zone=2)
[   14.813205] page_type: f5(slab)
[   14.813373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.813761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.814095] page dumped because: kasan: bad access detected
[   14.814345] 
[   14.814448] Memory state around the buggy address:
[   14.814698]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.815014]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.815266] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.815508]                                      ^
[   14.815749]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.816113]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.816464] ==================================================================
[   15.161897] ==================================================================
[   15.162270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.162807] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.163046] 
[   15.163153] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.163196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.163209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.163231] Call Trace:
[   15.163245]  <TASK>
[   15.163260]  dump_stack_lvl+0x73/0xb0
[   15.163289]  print_report+0xd1/0x610
[   15.163312]  ? __virt_addr_valid+0x1db/0x2d0
[   15.163336]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.163358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.163381]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.163404]  kasan_report+0x141/0x180
[   15.163427]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.163469]  __asan_report_load4_noabort+0x18/0x20
[   15.163494]  kasan_atomics_helper+0x49e8/0x5450
[   15.163518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.163553]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.163578]  ? kasan_atomics+0x152/0x310
[   15.163606]  kasan_atomics+0x1dc/0x310
[   15.163629]  ? __pfx_kasan_atomics+0x10/0x10
[   15.163654]  ? __pfx_read_tsc+0x10/0x10
[   15.163675]  ? ktime_get_ts64+0x86/0x230
[   15.163701]  kunit_try_run_case+0x1a5/0x480
[   15.163726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.163750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.163775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.163800]  ? __kthread_parkme+0x82/0x180
[   15.163821]  ? preempt_count_sub+0x50/0x80
[   15.163846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.163870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.163895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.163920]  kthread+0x337/0x6f0
[   15.163940]  ? trace_preempt_on+0x20/0xc0
[   15.163964]  ? __pfx_kthread+0x10/0x10
[   15.163984]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.164007]  ? calculate_sigpending+0x7b/0xa0
[   15.164031]  ? __pfx_kthread+0x10/0x10
[   15.164053]  ret_from_fork+0x116/0x1d0
[   15.164072]  ? __pfx_kthread+0x10/0x10
[   15.164093]  ret_from_fork_asm+0x1a/0x30
[   15.164127]  </TASK>
[   15.164137] 
[   15.171389] Allocated by task 283:
[   15.171621]  kasan_save_stack+0x45/0x70
[   15.171825]  kasan_save_track+0x18/0x40
[   15.172016]  kasan_save_alloc_info+0x3b/0x50
[   15.172224]  __kasan_kmalloc+0xb7/0xc0
[   15.172413]  __kmalloc_cache_noprof+0x189/0x420
[   15.172640]  kasan_atomics+0x95/0x310
[   15.172777]  kunit_try_run_case+0x1a5/0x480
[   15.172941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.173194]  kthread+0x337/0x6f0
[   15.173369]  ret_from_fork+0x116/0x1d0
[   15.173603]  ret_from_fork_asm+0x1a/0x30
[   15.173810] 
[   15.173901] The buggy address belongs to the object at ffff8881026f3680
[   15.173901]  which belongs to the cache kmalloc-64 of size 64
[   15.174257] The buggy address is located 0 bytes to the right of
[   15.174257]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.174887] 
[   15.174985] The buggy address belongs to the physical page:
[   15.175236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.175560] flags: 0x200000000000000(node=0|zone=2)
[   15.175785] page_type: f5(slab)
[   15.175905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.176140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.176406] page dumped because: kasan: bad access detected
[   15.177182] 
[   15.177293] Memory state around the buggy address:
[   15.177668]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.177972]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178265] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.178579]                                      ^
[   15.178761]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179067]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179343] ==================================================================
[   14.920401] ==================================================================
[   14.921132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.921375] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.923016] 
[   14.923150] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.923197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.923210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.923232] Call Trace:
[   14.923248]  <TASK>
[   14.923264]  dump_stack_lvl+0x73/0xb0
[   14.923293]  print_report+0xd1/0x610
[   14.923316]  ? __virt_addr_valid+0x1db/0x2d0
[   14.923340]  ? kasan_atomics_helper+0xd47/0x5450
[   14.923362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.923386]  ? kasan_atomics_helper+0xd47/0x5450
[   14.923409]  kasan_report+0x141/0x180
[   14.923432]  ? kasan_atomics_helper+0xd47/0x5450
[   14.923470]  kasan_check_range+0x10c/0x1c0
[   14.923494]  __kasan_check_write+0x18/0x20
[   14.923514]  kasan_atomics_helper+0xd47/0x5450
[   14.923537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.923561]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.923586]  ? kasan_atomics+0x152/0x310
[   14.923614]  kasan_atomics+0x1dc/0x310
[   14.923638]  ? __pfx_kasan_atomics+0x10/0x10
[   14.923663]  ? __pfx_read_tsc+0x10/0x10
[   14.923684]  ? ktime_get_ts64+0x86/0x230
[   14.923711]  kunit_try_run_case+0x1a5/0x480
[   14.923736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.923760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.923784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.923809]  ? __kthread_parkme+0x82/0x180
[   14.923830]  ? preempt_count_sub+0x50/0x80
[   14.923854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.923879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.923904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.923929]  kthread+0x337/0x6f0
[   14.923948]  ? trace_preempt_on+0x20/0xc0
[   14.923972]  ? __pfx_kthread+0x10/0x10
[   14.923993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.924015]  ? calculate_sigpending+0x7b/0xa0
[   14.924039]  ? __pfx_kthread+0x10/0x10
[   14.924061]  ret_from_fork+0x116/0x1d0
[   14.924081]  ? __pfx_kthread+0x10/0x10
[   14.924102]  ret_from_fork_asm+0x1a/0x30
[   14.924134]  </TASK>
[   14.924144] 
[   14.931649] Allocated by task 283:
[   14.931801]  kasan_save_stack+0x45/0x70
[   14.931999]  kasan_save_track+0x18/0x40
[   14.932201]  kasan_save_alloc_info+0x3b/0x50
[   14.932388]  __kasan_kmalloc+0xb7/0xc0
[   14.932552]  __kmalloc_cache_noprof+0x189/0x420
[   14.932780]  kasan_atomics+0x95/0x310
[   14.932941]  kunit_try_run_case+0x1a5/0x480
[   14.933111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.933367]  kthread+0x337/0x6f0
[   14.933524]  ret_from_fork+0x116/0x1d0
[   14.933702]  ret_from_fork_asm+0x1a/0x30
[   14.933886] 
[   14.933980] The buggy address belongs to the object at ffff8881026f3680
[   14.933980]  which belongs to the cache kmalloc-64 of size 64
[   14.934454] The buggy address is located 0 bytes to the right of
[   14.934454]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.934964] 
[   14.935061] The buggy address belongs to the physical page:
[   14.935284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.935566] flags: 0x200000000000000(node=0|zone=2)
[   14.935834] page_type: f5(slab)
[   14.936002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.936294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.936607] page dumped because: kasan: bad access detected
[   14.936862] 
[   14.936961] Memory state around the buggy address:
[   14.937152]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.937457]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.937764] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.938051]                                      ^
[   14.938255]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938558]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938840] ==================================================================
[   15.618564] ==================================================================
[   15.618960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.619255] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.619784] 
[   15.619932] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.619978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.619991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.620012] Call Trace:
[   15.620029]  <TASK>
[   15.620046]  dump_stack_lvl+0x73/0xb0
[   15.620075]  print_report+0xd1/0x610
[   15.620132]  ? __virt_addr_valid+0x1db/0x2d0
[   15.620156]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.620177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.620201]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.620224]  kasan_report+0x141/0x180
[   15.620277]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.620305]  kasan_check_range+0x10c/0x1c0
[   15.620331]  __kasan_check_write+0x18/0x20
[   15.620351]  kasan_atomics_helper+0x1e12/0x5450
[   15.620376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.620429]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.620466]  ? kasan_atomics+0x152/0x310
[   15.620494]  kasan_atomics+0x1dc/0x310
[   15.620518]  ? __pfx_kasan_atomics+0x10/0x10
[   15.620550]  ? __pfx_read_tsc+0x10/0x10
[   15.620573]  ? ktime_get_ts64+0x86/0x230
[   15.620632]  kunit_try_run_case+0x1a5/0x480
[   15.620657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.620681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.620706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.620760]  ? __kthread_parkme+0x82/0x180
[   15.620782]  ? preempt_count_sub+0x50/0x80
[   15.620808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.620833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.620858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.620913]  kthread+0x337/0x6f0
[   15.620934]  ? trace_preempt_on+0x20/0xc0
[   15.620957]  ? __pfx_kthread+0x10/0x10
[   15.620978]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.621000]  ? calculate_sigpending+0x7b/0xa0
[   15.621052]  ? __pfx_kthread+0x10/0x10
[   15.621075]  ret_from_fork+0x116/0x1d0
[   15.621094]  ? __pfx_kthread+0x10/0x10
[   15.621115]  ret_from_fork_asm+0x1a/0x30
[   15.621183]  </TASK>
[   15.621195] 
[   15.629251] Allocated by task 283:
[   15.629421]  kasan_save_stack+0x45/0x70
[   15.629639]  kasan_save_track+0x18/0x40
[   15.629850]  kasan_save_alloc_info+0x3b/0x50
[   15.630088]  __kasan_kmalloc+0xb7/0xc0
[   15.630297]  __kmalloc_cache_noprof+0x189/0x420
[   15.630518]  kasan_atomics+0x95/0x310
[   15.630737]  kunit_try_run_case+0x1a5/0x480
[   15.630946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.631199]  kthread+0x337/0x6f0
[   15.631373]  ret_from_fork+0x116/0x1d0
[   15.631593]  ret_from_fork_asm+0x1a/0x30
[   15.631818] 
[   15.631912] The buggy address belongs to the object at ffff8881026f3680
[   15.631912]  which belongs to the cache kmalloc-64 of size 64
[   15.632447] The buggy address is located 0 bytes to the right of
[   15.632447]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.633033] 
[   15.633115] The buggy address belongs to the physical page:
[   15.633371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.633636] flags: 0x200000000000000(node=0|zone=2)
[   15.633796] page_type: f5(slab)
[   15.633915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.634140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.634359] page dumped because: kasan: bad access detected
[   15.634538] 
[   15.634607] Memory state around the buggy address:
[   15.634760]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.635066]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.635372] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.636020]                                      ^
[   15.636243]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.636558]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.636863] ==================================================================
[   15.695553] ==================================================================
[   15.695937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.696169] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.696396] 
[   15.696616] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.696659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.696672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.696693] Call Trace:
[   15.696706]  <TASK>
[   15.696722]  dump_stack_lvl+0x73/0xb0
[   15.696749]  print_report+0xd1/0x610
[   15.696771]  ? __virt_addr_valid+0x1db/0x2d0
[   15.696795]  ? kasan_atomics_helper+0x2006/0x5450
[   15.696847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.696871]  ? kasan_atomics_helper+0x2006/0x5450
[   15.696894]  kasan_report+0x141/0x180
[   15.696949]  ? kasan_atomics_helper+0x2006/0x5450
[   15.696980]  kasan_check_range+0x10c/0x1c0
[   15.697004]  __kasan_check_write+0x18/0x20
[   15.697024]  kasan_atomics_helper+0x2006/0x5450
[   15.697048]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.697071]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.697124]  ? kasan_atomics+0x152/0x310
[   15.697157]  kasan_atomics+0x1dc/0x310
[   15.697181]  ? __pfx_kasan_atomics+0x10/0x10
[   15.697206]  ? __pfx_read_tsc+0x10/0x10
[   15.697227]  ? ktime_get_ts64+0x86/0x230
[   15.697281]  kunit_try_run_case+0x1a5/0x480
[   15.697306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.697329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.697355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.697380]  ? __kthread_parkme+0x82/0x180
[   15.697429]  ? preempt_count_sub+0x50/0x80
[   15.697467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.697492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.697517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.697553]  kthread+0x337/0x6f0
[   15.697573]  ? trace_preempt_on+0x20/0xc0
[   15.697628]  ? __pfx_kthread+0x10/0x10
[   15.697649]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.697672]  ? calculate_sigpending+0x7b/0xa0
[   15.697697]  ? __pfx_kthread+0x10/0x10
[   15.697719]  ret_from_fork+0x116/0x1d0
[   15.697761]  ? __pfx_kthread+0x10/0x10
[   15.697783]  ret_from_fork_asm+0x1a/0x30
[   15.697817]  </TASK>
[   15.697828] 
[   15.706114] Allocated by task 283:
[   15.706295]  kasan_save_stack+0x45/0x70
[   15.706538]  kasan_save_track+0x18/0x40
[   15.706766]  kasan_save_alloc_info+0x3b/0x50
[   15.706980]  __kasan_kmalloc+0xb7/0xc0
[   15.707158]  __kmalloc_cache_noprof+0x189/0x420
[   15.707396]  kasan_atomics+0x95/0x310
[   15.707656]  kunit_try_run_case+0x1a5/0x480
[   15.707833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.708010]  kthread+0x337/0x6f0
[   15.708133]  ret_from_fork+0x116/0x1d0
[   15.708270]  ret_from_fork_asm+0x1a/0x30
[   15.708416] 
[   15.708500] The buggy address belongs to the object at ffff8881026f3680
[   15.708500]  which belongs to the cache kmalloc-64 of size 64
[   15.709095] The buggy address is located 0 bytes to the right of
[   15.709095]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.709823] 
[   15.709957] The buggy address belongs to the physical page:
[   15.710212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.710618] flags: 0x200000000000000(node=0|zone=2)
[   15.710853] page_type: f5(slab)
[   15.711139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.711378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.711621] page dumped because: kasan: bad access detected
[   15.711795] 
[   15.711888] Memory state around the buggy address:
[   15.712109]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.712428]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.712786] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.713100]                                      ^
[   15.713327]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.713684]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.713932] ==================================================================
[   14.940660] ==================================================================
[   14.940918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.941154] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.941383] 
[   14.941673] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.941730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941763] Call Trace:
[   14.941776]  <TASK>
[   14.941790]  dump_stack_lvl+0x73/0xb0
[   14.941817]  print_report+0xd1/0x610
[   14.941841]  ? __virt_addr_valid+0x1db/0x2d0
[   14.941865]  ? kasan_atomics_helper+0xde0/0x5450
[   14.941888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.941914]  ? kasan_atomics_helper+0xde0/0x5450
[   14.941939]  kasan_report+0x141/0x180
[   14.941962]  ? kasan_atomics_helper+0xde0/0x5450
[   14.941991]  kasan_check_range+0x10c/0x1c0
[   14.942017]  __kasan_check_write+0x18/0x20
[   14.942038]  kasan_atomics_helper+0xde0/0x5450
[   14.942063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.942088]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.942115]  ? kasan_atomics+0x152/0x310
[   14.942143]  kasan_atomics+0x1dc/0x310
[   14.942168]  ? __pfx_kasan_atomics+0x10/0x10
[   14.942194]  ? __pfx_read_tsc+0x10/0x10
[   14.942216]  ? ktime_get_ts64+0x86/0x230
[   14.942242]  kunit_try_run_case+0x1a5/0x480
[   14.942268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.942319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.942345]  ? __kthread_parkme+0x82/0x180
[   14.942368]  ? preempt_count_sub+0x50/0x80
[   14.942395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.942492]  kthread+0x337/0x6f0
[   14.942512]  ? trace_preempt_on+0x20/0xc0
[   14.942537]  ? __pfx_kthread+0x10/0x10
[   14.942559]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.942582]  ? calculate_sigpending+0x7b/0xa0
[   14.942621]  ? __pfx_kthread+0x10/0x10
[   14.942645]  ret_from_fork+0x116/0x1d0
[   14.942665]  ? __pfx_kthread+0x10/0x10
[   14.942687]  ret_from_fork_asm+0x1a/0x30
[   14.942722]  </TASK>
[   14.942732] 
[   14.950854] Allocated by task 283:
[   14.951154]  kasan_save_stack+0x45/0x70
[   14.951359]  kasan_save_track+0x18/0x40
[   14.951566]  kasan_save_alloc_info+0x3b/0x50
[   14.951830]  __kasan_kmalloc+0xb7/0xc0
[   14.951965]  __kmalloc_cache_noprof+0x189/0x420
[   14.952124]  kasan_atomics+0x95/0x310
[   14.952258]  kunit_try_run_case+0x1a5/0x480
[   14.952420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.953811]  kthread+0x337/0x6f0
[   14.954351]  ret_from_fork+0x116/0x1d0
[   14.954952]  ret_from_fork_asm+0x1a/0x30
[   14.955548] 
[   14.955964] The buggy address belongs to the object at ffff8881026f3680
[   14.955964]  which belongs to the cache kmalloc-64 of size 64
[   14.957406] The buggy address is located 0 bytes to the right of
[   14.957406]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.958765] 
[   14.959099] The buggy address belongs to the physical page:
[   14.959793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.960053] flags: 0x200000000000000(node=0|zone=2)
[   14.960220] page_type: f5(slab)
[   14.960346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.961027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.961740] page dumped because: kasan: bad access detected
[   14.962259] 
[   14.962415] Memory state around the buggy address:
[   14.962871]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.963471]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.964047] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.964262]                                      ^
[   14.964416]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964917]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.965564] ==================================================================
[   14.777449] ==================================================================
[   14.777813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.778153] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.778551] 
[   14.778663] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.778737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.778763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.778783] Call Trace:
[   14.778795]  <TASK>
[   14.778823]  dump_stack_lvl+0x73/0xb0
[   14.778853]  print_report+0xd1/0x610
[   14.778876]  ? __virt_addr_valid+0x1db/0x2d0
[   14.778899]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.778921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.778945]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.778968]  kasan_report+0x141/0x180
[   14.778991]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.779019]  kasan_check_range+0x10c/0x1c0
[   14.779044]  __kasan_check_write+0x18/0x20
[   14.779064]  kasan_atomics_helper+0x8f9/0x5450
[   14.779089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.779142]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.779168]  ? kasan_atomics+0x152/0x310
[   14.779223]  kasan_atomics+0x1dc/0x310
[   14.779248]  ? __pfx_kasan_atomics+0x10/0x10
[   14.779273]  ? __pfx_read_tsc+0x10/0x10
[   14.779305]  ? ktime_get_ts64+0x86/0x230
[   14.779330]  kunit_try_run_case+0x1a5/0x480
[   14.779355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.779379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.779445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.779478]  ? __kthread_parkme+0x82/0x180
[   14.779500]  ? preempt_count_sub+0x50/0x80
[   14.779548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.779574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.779598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.779624]  kthread+0x337/0x6f0
[   14.779644]  ? trace_preempt_on+0x20/0xc0
[   14.779668]  ? __pfx_kthread+0x10/0x10
[   14.779689]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.779710]  ? calculate_sigpending+0x7b/0xa0
[   14.779735]  ? __pfx_kthread+0x10/0x10
[   14.779757]  ret_from_fork+0x116/0x1d0
[   14.779776]  ? __pfx_kthread+0x10/0x10
[   14.779797]  ret_from_fork_asm+0x1a/0x30
[   14.779831]  </TASK>
[   14.779841] 
[   14.787777] Allocated by task 283:
[   14.787972]  kasan_save_stack+0x45/0x70
[   14.788198]  kasan_save_track+0x18/0x40
[   14.788416]  kasan_save_alloc_info+0x3b/0x50
[   14.788685]  __kasan_kmalloc+0xb7/0xc0
[   14.788872]  __kmalloc_cache_noprof+0x189/0x420
[   14.789114]  kasan_atomics+0x95/0x310
[   14.789309]  kunit_try_run_case+0x1a5/0x480
[   14.789569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.789842]  kthread+0x337/0x6f0
[   14.790028]  ret_from_fork+0x116/0x1d0
[   14.790250]  ret_from_fork_asm+0x1a/0x30
[   14.790483] 
[   14.790622] The buggy address belongs to the object at ffff8881026f3680
[   14.790622]  which belongs to the cache kmalloc-64 of size 64
[   14.791209] The buggy address is located 0 bytes to the right of
[   14.791209]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.791801] 
[   14.791923] The buggy address belongs to the physical page:
[   14.792204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.792624] flags: 0x200000000000000(node=0|zone=2)
[   14.792862] page_type: f5(slab)
[   14.793029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.793371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.793736] page dumped because: kasan: bad access detected
[   14.793991] 
[   14.794084] Memory state around the buggy address:
[   14.794321]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.794705]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.794972] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.795317]                                      ^
[   14.795578]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795914]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796258] ==================================================================
[   14.877697] ==================================================================
[   14.878331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.878919] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.879398] 
[   14.879633] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.879679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.879691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.879712] Call Trace:
[   14.879727]  <TASK>
[   14.879750]  dump_stack_lvl+0x73/0xb0
[   14.879780]  print_report+0xd1/0x610
[   14.879803]  ? __virt_addr_valid+0x1db/0x2d0
[   14.879825]  ? kasan_atomics_helper+0xc70/0x5450
[   14.879847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.879871]  ? kasan_atomics_helper+0xc70/0x5450
[   14.879894]  kasan_report+0x141/0x180
[   14.879918]  ? kasan_atomics_helper+0xc70/0x5450
[   14.879946]  kasan_check_range+0x10c/0x1c0
[   14.879971]  __kasan_check_write+0x18/0x20
[   14.879991]  kasan_atomics_helper+0xc70/0x5450
[   14.880015]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.880038]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.880063]  ? kasan_atomics+0x152/0x310
[   14.880090]  kasan_atomics+0x1dc/0x310
[   14.880113]  ? __pfx_kasan_atomics+0x10/0x10
[   14.880139]  ? __pfx_read_tsc+0x10/0x10
[   14.880159]  ? ktime_get_ts64+0x86/0x230
[   14.880184]  kunit_try_run_case+0x1a5/0x480
[   14.880208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.880231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.880255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.880279]  ? __kthread_parkme+0x82/0x180
[   14.880340]  ? preempt_count_sub+0x50/0x80
[   14.880365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.880401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.880427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.880460]  kthread+0x337/0x6f0
[   14.880479]  ? trace_preempt_on+0x20/0xc0
[   14.880503]  ? __pfx_kthread+0x10/0x10
[   14.880524]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.880546]  ? calculate_sigpending+0x7b/0xa0
[   14.880587]  ? __pfx_kthread+0x10/0x10
[   14.880610]  ret_from_fork+0x116/0x1d0
[   14.880628]  ? __pfx_kthread+0x10/0x10
[   14.880650]  ret_from_fork_asm+0x1a/0x30
[   14.880683]  </TASK>
[   14.880694] 
[   14.891119] Allocated by task 283:
[   14.891284]  kasan_save_stack+0x45/0x70
[   14.891776]  kasan_save_track+0x18/0x40
[   14.892079]  kasan_save_alloc_info+0x3b/0x50
[   14.892246]  __kasan_kmalloc+0xb7/0xc0
[   14.892646]  __kmalloc_cache_noprof+0x189/0x420
[   14.892901]  kasan_atomics+0x95/0x310
[   14.893213]  kunit_try_run_case+0x1a5/0x480
[   14.893446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.893895]  kthread+0x337/0x6f0
[   14.894153]  ret_from_fork+0x116/0x1d0
[   14.894365]  ret_from_fork_asm+0x1a/0x30
[   14.894760] 
[   14.894863] The buggy address belongs to the object at ffff8881026f3680
[   14.894863]  which belongs to the cache kmalloc-64 of size 64
[   14.895579] The buggy address is located 0 bytes to the right of
[   14.895579]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.896190] 
[   14.896427] The buggy address belongs to the physical page:
[   14.896878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.897274] flags: 0x200000000000000(node=0|zone=2)
[   14.897670] page_type: f5(slab)
[   14.897943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.898311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.898831] page dumped because: kasan: bad access detected
[   14.899164] 
[   14.899242] Memory state around the buggy address:
[   14.899627]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900043]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900369] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.900795]                                      ^
[   14.901022]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901462]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901918] ==================================================================
[   15.407858] ==================================================================
[   15.408155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.408384] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.408733] 
[   15.409008] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.409276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.409291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.409370] Call Trace:
[   15.409386]  <TASK>
[   15.409401]  dump_stack_lvl+0x73/0xb0
[   15.409523]  print_report+0xd1/0x610
[   15.409559]  ? __virt_addr_valid+0x1db/0x2d0
[   15.409652]  ? kasan_atomics_helper+0x1818/0x5450
[   15.409675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.409698]  ? kasan_atomics_helper+0x1818/0x5450
[   15.409721]  kasan_report+0x141/0x180
[   15.409746]  ? kasan_atomics_helper+0x1818/0x5450
[   15.409774]  kasan_check_range+0x10c/0x1c0
[   15.409799]  __kasan_check_write+0x18/0x20
[   15.409818]  kasan_atomics_helper+0x1818/0x5450
[   15.409941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.409963]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.409989]  ? kasan_atomics+0x152/0x310
[   15.410016]  kasan_atomics+0x1dc/0x310
[   15.410040]  ? __pfx_kasan_atomics+0x10/0x10
[   15.410066]  ? __pfx_read_tsc+0x10/0x10
[   15.410088]  ? ktime_get_ts64+0x86/0x230
[   15.410114]  kunit_try_run_case+0x1a5/0x480
[   15.410138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.410161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.410186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.410210]  ? __kthread_parkme+0x82/0x180
[   15.410231]  ? preempt_count_sub+0x50/0x80
[   15.410256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.410280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.410304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.410329]  kthread+0x337/0x6f0
[   15.410349]  ? trace_preempt_on+0x20/0xc0
[   15.410373]  ? __pfx_kthread+0x10/0x10
[   15.410393]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.410415]  ? calculate_sigpending+0x7b/0xa0
[   15.410451]  ? __pfx_kthread+0x10/0x10
[   15.410473]  ret_from_fork+0x116/0x1d0
[   15.410492]  ? __pfx_kthread+0x10/0x10
[   15.410513]  ret_from_fork_asm+0x1a/0x30
[   15.410546]  </TASK>
[   15.410557] 
[   15.420464] Allocated by task 283:
[   15.420761]  kasan_save_stack+0x45/0x70
[   15.420950]  kasan_save_track+0x18/0x40
[   15.421123]  kasan_save_alloc_info+0x3b/0x50
[   15.421320]  __kasan_kmalloc+0xb7/0xc0
[   15.421524]  __kmalloc_cache_noprof+0x189/0x420
[   15.421963]  kasan_atomics+0x95/0x310
[   15.422215]  kunit_try_run_case+0x1a5/0x480
[   15.422385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.422826]  kthread+0x337/0x6f0
[   15.422979]  ret_from_fork+0x116/0x1d0
[   15.423278]  ret_from_fork_asm+0x1a/0x30
[   15.423556] 
[   15.423641] The buggy address belongs to the object at ffff8881026f3680
[   15.423641]  which belongs to the cache kmalloc-64 of size 64
[   15.424288] The buggy address is located 0 bytes to the right of
[   15.424288]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.424901] 
[   15.425003] The buggy address belongs to the physical page:
[   15.425235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.425808] flags: 0x200000000000000(node=0|zone=2)
[   15.426092] page_type: f5(slab)
[   15.426235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.426692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.427106] page dumped because: kasan: bad access detected
[   15.427422] 
[   15.427534] Memory state around the buggy address:
[   15.427767]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.428204]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.428524] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.428808]                                      ^
[   15.429012]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.429309]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.429856] ==================================================================
[   15.657458] ==================================================================
[   15.657975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.658313] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.658712] 
[   15.658800] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.658880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.658892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.658914] Call Trace:
[   15.658930]  <TASK>
[   15.658946]  dump_stack_lvl+0x73/0xb0
[   15.659007]  print_report+0xd1/0x610
[   15.659030]  ? __virt_addr_valid+0x1db/0x2d0
[   15.659054]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.659076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.659099]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.659122]  kasan_report+0x141/0x180
[   15.659145]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.659174]  kasan_check_range+0x10c/0x1c0
[   15.659229]  __kasan_check_write+0x18/0x20
[   15.659250]  kasan_atomics_helper+0x1f43/0x5450
[   15.659274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.659297]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.659323]  ? kasan_atomics+0x152/0x310
[   15.659377]  kasan_atomics+0x1dc/0x310
[   15.659401]  ? __pfx_kasan_atomics+0x10/0x10
[   15.659426]  ? __pfx_read_tsc+0x10/0x10
[   15.659461]  ? ktime_get_ts64+0x86/0x230
[   15.659487]  kunit_try_run_case+0x1a5/0x480
[   15.659542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.659566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.659591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.659615]  ? __kthread_parkme+0x82/0x180
[   15.659637]  ? preempt_count_sub+0x50/0x80
[   15.659664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.659689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.659744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.659769]  kthread+0x337/0x6f0
[   15.659789]  ? trace_preempt_on+0x20/0xc0
[   15.659814]  ? __pfx_kthread+0x10/0x10
[   15.659835]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.659857]  ? calculate_sigpending+0x7b/0xa0
[   15.659882]  ? __pfx_kthread+0x10/0x10
[   15.659904]  ret_from_fork+0x116/0x1d0
[   15.659923]  ? __pfx_kthread+0x10/0x10
[   15.659944]  ret_from_fork_asm+0x1a/0x30
[   15.659979]  </TASK>
[   15.659989] 
[   15.668037] Allocated by task 283:
[   15.668224]  kasan_save_stack+0x45/0x70
[   15.668450]  kasan_save_track+0x18/0x40
[   15.668681]  kasan_save_alloc_info+0x3b/0x50
[   15.668913]  __kasan_kmalloc+0xb7/0xc0
[   15.669097]  __kmalloc_cache_noprof+0x189/0x420
[   15.669322]  kasan_atomics+0x95/0x310
[   15.669504]  kunit_try_run_case+0x1a5/0x480
[   15.669870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.670076]  kthread+0x337/0x6f0
[   15.670195]  ret_from_fork+0x116/0x1d0
[   15.670325]  ret_from_fork_asm+0x1a/0x30
[   15.670547] 
[   15.670643] The buggy address belongs to the object at ffff8881026f3680
[   15.670643]  which belongs to the cache kmalloc-64 of size 64
[   15.671160] The buggy address is located 0 bytes to the right of
[   15.671160]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.671696] 
[   15.671793] The buggy address belongs to the physical page:
[   15.672040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.672382] flags: 0x200000000000000(node=0|zone=2)
[   15.672619] page_type: f5(slab)
[   15.672785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.673113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.673351] page dumped because: kasan: bad access detected
[   15.673526] 
[   15.673609] Memory state around the buggy address:
[   15.673843]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.674155]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.674518] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.674822]                                      ^
[   15.674977]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.675188]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.675394] ==================================================================
[   15.275937] ==================================================================
[   15.276448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.276838] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.277226] 
[   15.277309] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.277349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.277361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.277382] Call Trace:
[   15.277396]  <TASK>
[   15.277412]  dump_stack_lvl+0x73/0xb0
[   15.277449]  print_report+0xd1/0x610
[   15.277472]  ? __virt_addr_valid+0x1db/0x2d0
[   15.277495]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.277517]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.277540]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.277563]  kasan_report+0x141/0x180
[   15.277599]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.277628]  __asan_report_store8_noabort+0x1b/0x30
[   15.277654]  kasan_atomics_helper+0x50d4/0x5450
[   15.277678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.277702]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.277727]  ? kasan_atomics+0x152/0x310
[   15.277755]  kasan_atomics+0x1dc/0x310
[   15.277778]  ? __pfx_kasan_atomics+0x10/0x10
[   15.277803]  ? __pfx_read_tsc+0x10/0x10
[   15.277824]  ? ktime_get_ts64+0x86/0x230
[   15.277849]  kunit_try_run_case+0x1a5/0x480
[   15.277874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.277897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.277921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.277946]  ? __kthread_parkme+0x82/0x180
[   15.277967]  ? preempt_count_sub+0x50/0x80
[   15.277992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.278018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.278042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.278068]  kthread+0x337/0x6f0
[   15.278087]  ? trace_preempt_on+0x20/0xc0
[   15.278110]  ? __pfx_kthread+0x10/0x10
[   15.278131]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.278154]  ? calculate_sigpending+0x7b/0xa0
[   15.278179]  ? __pfx_kthread+0x10/0x10
[   15.278201]  ret_from_fork+0x116/0x1d0
[   15.278220]  ? __pfx_kthread+0x10/0x10
[   15.278241]  ret_from_fork_asm+0x1a/0x30
[   15.278273]  </TASK>
[   15.278284] 
[   15.289706] Allocated by task 283:
[   15.289905]  kasan_save_stack+0x45/0x70
[   15.290251]  kasan_save_track+0x18/0x40
[   15.290532]  kasan_save_alloc_info+0x3b/0x50
[   15.290851]  __kasan_kmalloc+0xb7/0xc0
[   15.291006]  __kmalloc_cache_noprof+0x189/0x420
[   15.291229]  kasan_atomics+0x95/0x310
[   15.291413]  kunit_try_run_case+0x1a5/0x480
[   15.291883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292100]  kthread+0x337/0x6f0
[   15.292275]  ret_from_fork+0x116/0x1d0
[   15.292579]  ret_from_fork_asm+0x1a/0x30
[   15.292899] 
[   15.293002] The buggy address belongs to the object at ffff8881026f3680
[   15.293002]  which belongs to the cache kmalloc-64 of size 64
[   15.293681] The buggy address is located 0 bytes to the right of
[   15.293681]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.294250] 
[   15.294333] The buggy address belongs to the physical page:
[   15.294603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.294914] flags: 0x200000000000000(node=0|zone=2)
[   15.295134] page_type: f5(slab)
[   15.295292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.296012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.296313] page dumped because: kasan: bad access detected
[   15.296688] 
[   15.296790] Memory state around the buggy address:
[   15.296969]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.297403]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.297811] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.298057]                                      ^
[   15.298390]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.298683]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.299241] ==================================================================
[   15.251278] ==================================================================
[   15.252148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.252802] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.253404] 
[   15.254115] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.254163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.254187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.254209] Call Trace:
[   15.254225]  <TASK>
[   15.254240]  dump_stack_lvl+0x73/0xb0
[   15.254270]  print_report+0xd1/0x610
[   15.254293]  ? __virt_addr_valid+0x1db/0x2d0
[   15.254316]  ? kasan_atomics_helper+0x1467/0x5450
[   15.254338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.254361]  ? kasan_atomics_helper+0x1467/0x5450
[   15.254384]  kasan_report+0x141/0x180
[   15.254406]  ? kasan_atomics_helper+0x1467/0x5450
[   15.254444]  kasan_check_range+0x10c/0x1c0
[   15.254469]  __kasan_check_write+0x18/0x20
[   15.254491]  kasan_atomics_helper+0x1467/0x5450
[   15.254514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.254537]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.254563]  ? kasan_atomics+0x152/0x310
[   15.254590]  kasan_atomics+0x1dc/0x310
[   15.254612]  ? __pfx_kasan_atomics+0x10/0x10
[   15.254638]  ? __pfx_read_tsc+0x10/0x10
[   15.254660]  ? ktime_get_ts64+0x86/0x230
[   15.254685]  kunit_try_run_case+0x1a5/0x480
[   15.254710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.254733]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.254758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.254783]  ? __kthread_parkme+0x82/0x180
[   15.254804]  ? preempt_count_sub+0x50/0x80
[   15.254829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.254857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.254882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.254908]  kthread+0x337/0x6f0
[   15.254928]  ? trace_preempt_on+0x20/0xc0
[   15.254952]  ? __pfx_kthread+0x10/0x10
[   15.254973]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.254995]  ? calculate_sigpending+0x7b/0xa0
[   15.255020]  ? __pfx_kthread+0x10/0x10
[   15.255041]  ret_from_fork+0x116/0x1d0
[   15.255060]  ? __pfx_kthread+0x10/0x10
[   15.255081]  ret_from_fork_asm+0x1a/0x30
[   15.255114]  </TASK>
[   15.255124] 
[   15.268199] Allocated by task 283:
[   15.268343]  kasan_save_stack+0x45/0x70
[   15.268511]  kasan_save_track+0x18/0x40
[   15.268651]  kasan_save_alloc_info+0x3b/0x50
[   15.268802]  __kasan_kmalloc+0xb7/0xc0
[   15.269005]  __kmalloc_cache_noprof+0x189/0x420
[   15.269188]  kasan_atomics+0x95/0x310
[   15.269323]  kunit_try_run_case+0x1a5/0x480
[   15.269511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.269777]  kthread+0x337/0x6f0
[   15.269946]  ret_from_fork+0x116/0x1d0
[   15.270143]  ret_from_fork_asm+0x1a/0x30
[   15.270313] 
[   15.270384] The buggy address belongs to the object at ffff8881026f3680
[   15.270384]  which belongs to the cache kmalloc-64 of size 64
[   15.270830] The buggy address is located 0 bytes to the right of
[   15.270830]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.271492] 
[   15.271647] The buggy address belongs to the physical page:
[   15.271902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.272206] flags: 0x200000000000000(node=0|zone=2)
[   15.272396] page_type: f5(slab)
[   15.272580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.272901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.273165] page dumped because: kasan: bad access detected
[   15.273368] 
[   15.273472] Memory state around the buggy address:
[   15.273700]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.273984]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.274225] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.274569]                                      ^
[   15.274787]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.275068]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.275333] ==================================================================
[   15.818761] ==================================================================
[   15.819376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.819934] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.820200] 
[   15.820315] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.820360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.820374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.820396] Call Trace:
[   15.820414]  <TASK>
[   15.820432]  dump_stack_lvl+0x73/0xb0
[   15.820475]  print_report+0xd1/0x610
[   15.820525]  ? __virt_addr_valid+0x1db/0x2d0
[   15.820751]  ? kasan_atomics_helper+0x224c/0x5450
[   15.820775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.820800]  ? kasan_atomics_helper+0x224c/0x5450
[   15.820823]  kasan_report+0x141/0x180
[   15.820846]  ? kasan_atomics_helper+0x224c/0x5450
[   15.820875]  kasan_check_range+0x10c/0x1c0
[   15.820899]  __kasan_check_write+0x18/0x20
[   15.820919]  kasan_atomics_helper+0x224c/0x5450
[   15.820943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.820966]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.820992]  ? kasan_atomics+0x152/0x310
[   15.821020]  kasan_atomics+0x1dc/0x310
[   15.821043]  ? __pfx_kasan_atomics+0x10/0x10
[   15.821067]  ? __pfx_read_tsc+0x10/0x10
[   15.821089]  ? ktime_get_ts64+0x86/0x230
[   15.821116]  kunit_try_run_case+0x1a5/0x480
[   15.821152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.821199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.821224]  ? __kthread_parkme+0x82/0x180
[   15.821245]  ? preempt_count_sub+0x50/0x80
[   15.821271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.821321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.821345]  kthread+0x337/0x6f0
[   15.821365]  ? trace_preempt_on+0x20/0xc0
[   15.821389]  ? __pfx_kthread+0x10/0x10
[   15.821410]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.821433]  ? calculate_sigpending+0x7b/0xa0
[   15.821469]  ? __pfx_kthread+0x10/0x10
[   15.821491]  ret_from_fork+0x116/0x1d0
[   15.821510]  ? __pfx_kthread+0x10/0x10
[   15.821531]  ret_from_fork_asm+0x1a/0x30
[   15.821582]  </TASK>
[   15.821594] 
[   15.831855] Allocated by task 283:
[   15.832009]  kasan_save_stack+0x45/0x70
[   15.832290]  kasan_save_track+0x18/0x40
[   15.832491]  kasan_save_alloc_info+0x3b/0x50
[   15.832958]  __kasan_kmalloc+0xb7/0xc0
[   15.833201]  __kmalloc_cache_noprof+0x189/0x420
[   15.833475]  kasan_atomics+0x95/0x310
[   15.833775]  kunit_try_run_case+0x1a5/0x480
[   15.833945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.834326]  kthread+0x337/0x6f0
[   15.834491]  ret_from_fork+0x116/0x1d0
[   15.834822]  ret_from_fork_asm+0x1a/0x30
[   15.834988] 
[   15.835150] The buggy address belongs to the object at ffff8881026f3680
[   15.835150]  which belongs to the cache kmalloc-64 of size 64
[   15.835775] The buggy address is located 0 bytes to the right of
[   15.835775]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.836370] 
[   15.836465] The buggy address belongs to the physical page:
[   15.836791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.837280] flags: 0x200000000000000(node=0|zone=2)
[   15.837545] page_type: f5(slab)
[   15.837868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.838273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.838598] page dumped because: kasan: bad access detected
[   15.838957] 
[   15.839056] Memory state around the buggy address:
[   15.839249]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.839722]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840062] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.840378]                                      ^
[   15.840592]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841071]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841476] ==================================================================
[   15.317359] ==================================================================
[   15.317703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.318039] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.318285] 
[   15.318363] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.318402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.318414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.318457] Call Trace:
[   15.318470]  <TASK>
[   15.318485]  dump_stack_lvl+0x73/0xb0
[   15.318511]  print_report+0xd1/0x610
[   15.318534]  ? __virt_addr_valid+0x1db/0x2d0
[   15.318558]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.318580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.318604]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.318627]  kasan_report+0x141/0x180
[   15.318649]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.318678]  kasan_check_range+0x10c/0x1c0
[   15.318712]  __kasan_check_write+0x18/0x20
[   15.318732]  kasan_atomics_helper+0x15b6/0x5450
[   15.318757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.318780]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.318806]  ? kasan_atomics+0x152/0x310
[   15.318834]  kasan_atomics+0x1dc/0x310
[   15.318857]  ? __pfx_kasan_atomics+0x10/0x10
[   15.318882]  ? __pfx_read_tsc+0x10/0x10
[   15.318903]  ? ktime_get_ts64+0x86/0x230
[   15.318928]  kunit_try_run_case+0x1a5/0x480
[   15.318953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.318977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.319001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.319025]  ? __kthread_parkme+0x82/0x180
[   15.319046]  ? preempt_count_sub+0x50/0x80
[   15.319071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.319096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.319120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.319145]  kthread+0x337/0x6f0
[   15.319164]  ? trace_preempt_on+0x20/0xc0
[   15.319188]  ? __pfx_kthread+0x10/0x10
[   15.319209]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.319231]  ? calculate_sigpending+0x7b/0xa0
[   15.319256]  ? __pfx_kthread+0x10/0x10
[   15.319277]  ret_from_fork+0x116/0x1d0
[   15.319296]  ? __pfx_kthread+0x10/0x10
[   15.319317]  ret_from_fork_asm+0x1a/0x30
[   15.319350]  </TASK>
[   15.319360] 
[   15.326489] Allocated by task 283:
[   15.326619]  kasan_save_stack+0x45/0x70
[   15.326829]  kasan_save_track+0x18/0x40
[   15.327021]  kasan_save_alloc_info+0x3b/0x50
[   15.327241]  __kasan_kmalloc+0xb7/0xc0
[   15.327428]  __kmalloc_cache_noprof+0x189/0x420
[   15.327773]  kasan_atomics+0x95/0x310
[   15.327944]  kunit_try_run_case+0x1a5/0x480
[   15.328132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328342]  kthread+0x337/0x6f0
[   15.328481]  ret_from_fork+0x116/0x1d0
[   15.328826]  ret_from_fork_asm+0x1a/0x30
[   15.328995] 
[   15.329081] The buggy address belongs to the object at ffff8881026f3680
[   15.329081]  which belongs to the cache kmalloc-64 of size 64
[   15.329550] The buggy address is located 0 bytes to the right of
[   15.329550]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.330002] 
[   15.330075] The buggy address belongs to the physical page:
[   15.330251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.330500] flags: 0x200000000000000(node=0|zone=2)
[   15.330665] page_type: f5(slab)
[   15.330786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.331018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.331284] page dumped because: kasan: bad access detected
[   15.331563] 
[   15.331658] Memory state around the buggy address:
[   15.331877]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.332192]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.332518] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.333188]                                      ^
[   15.333451]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.333886]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.334108] ==================================================================
[   15.179907] ==================================================================
[   15.180203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.180766] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.181058] 
[   15.181167] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.181209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.181221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.181242] Call Trace:
[   15.181257]  <TASK>
[   15.181273]  dump_stack_lvl+0x73/0xb0
[   15.181300]  print_report+0xd1/0x610
[   15.181322]  ? __virt_addr_valid+0x1db/0x2d0
[   15.181345]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.181366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.181391]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.181611]  kasan_report+0x141/0x180
[   15.181637]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.181665]  kasan_check_range+0x10c/0x1c0
[   15.181690]  __kasan_check_write+0x18/0x20
[   15.181709]  kasan_atomics_helper+0x12e6/0x5450
[   15.181734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.181757]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.181782]  ? kasan_atomics+0x152/0x310
[   15.181810]  kasan_atomics+0x1dc/0x310
[   15.181833]  ? __pfx_kasan_atomics+0x10/0x10
[   15.181857]  ? __pfx_read_tsc+0x10/0x10
[   15.181879]  ? ktime_get_ts64+0x86/0x230
[   15.181905]  kunit_try_run_case+0x1a5/0x480
[   15.181930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.181978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.182002]  ? __kthread_parkme+0x82/0x180
[   15.182022]  ? preempt_count_sub+0x50/0x80
[   15.182047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.182072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.182096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.182121]  kthread+0x337/0x6f0
[   15.182141]  ? trace_preempt_on+0x20/0xc0
[   15.182164]  ? __pfx_kthread+0x10/0x10
[   15.182184]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.182206]  ? calculate_sigpending+0x7b/0xa0
[   15.182231]  ? __pfx_kthread+0x10/0x10
[   15.182253]  ret_from_fork+0x116/0x1d0
[   15.182272]  ? __pfx_kthread+0x10/0x10
[   15.182293]  ret_from_fork_asm+0x1a/0x30
[   15.182326]  </TASK>
[   15.182336] 
[   15.189741] Allocated by task 283:
[   15.189893]  kasan_save_stack+0x45/0x70
[   15.190092]  kasan_save_track+0x18/0x40
[   15.190230]  kasan_save_alloc_info+0x3b/0x50
[   15.190379]  __kasan_kmalloc+0xb7/0xc0
[   15.190558]  __kmalloc_cache_noprof+0x189/0x420
[   15.190780]  kasan_atomics+0x95/0x310
[   15.190964]  kunit_try_run_case+0x1a5/0x480
[   15.191112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.191323]  kthread+0x337/0x6f0
[   15.191506]  ret_from_fork+0x116/0x1d0
[   15.191864]  ret_from_fork_asm+0x1a/0x30
[   15.192048] 
[   15.192120] The buggy address belongs to the object at ffff8881026f3680
[   15.192120]  which belongs to the cache kmalloc-64 of size 64
[   15.192487] The buggy address is located 0 bytes to the right of
[   15.192487]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.192860] 
[   15.192932] The buggy address belongs to the physical page:
[   15.193108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.193353] flags: 0x200000000000000(node=0|zone=2)
[   15.193581] page_type: f5(slab)
[   15.193750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.194092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.194423] page dumped because: kasan: bad access detected
[   15.194702] 
[   15.194792] Memory state around the buggy address:
[   15.195004]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.195465]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.195772] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.195989]                                      ^
[   15.196145]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.196363]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.196681] ==================================================================
[   14.731139] ==================================================================
[   14.731491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.731875] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.732202] 
[   14.732305] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.732345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.732357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.732378] Call Trace:
[   14.732390]  <TASK>
[   14.732404]  dump_stack_lvl+0x73/0xb0
[   14.732430]  print_report+0xd1/0x610
[   14.732463]  ? __virt_addr_valid+0x1db/0x2d0
[   14.732487]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.732509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.732533]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.732573]  kasan_report+0x141/0x180
[   14.732596]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.732624]  kasan_check_range+0x10c/0x1c0
[   14.732649]  __kasan_check_write+0x18/0x20
[   14.732669]  kasan_atomics_helper+0x7c7/0x5450
[   14.732704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.732728]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.732754]  ? kasan_atomics+0x152/0x310
[   14.732781]  kasan_atomics+0x1dc/0x310
[   14.732804]  ? __pfx_kasan_atomics+0x10/0x10
[   14.732830]  ? __pfx_read_tsc+0x10/0x10
[   14.732851]  ? ktime_get_ts64+0x86/0x230
[   14.732876]  kunit_try_run_case+0x1a5/0x480
[   14.732901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.732924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.732949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.732973]  ? __kthread_parkme+0x82/0x180
[   14.732993]  ? preempt_count_sub+0x50/0x80
[   14.733018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.733042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.733067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.733093]  kthread+0x337/0x6f0
[   14.733112]  ? trace_preempt_on+0x20/0xc0
[   14.733140]  ? __pfx_kthread+0x10/0x10
[   14.733162]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.733184]  ? calculate_sigpending+0x7b/0xa0
[   14.733208]  ? __pfx_kthread+0x10/0x10
[   14.733230]  ret_from_fork+0x116/0x1d0
[   14.733249]  ? __pfx_kthread+0x10/0x10
[   14.733270]  ret_from_fork_asm+0x1a/0x30
[   14.733303]  </TASK>
[   14.733313] 
[   14.740708] Allocated by task 283:
[   14.740864]  kasan_save_stack+0x45/0x70
[   14.741042]  kasan_save_track+0x18/0x40
[   14.741215]  kasan_save_alloc_info+0x3b/0x50
[   14.741402]  __kasan_kmalloc+0xb7/0xc0
[   14.742161]  __kmalloc_cache_noprof+0x189/0x420
[   14.742582]  kasan_atomics+0x95/0x310
[   14.742916]  kunit_try_run_case+0x1a5/0x480
[   14.743341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.743626]  kthread+0x337/0x6f0
[   14.743973]  ret_from_fork+0x116/0x1d0
[   14.744398]  ret_from_fork_asm+0x1a/0x30
[   14.744558] 
[   14.744632] The buggy address belongs to the object at ffff8881026f3680
[   14.744632]  which belongs to the cache kmalloc-64 of size 64
[   14.744989] The buggy address is located 0 bytes to the right of
[   14.744989]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.745617] 
[   14.745781] The buggy address belongs to the physical page:
[   14.746241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.746924] flags: 0x200000000000000(node=0|zone=2)
[   14.747394] page_type: f5(slab)
[   14.747814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.748653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.749509] page dumped because: kasan: bad access detected
[   14.749997] 
[   14.750192] Memory state around the buggy address:
[   14.750536]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.750885]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.751104] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.751317]                                      ^
[   14.751571]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.752267]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.752754] ==================================================================
[   15.385325] ==================================================================
[   15.385981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.386285] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.386630] 
[   15.386814] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.386874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.386887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.386923] Call Trace:
[   15.386950]  <TASK>
[   15.387193]  dump_stack_lvl+0x73/0xb0
[   15.387228]  print_report+0xd1/0x610
[   15.387252]  ? __virt_addr_valid+0x1db/0x2d0
[   15.387274]  ? kasan_atomics_helper+0x177f/0x5450
[   15.387296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.387319]  ? kasan_atomics_helper+0x177f/0x5450
[   15.387342]  kasan_report+0x141/0x180
[   15.387365]  ? kasan_atomics_helper+0x177f/0x5450
[   15.387394]  kasan_check_range+0x10c/0x1c0
[   15.387418]  __kasan_check_write+0x18/0x20
[   15.387450]  kasan_atomics_helper+0x177f/0x5450
[   15.387474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.387497]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.387523]  ? kasan_atomics+0x152/0x310
[   15.387675]  kasan_atomics+0x1dc/0x310
[   15.387698]  ? __pfx_kasan_atomics+0x10/0x10
[   15.387724]  ? __pfx_read_tsc+0x10/0x10
[   15.387745]  ? ktime_get_ts64+0x86/0x230
[   15.387771]  kunit_try_run_case+0x1a5/0x480
[   15.387795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.387818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.387842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.387866]  ? __kthread_parkme+0x82/0x180
[   15.387887]  ? preempt_count_sub+0x50/0x80
[   15.387912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.387937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.387961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.387987]  kthread+0x337/0x6f0
[   15.388006]  ? trace_preempt_on+0x20/0xc0
[   15.388029]  ? __pfx_kthread+0x10/0x10
[   15.388051]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.388073]  ? calculate_sigpending+0x7b/0xa0
[   15.388098]  ? __pfx_kthread+0x10/0x10
[   15.388120]  ret_from_fork+0x116/0x1d0
[   15.388140]  ? __pfx_kthread+0x10/0x10
[   15.388160]  ret_from_fork_asm+0x1a/0x30
[   15.388193]  </TASK>
[   15.388204] 
[   15.397974] Allocated by task 283:
[   15.398257]  kasan_save_stack+0x45/0x70
[   15.398467]  kasan_save_track+0x18/0x40
[   15.398643]  kasan_save_alloc_info+0x3b/0x50
[   15.398995]  __kasan_kmalloc+0xb7/0xc0
[   15.399246]  __kmalloc_cache_noprof+0x189/0x420
[   15.399516]  kasan_atomics+0x95/0x310
[   15.399729]  kunit_try_run_case+0x1a5/0x480
[   15.399988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.400210]  kthread+0x337/0x6f0
[   15.400352]  ret_from_fork+0x116/0x1d0
[   15.400526]  ret_from_fork_asm+0x1a/0x30
[   15.400961] 
[   15.401036] The buggy address belongs to the object at ffff8881026f3680
[   15.401036]  which belongs to the cache kmalloc-64 of size 64
[   15.401701] The buggy address is located 0 bytes to the right of
[   15.401701]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.402262] 
[   15.402450] The buggy address belongs to the physical page:
[   15.402753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.403138] flags: 0x200000000000000(node=0|zone=2)
[   15.403343] page_type: f5(slab)
[   15.403641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.403935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.404235] page dumped because: kasan: bad access detected
[   15.404474] 
[   15.404552] Memory state around the buggy address:
[   15.405023]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.405407]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.405728] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.406172]                                      ^
[   15.406460]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.406782]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.407226] ==================================================================
[   15.490119] ==================================================================
[   15.490497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.490728] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.491245] 
[   15.491348] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.491391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.491403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.491425] Call Trace:
[   15.491472]  <TASK>
[   15.491491]  dump_stack_lvl+0x73/0xb0
[   15.491519]  print_report+0xd1/0x610
[   15.491549]  ? __virt_addr_valid+0x1db/0x2d0
[   15.491574]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.491595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.491619]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.491642]  kasan_report+0x141/0x180
[   15.491683]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.491712]  kasan_check_range+0x10c/0x1c0
[   15.491737]  __kasan_check_write+0x18/0x20
[   15.491757]  kasan_atomics_helper+0x1a7f/0x5450
[   15.491812]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.491834]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.491860]  ? kasan_atomics+0x152/0x310
[   15.491887]  kasan_atomics+0x1dc/0x310
[   15.491910]  ? __pfx_kasan_atomics+0x10/0x10
[   15.491934]  ? __pfx_read_tsc+0x10/0x10
[   15.491957]  ? ktime_get_ts64+0x86/0x230
[   15.491983]  kunit_try_run_case+0x1a5/0x480
[   15.492009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.492057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.492082]  ? __kthread_parkme+0x82/0x180
[   15.492102]  ? preempt_count_sub+0x50/0x80
[   15.492129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.492178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.492205]  kthread+0x337/0x6f0
[   15.492242]  ? trace_preempt_on+0x20/0xc0
[   15.492267]  ? __pfx_kthread+0x10/0x10
[   15.492287]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.492310]  ? calculate_sigpending+0x7b/0xa0
[   15.492335]  ? __pfx_kthread+0x10/0x10
[   15.492357]  ret_from_fork+0x116/0x1d0
[   15.492376]  ? __pfx_kthread+0x10/0x10
[   15.492396]  ret_from_fork_asm+0x1a/0x30
[   15.492465]  </TASK>
[   15.492475] 
[   15.500144] Allocated by task 283:
[   15.500354]  kasan_save_stack+0x45/0x70
[   15.500580]  kasan_save_track+0x18/0x40
[   15.500775]  kasan_save_alloc_info+0x3b/0x50
[   15.500999]  __kasan_kmalloc+0xb7/0xc0
[   15.501187]  __kmalloc_cache_noprof+0x189/0x420
[   15.501408]  kasan_atomics+0x95/0x310
[   15.501610]  kunit_try_run_case+0x1a5/0x480
[   15.501817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.502316]  kthread+0x337/0x6f0
[   15.502446]  ret_from_fork+0x116/0x1d0
[   15.502693]  ret_from_fork_asm+0x1a/0x30
[   15.502888] 
[   15.502972] The buggy address belongs to the object at ffff8881026f3680
[   15.502972]  which belongs to the cache kmalloc-64 of size 64
[   15.503472] The buggy address is located 0 bytes to the right of
[   15.503472]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.503879] 
[   15.503950] The buggy address belongs to the physical page:
[   15.504119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.504475] flags: 0x200000000000000(node=0|zone=2)
[   15.505004] page_type: f5(slab)
[   15.505180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.505534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.505772] page dumped because: kasan: bad access detected
[   15.505939] 
[   15.506007] Memory state around the buggy address:
[   15.506158]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.506370]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.506590] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.506796]                                      ^
[   15.506945]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.507425]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.508044] ==================================================================
[   15.142957] ==================================================================
[   15.143293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.143736] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.143990] 
[   15.144074] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.144116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.144128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.144149] Call Trace:
[   15.144163]  <TASK>
[   15.144177]  dump_stack_lvl+0x73/0xb0
[   15.144204]  print_report+0xd1/0x610
[   15.144227]  ? __virt_addr_valid+0x1db/0x2d0
[   15.144250]  ? kasan_atomics_helper+0x1217/0x5450
[   15.144272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.144296]  ? kasan_atomics_helper+0x1217/0x5450
[   15.144318]  kasan_report+0x141/0x180
[   15.144341]  ? kasan_atomics_helper+0x1217/0x5450
[   15.144370]  kasan_check_range+0x10c/0x1c0
[   15.144395]  __kasan_check_write+0x18/0x20
[   15.144414]  kasan_atomics_helper+0x1217/0x5450
[   15.144451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.144474]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.144499]  ? kasan_atomics+0x152/0x310
[   15.144527]  kasan_atomics+0x1dc/0x310
[   15.144558]  ? __pfx_kasan_atomics+0x10/0x10
[   15.144583]  ? __pfx_read_tsc+0x10/0x10
[   15.144604]  ? ktime_get_ts64+0x86/0x230
[   15.144629]  kunit_try_run_case+0x1a5/0x480
[   15.144653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.144676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.144700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.144725]  ? __kthread_parkme+0x82/0x180
[   15.144745]  ? preempt_count_sub+0x50/0x80
[   15.144770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.144795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.144820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.144846]  kthread+0x337/0x6f0
[   15.144867]  ? trace_preempt_on+0x20/0xc0
[   15.144894]  ? __pfx_kthread+0x10/0x10
[   15.144917]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.144939]  ? calculate_sigpending+0x7b/0xa0
[   15.144963]  ? __pfx_kthread+0x10/0x10
[   15.144986]  ret_from_fork+0x116/0x1d0
[   15.145005]  ? __pfx_kthread+0x10/0x10
[   15.145026]  ret_from_fork_asm+0x1a/0x30
[   15.145059]  </TASK>
[   15.145070] 
[   15.152382] Allocated by task 283:
[   15.152553]  kasan_save_stack+0x45/0x70
[   15.152863]  kasan_save_track+0x18/0x40
[   15.153057]  kasan_save_alloc_info+0x3b/0x50
[   15.153271]  __kasan_kmalloc+0xb7/0xc0
[   15.153473]  __kmalloc_cache_noprof+0x189/0x420
[   15.153914]  kasan_atomics+0x95/0x310
[   15.154107]  kunit_try_run_case+0x1a5/0x480
[   15.154312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154622]  kthread+0x337/0x6f0
[   15.154793]  ret_from_fork+0x116/0x1d0
[   15.154980]  ret_from_fork_asm+0x1a/0x30
[   15.155122] 
[   15.155192] The buggy address belongs to the object at ffff8881026f3680
[   15.155192]  which belongs to the cache kmalloc-64 of size 64
[   15.155672] The buggy address is located 0 bytes to the right of
[   15.155672]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.156168] 
[   15.156258] The buggy address belongs to the physical page:
[   15.156488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.156931] flags: 0x200000000000000(node=0|zone=2)
[   15.157136] page_type: f5(slab)
[   15.157298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.157693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.157976] page dumped because: kasan: bad access detected
[   15.158228] 
[   15.158308] Memory state around the buggy address:
[   15.158510]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.158732]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.158950] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.159166]                                      ^
[   15.159322]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159599]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160278] ==================================================================
[   15.578987] ==================================================================
[   15.579319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.579748] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.580134] 
[   15.580255] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.580300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.580313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.580335] Call Trace:
[   15.580350]  <TASK>
[   15.580364]  dump_stack_lvl+0x73/0xb0
[   15.580420]  print_report+0xd1/0x610
[   15.580454]  ? __virt_addr_valid+0x1db/0x2d0
[   15.580478]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.580500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.580524]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.580558]  kasan_report+0x141/0x180
[   15.580613]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.580642]  kasan_check_range+0x10c/0x1c0
[   15.580667]  __kasan_check_write+0x18/0x20
[   15.580689]  kasan_atomics_helper+0x1ce1/0x5450
[   15.580713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.580736]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.580792]  ? kasan_atomics+0x152/0x310
[   15.580820]  kasan_atomics+0x1dc/0x310
[   15.580843]  ? __pfx_kasan_atomics+0x10/0x10
[   15.580868]  ? __pfx_read_tsc+0x10/0x10
[   15.580889]  ? ktime_get_ts64+0x86/0x230
[   15.580944]  kunit_try_run_case+0x1a5/0x480
[   15.580970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.580993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.581018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.581043]  ? __kthread_parkme+0x82/0x180
[   15.581063]  ? preempt_count_sub+0x50/0x80
[   15.581088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.581112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.581142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.581168]  kthread+0x337/0x6f0
[   15.581187]  ? trace_preempt_on+0x20/0xc0
[   15.581236]  ? __pfx_kthread+0x10/0x10
[   15.581281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.581327]  ? calculate_sigpending+0x7b/0xa0
[   15.581375]  ? __pfx_kthread+0x10/0x10
[   15.581455]  ret_from_fork+0x116/0x1d0
[   15.581499]  ? __pfx_kthread+0x10/0x10
[   15.581538]  ret_from_fork_asm+0x1a/0x30
[   15.581572]  </TASK>
[   15.581582] 
[   15.589712] Allocated by task 283:
[   15.589919]  kasan_save_stack+0x45/0x70
[   15.590090]  kasan_save_track+0x18/0x40
[   15.590279]  kasan_save_alloc_info+0x3b/0x50
[   15.590534]  __kasan_kmalloc+0xb7/0xc0
[   15.590763]  __kmalloc_cache_noprof+0x189/0x420
[   15.591191]  kasan_atomics+0x95/0x310
[   15.591410]  kunit_try_run_case+0x1a5/0x480
[   15.591625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.591870]  kthread+0x337/0x6f0
[   15.592034]  ret_from_fork+0x116/0x1d0
[   15.592216]  ret_from_fork_asm+0x1a/0x30
[   15.592410] 
[   15.592601] The buggy address belongs to the object at ffff8881026f3680
[   15.592601]  which belongs to the cache kmalloc-64 of size 64
[   15.593189] The buggy address is located 0 bytes to the right of
[   15.593189]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.593966] 
[   15.594042] The buggy address belongs to the physical page:
[   15.594218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.594538] flags: 0x200000000000000(node=0|zone=2)
[   15.594787] page_type: f5(slab)
[   15.594993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.595372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.595961] page dumped because: kasan: bad access detected
[   15.596238] 
[   15.596324] Memory state around the buggy address:
[   15.596512]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.596847]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.597182] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.597518]                                      ^
[   15.597772]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.598089]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.598408] ==================================================================
[   14.490146] ==================================================================
[   14.490632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.491276] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.491658] 
[   14.491898] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.491997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.492008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.492029] Call Trace:
[   14.492045]  <TASK>
[   14.492062]  dump_stack_lvl+0x73/0xb0
[   14.492088]  print_report+0xd1/0x610
[   14.492110]  ? __virt_addr_valid+0x1db/0x2d0
[   14.492132]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.492152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.492175]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.492196]  kasan_report+0x141/0x180
[   14.492218]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.492245]  __asan_report_store4_noabort+0x1b/0x30
[   14.492270]  kasan_atomics_helper+0x4ba2/0x5450
[   14.492293]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.492315]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.492340]  ? kasan_atomics+0x152/0x310
[   14.492366]  kasan_atomics+0x1dc/0x310
[   14.492388]  ? __pfx_kasan_atomics+0x10/0x10
[   14.492412]  ? __pfx_read_tsc+0x10/0x10
[   14.492432]  ? ktime_get_ts64+0x86/0x230
[   14.492467]  kunit_try_run_case+0x1a5/0x480
[   14.492492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.492539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.492562]  ? __kthread_parkme+0x82/0x180
[   14.492582]  ? preempt_count_sub+0x50/0x80
[   14.492617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.492667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.492691]  kthread+0x337/0x6f0
[   14.492709]  ? trace_preempt_on+0x20/0xc0
[   14.492743]  ? __pfx_kthread+0x10/0x10
[   14.492774]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.492805]  ? calculate_sigpending+0x7b/0xa0
[   14.492830]  ? __pfx_kthread+0x10/0x10
[   14.492851]  ret_from_fork+0x116/0x1d0
[   14.492869]  ? __pfx_kthread+0x10/0x10
[   14.492888]  ret_from_fork_asm+0x1a/0x30
[   14.492920]  </TASK>
[   14.492930] 
[   14.508969] Allocated by task 283:
[   14.509343]  kasan_save_stack+0x45/0x70
[   14.509858]  kasan_save_track+0x18/0x40
[   14.510069]  kasan_save_alloc_info+0x3b/0x50
[   14.510219]  __kasan_kmalloc+0xb7/0xc0
[   14.510348]  __kmalloc_cache_noprof+0x189/0x420
[   14.510931]  kasan_atomics+0x95/0x310
[   14.511282]  kunit_try_run_case+0x1a5/0x480
[   14.511725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.512347]  kthread+0x337/0x6f0
[   14.512715]  ret_from_fork+0x116/0x1d0
[   14.513104]  ret_from_fork_asm+0x1a/0x30
[   14.513323] 
[   14.513392] The buggy address belongs to the object at ffff8881026f3680
[   14.513392]  which belongs to the cache kmalloc-64 of size 64
[   14.514373] The buggy address is located 0 bytes to the right of
[   14.514373]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.515693] 
[   14.515870] The buggy address belongs to the physical page:
[   14.516146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.516380] flags: 0x200000000000000(node=0|zone=2)
[   14.516949] page_type: f5(slab)
[   14.517263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.518046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.518751] page dumped because: kasan: bad access detected
[   14.518921] 
[   14.518988] Memory state around the buggy address:
[   14.519138]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519344]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519917] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.520800]                                      ^
[   14.521215]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521955]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.522779] ==================================================================
[   15.094886] ==================================================================
[   15.095807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.096121] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.096359] 
[   15.096480] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.096523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.096536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.096558] Call Trace:
[   15.096573]  <TASK>
[   15.096590]  dump_stack_lvl+0x73/0xb0
[   15.096618]  print_report+0xd1/0x610
[   15.096641]  ? __virt_addr_valid+0x1db/0x2d0
[   15.096664]  ? kasan_atomics_helper+0x1148/0x5450
[   15.096685]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.096708]  ? kasan_atomics_helper+0x1148/0x5450
[   15.096730]  kasan_report+0x141/0x180
[   15.096753]  ? kasan_atomics_helper+0x1148/0x5450
[   15.096781]  kasan_check_range+0x10c/0x1c0
[   15.096806]  __kasan_check_write+0x18/0x20
[   15.096825]  kasan_atomics_helper+0x1148/0x5450
[   15.096849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.096872]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.096897]  ? kasan_atomics+0x152/0x310
[   15.096925]  kasan_atomics+0x1dc/0x310
[   15.096948]  ? __pfx_kasan_atomics+0x10/0x10
[   15.096973]  ? __pfx_read_tsc+0x10/0x10
[   15.096994]  ? ktime_get_ts64+0x86/0x230
[   15.097020]  kunit_try_run_case+0x1a5/0x480
[   15.097044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.097092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.097116]  ? __kthread_parkme+0x82/0x180
[   15.097143]  ? preempt_count_sub+0x50/0x80
[   15.097167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.097241]  kthread+0x337/0x6f0
[   15.097260]  ? trace_preempt_on+0x20/0xc0
[   15.097283]  ? __pfx_kthread+0x10/0x10
[   15.097305]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.097326]  ? calculate_sigpending+0x7b/0xa0
[   15.097351]  ? __pfx_kthread+0x10/0x10
[   15.097373]  ret_from_fork+0x116/0x1d0
[   15.097392]  ? __pfx_kthread+0x10/0x10
[   15.097412]  ret_from_fork_asm+0x1a/0x30
[   15.097455]  </TASK>
[   15.097465] 
[   15.111303] Allocated by task 283:
[   15.111451]  kasan_save_stack+0x45/0x70
[   15.111620]  kasan_save_track+0x18/0x40
[   15.111760]  kasan_save_alloc_info+0x3b/0x50
[   15.111911]  __kasan_kmalloc+0xb7/0xc0
[   15.112045]  __kmalloc_cache_noprof+0x189/0x420
[   15.112205]  kasan_atomics+0x95/0x310
[   15.112340]  kunit_try_run_case+0x1a5/0x480
[   15.112499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.112967]  kthread+0x337/0x6f0
[   15.113268]  ret_from_fork+0x116/0x1d0
[   15.113607]  ret_from_fork_asm+0x1a/0x30
[   15.113970] 
[   15.114130] The buggy address belongs to the object at ffff8881026f3680
[   15.114130]  which belongs to the cache kmalloc-64 of size 64
[   15.115191] The buggy address is located 0 bytes to the right of
[   15.115191]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.116384] 
[   15.116567] The buggy address belongs to the physical page:
[   15.117030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.117822] flags: 0x200000000000000(node=0|zone=2)
[   15.118267] page_type: f5(slab)
[   15.118433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.118803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.119445] page dumped because: kasan: bad access detected
[   15.119953] 
[   15.120107] Memory state around the buggy address:
[   15.120530]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.120845]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.121065] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.121292]                                      ^
[   15.121457]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121767]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122031] ==================================================================
[   14.713174] ==================================================================
[   14.713412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.713683] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.714016] 
[   14.714123] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.714163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.714175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.714197] Call Trace:
[   14.714211]  <TASK>
[   14.714226]  dump_stack_lvl+0x73/0xb0
[   14.714251]  print_report+0xd1/0x610
[   14.714273]  ? __virt_addr_valid+0x1db/0x2d0
[   14.714296]  ? kasan_atomics_helper+0x72f/0x5450
[   14.714318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.714340]  ? kasan_atomics_helper+0x72f/0x5450
[   14.714362]  kasan_report+0x141/0x180
[   14.714384]  ? kasan_atomics_helper+0x72f/0x5450
[   14.714412]  kasan_check_range+0x10c/0x1c0
[   14.714446]  __kasan_check_write+0x18/0x20
[   14.714465]  kasan_atomics_helper+0x72f/0x5450
[   14.714488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.714511]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.714536]  ? kasan_atomics+0x152/0x310
[   14.714562]  kasan_atomics+0x1dc/0x310
[   14.714584]  ? __pfx_kasan_atomics+0x10/0x10
[   14.714608]  ? __pfx_read_tsc+0x10/0x10
[   14.714628]  ? ktime_get_ts64+0x86/0x230
[   14.714651]  kunit_try_run_case+0x1a5/0x480
[   14.714675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.714697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.714720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.714743]  ? __kthread_parkme+0x82/0x180
[   14.714762]  ? preempt_count_sub+0x50/0x80
[   14.714786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.714810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.714833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.714856]  kthread+0x337/0x6f0
[   14.714876]  ? trace_preempt_on+0x20/0xc0
[   14.714898]  ? __pfx_kthread+0x10/0x10
[   14.714919]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.714940]  ? calculate_sigpending+0x7b/0xa0
[   14.714963]  ? __pfx_kthread+0x10/0x10
[   14.714985]  ret_from_fork+0x116/0x1d0
[   14.715003]  ? __pfx_kthread+0x10/0x10
[   14.715023]  ret_from_fork_asm+0x1a/0x30
[   14.715073]  </TASK>
[   14.715082] 
[   14.723546] Allocated by task 283:
[   14.723716]  kasan_save_stack+0x45/0x70
[   14.723892]  kasan_save_track+0x18/0x40
[   14.724061]  kasan_save_alloc_info+0x3b/0x50
[   14.724215]  __kasan_kmalloc+0xb7/0xc0
[   14.724348]  __kmalloc_cache_noprof+0x189/0x420
[   14.724514]  kasan_atomics+0x95/0x310
[   14.724648]  kunit_try_run_case+0x1a5/0x480
[   14.724796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.725010]  kthread+0x337/0x6f0
[   14.725183]  ret_from_fork+0x116/0x1d0
[   14.725367]  ret_from_fork_asm+0x1a/0x30
[   14.725582] 
[   14.725681] The buggy address belongs to the object at ffff8881026f3680
[   14.725681]  which belongs to the cache kmalloc-64 of size 64
[   14.726460] The buggy address is located 0 bytes to the right of
[   14.726460]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.726981] 
[   14.727076] The buggy address belongs to the physical page:
[   14.727280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.727688] flags: 0x200000000000000(node=0|zone=2)
[   14.727901] page_type: f5(slab)
[   14.728055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.728288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.728524] page dumped because: kasan: bad access detected
[   14.728695] 
[   14.728765] Memory state around the buggy address:
[   14.728920]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.729141]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.729360] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.729657]                                      ^
[   14.730001]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730315]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730636] ==================================================================
[   14.836311] ==================================================================
[   14.836757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.837192] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.837503] 
[   14.837703] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.837765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.837778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.837800] Call Trace:
[   14.837816]  <TASK>
[   14.837832]  dump_stack_lvl+0x73/0xb0
[   14.837860]  print_report+0xd1/0x610
[   14.837883]  ? __virt_addr_valid+0x1db/0x2d0
[   14.837907]  ? kasan_atomics_helper+0xac7/0x5450
[   14.837961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.837986]  ? kasan_atomics_helper+0xac7/0x5450
[   14.838009]  kasan_report+0x141/0x180
[   14.838047]  ? kasan_atomics_helper+0xac7/0x5450
[   14.838075]  kasan_check_range+0x10c/0x1c0
[   14.838126]  __kasan_check_write+0x18/0x20
[   14.838146]  kasan_atomics_helper+0xac7/0x5450
[   14.838170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.838205]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.838231]  ? kasan_atomics+0x152/0x310
[   14.838284]  kasan_atomics+0x1dc/0x310
[   14.838308]  ? __pfx_kasan_atomics+0x10/0x10
[   14.838332]  ? __pfx_read_tsc+0x10/0x10
[   14.838365]  ? ktime_get_ts64+0x86/0x230
[   14.838426]  kunit_try_run_case+0x1a5/0x480
[   14.838463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.838486]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.838538]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.838581]  ? __kthread_parkme+0x82/0x180
[   14.838611]  ? preempt_count_sub+0x50/0x80
[   14.838635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.838670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.838696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.838721]  kthread+0x337/0x6f0
[   14.838757]  ? trace_preempt_on+0x20/0xc0
[   14.838790]  ? __pfx_kthread+0x10/0x10
[   14.838811]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.838834]  ? calculate_sigpending+0x7b/0xa0
[   14.838869]  ? __pfx_kthread+0x10/0x10
[   14.838891]  ret_from_fork+0x116/0x1d0
[   14.838936]  ? __pfx_kthread+0x10/0x10
[   14.838958]  ret_from_fork_asm+0x1a/0x30
[   14.839001]  </TASK>
[   14.839011] 
[   14.847432] Allocated by task 283:
[   14.847673]  kasan_save_stack+0x45/0x70
[   14.847912]  kasan_save_track+0x18/0x40
[   14.848123]  kasan_save_alloc_info+0x3b/0x50
[   14.848340]  __kasan_kmalloc+0xb7/0xc0
[   14.848562]  __kmalloc_cache_noprof+0x189/0x420
[   14.848787]  kasan_atomics+0x95/0x310
[   14.848972]  kunit_try_run_case+0x1a5/0x480
[   14.849173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.849428]  kthread+0x337/0x6f0
[   14.849661]  ret_from_fork+0x116/0x1d0
[   14.849844]  ret_from_fork_asm+0x1a/0x30
[   14.850078] 
[   14.850192] The buggy address belongs to the object at ffff8881026f3680
[   14.850192]  which belongs to the cache kmalloc-64 of size 64
[   14.850793] The buggy address is located 0 bytes to the right of
[   14.850793]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.851391] 
[   14.851509] The buggy address belongs to the physical page:
[   14.851807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.852192] flags: 0x200000000000000(node=0|zone=2)
[   14.852429] page_type: f5(slab)
[   14.852674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.853105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.853470] page dumped because: kasan: bad access detected
[   14.853753] 
[   14.853846] Memory state around the buggy address:
[   14.854067]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.854386]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.854738] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.854956]                                      ^
[   14.855113]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855477]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855826] ==================================================================
[   15.535656] ==================================================================
[   15.535978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.536371] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.536838] 
[   15.536970] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.537015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.537028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.537050] Call Trace:
[   15.537066]  <TASK>
[   15.537085]  dump_stack_lvl+0x73/0xb0
[   15.537113]  print_report+0xd1/0x610
[   15.537206]  ? __virt_addr_valid+0x1db/0x2d0
[   15.537244]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.537266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.537291]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.537314]  kasan_report+0x141/0x180
[   15.537337]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.537366]  kasan_check_range+0x10c/0x1c0
[   15.537390]  __kasan_check_write+0x18/0x20
[   15.537410]  kasan_atomics_helper+0x1c18/0x5450
[   15.537443]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.537467]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.537493]  ? kasan_atomics+0x152/0x310
[   15.537520]  kasan_atomics+0x1dc/0x310
[   15.537562]  ? __pfx_kasan_atomics+0x10/0x10
[   15.537588]  ? __pfx_read_tsc+0x10/0x10
[   15.537609]  ? ktime_get_ts64+0x86/0x230
[   15.537635]  kunit_try_run_case+0x1a5/0x480
[   15.537660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.537682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.537707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.537732]  ? __kthread_parkme+0x82/0x180
[   15.537753]  ? preempt_count_sub+0x50/0x80
[   15.537777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.537802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.537827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.537852]  kthread+0x337/0x6f0
[   15.537871]  ? trace_preempt_on+0x20/0xc0
[   15.537894]  ? __pfx_kthread+0x10/0x10
[   15.537915]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.537937]  ? calculate_sigpending+0x7b/0xa0
[   15.537962]  ? __pfx_kthread+0x10/0x10
[   15.537984]  ret_from_fork+0x116/0x1d0
[   15.538002]  ? __pfx_kthread+0x10/0x10
[   15.538023]  ret_from_fork_asm+0x1a/0x30
[   15.538056]  </TASK>
[   15.538067] 
[   15.548317] Allocated by task 283:
[   15.548792]  kasan_save_stack+0x45/0x70
[   15.549071]  kasan_save_track+0x18/0x40
[   15.549350]  kasan_save_alloc_info+0x3b/0x50
[   15.549733]  __kasan_kmalloc+0xb7/0xc0
[   15.549960]  __kmalloc_cache_noprof+0x189/0x420
[   15.550283]  kasan_atomics+0x95/0x310
[   15.550491]  kunit_try_run_case+0x1a5/0x480
[   15.550918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.551267]  kthread+0x337/0x6f0
[   15.551553]  ret_from_fork+0x116/0x1d0
[   15.551715]  ret_from_fork_asm+0x1a/0x30
[   15.552056] 
[   15.552179] The buggy address belongs to the object at ffff8881026f3680
[   15.552179]  which belongs to the cache kmalloc-64 of size 64
[   15.552856] The buggy address is located 0 bytes to the right of
[   15.552856]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.553576] 
[   15.553685] The buggy address belongs to the physical page:
[   15.554002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.554354] flags: 0x200000000000000(node=0|zone=2)
[   15.554831] page_type: f5(slab)
[   15.554995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.555355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.555835] page dumped because: kasan: bad access detected
[   15.556117] 
[   15.556221] Memory state around the buggy address:
[   15.556462]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.557064]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.557378] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.557850]                                      ^
[   15.558156]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558597]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558982] ==================================================================
[   14.988775] ==================================================================
[   14.989187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.989565] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.989934] 
[   14.990017] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.990057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.990069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.990089] Call Trace:
[   14.990100]  <TASK>
[   14.990114]  dump_stack_lvl+0x73/0xb0
[   14.990141]  print_report+0xd1/0x610
[   14.990163]  ? __virt_addr_valid+0x1db/0x2d0
[   14.990186]  ? kasan_atomics_helper+0xf10/0x5450
[   14.990207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.990231]  ? kasan_atomics_helper+0xf10/0x5450
[   14.990254]  kasan_report+0x141/0x180
[   14.990277]  ? kasan_atomics_helper+0xf10/0x5450
[   14.990304]  kasan_check_range+0x10c/0x1c0
[   14.990329]  __kasan_check_write+0x18/0x20
[   14.990349]  kasan_atomics_helper+0xf10/0x5450
[   14.990372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.990397]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.990424]  ? kasan_atomics+0x152/0x310
[   14.990464]  kasan_atomics+0x1dc/0x310
[   14.990488]  ? __pfx_kasan_atomics+0x10/0x10
[   14.990513]  ? __pfx_read_tsc+0x10/0x10
[   14.990533]  ? ktime_get_ts64+0x86/0x230
[   14.990558]  kunit_try_run_case+0x1a5/0x480
[   14.990584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.990607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.990632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.990658]  ? __kthread_parkme+0x82/0x180
[   14.990678]  ? preempt_count_sub+0x50/0x80
[   14.990703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.990728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.990753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.990779]  kthread+0x337/0x6f0
[   14.990798]  ? trace_preempt_on+0x20/0xc0
[   14.990821]  ? __pfx_kthread+0x10/0x10
[   14.990843]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.990865]  ? calculate_sigpending+0x7b/0xa0
[   14.990890]  ? __pfx_kthread+0x10/0x10
[   14.990912]  ret_from_fork+0x116/0x1d0
[   14.990931]  ? __pfx_kthread+0x10/0x10
[   14.990952]  ret_from_fork_asm+0x1a/0x30
[   14.990985]  </TASK>
[   14.990995] 
[   14.998616] Allocated by task 283:
[   14.998760]  kasan_save_stack+0x45/0x70
[   14.998908]  kasan_save_track+0x18/0x40
[   14.999044]  kasan_save_alloc_info+0x3b/0x50
[   14.999193]  __kasan_kmalloc+0xb7/0xc0
[   14.999324]  __kmalloc_cache_noprof+0x189/0x420
[   14.999508]  kasan_atomics+0x95/0x310
[   14.999734]  kunit_try_run_case+0x1a5/0x480
[   14.999940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.000190]  kthread+0x337/0x6f0
[   15.000355]  ret_from_fork+0x116/0x1d0
[   15.000571]  ret_from_fork_asm+0x1a/0x30
[   15.000767] 
[   15.000861] The buggy address belongs to the object at ffff8881026f3680
[   15.000861]  which belongs to the cache kmalloc-64 of size 64
[   15.001332] The buggy address is located 0 bytes to the right of
[   15.001332]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.001728] 
[   15.001826] The buggy address belongs to the physical page:
[   15.002108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.002486] flags: 0x200000000000000(node=0|zone=2)
[   15.002742] page_type: f5(slab)
[   15.002938] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.003279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.003634] page dumped because: kasan: bad access detected
[   15.003873] 
[   15.003959] Memory state around the buggy address:
[   15.004173]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.004462]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.004758] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.004971]                                      ^
[   15.005131]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.005471]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.005815] ==================================================================
[   14.753900] ==================================================================
[   14.754593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.755261] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.755916] 
[   14.756107] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.756153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.756166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.756189] Call Trace:
[   14.756205]  <TASK>
[   14.756222]  dump_stack_lvl+0x73/0xb0
[   14.756250]  print_report+0xd1/0x610
[   14.756273]  ? __virt_addr_valid+0x1db/0x2d0
[   14.756313]  ? kasan_atomics_helper+0x860/0x5450
[   14.756335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.756359]  ? kasan_atomics_helper+0x860/0x5450
[   14.756382]  kasan_report+0x141/0x180
[   14.756405]  ? kasan_atomics_helper+0x860/0x5450
[   14.756432]  kasan_check_range+0x10c/0x1c0
[   14.756467]  __kasan_check_write+0x18/0x20
[   14.756487]  kasan_atomics_helper+0x860/0x5450
[   14.756511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.756553]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.756578]  ? kasan_atomics+0x152/0x310
[   14.756606]  kasan_atomics+0x1dc/0x310
[   14.756629]  ? __pfx_kasan_atomics+0x10/0x10
[   14.756654]  ? __pfx_read_tsc+0x10/0x10
[   14.756676]  ? ktime_get_ts64+0x86/0x230
[   14.756701]  kunit_try_run_case+0x1a5/0x480
[   14.756726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.756751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.756776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.756800]  ? __kthread_parkme+0x82/0x180
[   14.756820]  ? preempt_count_sub+0x50/0x80
[   14.756845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.756870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.756894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.756919]  kthread+0x337/0x6f0
[   14.756938]  ? trace_preempt_on+0x20/0xc0
[   14.756961]  ? __pfx_kthread+0x10/0x10
[   14.756982]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.757004]  ? calculate_sigpending+0x7b/0xa0
[   14.757029]  ? __pfx_kthread+0x10/0x10
[   14.757051]  ret_from_fork+0x116/0x1d0
[   14.757070]  ? __pfx_kthread+0x10/0x10
[   14.757091]  ret_from_fork_asm+0x1a/0x30
[   14.757124]  </TASK>
[   14.757138] 
[   14.767636] Allocated by task 283:
[   14.767811]  kasan_save_stack+0x45/0x70
[   14.767974]  kasan_save_track+0x18/0x40
[   14.768164]  kasan_save_alloc_info+0x3b/0x50
[   14.768373]  __kasan_kmalloc+0xb7/0xc0
[   14.768618]  __kmalloc_cache_noprof+0x189/0x420
[   14.768816]  kasan_atomics+0x95/0x310
[   14.768951]  kunit_try_run_case+0x1a5/0x480
[   14.769137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.769391]  kthread+0x337/0x6f0
[   14.769622]  ret_from_fork+0x116/0x1d0
[   14.769829]  ret_from_fork_asm+0x1a/0x30
[   14.770027] 
[   14.770121] The buggy address belongs to the object at ffff8881026f3680
[   14.770121]  which belongs to the cache kmalloc-64 of size 64
[   14.770661] The buggy address is located 0 bytes to the right of
[   14.770661]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.771171] 
[   14.771262] The buggy address belongs to the physical page:
[   14.771544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.771875] flags: 0x200000000000000(node=0|zone=2)
[   14.772092] page_type: f5(slab)
[   14.772301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.773712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.774256] page dumped because: kasan: bad access detected
[   14.774450] 
[   14.774524] Memory state around the buggy address:
[   14.774797]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.775351]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.775800] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.776021]                                      ^
[   14.776180]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.776400]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.776633] ==================================================================
[   14.966601] ==================================================================
[   14.967249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.967954] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.968409] 
[   14.968506] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.968572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.968585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.968606] Call Trace:
[   14.968621]  <TASK>
[   14.968647]  dump_stack_lvl+0x73/0xb0
[   14.968676]  print_report+0xd1/0x610
[   14.968699]  ? __virt_addr_valid+0x1db/0x2d0
[   14.968742]  ? kasan_atomics_helper+0xe78/0x5450
[   14.968764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.968788]  ? kasan_atomics_helper+0xe78/0x5450
[   14.968822]  kasan_report+0x141/0x180
[   14.968845]  ? kasan_atomics_helper+0xe78/0x5450
[   14.968873]  kasan_check_range+0x10c/0x1c0
[   14.968898]  __kasan_check_write+0x18/0x20
[   14.968918]  kasan_atomics_helper+0xe78/0x5450
[   14.968942]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.968965]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.968991]  ? kasan_atomics+0x152/0x310
[   14.969018]  kasan_atomics+0x1dc/0x310
[   14.969041]  ? __pfx_kasan_atomics+0x10/0x10
[   14.969066]  ? __pfx_read_tsc+0x10/0x10
[   14.969088]  ? ktime_get_ts64+0x86/0x230
[   14.969113]  kunit_try_run_case+0x1a5/0x480
[   14.969140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.969164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.969188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.969213]  ? __kthread_parkme+0x82/0x180
[   14.969233]  ? preempt_count_sub+0x50/0x80
[   14.969259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.969284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.969309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.969334]  kthread+0x337/0x6f0
[   14.969354]  ? trace_preempt_on+0x20/0xc0
[   14.969377]  ? __pfx_kthread+0x10/0x10
[   14.969398]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.969421]  ? calculate_sigpending+0x7b/0xa0
[   14.969455]  ? __pfx_kthread+0x10/0x10
[   14.969478]  ret_from_fork+0x116/0x1d0
[   14.969497]  ? __pfx_kthread+0x10/0x10
[   14.969536]  ret_from_fork_asm+0x1a/0x30
[   14.969570]  </TASK>
[   14.969580] 
[   14.980639] Allocated by task 283:
[   14.980826]  kasan_save_stack+0x45/0x70
[   14.980972]  kasan_save_track+0x18/0x40
[   14.981109]  kasan_save_alloc_info+0x3b/0x50
[   14.981310]  __kasan_kmalloc+0xb7/0xc0
[   14.981542]  __kmalloc_cache_noprof+0x189/0x420
[   14.981764]  kasan_atomics+0x95/0x310
[   14.981948]  kunit_try_run_case+0x1a5/0x480
[   14.982108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.982338]  kthread+0x337/0x6f0
[   14.982539]  ret_from_fork+0x116/0x1d0
[   14.982742]  ret_from_fork_asm+0x1a/0x30
[   14.982945] 
[   14.983026] The buggy address belongs to the object at ffff8881026f3680
[   14.983026]  which belongs to the cache kmalloc-64 of size 64
[   14.983583] The buggy address is located 0 bytes to the right of
[   14.983583]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.984087] 
[   14.984195] The buggy address belongs to the physical page:
[   14.984432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.984765] flags: 0x200000000000000(node=0|zone=2)
[   14.984928] page_type: f5(slab)
[   14.985047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.985376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.985739] page dumped because: kasan: bad access detected
[   14.985996] 
[   14.986089] Memory state around the buggy address:
[   14.986314]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986655]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986919] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.987135]                                      ^
[   14.987364]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987737]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988050] ==================================================================
[   14.817157] ==================================================================
[   14.817625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.817954] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.818295] 
[   14.818432] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.818513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.818558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.818588] Call Trace:
[   14.818601]  <TASK>
[   14.818615]  dump_stack_lvl+0x73/0xb0
[   14.818655]  print_report+0xd1/0x610
[   14.818676]  ? __virt_addr_valid+0x1db/0x2d0
[   14.818700]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.818722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.818746]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.818768]  kasan_report+0x141/0x180
[   14.818791]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.818819]  kasan_check_range+0x10c/0x1c0
[   14.818844]  __kasan_check_write+0x18/0x20
[   14.818863]  kasan_atomics_helper+0xa2b/0x5450
[   14.818887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.818910]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.818935]  ? kasan_atomics+0x152/0x310
[   14.818964]  kasan_atomics+0x1dc/0x310
[   14.818986]  ? __pfx_kasan_atomics+0x10/0x10
[   14.819011]  ? __pfx_read_tsc+0x10/0x10
[   14.819032]  ? ktime_get_ts64+0x86/0x230
[   14.819059]  kunit_try_run_case+0x1a5/0x480
[   14.819084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819107]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.819132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.819157]  ? __kthread_parkme+0x82/0x180
[   14.819178]  ? preempt_count_sub+0x50/0x80
[   14.819203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.819253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.819279]  kthread+0x337/0x6f0
[   14.819298]  ? trace_preempt_on+0x20/0xc0
[   14.819322]  ? __pfx_kthread+0x10/0x10
[   14.819343]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.819366]  ? calculate_sigpending+0x7b/0xa0
[   14.819390]  ? __pfx_kthread+0x10/0x10
[   14.819414]  ret_from_fork+0x116/0x1d0
[   14.819470]  ? __pfx_kthread+0x10/0x10
[   14.819491]  ret_from_fork_asm+0x1a/0x30
[   14.819549]  </TASK>
[   14.819559] 
[   14.827848] Allocated by task 283:
[   14.828015]  kasan_save_stack+0x45/0x70
[   14.828254]  kasan_save_track+0x18/0x40
[   14.828504]  kasan_save_alloc_info+0x3b/0x50
[   14.828761]  __kasan_kmalloc+0xb7/0xc0
[   14.828973]  __kmalloc_cache_noprof+0x189/0x420
[   14.829195]  kasan_atomics+0x95/0x310
[   14.829346]  kunit_try_run_case+0x1a5/0x480
[   14.829504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829820]  kthread+0x337/0x6f0
[   14.830046]  ret_from_fork+0x116/0x1d0
[   14.830247]  ret_from_fork_asm+0x1a/0x30
[   14.830464] 
[   14.830591] The buggy address belongs to the object at ffff8881026f3680
[   14.830591]  which belongs to the cache kmalloc-64 of size 64
[   14.831138] The buggy address is located 0 bytes to the right of
[   14.831138]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.831716] 
[   14.831793] The buggy address belongs to the physical page:
[   14.831968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.832237] flags: 0x200000000000000(node=0|zone=2)
[   14.832481] page_type: f5(slab)
[   14.832713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.833134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.833504] page dumped because: kasan: bad access detected
[   14.833750] 
[   14.833820] Memory state around the buggy address:
[   14.833971]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.834265]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.834594] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.834901]                                      ^
[   14.835119]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.835489]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.835821] ==================================================================
[   15.471369] ==================================================================
[   15.471996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.472326] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.472727] 
[   15.472812] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.472856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.472868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.472891] Call Trace:
[   15.472906]  <TASK>
[   15.472921]  dump_stack_lvl+0x73/0xb0
[   15.472947]  print_report+0xd1/0x610
[   15.472969]  ? __virt_addr_valid+0x1db/0x2d0
[   15.472992]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.473015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.473040]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.473063]  kasan_report+0x141/0x180
[   15.473086]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.473114]  kasan_check_range+0x10c/0x1c0
[   15.473145]  __kasan_check_write+0x18/0x20
[   15.473174]  kasan_atomics_helper+0x19e3/0x5450
[   15.473198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.473221]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.473246]  ? kasan_atomics+0x152/0x310
[   15.473275]  kasan_atomics+0x1dc/0x310
[   15.473298]  ? __pfx_kasan_atomics+0x10/0x10
[   15.473323]  ? __pfx_read_tsc+0x10/0x10
[   15.473343]  ? ktime_get_ts64+0x86/0x230
[   15.473380]  kunit_try_run_case+0x1a5/0x480
[   15.473405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473429]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.473462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.473488]  ? __kthread_parkme+0x82/0x180
[   15.473508]  ? preempt_count_sub+0x50/0x80
[   15.473532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.473582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.473607]  kthread+0x337/0x6f0
[   15.473652]  ? trace_preempt_on+0x20/0xc0
[   15.473677]  ? __pfx_kthread+0x10/0x10
[   15.473698]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.473720]  ? calculate_sigpending+0x7b/0xa0
[   15.473745]  ? __pfx_kthread+0x10/0x10
[   15.473767]  ret_from_fork+0x116/0x1d0
[   15.473785]  ? __pfx_kthread+0x10/0x10
[   15.473806]  ret_from_fork_asm+0x1a/0x30
[   15.473855]  </TASK>
[   15.473865] 
[   15.481513] Allocated by task 283:
[   15.481682]  kasan_save_stack+0x45/0x70
[   15.481897]  kasan_save_track+0x18/0x40
[   15.482089]  kasan_save_alloc_info+0x3b/0x50
[   15.482319]  __kasan_kmalloc+0xb7/0xc0
[   15.482528]  __kmalloc_cache_noprof+0x189/0x420
[   15.482755]  kasan_atomics+0x95/0x310
[   15.482937]  kunit_try_run_case+0x1a5/0x480
[   15.483136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.483386]  kthread+0x337/0x6f0
[   15.483564]  ret_from_fork+0x116/0x1d0
[   15.483720]  ret_from_fork_asm+0x1a/0x30
[   15.483856] 
[   15.483925] The buggy address belongs to the object at ffff8881026f3680
[   15.483925]  which belongs to the cache kmalloc-64 of size 64
[   15.484679] The buggy address is located 0 bytes to the right of
[   15.484679]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.485221] 
[   15.485317] The buggy address belongs to the physical page:
[   15.485585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.485898] flags: 0x200000000000000(node=0|zone=2)
[   15.486149] page_type: f5(slab)
[   15.486300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.486664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.486932] page dumped because: kasan: bad access detected
[   15.487183] 
[   15.487293] Memory state around the buggy address:
[   15.487533]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.487846]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.488174] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.488490]                                      ^
[   15.488706]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.489306]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.489525] ==================================================================
[   14.641257] ==================================================================
[   14.641763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.642486] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.642814] 
[   14.642902] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.642945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.642958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.642981] Call Trace:
[   14.642995]  <TASK>
[   14.643011]  dump_stack_lvl+0x73/0xb0
[   14.643051]  print_report+0xd1/0x610
[   14.643074]  ? __virt_addr_valid+0x1db/0x2d0
[   14.643097]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.643119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.643143]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.643166]  kasan_report+0x141/0x180
[   14.643189]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.643217]  __asan_report_store4_noabort+0x1b/0x30
[   14.643243]  kasan_atomics_helper+0x4b3a/0x5450
[   14.643268]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.643291]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.643316]  ? kasan_atomics+0x152/0x310
[   14.643343]  kasan_atomics+0x1dc/0x310
[   14.643366]  ? __pfx_kasan_atomics+0x10/0x10
[   14.643392]  ? __pfx_read_tsc+0x10/0x10
[   14.643414]  ? ktime_get_ts64+0x86/0x230
[   14.643450]  kunit_try_run_case+0x1a5/0x480
[   14.643475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.643498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.643522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.643557]  ? __kthread_parkme+0x82/0x180
[   14.643577]  ? preempt_count_sub+0x50/0x80
[   14.643602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.643626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.643651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.643676]  kthread+0x337/0x6f0
[   14.643695]  ? trace_preempt_on+0x20/0xc0
[   14.643718]  ? __pfx_kthread+0x10/0x10
[   14.643739]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.643761]  ? calculate_sigpending+0x7b/0xa0
[   14.643786]  ? __pfx_kthread+0x10/0x10
[   14.643808]  ret_from_fork+0x116/0x1d0
[   14.643826]  ? __pfx_kthread+0x10/0x10
[   14.643847]  ret_from_fork_asm+0x1a/0x30
[   14.643880]  </TASK>
[   14.643890] 
[   14.651169] Allocated by task 283:
[   14.651297]  kasan_save_stack+0x45/0x70
[   14.651472]  kasan_save_track+0x18/0x40
[   14.651819]  kasan_save_alloc_info+0x3b/0x50
[   14.652032]  __kasan_kmalloc+0xb7/0xc0
[   14.652215]  __kmalloc_cache_noprof+0x189/0x420
[   14.652373]  kasan_atomics+0x95/0x310
[   14.652519]  kunit_try_run_case+0x1a5/0x480
[   14.652735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.652991]  kthread+0x337/0x6f0
[   14.653165]  ret_from_fork+0x116/0x1d0
[   14.653332]  ret_from_fork_asm+0x1a/0x30
[   14.653538] 
[   14.653634] The buggy address belongs to the object at ffff8881026f3680
[   14.653634]  which belongs to the cache kmalloc-64 of size 64
[   14.654084] The buggy address is located 0 bytes to the right of
[   14.654084]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.654620] 
[   14.654712] The buggy address belongs to the physical page:
[   14.654950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.655262] flags: 0x200000000000000(node=0|zone=2)
[   14.655485] page_type: f5(slab)
[   14.655651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.655886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.656115] page dumped because: kasan: bad access detected
[   14.656287] 
[   14.656357] Memory state around the buggy address:
[   14.656638]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.656962]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.657283] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.657681]                                      ^
[   14.657849]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.658069]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.658285] ==================================================================
[   14.457097] ==================================================================
[   14.458555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.458815] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.459040] 
[   14.459130] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.459176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.459187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.459209] Call Trace:
[   14.459223]  <TASK>
[   14.459240]  dump_stack_lvl+0x73/0xb0
[   14.459268]  print_report+0xd1/0x610
[   14.459290]  ? __virt_addr_valid+0x1db/0x2d0
[   14.459313]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.459333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.459356]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.459378]  kasan_report+0x141/0x180
[   14.459400]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.459427]  __asan_report_load4_noabort+0x18/0x20
[   14.459489]  kasan_atomics_helper+0x4bbc/0x5450
[   14.459512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.459551]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.459577]  ? kasan_atomics+0x152/0x310
[   14.459603]  kasan_atomics+0x1dc/0x310
[   14.459625]  ? __pfx_kasan_atomics+0x10/0x10
[   14.459649]  ? __pfx_read_tsc+0x10/0x10
[   14.459670]  ? ktime_get_ts64+0x86/0x230
[   14.459695]  kunit_try_run_case+0x1a5/0x480
[   14.459720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.459742]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.459767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.459792]  ? __kthread_parkme+0x82/0x180
[   14.459836]  ? preempt_count_sub+0x50/0x80
[   14.459861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.459884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.459908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.459932]  kthread+0x337/0x6f0
[   14.459951]  ? trace_preempt_on+0x20/0xc0
[   14.459974]  ? __pfx_kthread+0x10/0x10
[   14.459994]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.460015]  ? calculate_sigpending+0x7b/0xa0
[   14.460039]  ? __pfx_kthread+0x10/0x10
[   14.460060]  ret_from_fork+0x116/0x1d0
[   14.460079]  ? __pfx_kthread+0x10/0x10
[   14.460099]  ret_from_fork_asm+0x1a/0x30
[   14.460133]  </TASK>
[   14.460144] 
[   14.474894] Allocated by task 283:
[   14.475132]  kasan_save_stack+0x45/0x70
[   14.475537]  kasan_save_track+0x18/0x40
[   14.475997]  kasan_save_alloc_info+0x3b/0x50
[   14.476397]  __kasan_kmalloc+0xb7/0xc0
[   14.476904]  __kmalloc_cache_noprof+0x189/0x420
[   14.477073]  kasan_atomics+0x95/0x310
[   14.477214]  kunit_try_run_case+0x1a5/0x480
[   14.477360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.477947]  kthread+0x337/0x6f0
[   14.478349]  ret_from_fork+0x116/0x1d0
[   14.478755]  ret_from_fork_asm+0x1a/0x30
[   14.479227] 
[   14.479424] The buggy address belongs to the object at ffff8881026f3680
[   14.479424]  which belongs to the cache kmalloc-64 of size 64
[   14.480667] The buggy address is located 0 bytes to the right of
[   14.480667]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.481377] 
[   14.481748] The buggy address belongs to the physical page:
[   14.482242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.483056] flags: 0x200000000000000(node=0|zone=2)
[   14.483232] page_type: f5(slab)
[   14.483357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.484005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.484779] page dumped because: kasan: bad access detected
[   14.485261] 
[   14.485457] Memory state around the buggy address:
[   14.485947]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.486735]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.487186] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.487616]                                      ^
[   14.488039]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.488792]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.489449] ==================================================================
[   15.637481] ==================================================================
[   15.638192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.638448] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.638962] 
[   15.639059] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.639102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.639114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.639136] Call Trace:
[   15.639148]  <TASK>
[   15.639164]  dump_stack_lvl+0x73/0xb0
[   15.639190]  print_report+0xd1/0x610
[   15.639213]  ? __virt_addr_valid+0x1db/0x2d0
[   15.639236]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.639257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.639281]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.639304]  kasan_report+0x141/0x180
[   15.639327]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.639355]  kasan_check_range+0x10c/0x1c0
[   15.639380]  __kasan_check_write+0x18/0x20
[   15.639399]  kasan_atomics_helper+0x1eaa/0x5450
[   15.639424]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.639457]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.639483]  ? kasan_atomics+0x152/0x310
[   15.639511]  kasan_atomics+0x1dc/0x310
[   15.639534]  ? __pfx_kasan_atomics+0x10/0x10
[   15.639559]  ? __pfx_read_tsc+0x10/0x10
[   15.639580]  ? ktime_get_ts64+0x86/0x230
[   15.639606]  kunit_try_run_case+0x1a5/0x480
[   15.639631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.639654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.639679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.639704]  ? __kthread_parkme+0x82/0x180
[   15.639771]  ? preempt_count_sub+0x50/0x80
[   15.639822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.639847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.639901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.639926]  kthread+0x337/0x6f0
[   15.639945]  ? trace_preempt_on+0x20/0xc0
[   15.639970]  ? __pfx_kthread+0x10/0x10
[   15.639991]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.640041]  ? calculate_sigpending+0x7b/0xa0
[   15.640067]  ? __pfx_kthread+0x10/0x10
[   15.640089]  ret_from_fork+0x116/0x1d0
[   15.640108]  ? __pfx_kthread+0x10/0x10
[   15.640129]  ret_from_fork_asm+0x1a/0x30
[   15.640189]  </TASK>
[   15.640200] 
[   15.648229] Allocated by task 283:
[   15.648397]  kasan_save_stack+0x45/0x70
[   15.648691]  kasan_save_track+0x18/0x40
[   15.648907]  kasan_save_alloc_info+0x3b/0x50
[   15.649117]  __kasan_kmalloc+0xb7/0xc0
[   15.649317]  __kmalloc_cache_noprof+0x189/0x420
[   15.649723]  kasan_atomics+0x95/0x310
[   15.650124]  kunit_try_run_case+0x1a5/0x480
[   15.650327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.650603]  kthread+0x337/0x6f0
[   15.650724]  ret_from_fork+0x116/0x1d0
[   15.650946]  ret_from_fork_asm+0x1a/0x30
[   15.651118] 
[   15.651198] The buggy address belongs to the object at ffff8881026f3680
[   15.651198]  which belongs to the cache kmalloc-64 of size 64
[   15.651740] The buggy address is located 0 bytes to the right of
[   15.651740]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.652300] 
[   15.652482] The buggy address belongs to the physical page:
[   15.652902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.653144] flags: 0x200000000000000(node=0|zone=2)
[   15.653398] page_type: f5(slab)
[   15.653576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.653905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.654227] page dumped because: kasan: bad access detected
[   15.654535] 
[   15.654628] Memory state around the buggy address:
[   15.654848]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.655229]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.655449] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.656001]                                      ^
[   15.656223]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656540]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656846] ==================================================================
[   14.676670] ==================================================================
[   14.677027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.677365] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.678122] 
[   14.678228] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.678280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.678292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.678312] Call Trace:
[   14.678326]  <TASK>
[   14.678341]  dump_stack_lvl+0x73/0xb0
[   14.678493]  print_report+0xd1/0x610
[   14.678515]  ? __virt_addr_valid+0x1db/0x2d0
[   14.678537]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.678559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.678582]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.678605]  kasan_report+0x141/0x180
[   14.678629]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.678657]  kasan_check_range+0x10c/0x1c0
[   14.678681]  __kasan_check_write+0x18/0x20
[   14.678701]  kasan_atomics_helper+0x5fe/0x5450
[   14.678725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.678748]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.678775]  ? kasan_atomics+0x152/0x310
[   14.678802]  kasan_atomics+0x1dc/0x310
[   14.678825]  ? __pfx_kasan_atomics+0x10/0x10
[   14.678850]  ? __pfx_read_tsc+0x10/0x10
[   14.678871]  ? ktime_get_ts64+0x86/0x230
[   14.678897]  kunit_try_run_case+0x1a5/0x480
[   14.678922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.678944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.678969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.678993]  ? __kthread_parkme+0x82/0x180
[   14.679012]  ? preempt_count_sub+0x50/0x80
[   14.679037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.679062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.679086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.679125]  kthread+0x337/0x6f0
[   14.679145]  ? trace_preempt_on+0x20/0xc0
[   14.679168]  ? __pfx_kthread+0x10/0x10
[   14.679188]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.679211]  ? calculate_sigpending+0x7b/0xa0
[   14.679235]  ? __pfx_kthread+0x10/0x10
[   14.679256]  ret_from_fork+0x116/0x1d0
[   14.679277]  ? __pfx_kthread+0x10/0x10
[   14.679297]  ret_from_fork_asm+0x1a/0x30
[   14.679330]  </TASK>
[   14.679340] 
[   14.686899] Allocated by task 283:
[   14.687042]  kasan_save_stack+0x45/0x70
[   14.687186]  kasan_save_track+0x18/0x40
[   14.687380]  kasan_save_alloc_info+0x3b/0x50
[   14.687683]  __kasan_kmalloc+0xb7/0xc0
[   14.687865]  __kmalloc_cache_noprof+0x189/0x420
[   14.688022]  kasan_atomics+0x95/0x310
[   14.688156]  kunit_try_run_case+0x1a5/0x480
[   14.688304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688491]  kthread+0x337/0x6f0
[   14.688616]  ret_from_fork+0x116/0x1d0
[   14.688752]  ret_from_fork_asm+0x1a/0x30
[   14.688893] 
[   14.688964] The buggy address belongs to the object at ffff8881026f3680
[   14.688964]  which belongs to the cache kmalloc-64 of size 64
[   14.689325] The buggy address is located 0 bytes to the right of
[   14.689325]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.689843] 
[   14.689939] The buggy address belongs to the physical page:
[   14.690191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.690570] flags: 0x200000000000000(node=0|zone=2)
[   14.690803] page_type: f5(slab)
[   14.690967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.691302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.691737] page dumped because: kasan: bad access detected
[   14.691956] 
[   14.692055] Memory state around the buggy address:
[   14.692223]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.692453]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.693037] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.693350]                                      ^
[   14.693517]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.693839]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.694122] ==================================================================
[   15.299873] ==================================================================
[   15.300190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.300417] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   15.301337] 
[   15.301452] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.301497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.301510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.301531] Call Trace:
[   15.301547]  <TASK>
[   15.301562]  dump_stack_lvl+0x73/0xb0
[   15.301590]  print_report+0xd1/0x610
[   15.301613]  ? __virt_addr_valid+0x1db/0x2d0
[   15.301635]  ? kasan_atomics_helper+0x151d/0x5450
[   15.301658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.301681]  ? kasan_atomics_helper+0x151d/0x5450
[   15.301705]  kasan_report+0x141/0x180
[   15.301728]  ? kasan_atomics_helper+0x151d/0x5450
[   15.301756]  kasan_check_range+0x10c/0x1c0
[   15.301781]  __kasan_check_write+0x18/0x20
[   15.301801]  kasan_atomics_helper+0x151d/0x5450
[   15.301825]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.301848]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.301874]  ? kasan_atomics+0x152/0x310
[   15.301902]  kasan_atomics+0x1dc/0x310
[   15.301925]  ? __pfx_kasan_atomics+0x10/0x10
[   15.301950]  ? __pfx_read_tsc+0x10/0x10
[   15.301971]  ? ktime_get_ts64+0x86/0x230
[   15.301996]  kunit_try_run_case+0x1a5/0x480
[   15.302020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.302043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.302067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.302092]  ? __kthread_parkme+0x82/0x180
[   15.302113]  ? preempt_count_sub+0x50/0x80
[   15.302138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.302163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.302188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.302214]  kthread+0x337/0x6f0
[   15.302232]  ? trace_preempt_on+0x20/0xc0
[   15.302256]  ? __pfx_kthread+0x10/0x10
[   15.302277]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.302299]  ? calculate_sigpending+0x7b/0xa0
[   15.302324]  ? __pfx_kthread+0x10/0x10
[   15.302346]  ret_from_fork+0x116/0x1d0
[   15.302364]  ? __pfx_kthread+0x10/0x10
[   15.302385]  ret_from_fork_asm+0x1a/0x30
[   15.302418]  </TASK>
[   15.302429] 
[   15.309262] Allocated by task 283:
[   15.309387]  kasan_save_stack+0x45/0x70
[   15.309816]  kasan_save_track+0x18/0x40
[   15.310006]  kasan_save_alloc_info+0x3b/0x50
[   15.310219]  __kasan_kmalloc+0xb7/0xc0
[   15.310407]  __kmalloc_cache_noprof+0x189/0x420
[   15.310726]  kasan_atomics+0x95/0x310
[   15.310904]  kunit_try_run_case+0x1a5/0x480
[   15.311086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.311298]  kthread+0x337/0x6f0
[   15.311469]  ret_from_fork+0x116/0x1d0
[   15.311599]  ret_from_fork_asm+0x1a/0x30
[   15.311736] 
[   15.311805] The buggy address belongs to the object at ffff8881026f3680
[   15.311805]  which belongs to the cache kmalloc-64 of size 64
[   15.312227] The buggy address is located 0 bytes to the right of
[   15.312227]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   15.312963] 
[   15.313161] The buggy address belongs to the physical page:
[   15.313409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   15.313708] flags: 0x200000000000000(node=0|zone=2)
[   15.313874] page_type: f5(slab)
[   15.313993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.314217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.314518] page dumped because: kasan: bad access detected
[   15.314771] 
[   15.314862] Memory state around the buggy address:
[   15.315086]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.315409]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.315952] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.316220]                                      ^
[   15.316369]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316589]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316833] ==================================================================
[   14.617943] ==================================================================
[   14.618536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.618800] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283
[   14.619028] 
[   14.619112] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.619164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.619176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.619196] Call Trace:
[   14.619210]  <TASK>
[   14.619225]  dump_stack_lvl+0x73/0xb0
[   14.619537]  print_report+0xd1/0x610
[   14.620230]  ? __virt_addr_valid+0x1db/0x2d0
[   14.620257]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.620279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.620303]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.620326]  kasan_report+0x141/0x180
[   14.620357]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.620386]  kasan_check_range+0x10c/0x1c0
[   14.620411]  __kasan_check_write+0x18/0x20
[   14.620431]  kasan_atomics_helper+0x4a0/0x5450
[   14.620463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.620487]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.620512]  ? kasan_atomics+0x152/0x310
[   14.620539]  kasan_atomics+0x1dc/0x310
[   14.620562]  ? __pfx_kasan_atomics+0x10/0x10
[   14.620587]  ? __pfx_read_tsc+0x10/0x10
[   14.620608]  ? ktime_get_ts64+0x86/0x230
[   14.620634]  kunit_try_run_case+0x1a5/0x480
[   14.620657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.620707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.620732]  ? __kthread_parkme+0x82/0x180
[   14.620752]  ? preempt_count_sub+0x50/0x80
[   14.620777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.620825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.620850]  kthread+0x337/0x6f0
[   14.620869]  ? trace_preempt_on+0x20/0xc0
[   14.620893]  ? __pfx_kthread+0x10/0x10
[   14.620913]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.620935]  ? calculate_sigpending+0x7b/0xa0
[   14.620959]  ? __pfx_kthread+0x10/0x10
[   14.620982]  ret_from_fork+0x116/0x1d0
[   14.621000]  ? __pfx_kthread+0x10/0x10
[   14.621020]  ret_from_fork_asm+0x1a/0x30
[   14.621054]  </TASK>
[   14.621065] 
[   14.631156] Allocated by task 283:
[   14.631529]  kasan_save_stack+0x45/0x70
[   14.631810]  kasan_save_track+0x18/0x40
[   14.632061]  kasan_save_alloc_info+0x3b/0x50
[   14.632340]  __kasan_kmalloc+0xb7/0xc0
[   14.632506]  __kmalloc_cache_noprof+0x189/0x420
[   14.632752]  kasan_atomics+0x95/0x310
[   14.633057]  kunit_try_run_case+0x1a5/0x480
[   14.633217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.633470]  kthread+0x337/0x6f0
[   14.633856]  ret_from_fork+0x116/0x1d0
[   14.634025]  ret_from_fork_asm+0x1a/0x30
[   14.634323] 
[   14.634401] The buggy address belongs to the object at ffff8881026f3680
[   14.634401]  which belongs to the cache kmalloc-64 of size 64
[   14.635177] The buggy address is located 0 bytes to the right of
[   14.635177]  allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0)
[   14.635884] 
[   14.636049] The buggy address belongs to the physical page:
[   14.636269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3
[   14.636641] flags: 0x200000000000000(node=0|zone=2)
[   14.636843] page_type: f5(slab)
[   14.636983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.637300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.637941] page dumped because: kasan: bad access detected
[   14.638166] 
[   14.638374] Memory state around the buggy address:
[   14.638547]  ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.638992]  ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.639242] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.639735]                                      ^
[   14.640011]  ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.640264]  ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.640677] ==================================================================

[   14.917121] ==================================================================
[   14.919054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.919602] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   14.919979] 
[   14.920229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.920283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.920296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.920320] Call Trace:
[   14.920333]  <TASK>
[   14.920351]  dump_stack_lvl+0x73/0xb0
[   14.920384]  print_report+0xd1/0x610
[   14.920407]  ? __virt_addr_valid+0x1db/0x2d0
[   14.920432]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.920454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.920477]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.920498]  kasan_report+0x141/0x180
[   14.920520]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.920545]  __asan_report_load4_noabort+0x18/0x20
[   14.920570]  kasan_atomics_helper+0x4bbc/0x5450
[   14.920592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.920627]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.920653]  ? kasan_atomics+0x152/0x310
[   14.920679]  kasan_atomics+0x1dc/0x310
[   14.920713]  ? __pfx_kasan_atomics+0x10/0x10
[   14.920738]  ? __pfx_read_tsc+0x10/0x10
[   14.920758]  ? ktime_get_ts64+0x86/0x230
[   14.920782]  kunit_try_run_case+0x1a5/0x480
[   14.920807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.920857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.920881]  ? __kthread_parkme+0x82/0x180
[   14.920902]  ? preempt_count_sub+0x50/0x80
[   14.920926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.920973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.920996]  kthread+0x337/0x6f0
[   14.921081]  ? trace_preempt_on+0x20/0xc0
[   14.921106]  ? __pfx_kthread+0x10/0x10
[   14.921126]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.921148]  ? calculate_sigpending+0x7b/0xa0
[   14.921172]  ? __pfx_kthread+0x10/0x10
[   14.921193]  ret_from_fork+0x116/0x1d0
[   14.921212]  ? __pfx_kthread+0x10/0x10
[   14.921231]  ret_from_fork_asm+0x1a/0x30
[   14.921261]  </TASK>
[   14.921273] 
[   14.934838] Allocated by task 282:
[   14.935271]  kasan_save_stack+0x45/0x70
[   14.935724]  kasan_save_track+0x18/0x40
[   14.936123]  kasan_save_alloc_info+0x3b/0x50
[   14.936460]  __kasan_kmalloc+0xb7/0xc0
[   14.936697]  __kmalloc_cache_noprof+0x189/0x420
[   14.937151]  kasan_atomics+0x95/0x310
[   14.937463]  kunit_try_run_case+0x1a5/0x480
[   14.937616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.938123]  kthread+0x337/0x6f0
[   14.938448]  ret_from_fork+0x116/0x1d0
[   14.938723]  ret_from_fork_asm+0x1a/0x30
[   14.938868] 
[   14.938941] The buggy address belongs to the object at ffff88810342d080
[   14.938941]  which belongs to the cache kmalloc-64 of size 64
[   14.940075] The buggy address is located 0 bytes to the right of
[   14.940075]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   14.941142] 
[   14.941357] The buggy address belongs to the physical page:
[   14.941792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   14.942183] flags: 0x200000000000000(node=0|zone=2)
[   14.942799] page_type: f5(slab)
[   14.943204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.944025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.944594] page dumped because: kasan: bad access detected
[   14.944768] 
[   14.944842] Memory state around the buggy address:
[   14.945021]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945370]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.945703] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.946028]                                      ^
[   14.946303]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.946693]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.947027] ==================================================================
[   16.295083] ==================================================================
[   16.295433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.295749] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.296091] 
[   16.296208] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.296258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.296292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.296317] Call Trace:
[   16.296341]  <TASK>
[   16.296362]  dump_stack_lvl+0x73/0xb0
[   16.296398]  print_report+0xd1/0x610
[   16.296422]  ? __virt_addr_valid+0x1db/0x2d0
[   16.296456]  ? kasan_atomics_helper+0x224c/0x5450
[   16.296478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.296520]  ? kasan_atomics_helper+0x224c/0x5450
[   16.296543]  kasan_report+0x141/0x180
[   16.296566]  ? kasan_atomics_helper+0x224c/0x5450
[   16.296593]  kasan_check_range+0x10c/0x1c0
[   16.296618]  __kasan_check_write+0x18/0x20
[   16.296638]  kasan_atomics_helper+0x224c/0x5450
[   16.296662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.296684]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.296727]  ? kasan_atomics+0x152/0x310
[   16.296754]  kasan_atomics+0x1dc/0x310
[   16.296777]  ? __pfx_kasan_atomics+0x10/0x10
[   16.296802]  ? __pfx_read_tsc+0x10/0x10
[   16.296824]  ? ktime_get_ts64+0x86/0x230
[   16.296856]  kunit_try_run_case+0x1a5/0x480
[   16.296882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.296923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.296949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.296977]  ? __kthread_parkme+0x82/0x180
[   16.296998]  ? preempt_count_sub+0x50/0x80
[   16.297035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.297059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.297086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.297112]  kthread+0x337/0x6f0
[   16.297150]  ? trace_preempt_on+0x20/0xc0
[   16.297175]  ? __pfx_kthread+0x10/0x10
[   16.297196]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.297220]  ? calculate_sigpending+0x7b/0xa0
[   16.297246]  ? __pfx_kthread+0x10/0x10
[   16.297267]  ret_from_fork+0x116/0x1d0
[   16.297287]  ? __pfx_kthread+0x10/0x10
[   16.297325]  ret_from_fork_asm+0x1a/0x30
[   16.297359]  </TASK>
[   16.297370] 
[   16.305329] Allocated by task 282:
[   16.305634]  kasan_save_stack+0x45/0x70
[   16.305862]  kasan_save_track+0x18/0x40
[   16.306047]  kasan_save_alloc_info+0x3b/0x50
[   16.306253]  __kasan_kmalloc+0xb7/0xc0
[   16.306459]  __kmalloc_cache_noprof+0x189/0x420
[   16.306680]  kasan_atomics+0x95/0x310
[   16.306868]  kunit_try_run_case+0x1a5/0x480
[   16.307094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.307341]  kthread+0x337/0x6f0
[   16.307600]  ret_from_fork+0x116/0x1d0
[   16.307784]  ret_from_fork_asm+0x1a/0x30
[   16.307980] 
[   16.308083] The buggy address belongs to the object at ffff88810342d080
[   16.308083]  which belongs to the cache kmalloc-64 of size 64
[   16.308634] The buggy address is located 0 bytes to the right of
[   16.308634]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.309151] 
[   16.309247] The buggy address belongs to the physical page:
[   16.309503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.309829] flags: 0x200000000000000(node=0|zone=2)
[   16.310078] page_type: f5(slab)
[   16.310215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.310579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.311018] page dumped because: kasan: bad access detected
[   16.311241] 
[   16.311322] Memory state around the buggy address:
[   16.311520]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.311856]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.312215] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.312530]                                      ^
[   16.312758]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.313083]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.313527] ==================================================================
[   15.015194] ==================================================================
[   15.015901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.016551] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.016882] 
[   15.016992] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.017264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.017280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.017314] Call Trace:
[   15.017329]  <TASK>
[   15.017351]  dump_stack_lvl+0x73/0xb0
[   15.017400]  print_report+0xd1/0x610
[   15.017426]  ? __virt_addr_valid+0x1db/0x2d0
[   15.017462]  ? kasan_atomics_helper+0x3df/0x5450
[   15.017485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.017520]  ? kasan_atomics_helper+0x3df/0x5450
[   15.017545]  kasan_report+0x141/0x180
[   15.017570]  ? kasan_atomics_helper+0x3df/0x5450
[   15.017608]  kasan_check_range+0x10c/0x1c0
[   15.017633]  __kasan_check_read+0x15/0x20
[   15.017653]  kasan_atomics_helper+0x3df/0x5450
[   15.017677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.017709]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.017736]  ? kasan_atomics+0x152/0x310
[   15.017773]  kasan_atomics+0x1dc/0x310
[   15.017796]  ? __pfx_kasan_atomics+0x10/0x10
[   15.017821]  ? __pfx_read_tsc+0x10/0x10
[   15.017844]  ? ktime_get_ts64+0x86/0x230
[   15.017878]  kunit_try_run_case+0x1a5/0x480
[   15.017905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.017929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.017964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.017988]  ? __kthread_parkme+0x82/0x180
[   15.018019]  ? preempt_count_sub+0x50/0x80
[   15.018045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.018078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.018103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.018128]  kthread+0x337/0x6f0
[   15.018159]  ? trace_preempt_on+0x20/0xc0
[   15.018183]  ? __pfx_kthread+0x10/0x10
[   15.018204]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.018227]  ? calculate_sigpending+0x7b/0xa0
[   15.018252]  ? __pfx_kthread+0x10/0x10
[   15.018283]  ret_from_fork+0x116/0x1d0
[   15.018302]  ? __pfx_kthread+0x10/0x10
[   15.018322]  ret_from_fork_asm+0x1a/0x30
[   15.018365]  </TASK>
[   15.018375] 
[   15.026606] Allocated by task 282:
[   15.026803]  kasan_save_stack+0x45/0x70
[   15.027059]  kasan_save_track+0x18/0x40
[   15.027222]  kasan_save_alloc_info+0x3b/0x50
[   15.027468]  __kasan_kmalloc+0xb7/0xc0
[   15.027632]  __kmalloc_cache_noprof+0x189/0x420
[   15.027866]  kasan_atomics+0x95/0x310
[   15.028062]  kunit_try_run_case+0x1a5/0x480
[   15.028278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.028534]  kthread+0x337/0x6f0
[   15.028709]  ret_from_fork+0x116/0x1d0
[   15.028880]  ret_from_fork_asm+0x1a/0x30
[   15.029097] 
[   15.029173] The buggy address belongs to the object at ffff88810342d080
[   15.029173]  which belongs to the cache kmalloc-64 of size 64
[   15.029772] The buggy address is located 0 bytes to the right of
[   15.029772]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.030227] 
[   15.030320] The buggy address belongs to the physical page:
[   15.030757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.031114] flags: 0x200000000000000(node=0|zone=2)
[   15.031294] page_type: f5(slab)
[   15.031419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.031654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.031882] page dumped because: kasan: bad access detected
[   15.032087] 
[   15.032189] Memory state around the buggy address:
[   15.032411]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032753]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.033085] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.033398]                                      ^
[   15.033854]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034179]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034399] ==================================================================
[   16.139431] ==================================================================
[   16.140073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.140365] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.140975] 
[   16.141080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.141128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.141141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.141165] Call Trace:
[   16.141186]  <TASK>
[   16.141208]  dump_stack_lvl+0x73/0xb0
[   16.141237]  print_report+0xd1/0x610
[   16.141260]  ? __virt_addr_valid+0x1db/0x2d0
[   16.141285]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.141306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.141330]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.141353]  kasan_report+0x141/0x180
[   16.141375]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.141401]  __asan_report_load8_noabort+0x18/0x20
[   16.141427]  kasan_atomics_helper+0x4f71/0x5450
[   16.141450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.141473]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.141500]  ? kasan_atomics+0x152/0x310
[   16.141530]  kasan_atomics+0x1dc/0x310
[   16.141553]  ? __pfx_kasan_atomics+0x10/0x10
[   16.141578]  ? __pfx_read_tsc+0x10/0x10
[   16.141601]  ? ktime_get_ts64+0x86/0x230
[   16.141667]  kunit_try_run_case+0x1a5/0x480
[   16.141693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.141716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.141741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.141766]  ? __kthread_parkme+0x82/0x180
[   16.141787]  ? preempt_count_sub+0x50/0x80
[   16.141812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.141836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.141882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.141908]  kthread+0x337/0x6f0
[   16.141928]  ? trace_preempt_on+0x20/0xc0
[   16.141952]  ? __pfx_kthread+0x10/0x10
[   16.141973]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.141995]  ? calculate_sigpending+0x7b/0xa0
[   16.142030]  ? __pfx_kthread+0x10/0x10
[   16.142052]  ret_from_fork+0x116/0x1d0
[   16.142072]  ? __pfx_kthread+0x10/0x10
[   16.142093]  ret_from_fork_asm+0x1a/0x30
[   16.142125]  </TASK>
[   16.142136] 
[   16.149337] Allocated by task 282:
[   16.149621]  kasan_save_stack+0x45/0x70
[   16.149850]  kasan_save_track+0x18/0x40
[   16.150049]  kasan_save_alloc_info+0x3b/0x50
[   16.150254]  __kasan_kmalloc+0xb7/0xc0
[   16.150443]  __kmalloc_cache_noprof+0x189/0x420
[   16.150605]  kasan_atomics+0x95/0x310
[   16.150737]  kunit_try_run_case+0x1a5/0x480
[   16.150881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.151141]  kthread+0x337/0x6f0
[   16.151334]  ret_from_fork+0x116/0x1d0
[   16.151664]  ret_from_fork_asm+0x1a/0x30
[   16.151880] 
[   16.151978] The buggy address belongs to the object at ffff88810342d080
[   16.151978]  which belongs to the cache kmalloc-64 of size 64
[   16.152453] The buggy address is located 0 bytes to the right of
[   16.152453]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.152925] 
[   16.153033] The buggy address belongs to the physical page:
[   16.153263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.153633] flags: 0x200000000000000(node=0|zone=2)
[   16.153870] page_type: f5(slab)
[   16.154046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.154373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.154704] page dumped because: kasan: bad access detected
[   16.154928] 
[   16.155041] Memory state around the buggy address:
[   16.155247]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.155515]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155852] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.156146]                                      ^
[   16.156342]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156672]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156970] ==================================================================
[   15.257146] ==================================================================
[   15.257459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.257765] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.258147] 
[   15.258289] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.258347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.258363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.258387] Call Trace:
[   15.258418]  <TASK>
[   15.258439]  dump_stack_lvl+0x73/0xb0
[   15.258469]  print_report+0xd1/0x610
[   15.258492]  ? __virt_addr_valid+0x1db/0x2d0
[   15.258518]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.258540]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.258564]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.258586]  kasan_report+0x141/0x180
[   15.258608]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.258645]  kasan_check_range+0x10c/0x1c0
[   15.258670]  __kasan_check_write+0x18/0x20
[   15.258689]  kasan_atomics_helper+0x8f9/0x5450
[   15.258724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.258746]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.258781]  ? kasan_atomics+0x152/0x310
[   15.258808]  kasan_atomics+0x1dc/0x310
[   15.258832]  ? __pfx_kasan_atomics+0x10/0x10
[   15.258867]  ? __pfx_read_tsc+0x10/0x10
[   15.258889]  ? ktime_get_ts64+0x86/0x230
[   15.258915]  kunit_try_run_case+0x1a5/0x480
[   15.258940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.258964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.258989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.259023]  ? __kthread_parkme+0x82/0x180
[   15.259045]  ? preempt_count_sub+0x50/0x80
[   15.259070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.259095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.259119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.259145]  kthread+0x337/0x6f0
[   15.259164]  ? trace_preempt_on+0x20/0xc0
[   15.259188]  ? __pfx_kthread+0x10/0x10
[   15.259211]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.259233]  ? calculate_sigpending+0x7b/0xa0
[   15.259258]  ? __pfx_kthread+0x10/0x10
[   15.259280]  ret_from_fork+0x116/0x1d0
[   15.259299]  ? __pfx_kthread+0x10/0x10
[   15.259320]  ret_from_fork_asm+0x1a/0x30
[   15.259352]  </TASK>
[   15.259362] 
[   15.266774] Allocated by task 282:
[   15.266974]  kasan_save_stack+0x45/0x70
[   15.267211]  kasan_save_track+0x18/0x40
[   15.267401]  kasan_save_alloc_info+0x3b/0x50
[   15.267611]  __kasan_kmalloc+0xb7/0xc0
[   15.267798]  __kmalloc_cache_noprof+0x189/0x420
[   15.267980]  kasan_atomics+0x95/0x310
[   15.268175]  kunit_try_run_case+0x1a5/0x480
[   15.268365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.268698]  kthread+0x337/0x6f0
[   15.268898]  ret_from_fork+0x116/0x1d0
[   15.269057]  ret_from_fork_asm+0x1a/0x30
[   15.269204] 
[   15.269316] The buggy address belongs to the object at ffff88810342d080
[   15.269316]  which belongs to the cache kmalloc-64 of size 64
[   15.270107] The buggy address is located 0 bytes to the right of
[   15.270107]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.270704] 
[   15.270815] The buggy address belongs to the physical page:
[   15.271063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.271418] flags: 0x200000000000000(node=0|zone=2)
[   15.271653] page_type: f5(slab)
[   15.271847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.272190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.272536] page dumped because: kasan: bad access detected
[   15.272764] 
[   15.272864] Memory state around the buggy address:
[   15.273071]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273312]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.273762] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.274154]                                      ^
[   15.274312]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.274833]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.275139] ==================================================================
[   15.747644] ==================================================================
[   15.748033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.748450] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.748759] 
[   15.748881] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.748959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.749007] Call Trace:
[   15.749042]  <TASK>
[   15.749063]  dump_stack_lvl+0x73/0xb0
[   15.749094]  print_report+0xd1/0x610
[   15.749117]  ? __virt_addr_valid+0x1db/0x2d0
[   15.749141]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.749163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.749187]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.749209]  kasan_report+0x141/0x180
[   15.749232]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.749259]  __asan_report_load8_noabort+0x18/0x20
[   15.749285]  kasan_atomics_helper+0x4eae/0x5450
[   15.749309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.749332]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.749358]  ? kasan_atomics+0x152/0x310
[   15.749385]  kasan_atomics+0x1dc/0x310
[   15.749415]  ? __pfx_kasan_atomics+0x10/0x10
[   15.749440]  ? __pfx_read_tsc+0x10/0x10
[   15.749462]  ? ktime_get_ts64+0x86/0x230
[   15.749488]  kunit_try_run_case+0x1a5/0x480
[   15.749514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.749564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.749588]  ? __kthread_parkme+0x82/0x180
[   15.749609]  ? preempt_count_sub+0x50/0x80
[   15.749634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.749708]  kthread+0x337/0x6f0
[   15.749727]  ? trace_preempt_on+0x20/0xc0
[   15.749751]  ? __pfx_kthread+0x10/0x10
[   15.749772]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.749796]  ? calculate_sigpending+0x7b/0xa0
[   15.749820]  ? __pfx_kthread+0x10/0x10
[   15.749843]  ret_from_fork+0x116/0x1d0
[   15.749864]  ? __pfx_kthread+0x10/0x10
[   15.749884]  ret_from_fork_asm+0x1a/0x30
[   15.749918]  </TASK>
[   15.749929] 
[   15.757394] Allocated by task 282:
[   15.757672]  kasan_save_stack+0x45/0x70
[   15.758018]  kasan_save_track+0x18/0x40
[   15.758230]  kasan_save_alloc_info+0x3b/0x50
[   15.758457]  __kasan_kmalloc+0xb7/0xc0
[   15.758650]  __kmalloc_cache_noprof+0x189/0x420
[   15.758887]  kasan_atomics+0x95/0x310
[   15.759032]  kunit_try_run_case+0x1a5/0x480
[   15.759184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.759490]  kthread+0x337/0x6f0
[   15.759732]  ret_from_fork+0x116/0x1d0
[   15.759990]  ret_from_fork_asm+0x1a/0x30
[   15.760282] 
[   15.760400] The buggy address belongs to the object at ffff88810342d080
[   15.760400]  which belongs to the cache kmalloc-64 of size 64
[   15.760883] The buggy address is located 0 bytes to the right of
[   15.760883]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.761358] 
[   15.761518] The buggy address belongs to the physical page:
[   15.761806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.762212] flags: 0x200000000000000(node=0|zone=2)
[   15.762481] page_type: f5(slab)
[   15.762635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.762986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.763308] page dumped because: kasan: bad access detected
[   15.763639] 
[   15.763766] Memory state around the buggy address:
[   15.763937]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.764209]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.764605] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.764928]                                      ^
[   15.765217]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765547]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765806] ==================================================================
[   15.589815] ==================================================================
[   15.590268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.590642] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.590919] 
[   15.591020] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.591070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.591082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.591105] Call Trace:
[   15.591126]  <TASK>
[   15.591146]  dump_stack_lvl+0x73/0xb0
[   15.591176]  print_report+0xd1/0x610
[   15.591199]  ? __virt_addr_valid+0x1db/0x2d0
[   15.591223]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.591245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.591269]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.591292]  kasan_report+0x141/0x180
[   15.591315]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.591342]  __asan_report_load4_noabort+0x18/0x20
[   15.591368]  kasan_atomics_helper+0x4a1c/0x5450
[   15.591392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.591416]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.591460]  ? kasan_atomics+0x152/0x310
[   15.591487]  kasan_atomics+0x1dc/0x310
[   15.591510]  ? __pfx_kasan_atomics+0x10/0x10
[   15.591535]  ? __pfx_read_tsc+0x10/0x10
[   15.591558]  ? ktime_get_ts64+0x86/0x230
[   15.591584]  kunit_try_run_case+0x1a5/0x480
[   15.591609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.591633]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.591657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.591682]  ? __kthread_parkme+0x82/0x180
[   15.591703]  ? preempt_count_sub+0x50/0x80
[   15.591729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.591753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.591777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.591802]  kthread+0x337/0x6f0
[   15.591822]  ? trace_preempt_on+0x20/0xc0
[   15.591846]  ? __pfx_kthread+0x10/0x10
[   15.591867]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.591888]  ? calculate_sigpending+0x7b/0xa0
[   15.591915]  ? __pfx_kthread+0x10/0x10
[   15.591936]  ret_from_fork+0x116/0x1d0
[   15.591955]  ? __pfx_kthread+0x10/0x10
[   15.591976]  ret_from_fork_asm+0x1a/0x30
[   15.592007]  </TASK>
[   15.592028] 
[   15.599263] Allocated by task 282:
[   15.599430]  kasan_save_stack+0x45/0x70
[   15.599638]  kasan_save_track+0x18/0x40
[   15.599778]  kasan_save_alloc_info+0x3b/0x50
[   15.599927]  __kasan_kmalloc+0xb7/0xc0
[   15.600093]  __kmalloc_cache_noprof+0x189/0x420
[   15.600318]  kasan_atomics+0x95/0x310
[   15.600595]  kunit_try_run_case+0x1a5/0x480
[   15.600771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.600994]  kthread+0x337/0x6f0
[   15.601178]  ret_from_fork+0x116/0x1d0
[   15.601338]  ret_from_fork_asm+0x1a/0x30
[   15.601537] 
[   15.601635] The buggy address belongs to the object at ffff88810342d080
[   15.601635]  which belongs to the cache kmalloc-64 of size 64
[   15.602117] The buggy address is located 0 bytes to the right of
[   15.602117]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.602636] 
[   15.602734] The buggy address belongs to the physical page:
[   15.602960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.603232] flags: 0x200000000000000(node=0|zone=2)
[   15.603443] page_type: f5(slab)
[   15.603611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.603950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.604226] page dumped because: kasan: bad access detected
[   15.604504] 
[   15.604585] Memory state around the buggy address:
[   15.604813]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.605106]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.605378] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.605705]                                      ^
[   15.605901]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.606202]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.606531] ==================================================================
[   15.479815] ==================================================================
[   15.480194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.480786] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.481306] 
[   15.481428] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.481640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.481654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.481677] Call Trace:
[   15.481699]  <TASK>
[   15.481720]  dump_stack_lvl+0x73/0xb0
[   15.481762]  print_report+0xd1/0x610
[   15.481786]  ? __virt_addr_valid+0x1db/0x2d0
[   15.481812]  ? kasan_atomics_helper+0xe78/0x5450
[   15.481834]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.481857]  ? kasan_atomics_helper+0xe78/0x5450
[   15.481879]  kasan_report+0x141/0x180
[   15.481902]  ? kasan_atomics_helper+0xe78/0x5450
[   15.481931]  kasan_check_range+0x10c/0x1c0
[   15.481956]  __kasan_check_write+0x18/0x20
[   15.481976]  kasan_atomics_helper+0xe78/0x5450
[   15.481999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.482031]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.482057]  ? kasan_atomics+0x152/0x310
[   15.482084]  kasan_atomics+0x1dc/0x310
[   15.482107]  ? __pfx_kasan_atomics+0x10/0x10
[   15.482131]  ? __pfx_read_tsc+0x10/0x10
[   15.482153]  ? ktime_get_ts64+0x86/0x230
[   15.482178]  kunit_try_run_case+0x1a5/0x480
[   15.482203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.482226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.482252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.482276]  ? __kthread_parkme+0x82/0x180
[   15.482298]  ? preempt_count_sub+0x50/0x80
[   15.482323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.482347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.482372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.482396]  kthread+0x337/0x6f0
[   15.482416]  ? trace_preempt_on+0x20/0xc0
[   15.482440]  ? __pfx_kthread+0x10/0x10
[   15.482460]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.482482]  ? calculate_sigpending+0x7b/0xa0
[   15.482507]  ? __pfx_kthread+0x10/0x10
[   15.482529]  ret_from_fork+0x116/0x1d0
[   15.482548]  ? __pfx_kthread+0x10/0x10
[   15.482569]  ret_from_fork_asm+0x1a/0x30
[   15.482602]  </TASK>
[   15.482612] 
[   15.492971] Allocated by task 282:
[   15.493186]  kasan_save_stack+0x45/0x70
[   15.493391]  kasan_save_track+0x18/0x40
[   15.493901]  kasan_save_alloc_info+0x3b/0x50
[   15.494200]  __kasan_kmalloc+0xb7/0xc0
[   15.494791]  __kmalloc_cache_noprof+0x189/0x420
[   15.495030]  kasan_atomics+0x95/0x310
[   15.495172]  kunit_try_run_case+0x1a5/0x480
[   15.495377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.495614]  kthread+0x337/0x6f0
[   15.495798]  ret_from_fork+0x116/0x1d0
[   15.495970]  ret_from_fork_asm+0x1a/0x30
[   15.496179] 
[   15.496281] The buggy address belongs to the object at ffff88810342d080
[   15.496281]  which belongs to the cache kmalloc-64 of size 64
[   15.496764] The buggy address is located 0 bytes to the right of
[   15.496764]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.497214] 
[   15.497318] The buggy address belongs to the physical page:
[   15.497673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.497947] flags: 0x200000000000000(node=0|zone=2)
[   15.498200] page_type: f5(slab)
[   15.498376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.498928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.499239] page dumped because: kasan: bad access detected
[   15.499860] 
[   15.500005] Memory state around the buggy address:
[   15.500214]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.500738]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.501159] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.501442]                                      ^
[   15.501792]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.502105]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.502400] ==================================================================
[   15.642886] ==================================================================
[   15.643256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.643589] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.643815] 
[   15.643905] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.643951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.643963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.643987] Call Trace:
[   15.644007]  <TASK>
[   15.644039]  dump_stack_lvl+0x73/0xb0
[   15.644069]  print_report+0xd1/0x610
[   15.644092]  ? __virt_addr_valid+0x1db/0x2d0
[   15.644116]  ? kasan_atomics_helper+0x1217/0x5450
[   15.644138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.644162]  ? kasan_atomics_helper+0x1217/0x5450
[   15.644185]  kasan_report+0x141/0x180
[   15.644208]  ? kasan_atomics_helper+0x1217/0x5450
[   15.644234]  kasan_check_range+0x10c/0x1c0
[   15.644259]  __kasan_check_write+0x18/0x20
[   15.644279]  kasan_atomics_helper+0x1217/0x5450
[   15.644303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.644326]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.644352]  ? kasan_atomics+0x152/0x310
[   15.644380]  kasan_atomics+0x1dc/0x310
[   15.644403]  ? __pfx_kasan_atomics+0x10/0x10
[   15.644428]  ? __pfx_read_tsc+0x10/0x10
[   15.644449]  ? ktime_get_ts64+0x86/0x230
[   15.644475]  kunit_try_run_case+0x1a5/0x480
[   15.644500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.644548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.644573]  ? __kthread_parkme+0x82/0x180
[   15.644595]  ? preempt_count_sub+0x50/0x80
[   15.644619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.644669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.644695]  kthread+0x337/0x6f0
[   15.644714]  ? trace_preempt_on+0x20/0xc0
[   15.644738]  ? __pfx_kthread+0x10/0x10
[   15.644758]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.644781]  ? calculate_sigpending+0x7b/0xa0
[   15.644806]  ? __pfx_kthread+0x10/0x10
[   15.644827]  ret_from_fork+0x116/0x1d0
[   15.644851]  ? __pfx_kthread+0x10/0x10
[   15.644872]  ret_from_fork_asm+0x1a/0x30
[   15.644903]  </TASK>
[   15.644914] 
[   15.658823] Allocated by task 282:
[   15.659048]  kasan_save_stack+0x45/0x70
[   15.659276]  kasan_save_track+0x18/0x40
[   15.660065]  kasan_save_alloc_info+0x3b/0x50
[   15.660335]  __kasan_kmalloc+0xb7/0xc0
[   15.660486]  __kmalloc_cache_noprof+0x189/0x420
[   15.660652]  kasan_atomics+0x95/0x310
[   15.660788]  kunit_try_run_case+0x1a5/0x480
[   15.660946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661533]  kthread+0x337/0x6f0
[   15.661718]  ret_from_fork+0x116/0x1d0
[   15.661853]  ret_from_fork_asm+0x1a/0x30
[   15.661997] 
[   15.662310] The buggy address belongs to the object at ffff88810342d080
[   15.662310]  which belongs to the cache kmalloc-64 of size 64
[   15.663458] The buggy address is located 0 bytes to the right of
[   15.663458]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.664207] 
[   15.664288] The buggy address belongs to the physical page:
[   15.664657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.665369] flags: 0x200000000000000(node=0|zone=2)
[   15.665858] page_type: f5(slab)
[   15.666188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.666698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.666937] page dumped because: kasan: bad access detected
[   15.667430] 
[   15.667630] Memory state around the buggy address:
[   15.667967]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668198]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.668440] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.669154]                                      ^
[   15.669626]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.670256]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.670882] ==================================================================
[   16.067075] ==================================================================
[   16.067426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.067695] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.067920] 
[   16.068034] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.068081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.068094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.068116] Call Trace:
[   16.068136]  <TASK>
[   16.068156]  dump_stack_lvl+0x73/0xb0
[   16.068184]  print_report+0xd1/0x610
[   16.068207]  ? __virt_addr_valid+0x1db/0x2d0
[   16.068234]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.068257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.068280]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.068304]  kasan_report+0x141/0x180
[   16.068327]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.068355]  kasan_check_range+0x10c/0x1c0
[   16.068379]  __kasan_check_write+0x18/0x20
[   16.068399]  kasan_atomics_helper+0x1d7a/0x5450
[   16.068423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.068448]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.068474]  ? kasan_atomics+0x152/0x310
[   16.068500]  kasan_atomics+0x1dc/0x310
[   16.068523]  ? __pfx_kasan_atomics+0x10/0x10
[   16.068547]  ? __pfx_read_tsc+0x10/0x10
[   16.068569]  ? ktime_get_ts64+0x86/0x230
[   16.068594]  kunit_try_run_case+0x1a5/0x480
[   16.068620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.068669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.068693]  ? __kthread_parkme+0x82/0x180
[   16.068714]  ? preempt_count_sub+0x50/0x80
[   16.068740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.068790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.068815]  kthread+0x337/0x6f0
[   16.068835]  ? trace_preempt_on+0x20/0xc0
[   16.068866]  ? __pfx_kthread+0x10/0x10
[   16.068887]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.068923]  ? calculate_sigpending+0x7b/0xa0
[   16.068948]  ? __pfx_kthread+0x10/0x10
[   16.068970]  ret_from_fork+0x116/0x1d0
[   16.068989]  ? __pfx_kthread+0x10/0x10
[   16.069020]  ret_from_fork_asm+0x1a/0x30
[   16.069051]  </TASK>
[   16.069062] 
[   16.076525] Allocated by task 282:
[   16.076725]  kasan_save_stack+0x45/0x70
[   16.076937]  kasan_save_track+0x18/0x40
[   16.077151]  kasan_save_alloc_info+0x3b/0x50
[   16.077374]  __kasan_kmalloc+0xb7/0xc0
[   16.077590]  __kmalloc_cache_noprof+0x189/0x420
[   16.077780]  kasan_atomics+0x95/0x310
[   16.077910]  kunit_try_run_case+0x1a5/0x480
[   16.078064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.078236]  kthread+0x337/0x6f0
[   16.078388]  ret_from_fork+0x116/0x1d0
[   16.078808]  ret_from_fork_asm+0x1a/0x30
[   16.079008] 
[   16.079115] The buggy address belongs to the object at ffff88810342d080
[   16.079115]  which belongs to the cache kmalloc-64 of size 64
[   16.079835] The buggy address is located 0 bytes to the right of
[   16.079835]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.080286] 
[   16.080384] The buggy address belongs to the physical page:
[   16.080750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.081050] flags: 0x200000000000000(node=0|zone=2)
[   16.081265] page_type: f5(slab)
[   16.081437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.081739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.082039] page dumped because: kasan: bad access detected
[   16.082251] 
[   16.082326] Memory state around the buggy address:
[   16.082560]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.082844]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.083119] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.083388]                                      ^
[   16.083643]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.083877]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.084161] ==================================================================
[   16.188978] ==================================================================
[   16.189695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.190363] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.190906] 
[   16.191132] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.191182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.191194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.191218] Call Trace:
[   16.191240]  <TASK>
[   16.191262]  dump_stack_lvl+0x73/0xb0
[   16.191304]  print_report+0xd1/0x610
[   16.191327]  ? __virt_addr_valid+0x1db/0x2d0
[   16.191362]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.191385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.191426]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.191450]  kasan_report+0x141/0x180
[   16.191473]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.191499]  __asan_report_load8_noabort+0x18/0x20
[   16.191525]  kasan_atomics_helper+0x4f98/0x5450
[   16.191549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.191571]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.191597]  ? kasan_atomics+0x152/0x310
[   16.191624]  kasan_atomics+0x1dc/0x310
[   16.191646]  ? __pfx_kasan_atomics+0x10/0x10
[   16.191671]  ? __pfx_read_tsc+0x10/0x10
[   16.191693]  ? ktime_get_ts64+0x86/0x230
[   16.191719]  kunit_try_run_case+0x1a5/0x480
[   16.191745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.191768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.191794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.191818]  ? __kthread_parkme+0x82/0x180
[   16.191840]  ? preempt_count_sub+0x50/0x80
[   16.191864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.191889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.191915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.191941]  kthread+0x337/0x6f0
[   16.191963]  ? trace_preempt_on+0x20/0xc0
[   16.191987]  ? __pfx_kthread+0x10/0x10
[   16.192021]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.192044]  ? calculate_sigpending+0x7b/0xa0
[   16.192069]  ? __pfx_kthread+0x10/0x10
[   16.192091]  ret_from_fork+0x116/0x1d0
[   16.192109]  ? __pfx_kthread+0x10/0x10
[   16.192130]  ret_from_fork_asm+0x1a/0x30
[   16.192162]  </TASK>
[   16.192174] 
[   16.202703] Allocated by task 282:
[   16.202870]  kasan_save_stack+0x45/0x70
[   16.203178]  kasan_save_track+0x18/0x40
[   16.203337]  kasan_save_alloc_info+0x3b/0x50
[   16.203573]  __kasan_kmalloc+0xb7/0xc0
[   16.203782]  __kmalloc_cache_noprof+0x189/0x420
[   16.204002]  kasan_atomics+0x95/0x310
[   16.204203]  kunit_try_run_case+0x1a5/0x480
[   16.204428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.204670]  kthread+0x337/0x6f0
[   16.204792]  ret_from_fork+0x116/0x1d0
[   16.204932]  ret_from_fork_asm+0x1a/0x30
[   16.205090] 
[   16.205209] The buggy address belongs to the object at ffff88810342d080
[   16.205209]  which belongs to the cache kmalloc-64 of size 64
[   16.205764] The buggy address is located 0 bytes to the right of
[   16.205764]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.206300] 
[   16.206425] The buggy address belongs to the physical page:
[   16.206599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.206927] flags: 0x200000000000000(node=0|zone=2)
[   16.207199] page_type: f5(slab)
[   16.207375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.207718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.208056] page dumped because: kasan: bad access detected
[   16.208295] 
[   16.208394] Memory state around the buggy address:
[   16.208633]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.208951]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.209251] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.209572]                                      ^
[   16.209729]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.210115]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.210362] ==================================================================
[   15.503389] ==================================================================
[   15.504112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.504448] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.504934] 
[   15.505309] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.505423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.505437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.505461] Call Trace:
[   15.505481]  <TASK>
[   15.505503]  dump_stack_lvl+0x73/0xb0
[   15.505636]  print_report+0xd1/0x610
[   15.505662]  ? __virt_addr_valid+0x1db/0x2d0
[   15.505688]  ? kasan_atomics_helper+0xf10/0x5450
[   15.505710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.505739]  ? kasan_atomics_helper+0xf10/0x5450
[   15.505762]  kasan_report+0x141/0x180
[   15.505785]  ? kasan_atomics_helper+0xf10/0x5450
[   15.505812]  kasan_check_range+0x10c/0x1c0
[   15.505838]  __kasan_check_write+0x18/0x20
[   15.505861]  kasan_atomics_helper+0xf10/0x5450
[   15.505886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.505911]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.505938]  ? kasan_atomics+0x152/0x310
[   15.505965]  kasan_atomics+0x1dc/0x310
[   15.505987]  ? __pfx_kasan_atomics+0x10/0x10
[   15.506024]  ? __pfx_read_tsc+0x10/0x10
[   15.506046]  ? ktime_get_ts64+0x86/0x230
[   15.506072]  kunit_try_run_case+0x1a5/0x480
[   15.506099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.506122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.506147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.506172]  ? __kthread_parkme+0x82/0x180
[   15.506193]  ? preempt_count_sub+0x50/0x80
[   15.506219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.506243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.506268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.506293]  kthread+0x337/0x6f0
[   15.506312]  ? trace_preempt_on+0x20/0xc0
[   15.506335]  ? __pfx_kthread+0x10/0x10
[   15.506356]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.506378]  ? calculate_sigpending+0x7b/0xa0
[   15.506403]  ? __pfx_kthread+0x10/0x10
[   15.506425]  ret_from_fork+0x116/0x1d0
[   15.506445]  ? __pfx_kthread+0x10/0x10
[   15.506466]  ret_from_fork_asm+0x1a/0x30
[   15.506498]  </TASK>
[   15.506509] 
[   15.519787] Allocated by task 282:
[   15.519947]  kasan_save_stack+0x45/0x70
[   15.520129]  kasan_save_track+0x18/0x40
[   15.520267]  kasan_save_alloc_info+0x3b/0x50
[   15.520417]  __kasan_kmalloc+0xb7/0xc0
[   15.520756]  __kmalloc_cache_noprof+0x189/0x420
[   15.521170]  kasan_atomics+0x95/0x310
[   15.521495]  kunit_try_run_case+0x1a5/0x480
[   15.521945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.522419]  kthread+0x337/0x6f0
[   15.522732]  ret_from_fork+0x116/0x1d0
[   15.523089]  ret_from_fork_asm+0x1a/0x30
[   15.523458] 
[   15.523616] The buggy address belongs to the object at ffff88810342d080
[   15.523616]  which belongs to the cache kmalloc-64 of size 64
[   15.524674] The buggy address is located 0 bytes to the right of
[   15.524674]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.525791] 
[   15.525952] The buggy address belongs to the physical page:
[   15.526156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.526400] flags: 0x200000000000000(node=0|zone=2)
[   15.526846] page_type: f5(slab)
[   15.527151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.527981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.528800] page dumped because: kasan: bad access detected
[   15.529243] 
[   15.529315] Memory state around the buggy address:
[   15.529540]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.530154]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.530878] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.531211]                                      ^
[   15.531370]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531921]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532544] ==================================================================
[   15.710133] ==================================================================
[   15.710536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.710858] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.711187] 
[   15.711305] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.711352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.711364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.711387] Call Trace:
[   15.711455]  <TASK>
[   15.711477]  dump_stack_lvl+0x73/0xb0
[   15.711509]  print_report+0xd1/0x610
[   15.711543]  ? __virt_addr_valid+0x1db/0x2d0
[   15.711567]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.711589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.711613]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.711636]  kasan_report+0x141/0x180
[   15.711659]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.711685]  __asan_report_load4_noabort+0x18/0x20
[   15.711710]  kasan_atomics_helper+0x49ce/0x5450
[   15.711736]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.711759]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.711801]  ? kasan_atomics+0x152/0x310
[   15.711828]  kasan_atomics+0x1dc/0x310
[   15.711852]  ? __pfx_kasan_atomics+0x10/0x10
[   15.711876]  ? __pfx_read_tsc+0x10/0x10
[   15.711899]  ? ktime_get_ts64+0x86/0x230
[   15.711924]  kunit_try_run_case+0x1a5/0x480
[   15.711950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.711999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.712033]  ? __kthread_parkme+0x82/0x180
[   15.712055]  ? preempt_count_sub+0x50/0x80
[   15.712080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.712104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.712128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.712153]  kthread+0x337/0x6f0
[   15.712173]  ? trace_preempt_on+0x20/0xc0
[   15.712197]  ? __pfx_kthread+0x10/0x10
[   15.712218]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.712240]  ? calculate_sigpending+0x7b/0xa0
[   15.712265]  ? __pfx_kthread+0x10/0x10
[   15.712286]  ret_from_fork+0x116/0x1d0
[   15.712306]  ? __pfx_kthread+0x10/0x10
[   15.712327]  ret_from_fork_asm+0x1a/0x30
[   15.712358]  </TASK>
[   15.712368] 
[   15.719792] Allocated by task 282:
[   15.719997]  kasan_save_stack+0x45/0x70
[   15.720218]  kasan_save_track+0x18/0x40
[   15.720373]  kasan_save_alloc_info+0x3b/0x50
[   15.720562]  __kasan_kmalloc+0xb7/0xc0
[   15.720737]  __kmalloc_cache_noprof+0x189/0x420
[   15.720917]  kasan_atomics+0x95/0x310
[   15.721180]  kunit_try_run_case+0x1a5/0x480
[   15.721326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.721521]  kthread+0x337/0x6f0
[   15.721640]  ret_from_fork+0x116/0x1d0
[   15.721769]  ret_from_fork_asm+0x1a/0x30
[   15.721904] 
[   15.722030] The buggy address belongs to the object at ffff88810342d080
[   15.722030]  which belongs to the cache kmalloc-64 of size 64
[   15.722586] The buggy address is located 0 bytes to the right of
[   15.722586]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.723124] 
[   15.723222] The buggy address belongs to the physical page:
[   15.723488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.723721] flags: 0x200000000000000(node=0|zone=2)
[   15.723881] page_type: f5(slab)
[   15.724005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.724240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.724483] page dumped because: kasan: bad access detected
[   15.724736] 
[   15.724886] Memory state around the buggy address:
[   15.725131]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.725483]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.725810] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.726139]                                      ^
[   15.726474]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726802]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.727132] ==================================================================
[   15.991323] ==================================================================
[   15.992069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.992347] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.992814] 
[   15.992913] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.992959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.992972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.992995] Call Trace:
[   15.993027]  <TASK>
[   15.993048]  dump_stack_lvl+0x73/0xb0
[   15.993079]  print_report+0xd1/0x610
[   15.993102]  ? __virt_addr_valid+0x1db/0x2d0
[   15.993126]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.993148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.993172]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.993195]  kasan_report+0x141/0x180
[   15.993218]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.993245]  kasan_check_range+0x10c/0x1c0
[   15.993269]  __kasan_check_write+0x18/0x20
[   15.993289]  kasan_atomics_helper+0x1b22/0x5450
[   15.993312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.993335]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.993362]  ? kasan_atomics+0x152/0x310
[   15.993388]  kasan_atomics+0x1dc/0x310
[   15.993411]  ? __pfx_kasan_atomics+0x10/0x10
[   15.993435]  ? __pfx_read_tsc+0x10/0x10
[   15.993457]  ? ktime_get_ts64+0x86/0x230
[   15.993482]  kunit_try_run_case+0x1a5/0x480
[   15.993508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.993557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.993583]  ? __kthread_parkme+0x82/0x180
[   15.993604]  ? preempt_count_sub+0x50/0x80
[   15.993629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.993703]  kthread+0x337/0x6f0
[   15.993722]  ? trace_preempt_on+0x20/0xc0
[   15.993746]  ? __pfx_kthread+0x10/0x10
[   15.993767]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.993789]  ? calculate_sigpending+0x7b/0xa0
[   15.993814]  ? __pfx_kthread+0x10/0x10
[   15.993835]  ret_from_fork+0x116/0x1d0
[   15.993854]  ? __pfx_kthread+0x10/0x10
[   15.993874]  ret_from_fork_asm+0x1a/0x30
[   15.993906]  </TASK>
[   15.993917] 
[   16.001901] Allocated by task 282:
[   16.002110]  kasan_save_stack+0x45/0x70
[   16.002320]  kasan_save_track+0x18/0x40
[   16.002616]  kasan_save_alloc_info+0x3b/0x50
[   16.002851]  __kasan_kmalloc+0xb7/0xc0
[   16.003058]  __kmalloc_cache_noprof+0x189/0x420
[   16.003279]  kasan_atomics+0x95/0x310
[   16.003469]  kunit_try_run_case+0x1a5/0x480
[   16.003618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.003789]  kthread+0x337/0x6f0
[   16.003908]  ret_from_fork+0x116/0x1d0
[   16.004049]  ret_from_fork_asm+0x1a/0x30
[   16.004187] 
[   16.004259] The buggy address belongs to the object at ffff88810342d080
[   16.004259]  which belongs to the cache kmalloc-64 of size 64
[   16.004598] The buggy address is located 0 bytes to the right of
[   16.004598]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.004956] 
[   16.005039] The buggy address belongs to the physical page:
[   16.005292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.005650] flags: 0x200000000000000(node=0|zone=2)
[   16.005881] page_type: f5(slab)
[   16.006061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.006502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.006847] page dumped because: kasan: bad access detected
[   16.007115] 
[   16.007210] Memory state around the buggy address:
[   16.007485]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.007836]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.008198] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.008555]                                      ^
[   16.008789]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.009100]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.009386] ==================================================================
[   15.766770] ==================================================================
[   15.767250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.767599] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.767881] 
[   15.767994] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.768050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.768063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.768085] Call Trace:
[   15.768105]  <TASK>
[   15.768126]  dump_stack_lvl+0x73/0xb0
[   15.768166]  print_report+0xd1/0x610
[   15.768190]  ? __virt_addr_valid+0x1db/0x2d0
[   15.768214]  ? kasan_atomics_helper+0x1467/0x5450
[   15.768248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.768272]  ? kasan_atomics_helper+0x1467/0x5450
[   15.768306]  kasan_report+0x141/0x180
[   15.768329]  ? kasan_atomics_helper+0x1467/0x5450
[   15.768359]  kasan_check_range+0x10c/0x1c0
[   15.768383]  __kasan_check_write+0x18/0x20
[   15.768404]  kasan_atomics_helper+0x1467/0x5450
[   15.768447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.768471]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.768498]  ? kasan_atomics+0x152/0x310
[   15.768526]  kasan_atomics+0x1dc/0x310
[   15.768549]  ? __pfx_kasan_atomics+0x10/0x10
[   15.768574]  ? __pfx_read_tsc+0x10/0x10
[   15.768595]  ? ktime_get_ts64+0x86/0x230
[   15.768621]  kunit_try_run_case+0x1a5/0x480
[   15.768657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.768679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.768715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.768748]  ? __kthread_parkme+0x82/0x180
[   15.768769]  ? preempt_count_sub+0x50/0x80
[   15.768795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.768831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.768859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.768894]  kthread+0x337/0x6f0
[   15.768914]  ? trace_preempt_on+0x20/0xc0
[   15.768937]  ? __pfx_kthread+0x10/0x10
[   15.768958]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.768981]  ? calculate_sigpending+0x7b/0xa0
[   15.769006]  ? __pfx_kthread+0x10/0x10
[   15.769036]  ret_from_fork+0x116/0x1d0
[   15.769055]  ? __pfx_kthread+0x10/0x10
[   15.769075]  ret_from_fork_asm+0x1a/0x30
[   15.769116]  </TASK>
[   15.769126] 
[   15.776492] Allocated by task 282:
[   15.776640]  kasan_save_stack+0x45/0x70
[   15.776794]  kasan_save_track+0x18/0x40
[   15.776959]  kasan_save_alloc_info+0x3b/0x50
[   15.777184]  __kasan_kmalloc+0xb7/0xc0
[   15.777399]  __kmalloc_cache_noprof+0x189/0x420
[   15.777644]  kasan_atomics+0x95/0x310
[   15.777844]  kunit_try_run_case+0x1a5/0x480
[   15.778074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778350]  kthread+0x337/0x6f0
[   15.778537]  ret_from_fork+0x116/0x1d0
[   15.778750]  ret_from_fork_asm+0x1a/0x30
[   15.778927] 
[   15.779026] The buggy address belongs to the object at ffff88810342d080
[   15.779026]  which belongs to the cache kmalloc-64 of size 64
[   15.779530] The buggy address is located 0 bytes to the right of
[   15.779530]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.780053] 
[   15.780157] The buggy address belongs to the physical page:
[   15.780394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.780679] flags: 0x200000000000000(node=0|zone=2)
[   15.780853] page_type: f5(slab)
[   15.780977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.781220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.781515] page dumped because: kasan: bad access detected
[   15.781776] 
[   15.781868] Memory state around the buggy address:
[   15.782102]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.782436]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.782773] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.783091]                                      ^
[   15.783317]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.783678]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.783984] ==================================================================
[   15.276111] ==================================================================
[   15.276431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.276781] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.277034] 
[   15.277126] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.277174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.277187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.277209] Call Trace:
[   15.277229]  <TASK>
[   15.277250]  dump_stack_lvl+0x73/0xb0
[   15.277278]  print_report+0xd1/0x610
[   15.277301]  ? __virt_addr_valid+0x1db/0x2d0
[   15.277324]  ? kasan_atomics_helper+0x992/0x5450
[   15.277344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.277367]  ? kasan_atomics_helper+0x992/0x5450
[   15.277388]  kasan_report+0x141/0x180
[   15.277410]  ? kasan_atomics_helper+0x992/0x5450
[   15.277436]  kasan_check_range+0x10c/0x1c0
[   15.277472]  __kasan_check_write+0x18/0x20
[   15.277502]  kasan_atomics_helper+0x992/0x5450
[   15.277525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.277561]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.277587]  ? kasan_atomics+0x152/0x310
[   15.277614]  kasan_atomics+0x1dc/0x310
[   15.277637]  ? __pfx_kasan_atomics+0x10/0x10
[   15.277661]  ? __pfx_read_tsc+0x10/0x10
[   15.277685]  ? ktime_get_ts64+0x86/0x230
[   15.277710]  kunit_try_run_case+0x1a5/0x480
[   15.277736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.277759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.277785]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.277809]  ? __kthread_parkme+0x82/0x180
[   15.277831]  ? preempt_count_sub+0x50/0x80
[   15.277856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.277880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.277906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.277932]  kthread+0x337/0x6f0
[   15.277953]  ? trace_preempt_on+0x20/0xc0
[   15.277977]  ? __pfx_kthread+0x10/0x10
[   15.277998]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.278032]  ? calculate_sigpending+0x7b/0xa0
[   15.278057]  ? __pfx_kthread+0x10/0x10
[   15.278079]  ret_from_fork+0x116/0x1d0
[   15.278098]  ? __pfx_kthread+0x10/0x10
[   15.278119]  ret_from_fork_asm+0x1a/0x30
[   15.278151]  </TASK>
[   15.278163] 
[   15.286107] Allocated by task 282:
[   15.286321]  kasan_save_stack+0x45/0x70
[   15.286594]  kasan_save_track+0x18/0x40
[   15.286783]  kasan_save_alloc_info+0x3b/0x50
[   15.286988]  __kasan_kmalloc+0xb7/0xc0
[   15.287144]  __kmalloc_cache_noprof+0x189/0x420
[   15.287340]  kasan_atomics+0x95/0x310
[   15.287594]  kunit_try_run_case+0x1a5/0x480
[   15.287789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.288047]  kthread+0x337/0x6f0
[   15.288242]  ret_from_fork+0x116/0x1d0
[   15.288398]  ret_from_fork_asm+0x1a/0x30
[   15.288633] 
[   15.288725] The buggy address belongs to the object at ffff88810342d080
[   15.288725]  which belongs to the cache kmalloc-64 of size 64
[   15.289230] The buggy address is located 0 bytes to the right of
[   15.289230]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.289800] 
[   15.289925] The buggy address belongs to the physical page:
[   15.290132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.290376] flags: 0x200000000000000(node=0|zone=2)
[   15.290849] page_type: f5(slab)
[   15.291052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.291394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.291732] page dumped because: kasan: bad access detected
[   15.291987] 
[   15.292097] Memory state around the buggy address:
[   15.292298]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.292617]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292921] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.293247]                                      ^
[   15.293491]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.293804]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294122] ==================================================================
[   16.010168] ==================================================================
[   16.010889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.011747] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.012137] 
[   16.012234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.012283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.012296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.012320] Call Trace:
[   16.012342]  <TASK>
[   16.012363]  dump_stack_lvl+0x73/0xb0
[   16.012394]  print_report+0xd1/0x610
[   16.012418]  ? __virt_addr_valid+0x1db/0x2d0
[   16.012442]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.012464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.012488]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.012512]  kasan_report+0x141/0x180
[   16.012534]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.012561]  kasan_check_range+0x10c/0x1c0
[   16.012586]  __kasan_check_write+0x18/0x20
[   16.012606]  kasan_atomics_helper+0x1c18/0x5450
[   16.012630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.012653]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.012679]  ? kasan_atomics+0x152/0x310
[   16.012706]  kasan_atomics+0x1dc/0x310
[   16.012728]  ? __pfx_kasan_atomics+0x10/0x10
[   16.012753]  ? __pfx_read_tsc+0x10/0x10
[   16.012775]  ? ktime_get_ts64+0x86/0x230
[   16.012801]  kunit_try_run_case+0x1a5/0x480
[   16.012828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.012855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.012881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.012907]  ? __kthread_parkme+0x82/0x180
[   16.012928]  ? preempt_count_sub+0x50/0x80
[   16.012953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.012977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.013001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.013039]  kthread+0x337/0x6f0
[   16.013058]  ? trace_preempt_on+0x20/0xc0
[   16.013083]  ? __pfx_kthread+0x10/0x10
[   16.013104]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.013127]  ? calculate_sigpending+0x7b/0xa0
[   16.013151]  ? __pfx_kthread+0x10/0x10
[   16.013172]  ret_from_fork+0x116/0x1d0
[   16.013192]  ? __pfx_kthread+0x10/0x10
[   16.013212]  ret_from_fork_asm+0x1a/0x30
[   16.013243]  </TASK>
[   16.013254] 
[   16.021410] Allocated by task 282:
[   16.021606]  kasan_save_stack+0x45/0x70
[   16.021815]  kasan_save_track+0x18/0x40
[   16.022035]  kasan_save_alloc_info+0x3b/0x50
[   16.022230]  __kasan_kmalloc+0xb7/0xc0
[   16.022366]  __kmalloc_cache_noprof+0x189/0x420
[   16.022795]  kasan_atomics+0x95/0x310
[   16.023003]  kunit_try_run_case+0x1a5/0x480
[   16.023211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.023387]  kthread+0x337/0x6f0
[   16.023721]  ret_from_fork+0x116/0x1d0
[   16.023910]  ret_from_fork_asm+0x1a/0x30
[   16.024064] 
[   16.024137] The buggy address belongs to the object at ffff88810342d080
[   16.024137]  which belongs to the cache kmalloc-64 of size 64
[   16.024653] The buggy address is located 0 bytes to the right of
[   16.024653]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.025198] 
[   16.025276] The buggy address belongs to the physical page:
[   16.025524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.025902] flags: 0x200000000000000(node=0|zone=2)
[   16.026149] page_type: f5(slab)
[   16.026322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.026772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.027118] page dumped because: kasan: bad access detected
[   16.027306] 
[   16.027378] Memory state around the buggy address:
[   16.027792]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.028131]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.028393] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.028608]                                      ^
[   16.028764]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.028987]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.029316] ==================================================================
[   16.120959] ==================================================================
[   16.121280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.122224] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.122564] 
[   16.122665] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.122714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.122727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.122750] Call Trace:
[   16.122774]  <TASK>
[   16.122795]  dump_stack_lvl+0x73/0xb0
[   16.122830]  print_report+0xd1/0x610
[   16.122855]  ? __virt_addr_valid+0x1db/0x2d0
[   16.122880]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.122902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.122925]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.122947]  kasan_report+0x141/0x180
[   16.122970]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.122997]  kasan_check_range+0x10c/0x1c0
[   16.123034]  __kasan_check_write+0x18/0x20
[   16.123054]  kasan_atomics_helper+0x1f43/0x5450
[   16.123078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.123101]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.123127]  ? kasan_atomics+0x152/0x310
[   16.123154]  kasan_atomics+0x1dc/0x310
[   16.123177]  ? __pfx_kasan_atomics+0x10/0x10
[   16.123201]  ? __pfx_read_tsc+0x10/0x10
[   16.123223]  ? ktime_get_ts64+0x86/0x230
[   16.123248]  kunit_try_run_case+0x1a5/0x480
[   16.123274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.123297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.123322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.123356]  ? __kthread_parkme+0x82/0x180
[   16.123379]  ? preempt_count_sub+0x50/0x80
[   16.123404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.123440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.123493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.123518]  kthread+0x337/0x6f0
[   16.123538]  ? trace_preempt_on+0x20/0xc0
[   16.123563]  ? __pfx_kthread+0x10/0x10
[   16.123585]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.123608]  ? calculate_sigpending+0x7b/0xa0
[   16.123633]  ? __pfx_kthread+0x10/0x10
[   16.123655]  ret_from_fork+0x116/0x1d0
[   16.123675]  ? __pfx_kthread+0x10/0x10
[   16.123695]  ret_from_fork_asm+0x1a/0x30
[   16.123728]  </TASK>
[   16.123740] 
[   16.131265] Allocated by task 282:
[   16.131460]  kasan_save_stack+0x45/0x70
[   16.131836]  kasan_save_track+0x18/0x40
[   16.131969]  kasan_save_alloc_info+0x3b/0x50
[   16.132186]  __kasan_kmalloc+0xb7/0xc0
[   16.132391]  __kmalloc_cache_noprof+0x189/0x420
[   16.132620]  kasan_atomics+0x95/0x310
[   16.132771]  kunit_try_run_case+0x1a5/0x480
[   16.132919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133143]  kthread+0x337/0x6f0
[   16.133310]  ret_from_fork+0x116/0x1d0
[   16.133573]  ret_from_fork_asm+0x1a/0x30
[   16.133766] 
[   16.133863] The buggy address belongs to the object at ffff88810342d080
[   16.133863]  which belongs to the cache kmalloc-64 of size 64
[   16.134313] The buggy address is located 0 bytes to the right of
[   16.134313]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.134941] 
[   16.135034] The buggy address belongs to the physical page:
[   16.135204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.135436] flags: 0x200000000000000(node=0|zone=2)
[   16.135599] page_type: f5(slab)
[   16.135722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.135945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.136175] page dumped because: kasan: bad access detected
[   16.136343] 
[   16.136410] Memory state around the buggy address:
[   16.136622]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136936]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.137475] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.137783]                                      ^
[   16.137998]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.138315]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.138616] ==================================================================
[   16.101830] ==================================================================
[   16.102149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.102455] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.102758] 
[   16.102876] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.102922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.102933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.102956] Call Trace:
[   16.102976]  <TASK>
[   16.102996]  dump_stack_lvl+0x73/0xb0
[   16.103039]  print_report+0xd1/0x610
[   16.103062]  ? __virt_addr_valid+0x1db/0x2d0
[   16.103085]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.103107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.103131]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.103154]  kasan_report+0x141/0x180
[   16.103177]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.103203]  kasan_check_range+0x10c/0x1c0
[   16.103227]  __kasan_check_write+0x18/0x20
[   16.103247]  kasan_atomics_helper+0x1eaa/0x5450
[   16.103271]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.103294]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.103319]  ? kasan_atomics+0x152/0x310
[   16.103346]  kasan_atomics+0x1dc/0x310
[   16.103369]  ? __pfx_kasan_atomics+0x10/0x10
[   16.103393]  ? __pfx_read_tsc+0x10/0x10
[   16.103415]  ? ktime_get_ts64+0x86/0x230
[   16.103451]  kunit_try_run_case+0x1a5/0x480
[   16.103477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.103499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.103524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.103549]  ? __kthread_parkme+0x82/0x180
[   16.103571]  ? preempt_count_sub+0x50/0x80
[   16.103596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.103620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.103645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.103671]  kthread+0x337/0x6f0
[   16.103691]  ? trace_preempt_on+0x20/0xc0
[   16.103715]  ? __pfx_kthread+0x10/0x10
[   16.103735]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.103760]  ? calculate_sigpending+0x7b/0xa0
[   16.103785]  ? __pfx_kthread+0x10/0x10
[   16.103807]  ret_from_fork+0x116/0x1d0
[   16.103826]  ? __pfx_kthread+0x10/0x10
[   16.103846]  ret_from_fork_asm+0x1a/0x30
[   16.103878]  </TASK>
[   16.103889] 
[   16.111773] Allocated by task 282:
[   16.111932]  kasan_save_stack+0x45/0x70
[   16.112095]  kasan_save_track+0x18/0x40
[   16.112265]  kasan_save_alloc_info+0x3b/0x50
[   16.112533]  __kasan_kmalloc+0xb7/0xc0
[   16.112723]  __kmalloc_cache_noprof+0x189/0x420
[   16.112956]  kasan_atomics+0x95/0x310
[   16.113105]  kunit_try_run_case+0x1a5/0x480
[   16.113315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.113498]  kthread+0x337/0x6f0
[   16.113619]  ret_from_fork+0x116/0x1d0
[   16.113749]  ret_from_fork_asm+0x1a/0x30
[   16.113886] 
[   16.113957] The buggy address belongs to the object at ffff88810342d080
[   16.113957]  which belongs to the cache kmalloc-64 of size 64
[   16.114828] The buggy address is located 0 bytes to the right of
[   16.114828]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.115397] 
[   16.115569] The buggy address belongs to the physical page:
[   16.115801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.116067] flags: 0x200000000000000(node=0|zone=2)
[   16.116230] page_type: f5(slab)
[   16.116350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.116879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.117366] page dumped because: kasan: bad access detected
[   16.117823] 
[   16.117922] Memory state around the buggy address:
[   16.118181]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.118438]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.118808] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.119137]                                      ^
[   16.119361]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119696]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119984] ==================================================================
[   15.147920] ==================================================================
[   15.148872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.149392] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.149999] 
[   15.150240] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.150288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.150310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.150332] Call Trace:
[   15.150354]  <TASK>
[   15.150385]  dump_stack_lvl+0x73/0xb0
[   15.150417]  print_report+0xd1/0x610
[   15.150440]  ? __virt_addr_valid+0x1db/0x2d0
[   15.150465]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.150486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.150511]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.150542]  kasan_report+0x141/0x180
[   15.150564]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.150591]  kasan_check_range+0x10c/0x1c0
[   15.150627]  __kasan_check_write+0x18/0x20
[   15.150646]  kasan_atomics_helper+0x5fe/0x5450
[   15.150670]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.150694]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.150720]  ? kasan_atomics+0x152/0x310
[   15.150748]  kasan_atomics+0x1dc/0x310
[   15.150771]  ? __pfx_kasan_atomics+0x10/0x10
[   15.150796]  ? __pfx_read_tsc+0x10/0x10
[   15.150817]  ? ktime_get_ts64+0x86/0x230
[   15.150843]  kunit_try_run_case+0x1a5/0x480
[   15.150869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.150918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.150942]  ? __kthread_parkme+0x82/0x180
[   15.150964]  ? preempt_count_sub+0x50/0x80
[   15.150988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.151022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.151050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.151075]  kthread+0x337/0x6f0
[   15.151095]  ? trace_preempt_on+0x20/0xc0
[   15.151119]  ? __pfx_kthread+0x10/0x10
[   15.151139]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.151162]  ? calculate_sigpending+0x7b/0xa0
[   15.151187]  ? __pfx_kthread+0x10/0x10
[   15.151209]  ret_from_fork+0x116/0x1d0
[   15.151228]  ? __pfx_kthread+0x10/0x10
[   15.151248]  ret_from_fork_asm+0x1a/0x30
[   15.151280]  </TASK>
[   15.151292] 
[   15.163059] Allocated by task 282:
[   15.163216]  kasan_save_stack+0x45/0x70
[   15.163374]  kasan_save_track+0x18/0x40
[   15.163696]  kasan_save_alloc_info+0x3b/0x50
[   15.164088]  __kasan_kmalloc+0xb7/0xc0
[   15.164424]  __kmalloc_cache_noprof+0x189/0x420
[   15.164913]  kasan_atomics+0x95/0x310
[   15.165276]  kunit_try_run_case+0x1a5/0x480
[   15.165694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.166259]  kthread+0x337/0x6f0
[   15.166620]  ret_from_fork+0x116/0x1d0
[   15.167035]  ret_from_fork_asm+0x1a/0x30
[   15.167405] 
[   15.167580] The buggy address belongs to the object at ffff88810342d080
[   15.167580]  which belongs to the cache kmalloc-64 of size 64
[   15.168314] The buggy address is located 0 bytes to the right of
[   15.168314]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.168705] 
[   15.168781] The buggy address belongs to the physical page:
[   15.168961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.169216] flags: 0x200000000000000(node=0|zone=2)
[   15.169383] page_type: f5(slab)
[   15.169559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.169790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.170292] page dumped because: kasan: bad access detected
[   15.170558] 
[   15.170655] Memory state around the buggy address:
[   15.170869]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.171171]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.171508] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.171798]                                      ^
[   15.172038]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.172354]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.172671] ==================================================================
[   15.875824] ==================================================================
[   15.876375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.876812] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.877176] 
[   15.877294] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.877342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.877355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.877378] Call Trace:
[   15.877399]  <TASK>
[   15.877438]  dump_stack_lvl+0x73/0xb0
[   15.877471]  print_report+0xd1/0x610
[   15.877494]  ? __virt_addr_valid+0x1db/0x2d0
[   15.877519]  ? kasan_atomics_helper+0x177f/0x5450
[   15.877541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.877565]  ? kasan_atomics_helper+0x177f/0x5450
[   15.877589]  kasan_report+0x141/0x180
[   15.877611]  ? kasan_atomics_helper+0x177f/0x5450
[   15.877639]  kasan_check_range+0x10c/0x1c0
[   15.877665]  __kasan_check_write+0x18/0x20
[   15.877685]  kasan_atomics_helper+0x177f/0x5450
[   15.877709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.877732]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.877759]  ? kasan_atomics+0x152/0x310
[   15.877786]  kasan_atomics+0x1dc/0x310
[   15.877810]  ? __pfx_kasan_atomics+0x10/0x10
[   15.877835]  ? __pfx_read_tsc+0x10/0x10
[   15.877857]  ? ktime_get_ts64+0x86/0x230
[   15.877883]  kunit_try_run_case+0x1a5/0x480
[   15.877910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.877933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.877959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.877983]  ? __kthread_parkme+0x82/0x180
[   15.878004]  ? preempt_count_sub+0x50/0x80
[   15.878039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.878063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.878087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.878113]  kthread+0x337/0x6f0
[   15.878132]  ? trace_preempt_on+0x20/0xc0
[   15.878156]  ? __pfx_kthread+0x10/0x10
[   15.878177]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.878198]  ? calculate_sigpending+0x7b/0xa0
[   15.878223]  ? __pfx_kthread+0x10/0x10
[   15.878244]  ret_from_fork+0x116/0x1d0
[   15.878264]  ? __pfx_kthread+0x10/0x10
[   15.878296]  ret_from_fork_asm+0x1a/0x30
[   15.878327]  </TASK>
[   15.878338] 
[   15.886408] Allocated by task 282:
[   15.886607]  kasan_save_stack+0x45/0x70
[   15.886818]  kasan_save_track+0x18/0x40
[   15.887007]  kasan_save_alloc_info+0x3b/0x50
[   15.887229]  __kasan_kmalloc+0xb7/0xc0
[   15.887413]  __kmalloc_cache_noprof+0x189/0x420
[   15.887649]  kasan_atomics+0x95/0x310
[   15.887834]  kunit_try_run_case+0x1a5/0x480
[   15.888022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.888201]  kthread+0x337/0x6f0
[   15.888360]  ret_from_fork+0x116/0x1d0
[   15.888693]  ret_from_fork_asm+0x1a/0x30
[   15.888899] 
[   15.888991] The buggy address belongs to the object at ffff88810342d080
[   15.888991]  which belongs to the cache kmalloc-64 of size 64
[   15.889466] The buggy address is located 0 bytes to the right of
[   15.889466]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.889932] 
[   15.890040] The buggy address belongs to the physical page:
[   15.890294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.890643] flags: 0x200000000000000(node=0|zone=2)
[   15.890812] page_type: f5(slab)
[   15.890937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.891182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.891410] page dumped because: kasan: bad access detected
[   15.891643] 
[   15.891733] Memory state around the buggy address:
[   15.891957]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.892279]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.892595] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.892854]                                      ^
[   15.893018]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.893234]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.893564] ==================================================================
[   15.727838] ==================================================================
[   15.728286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.728764] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.729104] 
[   15.729251] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.729311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.729324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.729346] Call Trace:
[   15.729366]  <TASK>
[   15.729386]  dump_stack_lvl+0x73/0xb0
[   15.729437]  print_report+0xd1/0x610
[   15.729461]  ? __virt_addr_valid+0x1db/0x2d0
[   15.729485]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.729508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.729532]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.729555]  kasan_report+0x141/0x180
[   15.729578]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.729605]  kasan_check_range+0x10c/0x1c0
[   15.729629]  __kasan_check_read+0x15/0x20
[   15.729649]  kasan_atomics_helper+0x13b5/0x5450
[   15.729673]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.729695]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.729721]  ? kasan_atomics+0x152/0x310
[   15.729748]  kasan_atomics+0x1dc/0x310
[   15.729771]  ? __pfx_kasan_atomics+0x10/0x10
[   15.729796]  ? __pfx_read_tsc+0x10/0x10
[   15.729817]  ? ktime_get_ts64+0x86/0x230
[   15.729843]  kunit_try_run_case+0x1a5/0x480
[   15.729868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.729891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.729916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.729941]  ? __kthread_parkme+0x82/0x180
[   15.729962]  ? preempt_count_sub+0x50/0x80
[   15.729987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.730048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.730106]  kthread+0x337/0x6f0
[   15.730127]  ? trace_preempt_on+0x20/0xc0
[   15.730151]  ? __pfx_kthread+0x10/0x10
[   15.730183]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.730206]  ? calculate_sigpending+0x7b/0xa0
[   15.730231]  ? __pfx_kthread+0x10/0x10
[   15.730252]  ret_from_fork+0x116/0x1d0
[   15.730272]  ? __pfx_kthread+0x10/0x10
[   15.730293]  ret_from_fork_asm+0x1a/0x30
[   15.730353]  </TASK>
[   15.730363] 
[   15.738717] Allocated by task 282:
[   15.738913]  kasan_save_stack+0x45/0x70
[   15.739150]  kasan_save_track+0x18/0x40
[   15.739364]  kasan_save_alloc_info+0x3b/0x50
[   15.739543]  __kasan_kmalloc+0xb7/0xc0
[   15.739736]  __kmalloc_cache_noprof+0x189/0x420
[   15.740036]  kasan_atomics+0x95/0x310
[   15.740207]  kunit_try_run_case+0x1a5/0x480
[   15.740406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.740652]  kthread+0x337/0x6f0
[   15.740826]  ret_from_fork+0x116/0x1d0
[   15.741057]  ret_from_fork_asm+0x1a/0x30
[   15.741265] 
[   15.741335] The buggy address belongs to the object at ffff88810342d080
[   15.741335]  which belongs to the cache kmalloc-64 of size 64
[   15.741940] The buggy address is located 0 bytes to the right of
[   15.741940]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.742473] 
[   15.742608] The buggy address belongs to the physical page:
[   15.742885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.743204] flags: 0x200000000000000(node=0|zone=2)
[   15.743491] page_type: f5(slab)
[   15.743614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.743837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.744125] page dumped because: kasan: bad access detected
[   15.744383] 
[   15.744501] Memory state around the buggy address:
[   15.744717]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.745037]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.745342] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.745636]                                      ^
[   15.745789]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746102]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746555] ==================================================================
[   15.972637] ==================================================================
[   15.972987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.973693] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.974046] 
[   15.974158] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.974205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.974239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.974262] Call Trace:
[   15.974283]  <TASK>
[   15.974303]  dump_stack_lvl+0x73/0xb0
[   15.974333]  print_report+0xd1/0x610
[   15.974356]  ? __virt_addr_valid+0x1db/0x2d0
[   15.974380]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.974402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.974453]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.974476]  kasan_report+0x141/0x180
[   15.974498]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.974525]  kasan_check_range+0x10c/0x1c0
[   15.974550]  __kasan_check_write+0x18/0x20
[   15.974571]  kasan_atomics_helper+0x1a7f/0x5450
[   15.974594]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.974617]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.974643]  ? kasan_atomics+0x152/0x310
[   15.974686]  kasan_atomics+0x1dc/0x310
[   15.974710]  ? __pfx_kasan_atomics+0x10/0x10
[   15.974735]  ? __pfx_read_tsc+0x10/0x10
[   15.974757]  ? ktime_get_ts64+0x86/0x230
[   15.974782]  kunit_try_run_case+0x1a5/0x480
[   15.974809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.974873]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.974897]  ? __kthread_parkme+0x82/0x180
[   15.974919]  ? preempt_count_sub+0x50/0x80
[   15.974944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.975051]  kthread+0x337/0x6f0
[   15.975071]  ? trace_preempt_on+0x20/0xc0
[   15.975095]  ? __pfx_kthread+0x10/0x10
[   15.975116]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.975138]  ? calculate_sigpending+0x7b/0xa0
[   15.975163]  ? __pfx_kthread+0x10/0x10
[   15.975185]  ret_from_fork+0x116/0x1d0
[   15.975203]  ? __pfx_kthread+0x10/0x10
[   15.975224]  ret_from_fork_asm+0x1a/0x30
[   15.975256]  </TASK>
[   15.975267] 
[   15.982891] Allocated by task 282:
[   15.983118]  kasan_save_stack+0x45/0x70
[   15.983351]  kasan_save_track+0x18/0x40
[   15.983567]  kasan_save_alloc_info+0x3b/0x50
[   15.983721]  __kasan_kmalloc+0xb7/0xc0
[   15.983855]  __kmalloc_cache_noprof+0x189/0x420
[   15.984023]  kasan_atomics+0x95/0x310
[   15.984159]  kunit_try_run_case+0x1a5/0x480
[   15.984307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.984513]  kthread+0x337/0x6f0
[   15.984682]  ret_from_fork+0x116/0x1d0
[   15.984963]  ret_from_fork_asm+0x1a/0x30
[   15.985170] 
[   15.985266] The buggy address belongs to the object at ffff88810342d080
[   15.985266]  which belongs to the cache kmalloc-64 of size 64
[   15.986212] The buggy address is located 0 bytes to the right of
[   15.986212]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.986806] 
[   15.986906] The buggy address belongs to the physical page:
[   15.987112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.987515] flags: 0x200000000000000(node=0|zone=2)
[   15.987693] page_type: f5(slab)
[   15.987814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.988057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.988401] page dumped because: kasan: bad access detected
[   15.988660] 
[   15.988755] Memory state around the buggy address:
[   15.989046]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.989273]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.989482] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.989689]                                      ^
[   15.989840]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990182]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990488] ==================================================================
[   15.784650] ==================================================================
[   15.784905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.785879] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.786256] 
[   15.786396] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.786464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.786477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.786500] Call Trace:
[   15.786521]  <TASK>
[   15.786551]  dump_stack_lvl+0x73/0xb0
[   15.786585]  print_report+0xd1/0x610
[   15.786620]  ? __virt_addr_valid+0x1db/0x2d0
[   15.786645]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.786666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.786690]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.786722]  kasan_report+0x141/0x180
[   15.786745]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.786772]  __asan_report_store8_noabort+0x1b/0x30
[   15.786809]  kasan_atomics_helper+0x50d4/0x5450
[   15.786832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.786854]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.786881]  ? kasan_atomics+0x152/0x310
[   15.786916]  kasan_atomics+0x1dc/0x310
[   15.786939]  ? __pfx_kasan_atomics+0x10/0x10
[   15.786964]  ? __pfx_read_tsc+0x10/0x10
[   15.786996]  ? ktime_get_ts64+0x86/0x230
[   15.787030]  kunit_try_run_case+0x1a5/0x480
[   15.787055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.787078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.787112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.787136]  ? __kthread_parkme+0x82/0x180
[   15.787159]  ? preempt_count_sub+0x50/0x80
[   15.787195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.787219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.787243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.787277]  kthread+0x337/0x6f0
[   15.787296]  ? trace_preempt_on+0x20/0xc0
[   15.787321]  ? __pfx_kthread+0x10/0x10
[   15.787352]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.787374]  ? calculate_sigpending+0x7b/0xa0
[   15.787399]  ? __pfx_kthread+0x10/0x10
[   15.787448]  ret_from_fork+0x116/0x1d0
[   15.787468]  ? __pfx_kthread+0x10/0x10
[   15.787489]  ret_from_fork_asm+0x1a/0x30
[   15.787532]  </TASK>
[   15.787544] 
[   15.795166] Allocated by task 282:
[   15.795352]  kasan_save_stack+0x45/0x70
[   15.795535]  kasan_save_track+0x18/0x40
[   15.795750]  kasan_save_alloc_info+0x3b/0x50
[   15.795933]  __kasan_kmalloc+0xb7/0xc0
[   15.796117]  __kmalloc_cache_noprof+0x189/0x420
[   15.796313]  kasan_atomics+0x95/0x310
[   15.796494]  kunit_try_run_case+0x1a5/0x480
[   15.796643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796819]  kthread+0x337/0x6f0
[   15.796949]  ret_from_fork+0x116/0x1d0
[   15.797098]  ret_from_fork_asm+0x1a/0x30
[   15.797239] 
[   15.797312] The buggy address belongs to the object at ffff88810342d080
[   15.797312]  which belongs to the cache kmalloc-64 of size 64
[   15.797666] The buggy address is located 0 bytes to the right of
[   15.797666]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.798294] 
[   15.798429] The buggy address belongs to the physical page:
[   15.798715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.799151] flags: 0x200000000000000(node=0|zone=2)
[   15.799435] page_type: f5(slab)
[   15.799608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.799918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.800158] page dumped because: kasan: bad access detected
[   15.800344] 
[   15.800465] Memory state around the buggy address:
[   15.800691]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801041]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.801361] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.801682]                                      ^
[   15.801893]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802209]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802532] ==================================================================
[   15.571360] ==================================================================
[   15.572061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.572351] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.572760] 
[   15.572883] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.572931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.572943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.572970] Call Trace:
[   15.572990]  <TASK>
[   15.573022]  dump_stack_lvl+0x73/0xb0
[   15.573052]  print_report+0xd1/0x610
[   15.573077]  ? __virt_addr_valid+0x1db/0x2d0
[   15.573101]  ? kasan_atomics_helper+0x1079/0x5450
[   15.573123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.573147]  ? kasan_atomics_helper+0x1079/0x5450
[   15.573170]  kasan_report+0x141/0x180
[   15.573193]  ? kasan_atomics_helper+0x1079/0x5450
[   15.573220]  kasan_check_range+0x10c/0x1c0
[   15.573244]  __kasan_check_write+0x18/0x20
[   15.573264]  kasan_atomics_helper+0x1079/0x5450
[   15.573290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.573313]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.573339]  ? kasan_atomics+0x152/0x310
[   15.573366]  kasan_atomics+0x1dc/0x310
[   15.573390]  ? __pfx_kasan_atomics+0x10/0x10
[   15.573415]  ? __pfx_read_tsc+0x10/0x10
[   15.573448]  ? ktime_get_ts64+0x86/0x230
[   15.573473]  kunit_try_run_case+0x1a5/0x480
[   15.573499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.573523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.573548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.573574]  ? __kthread_parkme+0x82/0x180
[   15.573595]  ? preempt_count_sub+0x50/0x80
[   15.573619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.573645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.573670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.573695]  kthread+0x337/0x6f0
[   15.573715]  ? trace_preempt_on+0x20/0xc0
[   15.573738]  ? __pfx_kthread+0x10/0x10
[   15.573759]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.573782]  ? calculate_sigpending+0x7b/0xa0
[   15.573808]  ? __pfx_kthread+0x10/0x10
[   15.573829]  ret_from_fork+0x116/0x1d0
[   15.573849]  ? __pfx_kthread+0x10/0x10
[   15.573869]  ret_from_fork_asm+0x1a/0x30
[   15.573901]  </TASK>
[   15.573911] 
[   15.581592] Allocated by task 282:
[   15.581789]  kasan_save_stack+0x45/0x70
[   15.581997]  kasan_save_track+0x18/0x40
[   15.582186]  kasan_save_alloc_info+0x3b/0x50
[   15.582386]  __kasan_kmalloc+0xb7/0xc0
[   15.582593]  __kmalloc_cache_noprof+0x189/0x420
[   15.582799]  kasan_atomics+0x95/0x310
[   15.582984]  kunit_try_run_case+0x1a5/0x480
[   15.583147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.583351]  kthread+0x337/0x6f0
[   15.583493]  ret_from_fork+0x116/0x1d0
[   15.583693]  ret_from_fork_asm+0x1a/0x30
[   15.583893] 
[   15.583992] The buggy address belongs to the object at ffff88810342d080
[   15.583992]  which belongs to the cache kmalloc-64 of size 64
[   15.584363] The buggy address is located 0 bytes to the right of
[   15.584363]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.585224] 
[   15.585327] The buggy address belongs to the physical page:
[   15.585562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.586115] flags: 0x200000000000000(node=0|zone=2)
[   15.586321] page_type: f5(slab)
[   15.586500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.586773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.587119] page dumped because: kasan: bad access detected
[   15.587327] 
[   15.587422] Memory state around the buggy address:
[   15.587630]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.587846]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.588072] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.588287]                                      ^
[   15.588449]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.588766]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.589093] ==================================================================
[   15.173598] ==================================================================
[   15.173972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.174951] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.175200] 
[   15.175325] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.175384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.175398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.175421] Call Trace:
[   15.175442]  <TASK>
[   15.175463]  dump_stack_lvl+0x73/0xb0
[   15.175494]  print_report+0xd1/0x610
[   15.175519]  ? __virt_addr_valid+0x1db/0x2d0
[   15.175543]  ? kasan_atomics_helper+0x697/0x5450
[   15.175578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.175602]  ? kasan_atomics_helper+0x697/0x5450
[   15.175625]  kasan_report+0x141/0x180
[   15.175647]  ? kasan_atomics_helper+0x697/0x5450
[   15.175684]  kasan_check_range+0x10c/0x1c0
[   15.175709]  __kasan_check_write+0x18/0x20
[   15.175729]  kasan_atomics_helper+0x697/0x5450
[   15.175764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.175787]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.175813]  ? kasan_atomics+0x152/0x310
[   15.175840]  kasan_atomics+0x1dc/0x310
[   15.175872]  ? __pfx_kasan_atomics+0x10/0x10
[   15.175897]  ? __pfx_read_tsc+0x10/0x10
[   15.175930]  ? ktime_get_ts64+0x86/0x230
[   15.175955]  kunit_try_run_case+0x1a5/0x480
[   15.175981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.176005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.176039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.176064]  ? __kthread_parkme+0x82/0x180
[   15.176086]  ? preempt_count_sub+0x50/0x80
[   15.176111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.176135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.176160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.176186]  kthread+0x337/0x6f0
[   15.176205]  ? trace_preempt_on+0x20/0xc0
[   15.176238]  ? __pfx_kthread+0x10/0x10
[   15.176259]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.176282]  ? calculate_sigpending+0x7b/0xa0
[   15.176318]  ? __pfx_kthread+0x10/0x10
[   15.176340]  ret_from_fork+0x116/0x1d0
[   15.176359]  ? __pfx_kthread+0x10/0x10
[   15.176381]  ret_from_fork_asm+0x1a/0x30
[   15.176413]  </TASK>
[   15.176424] 
[   15.184105] Allocated by task 282:
[   15.184300]  kasan_save_stack+0x45/0x70
[   15.184528]  kasan_save_track+0x18/0x40
[   15.184722]  kasan_save_alloc_info+0x3b/0x50
[   15.184937]  __kasan_kmalloc+0xb7/0xc0
[   15.185176]  __kmalloc_cache_noprof+0x189/0x420
[   15.185408]  kasan_atomics+0x95/0x310
[   15.185546]  kunit_try_run_case+0x1a5/0x480
[   15.185695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.185899]  kthread+0x337/0x6f0
[   15.186084]  ret_from_fork+0x116/0x1d0
[   15.186275]  ret_from_fork_asm+0x1a/0x30
[   15.186586] 
[   15.186689] The buggy address belongs to the object at ffff88810342d080
[   15.186689]  which belongs to the cache kmalloc-64 of size 64
[   15.187234] The buggy address is located 0 bytes to the right of
[   15.187234]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.187769] 
[   15.187870] The buggy address belongs to the physical page:
[   15.188112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.188476] flags: 0x200000000000000(node=0|zone=2)
[   15.188689] page_type: f5(slab)
[   15.188871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.189209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.189523] page dumped because: kasan: bad access detected
[   15.189788] 
[   15.189859] Memory state around the buggy address:
[   15.190084]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190357]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.190889] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.191128]                                      ^
[   15.191381]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.191868]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.192192] ==================================================================
[   15.624949] ==================================================================
[   15.625426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.625677] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.625900] 
[   15.625989] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.626049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.626062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.626085] Call Trace:
[   15.626107]  <TASK>
[   15.626129]  dump_stack_lvl+0x73/0xb0
[   15.626158]  print_report+0xd1/0x610
[   15.626181]  ? __virt_addr_valid+0x1db/0x2d0
[   15.626206]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.626231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.626255]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.626279]  kasan_report+0x141/0x180
[   15.626302]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.626329]  __asan_report_load4_noabort+0x18/0x20
[   15.626355]  kasan_atomics_helper+0x4a02/0x5450
[   15.626379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.626402]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.626428]  ? kasan_atomics+0x152/0x310
[   15.626454]  kasan_atomics+0x1dc/0x310
[   15.626492]  ? __pfx_kasan_atomics+0x10/0x10
[   15.626517]  ? __pfx_read_tsc+0x10/0x10
[   15.626539]  ? ktime_get_ts64+0x86/0x230
[   15.626565]  kunit_try_run_case+0x1a5/0x480
[   15.626591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.626615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.626641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.626665]  ? __kthread_parkme+0x82/0x180
[   15.626687]  ? preempt_count_sub+0x50/0x80
[   15.626712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.626737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.626761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.626787]  kthread+0x337/0x6f0
[   15.626806]  ? trace_preempt_on+0x20/0xc0
[   15.626830]  ? __pfx_kthread+0x10/0x10
[   15.626850]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.626872]  ? calculate_sigpending+0x7b/0xa0
[   15.626898]  ? __pfx_kthread+0x10/0x10
[   15.626920]  ret_from_fork+0x116/0x1d0
[   15.626939]  ? __pfx_kthread+0x10/0x10
[   15.626960]  ret_from_fork_asm+0x1a/0x30
[   15.626992]  </TASK>
[   15.627003] 
[   15.634632] Allocated by task 282:
[   15.634824]  kasan_save_stack+0x45/0x70
[   15.635004]  kasan_save_track+0x18/0x40
[   15.635187]  kasan_save_alloc_info+0x3b/0x50
[   15.635368]  __kasan_kmalloc+0xb7/0xc0
[   15.635537]  __kmalloc_cache_noprof+0x189/0x420
[   15.635748]  kasan_atomics+0x95/0x310
[   15.635918]  kunit_try_run_case+0x1a5/0x480
[   15.636108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.636354]  kthread+0x337/0x6f0
[   15.636495]  ret_from_fork+0x116/0x1d0
[   15.636709]  ret_from_fork_asm+0x1a/0x30
[   15.636854] 
[   15.636926] The buggy address belongs to the object at ffff88810342d080
[   15.636926]  which belongs to the cache kmalloc-64 of size 64
[   15.637285] The buggy address is located 0 bytes to the right of
[   15.637285]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.637650] 
[   15.637724] The buggy address belongs to the physical page:
[   15.638006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.638377] flags: 0x200000000000000(node=0|zone=2)
[   15.638865] page_type: f5(slab)
[   15.639079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.639431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.639765] page dumped because: kasan: bad access detected
[   15.639946] 
[   15.640026] Memory state around the buggy address:
[   15.640182]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640397]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.641133] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.641474]                                      ^
[   15.641693]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.641978]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.642268] ==================================================================
[   14.948197] ==================================================================
[   14.948747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.949227] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   14.949570] 
[   14.949682] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.949729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.949741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.949763] Call Trace:
[   14.949782]  <TASK>
[   14.949802]  dump_stack_lvl+0x73/0xb0
[   14.949845]  print_report+0xd1/0x610
[   14.949869]  ? __virt_addr_valid+0x1db/0x2d0
[   14.949904]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.949926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.949949]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.949971]  kasan_report+0x141/0x180
[   14.949992]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.950029]  __asan_report_store4_noabort+0x1b/0x30
[   14.950056]  kasan_atomics_helper+0x4ba2/0x5450
[   14.950081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.950106]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.950174]  ? kasan_atomics+0x152/0x310
[   14.950200]  kasan_atomics+0x1dc/0x310
[   14.950252]  ? __pfx_kasan_atomics+0x10/0x10
[   14.950276]  ? __pfx_read_tsc+0x10/0x10
[   14.950297]  ? ktime_get_ts64+0x86/0x230
[   14.950323]  kunit_try_run_case+0x1a5/0x480
[   14.950347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.950369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.950404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.950427]  ? __kthread_parkme+0x82/0x180
[   14.950447]  ? preempt_count_sub+0x50/0x80
[   14.950482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.950506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.950529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.950553]  kthread+0x337/0x6f0
[   14.950571]  ? trace_preempt_on+0x20/0xc0
[   14.950594]  ? __pfx_kthread+0x10/0x10
[   14.950623]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.950644]  ? calculate_sigpending+0x7b/0xa0
[   14.950669]  ? __pfx_kthread+0x10/0x10
[   14.950699]  ret_from_fork+0x116/0x1d0
[   14.950718]  ? __pfx_kthread+0x10/0x10
[   14.950737]  ret_from_fork_asm+0x1a/0x30
[   14.950768]  </TASK>
[   14.950777] 
[   14.959763] Allocated by task 282:
[   14.959997]  kasan_save_stack+0x45/0x70
[   14.960287]  kasan_save_track+0x18/0x40
[   14.960510]  kasan_save_alloc_info+0x3b/0x50
[   14.960704]  __kasan_kmalloc+0xb7/0xc0
[   14.960892]  __kmalloc_cache_noprof+0x189/0x420
[   14.961200]  kasan_atomics+0x95/0x310
[   14.961391]  kunit_try_run_case+0x1a5/0x480
[   14.961674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961934]  kthread+0x337/0x6f0
[   14.962133]  ret_from_fork+0x116/0x1d0
[   14.962409]  ret_from_fork_asm+0x1a/0x30
[   14.962673] 
[   14.962791] The buggy address belongs to the object at ffff88810342d080
[   14.962791]  which belongs to the cache kmalloc-64 of size 64
[   14.963717] The buggy address is located 0 bytes to the right of
[   14.963717]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   14.964320] 
[   14.964471] The buggy address belongs to the physical page:
[   14.964647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   14.964899] flags: 0x200000000000000(node=0|zone=2)
[   14.965079] page_type: f5(slab)
[   14.965364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.965760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.966255] page dumped because: kasan: bad access detected
[   14.966622] 
[   14.966716] Memory state around the buggy address:
[   14.966939]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.967297]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.967520] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.967785]                                      ^
[   14.968462]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.968821]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969196] ==================================================================
[   15.210797] ==================================================================
[   15.211091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.211450] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.211824] 
[   15.211960] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.212007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.212036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.212069] Call Trace:
[   15.212089]  <TASK>
[   15.212109]  dump_stack_lvl+0x73/0xb0
[   15.212150]  print_report+0xd1/0x610
[   15.212174]  ? __virt_addr_valid+0x1db/0x2d0
[   15.212198]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.212221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.212244]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.212267]  kasan_report+0x141/0x180
[   15.212289]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.212316]  kasan_check_range+0x10c/0x1c0
[   15.212341]  __kasan_check_write+0x18/0x20
[   15.212361]  kasan_atomics_helper+0x7c7/0x5450
[   15.212384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.212408]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.212434]  ? kasan_atomics+0x152/0x310
[   15.212461]  kasan_atomics+0x1dc/0x310
[   15.212484]  ? __pfx_kasan_atomics+0x10/0x10
[   15.212509]  ? __pfx_read_tsc+0x10/0x10
[   15.212531]  ? ktime_get_ts64+0x86/0x230
[   15.212557]  kunit_try_run_case+0x1a5/0x480
[   15.212583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.212606]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.212641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.212665]  ? __kthread_parkme+0x82/0x180
[   15.212687]  ? preempt_count_sub+0x50/0x80
[   15.212722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.212747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.212772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.212798]  kthread+0x337/0x6f0
[   15.212826]  ? trace_preempt_on+0x20/0xc0
[   15.212858]  ? __pfx_kthread+0x10/0x10
[   15.212880]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.212913]  ? calculate_sigpending+0x7b/0xa0
[   15.212938]  ? __pfx_kthread+0x10/0x10
[   15.212960]  ret_from_fork+0x116/0x1d0
[   15.212980]  ? __pfx_kthread+0x10/0x10
[   15.213016]  ret_from_fork_asm+0x1a/0x30
[   15.213049]  </TASK>
[   15.213060] 
[   15.220626] Allocated by task 282:
[   15.220819]  kasan_save_stack+0x45/0x70
[   15.221072]  kasan_save_track+0x18/0x40
[   15.221269]  kasan_save_alloc_info+0x3b/0x50
[   15.221536]  __kasan_kmalloc+0xb7/0xc0
[   15.221751]  __kmalloc_cache_noprof+0x189/0x420
[   15.221927]  kasan_atomics+0x95/0x310
[   15.222139]  kunit_try_run_case+0x1a5/0x480
[   15.222318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.222602]  kthread+0x337/0x6f0
[   15.222731]  ret_from_fork+0x116/0x1d0
[   15.222954]  ret_from_fork_asm+0x1a/0x30
[   15.223153] 
[   15.223246] The buggy address belongs to the object at ffff88810342d080
[   15.223246]  which belongs to the cache kmalloc-64 of size 64
[   15.223806] The buggy address is located 0 bytes to the right of
[   15.223806]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.224308] 
[   15.224409] The buggy address belongs to the physical page:
[   15.224636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.224890] flags: 0x200000000000000(node=0|zone=2)
[   15.225091] page_type: f5(slab)
[   15.225264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.225811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.226167] page dumped because: kasan: bad access detected
[   15.226382] 
[   15.226512] Memory state around the buggy address:
[   15.226740]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227065]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.227284] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.227496]                                      ^
[   15.227857]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228216]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228588] ==================================================================
[   15.192987] ==================================================================
[   15.193329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.193766] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.194109] 
[   15.194225] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.194283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.194295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.194329] Call Trace:
[   15.194350]  <TASK>
[   15.194370]  dump_stack_lvl+0x73/0xb0
[   15.194399]  print_report+0xd1/0x610
[   15.194455]  ? __virt_addr_valid+0x1db/0x2d0
[   15.194480]  ? kasan_atomics_helper+0x72f/0x5450
[   15.194512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.194536]  ? kasan_atomics_helper+0x72f/0x5450
[   15.194559]  kasan_report+0x141/0x180
[   15.194585]  ? kasan_atomics_helper+0x72f/0x5450
[   15.194612]  kasan_check_range+0x10c/0x1c0
[   15.194646]  __kasan_check_write+0x18/0x20
[   15.194667]  kasan_atomics_helper+0x72f/0x5450
[   15.194691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.194724]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.194750]  ? kasan_atomics+0x152/0x310
[   15.194777]  kasan_atomics+0x1dc/0x310
[   15.194800]  ? __pfx_kasan_atomics+0x10/0x10
[   15.194825]  ? __pfx_read_tsc+0x10/0x10
[   15.194847]  ? ktime_get_ts64+0x86/0x230
[   15.194872]  kunit_try_run_case+0x1a5/0x480
[   15.194898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.194921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.194947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.194971]  ? __kthread_parkme+0x82/0x180
[   15.194992]  ? preempt_count_sub+0x50/0x80
[   15.195027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.195052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.195085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.195111]  kthread+0x337/0x6f0
[   15.195131]  ? trace_preempt_on+0x20/0xc0
[   15.195165]  ? __pfx_kthread+0x10/0x10
[   15.195187]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.195209]  ? calculate_sigpending+0x7b/0xa0
[   15.195235]  ? __pfx_kthread+0x10/0x10
[   15.195256]  ret_from_fork+0x116/0x1d0
[   15.195276]  ? __pfx_kthread+0x10/0x10
[   15.195297]  ret_from_fork_asm+0x1a/0x30
[   15.195329]  </TASK>
[   15.195340] 
[   15.203160] Allocated by task 282:
[   15.203341]  kasan_save_stack+0x45/0x70
[   15.203630]  kasan_save_track+0x18/0x40
[   15.203768]  kasan_save_alloc_info+0x3b/0x50
[   15.203929]  __kasan_kmalloc+0xb7/0xc0
[   15.204138]  __kmalloc_cache_noprof+0x189/0x420
[   15.204362]  kasan_atomics+0x95/0x310
[   15.204497]  kunit_try_run_case+0x1a5/0x480
[   15.204646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.204921]  kthread+0x337/0x6f0
[   15.205101]  ret_from_fork+0x116/0x1d0
[   15.205292]  ret_from_fork_asm+0x1a/0x30
[   15.205542] 
[   15.205645] The buggy address belongs to the object at ffff88810342d080
[   15.205645]  which belongs to the cache kmalloc-64 of size 64
[   15.206125] The buggy address is located 0 bytes to the right of
[   15.206125]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.206590] 
[   15.206669] The buggy address belongs to the physical page:
[   15.206844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.207098] flags: 0x200000000000000(node=0|zone=2)
[   15.207266] page_type: f5(slab)
[   15.207390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.207623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.207854] page dumped because: kasan: bad access detected
[   15.208126] 
[   15.208220] Memory state around the buggy address:
[   15.208488]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208806]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.209138] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.209451]                                      ^
[   15.209675]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.209996]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.210221] ==================================================================
[   16.211178] ==================================================================
[   16.211665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.212080] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.212458] 
[   16.212619] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.212669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.212682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.212705] Call Trace:
[   16.212725]  <TASK>
[   16.212765]  dump_stack_lvl+0x73/0xb0
[   16.212796]  print_report+0xd1/0x610
[   16.212821]  ? __virt_addr_valid+0x1db/0x2d0
[   16.212845]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.212874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.212898]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.212920]  kasan_report+0x141/0x180
[   16.212942]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.212969]  kasan_check_range+0x10c/0x1c0
[   16.212994]  __kasan_check_write+0x18/0x20
[   16.213074]  kasan_atomics_helper+0x20c8/0x5450
[   16.213100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.213162]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.213189]  ? kasan_atomics+0x152/0x310
[   16.213252]  kasan_atomics+0x1dc/0x310
[   16.213277]  ? __pfx_kasan_atomics+0x10/0x10
[   16.213302]  ? __pfx_read_tsc+0x10/0x10
[   16.213335]  ? ktime_get_ts64+0x86/0x230
[   16.213360]  kunit_try_run_case+0x1a5/0x480
[   16.213387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.213411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.213456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.213481]  ? __kthread_parkme+0x82/0x180
[   16.213503]  ? preempt_count_sub+0x50/0x80
[   16.213527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.213552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.213577]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.213602]  kthread+0x337/0x6f0
[   16.213621]  ? trace_preempt_on+0x20/0xc0
[   16.213645]  ? __pfx_kthread+0x10/0x10
[   16.213667]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.213688]  ? calculate_sigpending+0x7b/0xa0
[   16.213714]  ? __pfx_kthread+0x10/0x10
[   16.213735]  ret_from_fork+0x116/0x1d0
[   16.213755]  ? __pfx_kthread+0x10/0x10
[   16.213776]  ret_from_fork_asm+0x1a/0x30
[   16.213807]  </TASK>
[   16.213818] 
[   16.221500] Allocated by task 282:
[   16.221730]  kasan_save_stack+0x45/0x70
[   16.221957]  kasan_save_track+0x18/0x40
[   16.222218]  kasan_save_alloc_info+0x3b/0x50
[   16.222566]  __kasan_kmalloc+0xb7/0xc0
[   16.222806]  __kmalloc_cache_noprof+0x189/0x420
[   16.223109]  kasan_atomics+0x95/0x310
[   16.223360]  kunit_try_run_case+0x1a5/0x480
[   16.223655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.223933]  kthread+0x337/0x6f0
[   16.224070]  ret_from_fork+0x116/0x1d0
[   16.224206]  ret_from_fork_asm+0x1a/0x30
[   16.224347] 
[   16.224455] The buggy address belongs to the object at ffff88810342d080
[   16.224455]  which belongs to the cache kmalloc-64 of size 64
[   16.225003] The buggy address is located 0 bytes to the right of
[   16.225003]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.225634] 
[   16.225738] The buggy address belongs to the physical page:
[   16.226048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.226344] flags: 0x200000000000000(node=0|zone=2)
[   16.226648] page_type: f5(slab)
[   16.226786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.227063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.227544] page dumped because: kasan: bad access detected
[   16.227832] 
[   16.227903] Memory state around the buggy address:
[   16.228081]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.228486]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.228895] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.229270]                                      ^
[   16.229455]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.229734]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.230110] ==================================================================
[   15.312819] ==================================================================
[   15.313351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.313842] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.314105] 
[   15.314220] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.314266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.314279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.314302] Call Trace:
[   15.314326]  <TASK>
[   15.314347]  dump_stack_lvl+0x73/0xb0
[   15.314376]  print_report+0xd1/0x610
[   15.314399]  ? __virt_addr_valid+0x1db/0x2d0
[   15.314424]  ? kasan_atomics_helper+0xac7/0x5450
[   15.314448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.314472]  ? kasan_atomics_helper+0xac7/0x5450
[   15.314494]  kasan_report+0x141/0x180
[   15.314517]  ? kasan_atomics_helper+0xac7/0x5450
[   15.314544]  kasan_check_range+0x10c/0x1c0
[   15.314569]  __kasan_check_write+0x18/0x20
[   15.314590]  kasan_atomics_helper+0xac7/0x5450
[   15.314613]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.314636]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.314663]  ? kasan_atomics+0x152/0x310
[   15.314689]  kasan_atomics+0x1dc/0x310
[   15.314713]  ? __pfx_kasan_atomics+0x10/0x10
[   15.314738]  ? __pfx_read_tsc+0x10/0x10
[   15.314760]  ? ktime_get_ts64+0x86/0x230
[   15.314786]  kunit_try_run_case+0x1a5/0x480
[   15.314811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.314861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.314885]  ? __kthread_parkme+0x82/0x180
[   15.314909]  ? preempt_count_sub+0x50/0x80
[   15.314934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.314984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.315021]  kthread+0x337/0x6f0
[   15.315040]  ? trace_preempt_on+0x20/0xc0
[   15.315063]  ? __pfx_kthread+0x10/0x10
[   15.315084]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.315106]  ? calculate_sigpending+0x7b/0xa0
[   15.315131]  ? __pfx_kthread+0x10/0x10
[   15.315153]  ret_from_fork+0x116/0x1d0
[   15.315172]  ? __pfx_kthread+0x10/0x10
[   15.315193]  ret_from_fork_asm+0x1a/0x30
[   15.315224]  </TASK>
[   15.315235] 
[   15.323207] Allocated by task 282:
[   15.323445]  kasan_save_stack+0x45/0x70
[   15.323641]  kasan_save_track+0x18/0x40
[   15.323780]  kasan_save_alloc_info+0x3b/0x50
[   15.324023]  __kasan_kmalloc+0xb7/0xc0
[   15.324212]  __kmalloc_cache_noprof+0x189/0x420
[   15.324369]  kasan_atomics+0x95/0x310
[   15.324702]  kunit_try_run_case+0x1a5/0x480
[   15.324938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325167]  kthread+0x337/0x6f0
[   15.325318]  ret_from_fork+0x116/0x1d0
[   15.325536]  ret_from_fork_asm+0x1a/0x30
[   15.325679] 
[   15.325751] The buggy address belongs to the object at ffff88810342d080
[   15.325751]  which belongs to the cache kmalloc-64 of size 64
[   15.327327] The buggy address is located 0 bytes to the right of
[   15.327327]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.329835] 
[   15.330005] The buggy address belongs to the physical page:
[   15.330194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.330477] flags: 0x200000000000000(node=0|zone=2)
[   15.330970] page_type: f5(slab)
[   15.331313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.331972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.332521] page dumped because: kasan: bad access detected
[   15.332694] 
[   15.332842] Memory state around the buggy address:
[   15.333364]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.334027]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334424] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.334642]                                      ^
[   15.334803]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335030]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335245] ==================================================================
[   15.671872] ==================================================================
[   15.672579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.673398] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.674240] 
[   15.674343] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.674394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.674406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.674439] Call Trace:
[   15.674460]  <TASK>
[   15.674481]  dump_stack_lvl+0x73/0xb0
[   15.674516]  print_report+0xd1/0x610
[   15.674541]  ? __virt_addr_valid+0x1db/0x2d0
[   15.674565]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.674587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.674611]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.674634]  kasan_report+0x141/0x180
[   15.674656]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.674684]  __asan_report_load4_noabort+0x18/0x20
[   15.674709]  kasan_atomics_helper+0x49e8/0x5450
[   15.674733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.674756]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.674782]  ? kasan_atomics+0x152/0x310
[   15.674809]  kasan_atomics+0x1dc/0x310
[   15.674832]  ? __pfx_kasan_atomics+0x10/0x10
[   15.674857]  ? __pfx_read_tsc+0x10/0x10
[   15.674879]  ? ktime_get_ts64+0x86/0x230
[   15.674905]  kunit_try_run_case+0x1a5/0x480
[   15.674931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.674980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.675004]  ? __kthread_parkme+0x82/0x180
[   15.675037]  ? preempt_count_sub+0x50/0x80
[   15.675061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.675086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.675111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.675136]  kthread+0x337/0x6f0
[   15.675156]  ? trace_preempt_on+0x20/0xc0
[   15.675182]  ? __pfx_kthread+0x10/0x10
[   15.675203]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.675225]  ? calculate_sigpending+0x7b/0xa0
[   15.675251]  ? __pfx_kthread+0x10/0x10
[   15.675273]  ret_from_fork+0x116/0x1d0
[   15.675292]  ? __pfx_kthread+0x10/0x10
[   15.675313]  ret_from_fork_asm+0x1a/0x30
[   15.675344]  </TASK>
[   15.675355] 
[   15.682806] Allocated by task 282:
[   15.682973]  kasan_save_stack+0x45/0x70
[   15.683201]  kasan_save_track+0x18/0x40
[   15.683339]  kasan_save_alloc_info+0x3b/0x50
[   15.683516]  __kasan_kmalloc+0xb7/0xc0
[   15.683685]  __kmalloc_cache_noprof+0x189/0x420
[   15.683921]  kasan_atomics+0x95/0x310
[   15.684115]  kunit_try_run_case+0x1a5/0x480
[   15.684321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.684598]  kthread+0x337/0x6f0
[   15.684767]  ret_from_fork+0x116/0x1d0
[   15.684920]  ret_from_fork_asm+0x1a/0x30
[   15.685146] 
[   15.685220] The buggy address belongs to the object at ffff88810342d080
[   15.685220]  which belongs to the cache kmalloc-64 of size 64
[   15.685772] The buggy address is located 0 bytes to the right of
[   15.685772]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.686249] 
[   15.686327] The buggy address belongs to the physical page:
[   15.686527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.686771] flags: 0x200000000000000(node=0|zone=2)
[   15.686954] page_type: f5(slab)
[   15.687133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.687548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.687942] page dumped because: kasan: bad access detected
[   15.688214] 
[   15.688307] Memory state around the buggy address:
[   15.688555]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.688881]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.689132] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.689357]                                      ^
[   15.689635]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.689959]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.690282] ==================================================================
[   15.894529] ==================================================================
[   15.894891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.896106] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.896409] 
[   15.896542] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.896591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.896603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.896627] Call Trace:
[   15.896647]  <TASK>
[   15.896667]  dump_stack_lvl+0x73/0xb0
[   15.896700]  print_report+0xd1/0x610
[   15.896724]  ? __virt_addr_valid+0x1db/0x2d0
[   15.896748]  ? kasan_atomics_helper+0x1818/0x5450
[   15.896771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.896795]  ? kasan_atomics_helper+0x1818/0x5450
[   15.896818]  kasan_report+0x141/0x180
[   15.896840]  ? kasan_atomics_helper+0x1818/0x5450
[   15.896872]  kasan_check_range+0x10c/0x1c0
[   15.896896]  __kasan_check_write+0x18/0x20
[   15.896916]  kasan_atomics_helper+0x1818/0x5450
[   15.896939]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.896962]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.896988]  ? kasan_atomics+0x152/0x310
[   15.897028]  kasan_atomics+0x1dc/0x310
[   15.897052]  ? __pfx_kasan_atomics+0x10/0x10
[   15.897077]  ? __pfx_read_tsc+0x10/0x10
[   15.897099]  ? ktime_get_ts64+0x86/0x230
[   15.897125]  kunit_try_run_case+0x1a5/0x480
[   15.897150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.897173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.897199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.897223]  ? __kthread_parkme+0x82/0x180
[   15.897244]  ? preempt_count_sub+0x50/0x80
[   15.897269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.897293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.897318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.897343]  kthread+0x337/0x6f0
[   15.897362]  ? trace_preempt_on+0x20/0xc0
[   15.897386]  ? __pfx_kthread+0x10/0x10
[   15.897406]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.897439]  ? calculate_sigpending+0x7b/0xa0
[   15.897465]  ? __pfx_kthread+0x10/0x10
[   15.897486]  ret_from_fork+0x116/0x1d0
[   15.897505]  ? __pfx_kthread+0x10/0x10
[   15.897526]  ret_from_fork_asm+0x1a/0x30
[   15.897625]  </TASK>
[   15.897640] 
[   15.905097] Allocated by task 282:
[   15.905289]  kasan_save_stack+0x45/0x70
[   15.905494]  kasan_save_track+0x18/0x40
[   15.905671]  kasan_save_alloc_info+0x3b/0x50
[   15.905844]  __kasan_kmalloc+0xb7/0xc0
[   15.906006]  __kmalloc_cache_noprof+0x189/0x420
[   15.906242]  kasan_atomics+0x95/0x310
[   15.906412]  kunit_try_run_case+0x1a5/0x480
[   15.906612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.906845]  kthread+0x337/0x6f0
[   15.907018]  ret_from_fork+0x116/0x1d0
[   15.907199]  ret_from_fork_asm+0x1a/0x30
[   15.907387] 
[   15.907503] The buggy address belongs to the object at ffff88810342d080
[   15.907503]  which belongs to the cache kmalloc-64 of size 64
[   15.907968] The buggy address is located 0 bytes to the right of
[   15.907968]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.908376] 
[   15.908494] The buggy address belongs to the physical page:
[   15.908748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.909110] flags: 0x200000000000000(node=0|zone=2)
[   15.909325] page_type: f5(slab)
[   15.909501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.909768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.910245] page dumped because: kasan: bad access detected
[   15.910772] 
[   15.910967] Memory state around the buggy address:
[   15.911164]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.911377]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.912222] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.913091]                                      ^
[   15.913529]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.913925]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.914151] ==================================================================
[   16.273709] ==================================================================
[   16.274782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.275580] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.276401] 
[   16.276553] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.276629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.276654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.276678] Call Trace:
[   16.276712]  <TASK>
[   16.276734]  dump_stack_lvl+0x73/0xb0
[   16.276782]  print_report+0xd1/0x610
[   16.276806]  ? __virt_addr_valid+0x1db/0x2d0
[   16.276830]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.276862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.276885]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.276908]  kasan_report+0x141/0x180
[   16.276937]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.276967]  __asan_report_load8_noabort+0x18/0x20
[   16.276993]  kasan_atomics_helper+0x4fa5/0x5450
[   16.277026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.277050]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.277076]  ? kasan_atomics+0x152/0x310
[   16.277104]  kasan_atomics+0x1dc/0x310
[   16.277128]  ? __pfx_kasan_atomics+0x10/0x10
[   16.277152]  ? __pfx_read_tsc+0x10/0x10
[   16.277175]  ? ktime_get_ts64+0x86/0x230
[   16.277214]  kunit_try_run_case+0x1a5/0x480
[   16.277241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.277264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.277290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.277314]  ? __kthread_parkme+0x82/0x180
[   16.277336]  ? preempt_count_sub+0x50/0x80
[   16.277361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.277386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.277411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.277436]  kthread+0x337/0x6f0
[   16.277456]  ? trace_preempt_on+0x20/0xc0
[   16.277480]  ? __pfx_kthread+0x10/0x10
[   16.277502]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.277524]  ? calculate_sigpending+0x7b/0xa0
[   16.277549]  ? __pfx_kthread+0x10/0x10
[   16.277571]  ret_from_fork+0x116/0x1d0
[   16.277610]  ? __pfx_kthread+0x10/0x10
[   16.277631]  ret_from_fork_asm+0x1a/0x30
[   16.277663]  </TASK>
[   16.277674] 
[   16.286368] Allocated by task 282:
[   16.286606]  kasan_save_stack+0x45/0x70
[   16.286819]  kasan_save_track+0x18/0x40
[   16.287034]  kasan_save_alloc_info+0x3b/0x50
[   16.287184]  __kasan_kmalloc+0xb7/0xc0
[   16.287373]  __kmalloc_cache_noprof+0x189/0x420
[   16.287640]  kasan_atomics+0x95/0x310
[   16.287841]  kunit_try_run_case+0x1a5/0x480
[   16.288041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.288269]  kthread+0x337/0x6f0
[   16.288417]  ret_from_fork+0x116/0x1d0
[   16.288549]  ret_from_fork_asm+0x1a/0x30
[   16.288717] 
[   16.288807] The buggy address belongs to the object at ffff88810342d080
[   16.288807]  which belongs to the cache kmalloc-64 of size 64
[   16.289347] The buggy address is located 0 bytes to the right of
[   16.289347]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.289876] 
[   16.289973] The buggy address belongs to the physical page:
[   16.290371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.290711] flags: 0x200000000000000(node=0|zone=2)
[   16.290878] page_type: f5(slab)
[   16.291045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.291309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.291856] page dumped because: kasan: bad access detected
[   16.292093] 
[   16.292188] Memory state around the buggy address:
[   16.292401]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.292692]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.293032] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.293339]                                      ^
[   16.293584]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.293897]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.294212] ==================================================================
[   15.418089] ==================================================================
[   15.418761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.419439] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.420071] 
[   15.420250] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.420297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.420310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.420333] Call Trace:
[   15.420353]  <TASK>
[   15.420374]  dump_stack_lvl+0x73/0xb0
[   15.420405]  print_report+0xd1/0x610
[   15.420449]  ? __virt_addr_valid+0x1db/0x2d0
[   15.420474]  ? kasan_atomics_helper+0xd47/0x5450
[   15.420495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.420519]  ? kasan_atomics_helper+0xd47/0x5450
[   15.420541]  kasan_report+0x141/0x180
[   15.420564]  ? kasan_atomics_helper+0xd47/0x5450
[   15.420591]  kasan_check_range+0x10c/0x1c0
[   15.420619]  __kasan_check_write+0x18/0x20
[   15.420639]  kasan_atomics_helper+0xd47/0x5450
[   15.420663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.420686]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.420713]  ? kasan_atomics+0x152/0x310
[   15.420739]  kasan_atomics+0x1dc/0x310
[   15.420762]  ? __pfx_kasan_atomics+0x10/0x10
[   15.420787]  ? __pfx_read_tsc+0x10/0x10
[   15.420810]  ? ktime_get_ts64+0x86/0x230
[   15.420836]  kunit_try_run_case+0x1a5/0x480
[   15.420866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.420890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.420914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.420939]  ? __kthread_parkme+0x82/0x180
[   15.420961]  ? preempt_count_sub+0x50/0x80
[   15.420986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.421045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.421071]  kthread+0x337/0x6f0
[   15.421090]  ? trace_preempt_on+0x20/0xc0
[   15.421116]  ? __pfx_kthread+0x10/0x10
[   15.421137]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.421160]  ? calculate_sigpending+0x7b/0xa0
[   15.421185]  ? __pfx_kthread+0x10/0x10
[   15.421207]  ret_from_fork+0x116/0x1d0
[   15.421227]  ? __pfx_kthread+0x10/0x10
[   15.421248]  ret_from_fork_asm+0x1a/0x30
[   15.421280]  </TASK>
[   15.421290] 
[   15.436920] Allocated by task 282:
[   15.437108]  kasan_save_stack+0x45/0x70
[   15.437278]  kasan_save_track+0x18/0x40
[   15.437417]  kasan_save_alloc_info+0x3b/0x50
[   15.437869]  __kasan_kmalloc+0xb7/0xc0
[   15.438227]  __kmalloc_cache_noprof+0x189/0x420
[   15.438762]  kasan_atomics+0x95/0x310
[   15.439144]  kunit_try_run_case+0x1a5/0x480
[   15.439566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.440076]  kthread+0x337/0x6f0
[   15.440420]  ret_from_fork+0x116/0x1d0
[   15.440817]  ret_from_fork_asm+0x1a/0x30
[   15.441105] 
[   15.441184] The buggy address belongs to the object at ffff88810342d080
[   15.441184]  which belongs to the cache kmalloc-64 of size 64
[   15.441585] The buggy address is located 0 bytes to the right of
[   15.441585]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.441958] 
[   15.442045] The buggy address belongs to the physical page:
[   15.442222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.442519] flags: 0x200000000000000(node=0|zone=2)
[   15.442962] page_type: f5(slab)
[   15.443334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.444059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.444878] page dumped because: kasan: bad access detected
[   15.445400] 
[   15.445630] Memory state around the buggy address:
[   15.446163]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.446839]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.447487] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.447984]                                      ^
[   15.448333]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.448627]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449149] ==================================================================
[   15.088435] ==================================================================
[   15.089125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.089821] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.090512] 
[   15.090690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.090752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.090765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.090788] Call Trace:
[   15.090819]  <TASK>
[   15.090849]  dump_stack_lvl+0x73/0xb0
[   15.090881]  print_report+0xd1/0x610
[   15.090905]  ? __virt_addr_valid+0x1db/0x2d0
[   15.090940]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.090963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.090986]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.091018]  kasan_report+0x141/0x180
[   15.091041]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.091068]  __asan_report_store4_noabort+0x1b/0x30
[   15.091094]  kasan_atomics_helper+0x4b3a/0x5450
[   15.091117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.091140]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.091166]  ? kasan_atomics+0x152/0x310
[   15.091193]  kasan_atomics+0x1dc/0x310
[   15.091215]  ? __pfx_kasan_atomics+0x10/0x10
[   15.091240]  ? __pfx_read_tsc+0x10/0x10
[   15.091261]  ? ktime_get_ts64+0x86/0x230
[   15.091287]  kunit_try_run_case+0x1a5/0x480
[   15.091313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.091336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.091361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.091385]  ? __kthread_parkme+0x82/0x180
[   15.091407]  ? preempt_count_sub+0x50/0x80
[   15.091452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.091476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.091502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.091527]  kthread+0x337/0x6f0
[   15.091547]  ? trace_preempt_on+0x20/0xc0
[   15.091570]  ? __pfx_kthread+0x10/0x10
[   15.091591]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.091614]  ? calculate_sigpending+0x7b/0xa0
[   15.091640]  ? __pfx_kthread+0x10/0x10
[   15.091661]  ret_from_fork+0x116/0x1d0
[   15.091681]  ? __pfx_kthread+0x10/0x10
[   15.091701]  ret_from_fork_asm+0x1a/0x30
[   15.091733]  </TASK>
[   15.091744] 
[   15.104919] Allocated by task 282:
[   15.105347]  kasan_save_stack+0x45/0x70
[   15.105799]  kasan_save_track+0x18/0x40
[   15.106161]  kasan_save_alloc_info+0x3b/0x50
[   15.106355]  __kasan_kmalloc+0xb7/0xc0
[   15.106797]  __kmalloc_cache_noprof+0x189/0x420
[   15.107119]  kasan_atomics+0x95/0x310
[   15.107258]  kunit_try_run_case+0x1a5/0x480
[   15.107417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107595]  kthread+0x337/0x6f0
[   15.107719]  ret_from_fork+0x116/0x1d0
[   15.107857]  ret_from_fork_asm+0x1a/0x30
[   15.108000] 
[   15.108451] The buggy address belongs to the object at ffff88810342d080
[   15.108451]  which belongs to the cache kmalloc-64 of size 64
[   15.110249] The buggy address is located 0 bytes to the right of
[   15.110249]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.111419] 
[   15.111667] The buggy address belongs to the physical page:
[   15.112202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.113027] flags: 0x200000000000000(node=0|zone=2)
[   15.113550] page_type: f5(slab)
[   15.113770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.113995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.114226] page dumped because: kasan: bad access detected
[   15.114393] 
[   15.114645] Memory state around the buggy address:
[   15.115159]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.115864]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116548] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.117215]                                      ^
[   15.117720]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118284]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118518] ==================================================================
[   15.336724] ==================================================================
[   15.337970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.338731] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.339500] 
[   15.339716] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.339765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.339798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.339831] Call Trace:
[   15.339853]  <TASK>
[   15.339886]  dump_stack_lvl+0x73/0xb0
[   15.339920]  print_report+0xd1/0x610
[   15.339945]  ? __virt_addr_valid+0x1db/0x2d0
[   15.339969]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.339991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.340025]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.340048]  kasan_report+0x141/0x180
[   15.340072]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.340099]  kasan_check_range+0x10c/0x1c0
[   15.340123]  __kasan_check_write+0x18/0x20
[   15.340143]  kasan_atomics_helper+0xb6a/0x5450
[   15.340168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.340191]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.340219]  ? kasan_atomics+0x152/0x310
[   15.340246]  kasan_atomics+0x1dc/0x310
[   15.340270]  ? __pfx_kasan_atomics+0x10/0x10
[   15.340295]  ? __pfx_read_tsc+0x10/0x10
[   15.340318]  ? ktime_get_ts64+0x86/0x230
[   15.340343]  kunit_try_run_case+0x1a5/0x480
[   15.340370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.340393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.340420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.340457]  ? __kthread_parkme+0x82/0x180
[   15.340479]  ? preempt_count_sub+0x50/0x80
[   15.340504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.340529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.340554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.340580]  kthread+0x337/0x6f0
[   15.340600]  ? trace_preempt_on+0x20/0xc0
[   15.340623]  ? __pfx_kthread+0x10/0x10
[   15.340644]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.340666]  ? calculate_sigpending+0x7b/0xa0
[   15.340691]  ? __pfx_kthread+0x10/0x10
[   15.340712]  ret_from_fork+0x116/0x1d0
[   15.340733]  ? __pfx_kthread+0x10/0x10
[   15.340753]  ret_from_fork_asm+0x1a/0x30
[   15.340785]  </TASK>
[   15.340795] 
[   15.351289] Allocated by task 282:
[   15.351650]  kasan_save_stack+0x45/0x70
[   15.351900]  kasan_save_track+0x18/0x40
[   15.352092]  kasan_save_alloc_info+0x3b/0x50
[   15.352339]  __kasan_kmalloc+0xb7/0xc0
[   15.352550]  __kmalloc_cache_noprof+0x189/0x420
[   15.352778]  kasan_atomics+0x95/0x310
[   15.352985]  kunit_try_run_case+0x1a5/0x480
[   15.353252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.353516]  kthread+0x337/0x6f0
[   15.353694]  ret_from_fork+0x116/0x1d0
[   15.353915]  ret_from_fork_asm+0x1a/0x30
[   15.354143] 
[   15.354267] The buggy address belongs to the object at ffff88810342d080
[   15.354267]  which belongs to the cache kmalloc-64 of size 64
[   15.354961] The buggy address is located 0 bytes to the right of
[   15.354961]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.355672] 
[   15.355750] The buggy address belongs to the physical page:
[   15.355961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.356332] flags: 0x200000000000000(node=0|zone=2)
[   15.356820] page_type: f5(slab)
[   15.357077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.358258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.359394] page dumped because: kasan: bad access detected
[   15.359788] 
[   15.359890] Memory state around the buggy address:
[   15.360135]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360775]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.361096] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.361596]                                      ^
[   15.361950]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.362360]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.362861] ==================================================================
[   15.119480] ==================================================================
[   15.120279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.121170] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.122088] 
[   15.122343] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.122394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.122407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.122429] Call Trace:
[   15.122451]  <TASK>
[   15.122473]  dump_stack_lvl+0x73/0xb0
[   15.122506]  print_report+0xd1/0x610
[   15.122530]  ? __virt_addr_valid+0x1db/0x2d0
[   15.122554]  ? kasan_atomics_helper+0x565/0x5450
[   15.122575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.122599]  ? kasan_atomics_helper+0x565/0x5450
[   15.122622]  kasan_report+0x141/0x180
[   15.122645]  ? kasan_atomics_helper+0x565/0x5450
[   15.122673]  kasan_check_range+0x10c/0x1c0
[   15.122699]  __kasan_check_write+0x18/0x20
[   15.122719]  kasan_atomics_helper+0x565/0x5450
[   15.122745]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.122769]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.122796]  ? kasan_atomics+0x152/0x310
[   15.122823]  kasan_atomics+0x1dc/0x310
[   15.122847]  ? __pfx_kasan_atomics+0x10/0x10
[   15.122871]  ? __pfx_read_tsc+0x10/0x10
[   15.122894]  ? ktime_get_ts64+0x86/0x230
[   15.122921]  kunit_try_run_case+0x1a5/0x480
[   15.122948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.122972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.122997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.123094]  ? __kthread_parkme+0x82/0x180
[   15.123116]  ? preempt_count_sub+0x50/0x80
[   15.123140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.123165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.123190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.123215]  kthread+0x337/0x6f0
[   15.123235]  ? trace_preempt_on+0x20/0xc0
[   15.123259]  ? __pfx_kthread+0x10/0x10
[   15.123280]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.123303]  ? calculate_sigpending+0x7b/0xa0
[   15.123329]  ? __pfx_kthread+0x10/0x10
[   15.123350]  ret_from_fork+0x116/0x1d0
[   15.123370]  ? __pfx_kthread+0x10/0x10
[   15.123391]  ret_from_fork_asm+0x1a/0x30
[   15.123424]  </TASK>
[   15.123435] 
[   15.134678] Allocated by task 282:
[   15.135043]  kasan_save_stack+0x45/0x70
[   15.135414]  kasan_save_track+0x18/0x40
[   15.135823]  kasan_save_alloc_info+0x3b/0x50
[   15.136232]  __kasan_kmalloc+0xb7/0xc0
[   15.136610]  __kmalloc_cache_noprof+0x189/0x420
[   15.137048]  kasan_atomics+0x95/0x310
[   15.137394]  kunit_try_run_case+0x1a5/0x480
[   15.137794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.138291]  kthread+0x337/0x6f0
[   15.138566]  ret_from_fork+0x116/0x1d0
[   15.138941]  ret_from_fork_asm+0x1a/0x30
[   15.139093] 
[   15.139166] The buggy address belongs to the object at ffff88810342d080
[   15.139166]  which belongs to the cache kmalloc-64 of size 64
[   15.139593] The buggy address is located 0 bytes to the right of
[   15.139593]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.140806] 
[   15.141030] The buggy address belongs to the physical page:
[   15.141544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.142231] flags: 0x200000000000000(node=0|zone=2)
[   15.142713] page_type: f5(slab)
[   15.143048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.143315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.144022] page dumped because: kasan: bad access detected
[   15.144458] 
[   15.144600] Memory state around the buggy address:
[   15.144934]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145156]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.145368] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.145734]                                      ^
[   15.146133]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146351]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146873] ==================================================================
[   15.534265] ==================================================================
[   15.535190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.536100] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.536510] 
[   15.536606] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.536656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.536670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.536692] Call Trace:
[   15.536713]  <TASK>
[   15.536736]  dump_stack_lvl+0x73/0xb0
[   15.536766]  print_report+0xd1/0x610
[   15.536790]  ? __virt_addr_valid+0x1db/0x2d0
[   15.536817]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.536839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.536869]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.536892]  kasan_report+0x141/0x180
[   15.536914]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.536941]  kasan_check_range+0x10c/0x1c0
[   15.536965]  __kasan_check_write+0x18/0x20
[   15.536984]  kasan_atomics_helper+0xfa9/0x5450
[   15.537007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.537041]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.537068]  ? kasan_atomics+0x152/0x310
[   15.537094]  kasan_atomics+0x1dc/0x310
[   15.537117]  ? __pfx_kasan_atomics+0x10/0x10
[   15.537141]  ? __pfx_read_tsc+0x10/0x10
[   15.537164]  ? ktime_get_ts64+0x86/0x230
[   15.537190]  kunit_try_run_case+0x1a5/0x480
[   15.537216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.537242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.537271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.537298]  ? __kthread_parkme+0x82/0x180
[   15.537322]  ? preempt_count_sub+0x50/0x80
[   15.537347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.537372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.537396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.537421]  kthread+0x337/0x6f0
[   15.537440]  ? trace_preempt_on+0x20/0xc0
[   15.537464]  ? __pfx_kthread+0x10/0x10
[   15.537494]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.537516]  ? calculate_sigpending+0x7b/0xa0
[   15.537541]  ? __pfx_kthread+0x10/0x10
[   15.537563]  ret_from_fork+0x116/0x1d0
[   15.537582]  ? __pfx_kthread+0x10/0x10
[   15.537604]  ret_from_fork_asm+0x1a/0x30
[   15.537635]  </TASK>
[   15.537646] 
[   15.545085] Allocated by task 282:
[   15.545262]  kasan_save_stack+0x45/0x70
[   15.545501]  kasan_save_track+0x18/0x40
[   15.545646]  kasan_save_alloc_info+0x3b/0x50
[   15.545862]  __kasan_kmalloc+0xb7/0xc0
[   15.546022]  __kmalloc_cache_noprof+0x189/0x420
[   15.546247]  kasan_atomics+0x95/0x310
[   15.546385]  kunit_try_run_case+0x1a5/0x480
[   15.546539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.546772]  kthread+0x337/0x6f0
[   15.546941]  ret_from_fork+0x116/0x1d0
[   15.547147]  ret_from_fork_asm+0x1a/0x30
[   15.547358] 
[   15.547462] The buggy address belongs to the object at ffff88810342d080
[   15.547462]  which belongs to the cache kmalloc-64 of size 64
[   15.547936] The buggy address is located 0 bytes to the right of
[   15.547936]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.548481] 
[   15.548569] The buggy address belongs to the physical page:
[   15.548810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.549120] flags: 0x200000000000000(node=0|zone=2)
[   15.549289] page_type: f5(slab)
[   15.549414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.549649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.549876] page dumped because: kasan: bad access detected
[   15.550107] 
[   15.550200] Memory state around the buggy address:
[   15.550681]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.551020]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.551334] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.551928]                                      ^
[   15.552098]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.552316]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.552531] ==================================================================
[   15.229623] ==================================================================
[   15.230336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.230841] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.231175] 
[   15.231294] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.231352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.231365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.231388] Call Trace:
[   15.231420]  <TASK>
[   15.231442]  dump_stack_lvl+0x73/0xb0
[   15.231473]  print_report+0xd1/0x610
[   15.231496]  ? __virt_addr_valid+0x1db/0x2d0
[   15.231520]  ? kasan_atomics_helper+0x860/0x5450
[   15.231551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.231574]  ? kasan_atomics_helper+0x860/0x5450
[   15.231597]  kasan_report+0x141/0x180
[   15.231630]  ? kasan_atomics_helper+0x860/0x5450
[   15.231656]  kasan_check_range+0x10c/0x1c0
[   15.231681]  __kasan_check_write+0x18/0x20
[   15.231702]  kasan_atomics_helper+0x860/0x5450
[   15.231726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.231749]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.231775]  ? kasan_atomics+0x152/0x310
[   15.231801]  kasan_atomics+0x1dc/0x310
[   15.231824]  ? __pfx_kasan_atomics+0x10/0x10
[   15.231849]  ? __pfx_read_tsc+0x10/0x10
[   15.231871]  ? ktime_get_ts64+0x86/0x230
[   15.231897]  kunit_try_run_case+0x1a5/0x480
[   15.231923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.231972]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.232004]  ? __kthread_parkme+0x82/0x180
[   15.232036]  ? preempt_count_sub+0x50/0x80
[   15.232063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.232098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.232123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.232149]  kthread+0x337/0x6f0
[   15.232171]  ? trace_preempt_on+0x20/0xc0
[   15.232194]  ? __pfx_kthread+0x10/0x10
[   15.232215]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.232239]  ? calculate_sigpending+0x7b/0xa0
[   15.232264]  ? __pfx_kthread+0x10/0x10
[   15.232289]  ret_from_fork+0x116/0x1d0
[   15.232308]  ? __pfx_kthread+0x10/0x10
[   15.232331]  ret_from_fork_asm+0x1a/0x30
[   15.232363]  </TASK>
[   15.232375] 
[   15.245592] Allocated by task 282:
[   15.245967]  kasan_save_stack+0x45/0x70
[   15.246242]  kasan_save_track+0x18/0x40
[   15.246644]  kasan_save_alloc_info+0x3b/0x50
[   15.246797]  __kasan_kmalloc+0xb7/0xc0
[   15.246932]  __kmalloc_cache_noprof+0x189/0x420
[   15.247100]  kasan_atomics+0x95/0x310
[   15.247235]  kunit_try_run_case+0x1a5/0x480
[   15.247383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.247837]  kthread+0x337/0x6f0
[   15.248155]  ret_from_fork+0x116/0x1d0
[   15.248517]  ret_from_fork_asm+0x1a/0x30
[   15.248899] 
[   15.249068] The buggy address belongs to the object at ffff88810342d080
[   15.249068]  which belongs to the cache kmalloc-64 of size 64
[   15.250242] The buggy address is located 0 bytes to the right of
[   15.250242]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.251498] 
[   15.251692] The buggy address belongs to the physical page:
[   15.252193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.252886] flags: 0x200000000000000(node=0|zone=2)
[   15.253344] page_type: f5(slab)
[   15.253663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.253897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.254138] page dumped because: kasan: bad access detected
[   15.254319] 
[   15.254392] Memory state around the buggy address:
[   15.254576]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254839]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.255196] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.255539]                                      ^
[   15.255696]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.256026]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.256336] ==================================================================
[   15.607158] ==================================================================
[   15.607551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.607888] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.608192] 
[   15.608285] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.608331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.608344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.608367] Call Trace:
[   15.608388]  <TASK>
[   15.608409]  dump_stack_lvl+0x73/0xb0
[   15.608450]  print_report+0xd1/0x610
[   15.608473]  ? __virt_addr_valid+0x1db/0x2d0
[   15.608499]  ? kasan_atomics_helper+0x1148/0x5450
[   15.608522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.608546]  ? kasan_atomics_helper+0x1148/0x5450
[   15.608569]  kasan_report+0x141/0x180
[   15.608592]  ? kasan_atomics_helper+0x1148/0x5450
[   15.608619]  kasan_check_range+0x10c/0x1c0
[   15.608643]  __kasan_check_write+0x18/0x20
[   15.608663]  kasan_atomics_helper+0x1148/0x5450
[   15.608687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.608710]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.608736]  ? kasan_atomics+0x152/0x310
[   15.608763]  kasan_atomics+0x1dc/0x310
[   15.608786]  ? __pfx_kasan_atomics+0x10/0x10
[   15.608810]  ? __pfx_read_tsc+0x10/0x10
[   15.608832]  ? ktime_get_ts64+0x86/0x230
[   15.608864]  kunit_try_run_case+0x1a5/0x480
[   15.608889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.608913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.608938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.608963]  ? __kthread_parkme+0x82/0x180
[   15.608985]  ? preempt_count_sub+0x50/0x80
[   15.609021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.609046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.609071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.609096]  kthread+0x337/0x6f0
[   15.609115]  ? trace_preempt_on+0x20/0xc0
[   15.609139]  ? __pfx_kthread+0x10/0x10
[   15.609160]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.609184]  ? calculate_sigpending+0x7b/0xa0
[   15.609209]  ? __pfx_kthread+0x10/0x10
[   15.609231]  ret_from_fork+0x116/0x1d0
[   15.609250]  ? __pfx_kthread+0x10/0x10
[   15.609271]  ret_from_fork_asm+0x1a/0x30
[   15.609302]  </TASK>
[   15.609312] 
[   15.616801] Allocated by task 282:
[   15.616995]  kasan_save_stack+0x45/0x70
[   15.617172]  kasan_save_track+0x18/0x40
[   15.617366]  kasan_save_alloc_info+0x3b/0x50
[   15.617584]  __kasan_kmalloc+0xb7/0xc0
[   15.617772]  __kmalloc_cache_noprof+0x189/0x420
[   15.617967]  kasan_atomics+0x95/0x310
[   15.618143]  kunit_try_run_case+0x1a5/0x480
[   15.618347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.618526]  kthread+0x337/0x6f0
[   15.618648]  ret_from_fork+0x116/0x1d0
[   15.618781]  ret_from_fork_asm+0x1a/0x30
[   15.618922] 
[   15.618995] The buggy address belongs to the object at ffff88810342d080
[   15.618995]  which belongs to the cache kmalloc-64 of size 64
[   15.619782] The buggy address is located 0 bytes to the right of
[   15.619782]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.620194] 
[   15.620269] The buggy address belongs to the physical page:
[   15.620461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.620816] flags: 0x200000000000000(node=0|zone=2)
[   15.621068] page_type: f5(slab)
[   15.621246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.621743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.622047] page dumped because: kasan: bad access detected
[   15.622242] 
[   15.622311] Memory state around the buggy address:
[   15.622604]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.622914]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.623198] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.623500]                                      ^
[   15.623682]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.623900]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.624199] ==================================================================
[   15.691511] ==================================================================
[   15.692033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.692391] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.692743] 
[   15.692866] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.692915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.692938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.692961] Call Trace:
[   15.692980]  <TASK>
[   15.693001]  dump_stack_lvl+0x73/0xb0
[   15.693051]  print_report+0xd1/0x610
[   15.693073]  ? __virt_addr_valid+0x1db/0x2d0
[   15.693097]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.693119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.693142]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.693164]  kasan_report+0x141/0x180
[   15.693187]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.693213]  kasan_check_range+0x10c/0x1c0
[   15.693238]  __kasan_check_write+0x18/0x20
[   15.693258]  kasan_atomics_helper+0x12e6/0x5450
[   15.693281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.693314]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.693340]  ? kasan_atomics+0x152/0x310
[   15.693369]  kasan_atomics+0x1dc/0x310
[   15.693403]  ? __pfx_kasan_atomics+0x10/0x10
[   15.693447]  ? __pfx_read_tsc+0x10/0x10
[   15.693469]  ? ktime_get_ts64+0x86/0x230
[   15.693493]  kunit_try_run_case+0x1a5/0x480
[   15.693519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.693542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.693567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.693591]  ? __kthread_parkme+0x82/0x180
[   15.693613]  ? preempt_count_sub+0x50/0x80
[   15.693638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.693663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.693688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.693713]  kthread+0x337/0x6f0
[   15.693733]  ? trace_preempt_on+0x20/0xc0
[   15.693757]  ? __pfx_kthread+0x10/0x10
[   15.693778]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.693800]  ? calculate_sigpending+0x7b/0xa0
[   15.693825]  ? __pfx_kthread+0x10/0x10
[   15.693846]  ret_from_fork+0x116/0x1d0
[   15.693865]  ? __pfx_kthread+0x10/0x10
[   15.693886]  ret_from_fork_asm+0x1a/0x30
[   15.693927]  </TASK>
[   15.693938] 
[   15.701521] Allocated by task 282:
[   15.701742]  kasan_save_stack+0x45/0x70
[   15.701973]  kasan_save_track+0x18/0x40
[   15.702120]  kasan_save_alloc_info+0x3b/0x50
[   15.702270]  __kasan_kmalloc+0xb7/0xc0
[   15.702406]  __kmalloc_cache_noprof+0x189/0x420
[   15.702583]  kasan_atomics+0x95/0x310
[   15.702764]  kunit_try_run_case+0x1a5/0x480
[   15.702982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.703255]  kthread+0x337/0x6f0
[   15.703485]  ret_from_fork+0x116/0x1d0
[   15.703687]  ret_from_fork_asm+0x1a/0x30
[   15.703887] 
[   15.703997] The buggy address belongs to the object at ffff88810342d080
[   15.703997]  which belongs to the cache kmalloc-64 of size 64
[   15.704512] The buggy address is located 0 bytes to the right of
[   15.704512]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.705058] 
[   15.705174] The buggy address belongs to the physical page:
[   15.705399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.705759] flags: 0x200000000000000(node=0|zone=2)
[   15.705982] page_type: f5(slab)
[   15.706173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.706526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.706848] page dumped because: kasan: bad access detected
[   15.707088] 
[   15.707203] Memory state around the buggy address:
[   15.707386]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707699]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.707918] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.708235]                                      ^
[   15.708522]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.708899]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.709234] ==================================================================
[   14.993179] ==================================================================
[   14.993470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.993765] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   14.994131] 
[   14.994248] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.994296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.994307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.994330] Call Trace:
[   14.994350]  <TASK>
[   14.994370]  dump_stack_lvl+0x73/0xb0
[   14.994401]  print_report+0xd1/0x610
[   14.994425]  ? __virt_addr_valid+0x1db/0x2d0
[   14.994824]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.994848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.994993]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.995073]  kasan_report+0x141/0x180
[   14.995097]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.995123]  __asan_report_store4_noabort+0x1b/0x30
[   14.995148]  kasan_atomics_helper+0x4b6e/0x5450
[   14.995172]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.995318]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.995345]  ? kasan_atomics+0x152/0x310
[   14.995391]  kasan_atomics+0x1dc/0x310
[   14.995414]  ? __pfx_kasan_atomics+0x10/0x10
[   14.995577]  ? __pfx_read_tsc+0x10/0x10
[   14.995604]  ? ktime_get_ts64+0x86/0x230
[   14.995630]  kunit_try_run_case+0x1a5/0x480
[   14.995657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.995691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.995717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.995752]  ? __kthread_parkme+0x82/0x180
[   14.995775]  ? preempt_count_sub+0x50/0x80
[   14.995799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.995824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.995849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.995873]  kthread+0x337/0x6f0
[   14.995893]  ? trace_preempt_on+0x20/0xc0
[   14.995917]  ? __pfx_kthread+0x10/0x10
[   14.995938]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.995960]  ? calculate_sigpending+0x7b/0xa0
[   14.995987]  ? __pfx_kthread+0x10/0x10
[   14.996018]  ret_from_fork+0x116/0x1d0
[   14.996038]  ? __pfx_kthread+0x10/0x10
[   14.996059]  ret_from_fork_asm+0x1a/0x30
[   14.996091]  </TASK>
[   14.996112] 
[   15.005627] Allocated by task 282:
[   15.005841]  kasan_save_stack+0x45/0x70
[   15.006157]  kasan_save_track+0x18/0x40
[   15.006362]  kasan_save_alloc_info+0x3b/0x50
[   15.006708]  __kasan_kmalloc+0xb7/0xc0
[   15.006893]  __kmalloc_cache_noprof+0x189/0x420
[   15.007249]  kasan_atomics+0x95/0x310
[   15.007391]  kunit_try_run_case+0x1a5/0x480
[   15.007610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.007860]  kthread+0x337/0x6f0
[   15.008075]  ret_from_fork+0x116/0x1d0
[   15.008289]  ret_from_fork_asm+0x1a/0x30
[   15.008566] 
[   15.008652] The buggy address belongs to the object at ffff88810342d080
[   15.008652]  which belongs to the cache kmalloc-64 of size 64
[   15.009575] The buggy address is located 0 bytes to the right of
[   15.009575]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.010228] 
[   15.010324] The buggy address belongs to the physical page:
[   15.010565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.010811] flags: 0x200000000000000(node=0|zone=2)
[   15.010987] page_type: f5(slab)
[   15.011153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.011544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.011918] page dumped because: kasan: bad access detected
[   15.012101] 
[   15.012172] Memory state around the buggy address:
[   15.012421]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012746]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.013262] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.013668]                                      ^
[   15.013879]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014245]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014579] ==================================================================
[   15.857604] ==================================================================
[   15.857956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.858628] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.859029] 
[   15.859138] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.859186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.859210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.859234] Call Trace:
[   15.859254]  <TASK>
[   15.859286]  dump_stack_lvl+0x73/0xb0
[   15.859327]  print_report+0xd1/0x610
[   15.859351]  ? __virt_addr_valid+0x1db/0x2d0
[   15.859385]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.859407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.859453]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.859476]  kasan_report+0x141/0x180
[   15.859498]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.859526]  kasan_check_range+0x10c/0x1c0
[   15.859551]  __kasan_check_write+0x18/0x20
[   15.859572]  kasan_atomics_helper+0x16e7/0x5450
[   15.859595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.859618]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.859644]  ? kasan_atomics+0x152/0x310
[   15.859670]  kasan_atomics+0x1dc/0x310
[   15.859694]  ? __pfx_kasan_atomics+0x10/0x10
[   15.859719]  ? __pfx_read_tsc+0x10/0x10
[   15.859740]  ? ktime_get_ts64+0x86/0x230
[   15.859765]  kunit_try_run_case+0x1a5/0x480
[   15.859790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.859813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.859839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.859862]  ? __kthread_parkme+0x82/0x180
[   15.859883]  ? preempt_count_sub+0x50/0x80
[   15.859907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.859932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.859957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.859981]  kthread+0x337/0x6f0
[   15.860000]  ? trace_preempt_on+0x20/0xc0
[   15.860034]  ? __pfx_kthread+0x10/0x10
[   15.860065]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.860087]  ? calculate_sigpending+0x7b/0xa0
[   15.860112]  ? __pfx_kthread+0x10/0x10
[   15.860148]  ret_from_fork+0x116/0x1d0
[   15.860167]  ? __pfx_kthread+0x10/0x10
[   15.860188]  ret_from_fork_asm+0x1a/0x30
[   15.860231]  </TASK>
[   15.860242] 
[   15.867695] Allocated by task 282:
[   15.867843]  kasan_save_stack+0x45/0x70
[   15.867998]  kasan_save_track+0x18/0x40
[   15.868203]  kasan_save_alloc_info+0x3b/0x50
[   15.868456]  __kasan_kmalloc+0xb7/0xc0
[   15.868680]  __kmalloc_cache_noprof+0x189/0x420
[   15.868946]  kasan_atomics+0x95/0x310
[   15.869184]  kunit_try_run_case+0x1a5/0x480
[   15.869440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.869701]  kthread+0x337/0x6f0
[   15.869869]  ret_from_fork+0x116/0x1d0
[   15.870062]  ret_from_fork_asm+0x1a/0x30
[   15.870256] 
[   15.870350] The buggy address belongs to the object at ffff88810342d080
[   15.870350]  which belongs to the cache kmalloc-64 of size 64
[   15.870889] The buggy address is located 0 bytes to the right of
[   15.870889]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.871356] 
[   15.871455] The buggy address belongs to the physical page:
[   15.871688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.871993] flags: 0x200000000000000(node=0|zone=2)
[   15.872224] page_type: f5(slab)
[   15.872402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.872693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.873050] page dumped because: kasan: bad access detected
[   15.873306] 
[   15.873403] Memory state around the buggy address:
[   15.873634]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.873942]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.874239] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.874602]                                      ^
[   15.874815]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.875044]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.875257] ==================================================================
[   16.314632] ==================================================================
[   16.315170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.315412] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.315626] 
[   16.315713] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.315759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.315771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.315794] Call Trace:
[   16.315814]  <TASK>
[   16.315835]  dump_stack_lvl+0x73/0xb0
[   16.315863]  print_report+0xd1/0x610
[   16.315886]  ? __virt_addr_valid+0x1db/0x2d0
[   16.315910]  ? kasan_atomics_helper+0x5115/0x5450
[   16.315944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.315968]  ? kasan_atomics_helper+0x5115/0x5450
[   16.315991]  kasan_report+0x141/0x180
[   16.316024]  ? kasan_atomics_helper+0x5115/0x5450
[   16.316052]  __asan_report_load8_noabort+0x18/0x20
[   16.316078]  kasan_atomics_helper+0x5115/0x5450
[   16.316101]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.316124]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.316150]  ? kasan_atomics+0x152/0x310
[   16.316176]  kasan_atomics+0x1dc/0x310
[   16.316200]  ? __pfx_kasan_atomics+0x10/0x10
[   16.316225]  ? __pfx_read_tsc+0x10/0x10
[   16.316247]  ? ktime_get_ts64+0x86/0x230
[   16.316272]  kunit_try_run_case+0x1a5/0x480
[   16.316297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.316354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.316381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.316405]  ? __kthread_parkme+0x82/0x180
[   16.316427]  ? preempt_count_sub+0x50/0x80
[   16.316481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.316506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.316531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.316556]  kthread+0x337/0x6f0
[   16.316576]  ? trace_preempt_on+0x20/0xc0
[   16.316600]  ? __pfx_kthread+0x10/0x10
[   16.316621]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.316643]  ? calculate_sigpending+0x7b/0xa0
[   16.316669]  ? __pfx_kthread+0x10/0x10
[   16.316691]  ret_from_fork+0x116/0x1d0
[   16.316711]  ? __pfx_kthread+0x10/0x10
[   16.316732]  ret_from_fork_asm+0x1a/0x30
[   16.316765]  </TASK>
[   16.316780] 
[   16.324841] Allocated by task 282:
[   16.325053]  kasan_save_stack+0x45/0x70
[   16.325261]  kasan_save_track+0x18/0x40
[   16.325481]  kasan_save_alloc_info+0x3b/0x50
[   16.325638]  __kasan_kmalloc+0xb7/0xc0
[   16.325825]  __kmalloc_cache_noprof+0x189/0x420
[   16.326059]  kasan_atomics+0x95/0x310
[   16.326212]  kunit_try_run_case+0x1a5/0x480
[   16.326425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.326633]  kthread+0x337/0x6f0
[   16.326824]  ret_from_fork+0x116/0x1d0
[   16.327003]  ret_from_fork_asm+0x1a/0x30
[   16.327213] 
[   16.327306] The buggy address belongs to the object at ffff88810342d080
[   16.327306]  which belongs to the cache kmalloc-64 of size 64
[   16.327813] The buggy address is located 0 bytes to the right of
[   16.327813]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.328322] 
[   16.328424] The buggy address belongs to the physical page:
[   16.328658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.328986] flags: 0x200000000000000(node=0|zone=2)
[   16.329205] page_type: f5(slab)
[   16.329391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.329739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.330036] page dumped because: kasan: bad access detected
[   16.330307] 
[   16.330421] Memory state around the buggy address:
[   16.330641]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.330950]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.331274] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.331859]                                      ^
[   16.332062]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.332282]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.332736] ==================================================================
[   15.821636] ==================================================================
[   15.821981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.822353] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.822681] 
[   15.822772] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.822818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.822830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.822853] Call Trace:
[   15.822873]  <TASK>
[   15.822892]  dump_stack_lvl+0x73/0xb0
[   15.822921]  print_report+0xd1/0x610
[   15.822943]  ? __virt_addr_valid+0x1db/0x2d0
[   15.822967]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.822988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.823024]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.823046]  kasan_report+0x141/0x180
[   15.823068]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.823095]  kasan_check_range+0x10c/0x1c0
[   15.823119]  __kasan_check_write+0x18/0x20
[   15.823139]  kasan_atomics_helper+0x15b6/0x5450
[   15.823163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.823186]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.823212]  ? kasan_atomics+0x152/0x310
[   15.823238]  kasan_atomics+0x1dc/0x310
[   15.823260]  ? __pfx_kasan_atomics+0x10/0x10
[   15.823285]  ? __pfx_read_tsc+0x10/0x10
[   15.823306]  ? ktime_get_ts64+0x86/0x230
[   15.823342]  kunit_try_run_case+0x1a5/0x480
[   15.823370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.823447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.823471]  ? __kthread_parkme+0x82/0x180
[   15.823492]  ? preempt_count_sub+0x50/0x80
[   15.823525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.823574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.823610]  kthread+0x337/0x6f0
[   15.823629]  ? trace_preempt_on+0x20/0xc0
[   15.823653]  ? __pfx_kthread+0x10/0x10
[   15.823673]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.823705]  ? calculate_sigpending+0x7b/0xa0
[   15.823729]  ? __pfx_kthread+0x10/0x10
[   15.823750]  ret_from_fork+0x116/0x1d0
[   15.823780]  ? __pfx_kthread+0x10/0x10
[   15.823801]  ret_from_fork_asm+0x1a/0x30
[   15.823832]  </TASK>
[   15.823844] 
[   15.831533] Allocated by task 282:
[   15.831717]  kasan_save_stack+0x45/0x70
[   15.831884]  kasan_save_track+0x18/0x40
[   15.832106]  kasan_save_alloc_info+0x3b/0x50
[   15.832293]  __kasan_kmalloc+0xb7/0xc0
[   15.832514]  __kmalloc_cache_noprof+0x189/0x420
[   15.832719]  kasan_atomics+0x95/0x310
[   15.832924]  kunit_try_run_case+0x1a5/0x480
[   15.833081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833258]  kthread+0x337/0x6f0
[   15.833379]  ret_from_fork+0x116/0x1d0
[   15.833537]  ret_from_fork_asm+0x1a/0x30
[   15.833680] 
[   15.833757] The buggy address belongs to the object at ffff88810342d080
[   15.833757]  which belongs to the cache kmalloc-64 of size 64
[   15.834193] The buggy address is located 0 bytes to the right of
[   15.834193]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.834768] 
[   15.834866] The buggy address belongs to the physical page:
[   15.835126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.835500] flags: 0x200000000000000(node=0|zone=2)
[   15.835760] page_type: f5(slab)
[   15.835929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.836308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.836665] page dumped because: kasan: bad access detected
[   15.836952] 
[   15.837055] Memory state around the buggy address:
[   15.837278]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837573]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.837790] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.838005]                                      ^
[   15.838241]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838605]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838948] ==================================================================
[   15.954434] ==================================================================
[   15.954818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.955171] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.955398] 
[   15.955487] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.955533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.955545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.955568] Call Trace:
[   15.955588]  <TASK>
[   15.955608]  dump_stack_lvl+0x73/0xb0
[   15.955636]  print_report+0xd1/0x610
[   15.955658]  ? __virt_addr_valid+0x1db/0x2d0
[   15.955681]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.955703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.955727]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.955748]  kasan_report+0x141/0x180
[   15.955770]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.955797]  kasan_check_range+0x10c/0x1c0
[   15.955820]  __kasan_check_write+0x18/0x20
[   15.955841]  kasan_atomics_helper+0x19e3/0x5450
[   15.955863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.955885]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.955911]  ? kasan_atomics+0x152/0x310
[   15.955937]  kasan_atomics+0x1dc/0x310
[   15.955959]  ? __pfx_kasan_atomics+0x10/0x10
[   15.955983]  ? __pfx_read_tsc+0x10/0x10
[   15.956004]  ? ktime_get_ts64+0x86/0x230
[   15.956040]  kunit_try_run_case+0x1a5/0x480
[   15.956065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.956087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.956111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.956134]  ? __kthread_parkme+0x82/0x180
[   15.956155]  ? preempt_count_sub+0x50/0x80
[   15.956205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.956231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.956255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.956281]  kthread+0x337/0x6f0
[   15.956301]  ? trace_preempt_on+0x20/0xc0
[   15.956325]  ? __pfx_kthread+0x10/0x10
[   15.956346]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.956368]  ? calculate_sigpending+0x7b/0xa0
[   15.956393]  ? __pfx_kthread+0x10/0x10
[   15.956414]  ret_from_fork+0x116/0x1d0
[   15.956434]  ? __pfx_kthread+0x10/0x10
[   15.956454]  ret_from_fork_asm+0x1a/0x30
[   15.956487]  </TASK>
[   15.956497] 
[   15.964256] Allocated by task 282:
[   15.964401]  kasan_save_stack+0x45/0x70
[   15.964557]  kasan_save_track+0x18/0x40
[   15.964717]  kasan_save_alloc_info+0x3b/0x50
[   15.964934]  __kasan_kmalloc+0xb7/0xc0
[   15.965127]  __kmalloc_cache_noprof+0x189/0x420
[   15.965353]  kasan_atomics+0x95/0x310
[   15.965565]  kunit_try_run_case+0x1a5/0x480
[   15.965771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.966031]  kthread+0x337/0x6f0
[   15.966196]  ret_from_fork+0x116/0x1d0
[   15.966378]  ret_from_fork_asm+0x1a/0x30
[   15.966537] 
[   15.966609] The buggy address belongs to the object at ffff88810342d080
[   15.966609]  which belongs to the cache kmalloc-64 of size 64
[   15.967116] The buggy address is located 0 bytes to the right of
[   15.967116]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.967870] 
[   15.967986] The buggy address belongs to the physical page:
[   15.968230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.968576] flags: 0x200000000000000(node=0|zone=2)
[   15.968808] page_type: f5(slab)
[   15.969001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.969274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.969668] page dumped because: kasan: bad access detected
[   15.969855] 
[   15.969923] Memory state around the buggy address:
[   15.970087]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.970298]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.970668] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.970990]                                      ^
[   15.971225]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.971702]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.972027] ==================================================================
[   15.553136] ==================================================================
[   15.553537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.553895] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.554414] 
[   15.554534] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.554581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.554594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.554618] Call Trace:
[   15.554640]  <TASK>
[   15.554660]  dump_stack_lvl+0x73/0xb0
[   15.554691]  print_report+0xd1/0x610
[   15.554716]  ? __virt_addr_valid+0x1db/0x2d0
[   15.554742]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.554765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.554788]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.554810]  kasan_report+0x141/0x180
[   15.554833]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.554859]  __asan_report_load4_noabort+0x18/0x20
[   15.554885]  kasan_atomics_helper+0x4a36/0x5450
[   15.554908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.554931]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.554958]  ? kasan_atomics+0x152/0x310
[   15.554985]  kasan_atomics+0x1dc/0x310
[   15.555623]  ? __pfx_kasan_atomics+0x10/0x10
[   15.555672]  ? __pfx_read_tsc+0x10/0x10
[   15.555697]  ? ktime_get_ts64+0x86/0x230
[   15.555723]  kunit_try_run_case+0x1a5/0x480
[   15.555751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.555774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.555801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.555826]  ? __kthread_parkme+0x82/0x180
[   15.555847]  ? preempt_count_sub+0x50/0x80
[   15.555873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.555897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.555922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.555947]  kthread+0x337/0x6f0
[   15.555967]  ? trace_preempt_on+0x20/0xc0
[   15.555991]  ? __pfx_kthread+0x10/0x10
[   15.556024]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.556047]  ? calculate_sigpending+0x7b/0xa0
[   15.556073]  ? __pfx_kthread+0x10/0x10
[   15.556095]  ret_from_fork+0x116/0x1d0
[   15.556115]  ? __pfx_kthread+0x10/0x10
[   15.556136]  ret_from_fork_asm+0x1a/0x30
[   15.556168]  </TASK>
[   15.556179] 
[   15.563586] Allocated by task 282:
[   15.563743]  kasan_save_stack+0x45/0x70
[   15.563956]  kasan_save_track+0x18/0x40
[   15.564147]  kasan_save_alloc_info+0x3b/0x50
[   15.564301]  __kasan_kmalloc+0xb7/0xc0
[   15.564474]  __kmalloc_cache_noprof+0x189/0x420
[   15.564711]  kasan_atomics+0x95/0x310
[   15.564908]  kunit_try_run_case+0x1a5/0x480
[   15.565092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.565337]  kthread+0x337/0x6f0
[   15.565505]  ret_from_fork+0x116/0x1d0
[   15.565685]  ret_from_fork_asm+0x1a/0x30
[   15.565865] 
[   15.565974] The buggy address belongs to the object at ffff88810342d080
[   15.565974]  which belongs to the cache kmalloc-64 of size 64
[   15.566431] The buggy address is located 0 bytes to the right of
[   15.566431]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.566922] 
[   15.567021] The buggy address belongs to the physical page:
[   15.567233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.567568] flags: 0x200000000000000(node=0|zone=2)
[   15.567799] page_type: f5(slab)
[   15.567946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.568231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.568461] page dumped because: kasan: bad access detected
[   15.568632] 
[   15.568702] Memory state around the buggy address:
[   15.568867]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569131]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.569486] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.569802]                                      ^
[   15.570034]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.570287]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.570692] ==================================================================
[   16.157615] ==================================================================
[   16.158201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.158555] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.158862] 
[   16.158982] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.159300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.159318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.159342] Call Trace:
[   16.159363]  <TASK>
[   16.159385]  dump_stack_lvl+0x73/0xb0
[   16.159418]  print_report+0xd1/0x610
[   16.159876]  ? __virt_addr_valid+0x1db/0x2d0
[   16.159905]  ? kasan_atomics_helper+0x2006/0x5450
[   16.159928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.159955]  ? kasan_atomics_helper+0x2006/0x5450
[   16.159979]  kasan_report+0x141/0x180
[   16.160002]  ? kasan_atomics_helper+0x2006/0x5450
[   16.160042]  kasan_check_range+0x10c/0x1c0
[   16.160067]  __kasan_check_write+0x18/0x20
[   16.160087]  kasan_atomics_helper+0x2006/0x5450
[   16.160109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.160133]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.160160]  ? kasan_atomics+0x152/0x310
[   16.160186]  kasan_atomics+0x1dc/0x310
[   16.160209]  ? __pfx_kasan_atomics+0x10/0x10
[   16.160241]  ? __pfx_read_tsc+0x10/0x10
[   16.160264]  ? ktime_get_ts64+0x86/0x230
[   16.160290]  kunit_try_run_case+0x1a5/0x480
[   16.160315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.160365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.160389]  ? __kthread_parkme+0x82/0x180
[   16.160412]  ? preempt_count_sub+0x50/0x80
[   16.160707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.161640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.161676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.161714]  kthread+0x337/0x6f0
[   16.161924]  ? trace_preempt_on+0x20/0xc0
[   16.161955]  ? __pfx_kthread+0x10/0x10
[   16.161991]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.162025]  ? calculate_sigpending+0x7b/0xa0
[   16.162051]  ? __pfx_kthread+0x10/0x10
[   16.162073]  ret_from_fork+0x116/0x1d0
[   16.162093]  ? __pfx_kthread+0x10/0x10
[   16.162114]  ret_from_fork_asm+0x1a/0x30
[   16.162147]  </TASK>
[   16.162160] 
[   16.175700] Allocated by task 282:
[   16.176083]  kasan_save_stack+0x45/0x70
[   16.176426]  kasan_save_track+0x18/0x40
[   16.176724]  kasan_save_alloc_info+0x3b/0x50
[   16.176885]  __kasan_kmalloc+0xb7/0xc0
[   16.177037]  __kmalloc_cache_noprof+0x189/0x420
[   16.177200]  kasan_atomics+0x95/0x310
[   16.177336]  kunit_try_run_case+0x1a5/0x480
[   16.177663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.178145]  kthread+0x337/0x6f0
[   16.178476]  ret_from_fork+0x116/0x1d0
[   16.178831]  ret_from_fork_asm+0x1a/0x30
[   16.179203] 
[   16.179381] The buggy address belongs to the object at ffff88810342d080
[   16.179381]  which belongs to the cache kmalloc-64 of size 64
[   16.180471] The buggy address is located 0 bytes to the right of
[   16.180471]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.181576] 
[   16.181747] The buggy address belongs to the physical page:
[   16.182134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.182379] flags: 0x200000000000000(node=0|zone=2)
[   16.182860] page_type: f5(slab)
[   16.183187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.183879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.184554] page dumped because: kasan: bad access detected
[   16.184908] 
[   16.185085] Memory state around the buggy address:
[   16.185438]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.185916]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.186213] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.186861]                                      ^
[   16.187140]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.187748]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.187965] ==================================================================
[   15.936833] ==================================================================
[   15.937216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.937564] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.937860] 
[   15.937976] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.938036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.938049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.938073] Call Trace:
[   15.938093]  <TASK>
[   15.938114]  dump_stack_lvl+0x73/0xb0
[   15.938144]  print_report+0xd1/0x610
[   15.938167]  ? __virt_addr_valid+0x1db/0x2d0
[   15.938191]  ? kasan_atomics_helper+0x194a/0x5450
[   15.938213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.938238]  ? kasan_atomics_helper+0x194a/0x5450
[   15.938261]  kasan_report+0x141/0x180
[   15.938284]  ? kasan_atomics_helper+0x194a/0x5450
[   15.938310]  kasan_check_range+0x10c/0x1c0
[   15.938336]  __kasan_check_write+0x18/0x20
[   15.938357]  kasan_atomics_helper+0x194a/0x5450
[   15.938380]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.938403]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.938429]  ? kasan_atomics+0x152/0x310
[   15.938456]  kasan_atomics+0x1dc/0x310
[   15.938479]  ? __pfx_kasan_atomics+0x10/0x10
[   15.938504]  ? __pfx_read_tsc+0x10/0x10
[   15.938526]  ? ktime_get_ts64+0x86/0x230
[   15.938551]  kunit_try_run_case+0x1a5/0x480
[   15.938577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.938600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.938625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.938650]  ? __kthread_parkme+0x82/0x180
[   15.938671]  ? preempt_count_sub+0x50/0x80
[   15.938695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.938720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.938745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.938770]  kthread+0x337/0x6f0
[   15.938790]  ? trace_preempt_on+0x20/0xc0
[   15.938813]  ? __pfx_kthread+0x10/0x10
[   15.938834]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.938856]  ? calculate_sigpending+0x7b/0xa0
[   15.938881]  ? __pfx_kthread+0x10/0x10
[   15.938903]  ret_from_fork+0x116/0x1d0
[   15.938922]  ? __pfx_kthread+0x10/0x10
[   15.938943]  ret_from_fork_asm+0x1a/0x30
[   15.938974]  </TASK>
[   15.938984] 
[   15.946080] Allocated by task 282:
[   15.946272]  kasan_save_stack+0x45/0x70
[   15.946543]  kasan_save_track+0x18/0x40
[   15.946746]  kasan_save_alloc_info+0x3b/0x50
[   15.946979]  __kasan_kmalloc+0xb7/0xc0
[   15.947139]  __kmalloc_cache_noprof+0x189/0x420
[   15.947292]  kasan_atomics+0x95/0x310
[   15.947451]  kunit_try_run_case+0x1a5/0x480
[   15.947684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.947959]  kthread+0x337/0x6f0
[   15.948139]  ret_from_fork+0x116/0x1d0
[   15.948343]  ret_from_fork_asm+0x1a/0x30
[   15.948612] 
[   15.948693] The buggy address belongs to the object at ffff88810342d080
[   15.948693]  which belongs to the cache kmalloc-64 of size 64
[   15.949154] The buggy address is located 0 bytes to the right of
[   15.949154]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.949644] 
[   15.949742] The buggy address belongs to the physical page:
[   15.950004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.950328] flags: 0x200000000000000(node=0|zone=2)
[   15.950584] page_type: f5(slab)
[   15.950726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.950982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.951212] page dumped because: kasan: bad access detected
[   15.951377] 
[   15.951446] Memory state around the buggy address:
[   15.951631]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.951942]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.952261] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.952561]                                      ^
[   15.952840]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.953169]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.953396] ==================================================================
[   16.048351] ==================================================================
[   16.048966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.049414] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.049631] 
[   16.049807] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.049856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.049869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.049892] Call Trace:
[   16.049912]  <TASK>
[   16.049933]  dump_stack_lvl+0x73/0xb0
[   16.049964]  print_report+0xd1/0x610
[   16.049986]  ? __virt_addr_valid+0x1db/0x2d0
[   16.050021]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.050043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.050068]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.050091]  kasan_report+0x141/0x180
[   16.050112]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.050139]  kasan_check_range+0x10c/0x1c0
[   16.050164]  __kasan_check_write+0x18/0x20
[   16.050183]  kasan_atomics_helper+0x1ce1/0x5450
[   16.050207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.050230]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.050257]  ? kasan_atomics+0x152/0x310
[   16.050283]  kasan_atomics+0x1dc/0x310
[   16.050306]  ? __pfx_kasan_atomics+0x10/0x10
[   16.050331]  ? __pfx_read_tsc+0x10/0x10
[   16.050352]  ? ktime_get_ts64+0x86/0x230
[   16.050378]  kunit_try_run_case+0x1a5/0x480
[   16.050404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.050427]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.050452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.050479]  ? __kthread_parkme+0x82/0x180
[   16.050502]  ? preempt_count_sub+0x50/0x80
[   16.050530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.050557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.050584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.050608]  kthread+0x337/0x6f0
[   16.050629]  ? trace_preempt_on+0x20/0xc0
[   16.050654]  ? __pfx_kthread+0x10/0x10
[   16.050680]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.050723]  ? calculate_sigpending+0x7b/0xa0
[   16.050749]  ? __pfx_kthread+0x10/0x10
[   16.050771]  ret_from_fork+0x116/0x1d0
[   16.050790]  ? __pfx_kthread+0x10/0x10
[   16.050813]  ret_from_fork_asm+0x1a/0x30
[   16.050844]  </TASK>
[   16.050855] 
[   16.058262] Allocated by task 282:
[   16.058402]  kasan_save_stack+0x45/0x70
[   16.058551]  kasan_save_track+0x18/0x40
[   16.058685]  kasan_save_alloc_info+0x3b/0x50
[   16.058831]  __kasan_kmalloc+0xb7/0xc0
[   16.058960]  __kmalloc_cache_noprof+0x189/0x420
[   16.059372]  kasan_atomics+0x95/0x310
[   16.059686]  kunit_try_run_case+0x1a5/0x480
[   16.059888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.060265]  kthread+0x337/0x6f0
[   16.060608]  ret_from_fork+0x116/0x1d0
[   16.060748]  ret_from_fork_asm+0x1a/0x30
[   16.060888] 
[   16.060959] The buggy address belongs to the object at ffff88810342d080
[   16.060959]  which belongs to the cache kmalloc-64 of size 64
[   16.061316] The buggy address is located 0 bytes to the right of
[   16.061316]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.062390] 
[   16.062506] The buggy address belongs to the physical page:
[   16.062761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.063098] flags: 0x200000000000000(node=0|zone=2)
[   16.063304] page_type: f5(slab)
[   16.063456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.063702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.063923] page dumped because: kasan: bad access detected
[   16.064096] 
[   16.064164] Memory state around the buggy address:
[   16.064314]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064524]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.064804] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.065121]                                      ^
[   16.065340]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.065942]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.066255] ==================================================================
[   16.231108] ==================================================================
[   16.231476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.231851] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.232328] 
[   16.232441] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.232521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.232534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.232557] Call Trace:
[   16.232603]  <TASK>
[   16.232625]  dump_stack_lvl+0x73/0xb0
[   16.232658]  print_report+0xd1/0x610
[   16.232681]  ? __virt_addr_valid+0x1db/0x2d0
[   16.232706]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.232728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.232752]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.232775]  kasan_report+0x141/0x180
[   16.232798]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.232825]  __asan_report_load8_noabort+0x18/0x20
[   16.232859]  kasan_atomics_helper+0x4fb2/0x5450
[   16.232881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.232904]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.232932]  ? kasan_atomics+0x152/0x310
[   16.232959]  kasan_atomics+0x1dc/0x310
[   16.232982]  ? __pfx_kasan_atomics+0x10/0x10
[   16.233029]  ? __pfx_read_tsc+0x10/0x10
[   16.233052]  ? ktime_get_ts64+0x86/0x230
[   16.233077]  kunit_try_run_case+0x1a5/0x480
[   16.233103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.233126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.233151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.233176]  ? __kthread_parkme+0x82/0x180
[   16.233198]  ? preempt_count_sub+0x50/0x80
[   16.233222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.233247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.233273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.233298]  kthread+0x337/0x6f0
[   16.233317]  ? trace_preempt_on+0x20/0xc0
[   16.233341]  ? __pfx_kthread+0x10/0x10
[   16.233362]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.233384]  ? calculate_sigpending+0x7b/0xa0
[   16.233427]  ? __pfx_kthread+0x10/0x10
[   16.233449]  ret_from_fork+0x116/0x1d0
[   16.233468]  ? __pfx_kthread+0x10/0x10
[   16.233489]  ret_from_fork_asm+0x1a/0x30
[   16.233521]  </TASK>
[   16.233533] 
[   16.241684] Allocated by task 282:
[   16.241880]  kasan_save_stack+0x45/0x70
[   16.242106]  kasan_save_track+0x18/0x40
[   16.242300]  kasan_save_alloc_info+0x3b/0x50
[   16.242525]  __kasan_kmalloc+0xb7/0xc0
[   16.242665]  __kmalloc_cache_noprof+0x189/0x420
[   16.242826]  kasan_atomics+0x95/0x310
[   16.242962]  kunit_try_run_case+0x1a5/0x480
[   16.243122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.243440]  kthread+0x337/0x6f0
[   16.243612]  ret_from_fork+0x116/0x1d0
[   16.243803]  ret_from_fork_asm+0x1a/0x30
[   16.244029] 
[   16.244127] The buggy address belongs to the object at ffff88810342d080
[   16.244127]  which belongs to the cache kmalloc-64 of size 64
[   16.246048] The buggy address is located 0 bytes to the right of
[   16.246048]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.246904] 
[   16.246991] The buggy address belongs to the physical page:
[   16.247175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.247409] flags: 0x200000000000000(node=0|zone=2)
[   16.247901] page_type: f5(slab)
[   16.248226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.248907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.249629] page dumped because: kasan: bad access detected
[   16.250213] 
[   16.250386] Memory state around the buggy address:
[   16.250827]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.251319]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.251573] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.252132]                                      ^
[   16.252288]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.252679]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.253299] ==================================================================
[   15.839917] ==================================================================
[   15.840279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.840554] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.840894] 
[   15.841026] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.841075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.841099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.841122] Call Trace:
[   15.841143]  <TASK>
[   15.841163]  dump_stack_lvl+0x73/0xb0
[   15.841194]  print_report+0xd1/0x610
[   15.841227]  ? __virt_addr_valid+0x1db/0x2d0
[   15.841252]  ? kasan_atomics_helper+0x164f/0x5450
[   15.841274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.841308]  ? kasan_atomics_helper+0x164f/0x5450
[   15.841331]  kasan_report+0x141/0x180
[   15.841353]  ? kasan_atomics_helper+0x164f/0x5450
[   15.841380]  kasan_check_range+0x10c/0x1c0
[   15.841433]  __kasan_check_write+0x18/0x20
[   15.841457]  kasan_atomics_helper+0x164f/0x5450
[   15.841491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.841515]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.841542]  ? kasan_atomics+0x152/0x310
[   15.841568]  kasan_atomics+0x1dc/0x310
[   15.841591]  ? __pfx_kasan_atomics+0x10/0x10
[   15.841624]  ? __pfx_read_tsc+0x10/0x10
[   15.841646]  ? ktime_get_ts64+0x86/0x230
[   15.841671]  kunit_try_run_case+0x1a5/0x480
[   15.841709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.841732]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.841757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.841790]  ? __kthread_parkme+0x82/0x180
[   15.841812]  ? preempt_count_sub+0x50/0x80
[   15.841836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.841870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.841895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.841920]  kthread+0x337/0x6f0
[   15.841940]  ? trace_preempt_on+0x20/0xc0
[   15.841971]  ? __pfx_kthread+0x10/0x10
[   15.841992]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.842028]  ? calculate_sigpending+0x7b/0xa0
[   15.842054]  ? __pfx_kthread+0x10/0x10
[   15.842075]  ret_from_fork+0x116/0x1d0
[   15.842095]  ? __pfx_kthread+0x10/0x10
[   15.842115]  ret_from_fork_asm+0x1a/0x30
[   15.842157]  </TASK>
[   15.842168] 
[   15.849750] Allocated by task 282:
[   15.849924]  kasan_save_stack+0x45/0x70
[   15.850158]  kasan_save_track+0x18/0x40
[   15.850344]  kasan_save_alloc_info+0x3b/0x50
[   15.850559]  __kasan_kmalloc+0xb7/0xc0
[   15.850757]  __kmalloc_cache_noprof+0x189/0x420
[   15.850977]  kasan_atomics+0x95/0x310
[   15.851171]  kunit_try_run_case+0x1a5/0x480
[   15.851368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851624]  kthread+0x337/0x6f0
[   15.851805]  ret_from_fork+0x116/0x1d0
[   15.851955]  ret_from_fork_asm+0x1a/0x30
[   15.852107] 
[   15.852179] The buggy address belongs to the object at ffff88810342d080
[   15.852179]  which belongs to the cache kmalloc-64 of size 64
[   15.852555] The buggy address is located 0 bytes to the right of
[   15.852555]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.852927] 
[   15.853002] The buggy address belongs to the physical page:
[   15.853290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.853668] flags: 0x200000000000000(node=0|zone=2)
[   15.853904] page_type: f5(slab)
[   15.854085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.854472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.854784] page dumped because: kasan: bad access detected
[   15.854956] 
[   15.855035] Memory state around the buggy address:
[   15.855191]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.855426]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.855642] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.855972]                                      ^
[   15.856204]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.856552]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.856899] ==================================================================
[   15.803282] ==================================================================
[   15.803873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.804184] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.804604] 
[   15.804706] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.804754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.804777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.804799] Call Trace:
[   15.804820]  <TASK>
[   15.804841]  dump_stack_lvl+0x73/0xb0
[   15.804886]  print_report+0xd1/0x610
[   15.804910]  ? __virt_addr_valid+0x1db/0x2d0
[   15.804934]  ? kasan_atomics_helper+0x151d/0x5450
[   15.804966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.804989]  ? kasan_atomics_helper+0x151d/0x5450
[   15.805027]  kasan_report+0x141/0x180
[   15.805050]  ? kasan_atomics_helper+0x151d/0x5450
[   15.805076]  kasan_check_range+0x10c/0x1c0
[   15.805112]  __kasan_check_write+0x18/0x20
[   15.805131]  kasan_atomics_helper+0x151d/0x5450
[   15.805154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.805189]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.805215]  ? kasan_atomics+0x152/0x310
[   15.805241]  kasan_atomics+0x1dc/0x310
[   15.805275]  ? __pfx_kasan_atomics+0x10/0x10
[   15.805301]  ? __pfx_read_tsc+0x10/0x10
[   15.805323]  ? ktime_get_ts64+0x86/0x230
[   15.805360]  kunit_try_run_case+0x1a5/0x480
[   15.805386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.805464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.805500]  ? __kthread_parkme+0x82/0x180
[   15.805521]  ? preempt_count_sub+0x50/0x80
[   15.805546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.805609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.805634]  kthread+0x337/0x6f0
[   15.805664]  ? trace_preempt_on+0x20/0xc0
[   15.805688]  ? __pfx_kthread+0x10/0x10
[   15.805709]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.805742]  ? calculate_sigpending+0x7b/0xa0
[   15.805768]  ? __pfx_kthread+0x10/0x10
[   15.805789]  ret_from_fork+0x116/0x1d0
[   15.805809]  ? __pfx_kthread+0x10/0x10
[   15.805830]  ret_from_fork_asm+0x1a/0x30
[   15.805862]  </TASK>
[   15.805876] 
[   15.813286] Allocated by task 282:
[   15.813487]  kasan_save_stack+0x45/0x70
[   15.813716]  kasan_save_track+0x18/0x40
[   15.813922]  kasan_save_alloc_info+0x3b/0x50
[   15.814097]  __kasan_kmalloc+0xb7/0xc0
[   15.814303]  __kmalloc_cache_noprof+0x189/0x420
[   15.814540]  kasan_atomics+0x95/0x310
[   15.814712]  kunit_try_run_case+0x1a5/0x480
[   15.814944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.815139]  kthread+0x337/0x6f0
[   15.815262]  ret_from_fork+0x116/0x1d0
[   15.815397]  ret_from_fork_asm+0x1a/0x30
[   15.815570] 
[   15.815691] The buggy address belongs to the object at ffff88810342d080
[   15.815691]  which belongs to the cache kmalloc-64 of size 64
[   15.816320] The buggy address is located 0 bytes to the right of
[   15.816320]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.816921] 
[   15.817031] The buggy address belongs to the physical page:
[   15.817282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.817641] flags: 0x200000000000000(node=0|zone=2)
[   15.817815] page_type: f5(slab)
[   15.817989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.818702] page dumped because: kasan: bad access detected
[   15.818875] 
[   15.818945] Memory state around the buggy address:
[   15.819123]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819343]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.819589] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.819855]                                      ^
[   15.820102]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820434]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820745] ==================================================================
[   16.084699] ==================================================================
[   16.085252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.085571] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.085798] 
[   16.085888] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.085934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.085947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.085970] Call Trace:
[   16.085990]  <TASK>
[   16.086022]  dump_stack_lvl+0x73/0xb0
[   16.086051]  print_report+0xd1/0x610
[   16.086075]  ? __virt_addr_valid+0x1db/0x2d0
[   16.086100]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.086121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.086145]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.086168]  kasan_report+0x141/0x180
[   16.086190]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.086217]  kasan_check_range+0x10c/0x1c0
[   16.086241]  __kasan_check_write+0x18/0x20
[   16.086261]  kasan_atomics_helper+0x1e12/0x5450
[   16.086285]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.086308]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.086334]  ? kasan_atomics+0x152/0x310
[   16.086360]  kasan_atomics+0x1dc/0x310
[   16.086383]  ? __pfx_kasan_atomics+0x10/0x10
[   16.086407]  ? __pfx_read_tsc+0x10/0x10
[   16.086442]  ? ktime_get_ts64+0x86/0x230
[   16.086467]  kunit_try_run_case+0x1a5/0x480
[   16.086492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.086515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.086541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.086565]  ? __kthread_parkme+0x82/0x180
[   16.086587]  ? preempt_count_sub+0x50/0x80
[   16.086612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.086637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.086662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.086688]  kthread+0x337/0x6f0
[   16.086707]  ? trace_preempt_on+0x20/0xc0
[   16.086731]  ? __pfx_kthread+0x10/0x10
[   16.086752]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.086774]  ? calculate_sigpending+0x7b/0xa0
[   16.086799]  ? __pfx_kthread+0x10/0x10
[   16.086821]  ret_from_fork+0x116/0x1d0
[   16.086840]  ? __pfx_kthread+0x10/0x10
[   16.086861]  ret_from_fork_asm+0x1a/0x30
[   16.086892]  </TASK>
[   16.086903] 
[   16.094045] Allocated by task 282:
[   16.094216]  kasan_save_stack+0x45/0x70
[   16.094410]  kasan_save_track+0x18/0x40
[   16.094582]  kasan_save_alloc_info+0x3b/0x50
[   16.094774]  __kasan_kmalloc+0xb7/0xc0
[   16.094903]  __kmalloc_cache_noprof+0x189/0x420
[   16.095090]  kasan_atomics+0x95/0x310
[   16.095271]  kunit_try_run_case+0x1a5/0x480
[   16.095520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.095736]  kthread+0x337/0x6f0
[   16.095887]  ret_from_fork+0x116/0x1d0
[   16.096027]  ret_from_fork_asm+0x1a/0x30
[   16.096227] 
[   16.096324] The buggy address belongs to the object at ffff88810342d080
[   16.096324]  which belongs to the cache kmalloc-64 of size 64
[   16.096886] The buggy address is located 0 bytes to the right of
[   16.096886]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.097369] 
[   16.097459] The buggy address belongs to the physical page:
[   16.097712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.098052] flags: 0x200000000000000(node=0|zone=2)
[   16.098251] page_type: f5(slab)
[   16.098408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.098692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.098993] page dumped because: kasan: bad access detected
[   16.099206] 
[   16.099274] Memory state around the buggy address:
[   16.099426]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.099671]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.099976] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.100266]                                      ^
[   16.100416]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.100706]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.101035] ==================================================================
[   15.294732] ==================================================================
[   15.295101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.295461] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.295719] 
[   15.295820] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.295867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.295879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.295906] Call Trace:
[   15.295927]  <TASK>
[   15.295949]  dump_stack_lvl+0x73/0xb0
[   15.295978]  print_report+0xd1/0x610
[   15.296002]  ? __virt_addr_valid+0x1db/0x2d0
[   15.296036]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.296069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.296093]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.296116]  kasan_report+0x141/0x180
[   15.296149]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.296176]  kasan_check_range+0x10c/0x1c0
[   15.296201]  __kasan_check_write+0x18/0x20
[   15.296221]  kasan_atomics_helper+0xa2b/0x5450
[   15.296244]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.296268]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.296294]  ? kasan_atomics+0x152/0x310
[   15.296321]  kasan_atomics+0x1dc/0x310
[   15.296344]  ? __pfx_kasan_atomics+0x10/0x10
[   15.296369]  ? __pfx_read_tsc+0x10/0x10
[   15.296391]  ? ktime_get_ts64+0x86/0x230
[   15.296416]  kunit_try_run_case+0x1a5/0x480
[   15.296442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.296464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.296490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.296514]  ? __kthread_parkme+0x82/0x180
[   15.296536]  ? preempt_count_sub+0x50/0x80
[   15.296561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.296585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.296610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.296636]  kthread+0x337/0x6f0
[   15.296656]  ? trace_preempt_on+0x20/0xc0
[   15.296680]  ? __pfx_kthread+0x10/0x10
[   15.296701]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.296725]  ? calculate_sigpending+0x7b/0xa0
[   15.296762]  ? __pfx_kthread+0x10/0x10
[   15.296784]  ret_from_fork+0x116/0x1d0
[   15.296803]  ? __pfx_kthread+0x10/0x10
[   15.296834]  ret_from_fork_asm+0x1a/0x30
[   15.296872]  </TASK>
[   15.296882] 
[   15.304807] Allocated by task 282:
[   15.305017]  kasan_save_stack+0x45/0x70
[   15.305232]  kasan_save_track+0x18/0x40
[   15.305417]  kasan_save_alloc_info+0x3b/0x50
[   15.305645]  __kasan_kmalloc+0xb7/0xc0
[   15.305870]  __kmalloc_cache_noprof+0x189/0x420
[   15.306091]  kasan_atomics+0x95/0x310
[   15.306302]  kunit_try_run_case+0x1a5/0x480
[   15.306531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306780]  kthread+0x337/0x6f0
[   15.306911]  ret_from_fork+0x116/0x1d0
[   15.307063]  ret_from_fork_asm+0x1a/0x30
[   15.307280] 
[   15.307376] The buggy address belongs to the object at ffff88810342d080
[   15.307376]  which belongs to the cache kmalloc-64 of size 64
[   15.307957] The buggy address is located 0 bytes to the right of
[   15.307957]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.308513] 
[   15.308602] The buggy address belongs to the physical page:
[   15.308870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.309209] flags: 0x200000000000000(node=0|zone=2)
[   15.309441] page_type: f5(slab)
[   15.309568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.309801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.310037] page dumped because: kasan: bad access detected
[   15.310209] 
[   15.310279] Memory state around the buggy address:
[   15.310436]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310655]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.310872] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.311212]                                      ^
[   15.311436]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.311749]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312072] ==================================================================
[   15.059585] ==================================================================
[   15.060278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.060964] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.061658] 
[   15.061856] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.061906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.061918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.061950] Call Trace:
[   15.061970]  <TASK>
[   15.061992]  dump_stack_lvl+0x73/0xb0
[   15.062039]  print_report+0xd1/0x610
[   15.062063]  ? __virt_addr_valid+0x1db/0x2d0
[   15.062086]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.062108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.062132]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.062154]  kasan_report+0x141/0x180
[   15.062176]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.062203]  kasan_check_range+0x10c/0x1c0
[   15.062227]  __kasan_check_write+0x18/0x20
[   15.062247]  kasan_atomics_helper+0x4a0/0x5450
[   15.062270]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.062293]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.062319]  ? kasan_atomics+0x152/0x310
[   15.062346]  kasan_atomics+0x1dc/0x310
[   15.062370]  ? __pfx_kasan_atomics+0x10/0x10
[   15.062394]  ? __pfx_read_tsc+0x10/0x10
[   15.062440]  ? ktime_get_ts64+0x86/0x230
[   15.062465]  kunit_try_run_case+0x1a5/0x480
[   15.062492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.062540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.062564]  ? __kthread_parkme+0x82/0x180
[   15.062586]  ? preempt_count_sub+0x50/0x80
[   15.062611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.062661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.062686]  kthread+0x337/0x6f0
[   15.062705]  ? trace_preempt_on+0x20/0xc0
[   15.062729]  ? __pfx_kthread+0x10/0x10
[   15.062750]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.062773]  ? calculate_sigpending+0x7b/0xa0
[   15.062798]  ? __pfx_kthread+0x10/0x10
[   15.062819]  ret_from_fork+0x116/0x1d0
[   15.062838]  ? __pfx_kthread+0x10/0x10
[   15.062859]  ret_from_fork_asm+0x1a/0x30
[   15.062891]  </TASK>
[   15.062903] 
[   15.075268] Allocated by task 282:
[   15.075445]  kasan_save_stack+0x45/0x70
[   15.075822]  kasan_save_track+0x18/0x40
[   15.076188]  kasan_save_alloc_info+0x3b/0x50
[   15.076604]  __kasan_kmalloc+0xb7/0xc0
[   15.076960]  __kmalloc_cache_noprof+0x189/0x420
[   15.077383]  kasan_atomics+0x95/0x310
[   15.077749]  kunit_try_run_case+0x1a5/0x480
[   15.078152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.078559]  kthread+0x337/0x6f0
[   15.078685]  ret_from_fork+0x116/0x1d0
[   15.078820]  ret_from_fork_asm+0x1a/0x30
[   15.078963] 
[   15.079078] The buggy address belongs to the object at ffff88810342d080
[   15.079078]  which belongs to the cache kmalloc-64 of size 64
[   15.080157] The buggy address is located 0 bytes to the right of
[   15.080157]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.081263] 
[   15.081443] The buggy address belongs to the physical page:
[   15.081892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.082145] flags: 0x200000000000000(node=0|zone=2)
[   15.082312] page_type: f5(slab)
[   15.082464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.083138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.083775] page dumped because: kasan: bad access detected
[   15.084266] 
[   15.084445] Memory state around the buggy address:
[   15.084851]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.085462]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.086336] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.086829]                                      ^
[   15.086987]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087205]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087432] ==================================================================
[   15.450601] ==================================================================
[   15.451679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.452383] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.453257] 
[   15.453512] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.453566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.453580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.453603] Call Trace:
[   15.453625]  <TASK>
[   15.453648]  dump_stack_lvl+0x73/0xb0
[   15.453682]  print_report+0xd1/0x610
[   15.453728]  ? __virt_addr_valid+0x1db/0x2d0
[   15.453754]  ? kasan_atomics_helper+0xde0/0x5450
[   15.453776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.453800]  ? kasan_atomics_helper+0xde0/0x5450
[   15.453822]  kasan_report+0x141/0x180
[   15.453844]  ? kasan_atomics_helper+0xde0/0x5450
[   15.453870]  kasan_check_range+0x10c/0x1c0
[   15.453896]  __kasan_check_write+0x18/0x20
[   15.453920]  kasan_atomics_helper+0xde0/0x5450
[   15.453943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.453966]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.453993]  ? kasan_atomics+0x152/0x310
[   15.454029]  kasan_atomics+0x1dc/0x310
[   15.454052]  ? __pfx_kasan_atomics+0x10/0x10
[   15.454078]  ? __pfx_read_tsc+0x10/0x10
[   15.454100]  ? ktime_get_ts64+0x86/0x230
[   15.454125]  kunit_try_run_case+0x1a5/0x480
[   15.454151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.454175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.454200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.454224]  ? __kthread_parkme+0x82/0x180
[   15.454246]  ? preempt_count_sub+0x50/0x80
[   15.454272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.454297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.454322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.454348]  kthread+0x337/0x6f0
[   15.454368]  ? trace_preempt_on+0x20/0xc0
[   15.454392]  ? __pfx_kthread+0x10/0x10
[   15.454413]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.454447]  ? calculate_sigpending+0x7b/0xa0
[   15.454473]  ? __pfx_kthread+0x10/0x10
[   15.454494]  ret_from_fork+0x116/0x1d0
[   15.454514]  ? __pfx_kthread+0x10/0x10
[   15.454535]  ret_from_fork_asm+0x1a/0x30
[   15.454567]  </TASK>
[   15.454579] 
[   15.467390] Allocated by task 282:
[   15.467773]  kasan_save_stack+0x45/0x70
[   15.468067]  kasan_save_track+0x18/0x40
[   15.468204]  kasan_save_alloc_info+0x3b/0x50
[   15.468350]  __kasan_kmalloc+0xb7/0xc0
[   15.468619]  __kmalloc_cache_noprof+0x189/0x420
[   15.469071]  kasan_atomics+0x95/0x310
[   15.469436]  kunit_try_run_case+0x1a5/0x480
[   15.469912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.470404]  kthread+0x337/0x6f0
[   15.470741]  ret_from_fork+0x116/0x1d0
[   15.471102]  ret_from_fork_asm+0x1a/0x30
[   15.471242] 
[   15.471315] The buggy address belongs to the object at ffff88810342d080
[   15.471315]  which belongs to the cache kmalloc-64 of size 64
[   15.471956] The buggy address is located 0 bytes to the right of
[   15.471956]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.472612] 
[   15.472721] The buggy address belongs to the physical page:
[   15.473228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.473640] flags: 0x200000000000000(node=0|zone=2)
[   15.473806] page_type: f5(slab)
[   15.473926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.474185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.474552] page dumped because: kasan: bad access detected
[   15.474825] 
[   15.474895] Memory state around the buggy address:
[   15.475343]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.475769]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476080] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.476369]                                      ^
[   15.477210]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.477685]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.478186] ==================================================================
[   14.969804] ==================================================================
[   14.970373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.970731] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   14.971121] 
[   14.971249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.971309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.971322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.971345] Call Trace:
[   14.971359]  <TASK>
[   14.971377]  dump_stack_lvl+0x73/0xb0
[   14.971409]  print_report+0xd1/0x610
[   14.971432]  ? __virt_addr_valid+0x1db/0x2d0
[   14.971466]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.971489]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.971512]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.971544]  kasan_report+0x141/0x180
[   14.971566]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.971601]  __asan_report_load4_noabort+0x18/0x20
[   14.971625]  kasan_atomics_helper+0x4b88/0x5450
[   14.971647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.971679]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.971705]  ? kasan_atomics+0x152/0x310
[   14.971731]  kasan_atomics+0x1dc/0x310
[   14.971762]  ? __pfx_kasan_atomics+0x10/0x10
[   14.971787]  ? __pfx_read_tsc+0x10/0x10
[   14.971810]  ? ktime_get_ts64+0x86/0x230
[   14.971844]  kunit_try_run_case+0x1a5/0x480
[   14.971869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.971891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.971916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.971939]  ? __kthread_parkme+0x82/0x180
[   14.971966]  ? preempt_count_sub+0x50/0x80
[   14.971990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.972030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.972053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.972077]  kthread+0x337/0x6f0
[   14.972095]  ? trace_preempt_on+0x20/0xc0
[   14.972118]  ? __pfx_kthread+0x10/0x10
[   14.972137]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.972159]  ? calculate_sigpending+0x7b/0xa0
[   14.972265]  ? __pfx_kthread+0x10/0x10
[   14.972286]  ret_from_fork+0x116/0x1d0
[   14.972305]  ? __pfx_kthread+0x10/0x10
[   14.972325]  ret_from_fork_asm+0x1a/0x30
[   14.972365]  </TASK>
[   14.972374] 
[   14.983033] Allocated by task 282:
[   14.983277]  kasan_save_stack+0x45/0x70
[   14.983500]  kasan_save_track+0x18/0x40
[   14.983744]  kasan_save_alloc_info+0x3b/0x50
[   14.983944]  __kasan_kmalloc+0xb7/0xc0
[   14.984196]  __kmalloc_cache_noprof+0x189/0x420
[   14.984354]  kasan_atomics+0x95/0x310
[   14.984486]  kunit_try_run_case+0x1a5/0x480
[   14.984633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.984940]  kthread+0x337/0x6f0
[   14.985580]  ret_from_fork+0x116/0x1d0
[   14.985792]  ret_from_fork_asm+0x1a/0x30
[   14.986091] 
[   14.986183] The buggy address belongs to the object at ffff88810342d080
[   14.986183]  which belongs to the cache kmalloc-64 of size 64
[   14.986860] The buggy address is located 0 bytes to the right of
[   14.986860]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   14.987511] 
[   14.987585] The buggy address belongs to the physical page:
[   14.987758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   14.988416] flags: 0x200000000000000(node=0|zone=2)
[   14.988813] page_type: f5(slab)
[   14.988953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.989491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.989796] page dumped because: kasan: bad access detected
[   14.989987] 
[   14.990089] Memory state around the buggy address:
[   14.990339]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990767]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.990987] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.991321]                                      ^
[   14.991706]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.992141]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.992373] ==================================================================
[   16.254379] ==================================================================
[   16.255148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.255539] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.255764] 
[   16.255857] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.255908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.255921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.255944] Call Trace:
[   16.255964]  <TASK>
[   16.255987]  dump_stack_lvl+0x73/0xb0
[   16.256030]  print_report+0xd1/0x610
[   16.256055]  ? __virt_addr_valid+0x1db/0x2d0
[   16.256079]  ? kasan_atomics_helper+0x218a/0x5450
[   16.256101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.256125]  ? kasan_atomics_helper+0x218a/0x5450
[   16.256171]  kasan_report+0x141/0x180
[   16.256193]  ? kasan_atomics_helper+0x218a/0x5450
[   16.256221]  kasan_check_range+0x10c/0x1c0
[   16.256263]  __kasan_check_write+0x18/0x20
[   16.256298]  kasan_atomics_helper+0x218a/0x5450
[   16.256322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.256345]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.256371]  ? kasan_atomics+0x152/0x310
[   16.256398]  kasan_atomics+0x1dc/0x310
[   16.256421]  ? __pfx_kasan_atomics+0x10/0x10
[   16.256446]  ? __pfx_read_tsc+0x10/0x10
[   16.256469]  ? ktime_get_ts64+0x86/0x230
[   16.256494]  kunit_try_run_case+0x1a5/0x480
[   16.256533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.256556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.256582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.256607]  ? __kthread_parkme+0x82/0x180
[   16.256645]  ? preempt_count_sub+0x50/0x80
[   16.256671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.256696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.256721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.256762]  kthread+0x337/0x6f0
[   16.256782]  ? trace_preempt_on+0x20/0xc0
[   16.256806]  ? __pfx_kthread+0x10/0x10
[   16.256827]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.256857]  ? calculate_sigpending+0x7b/0xa0
[   16.256882]  ? __pfx_kthread+0x10/0x10
[   16.256904]  ret_from_fork+0x116/0x1d0
[   16.256923]  ? __pfx_kthread+0x10/0x10
[   16.256944]  ret_from_fork_asm+0x1a/0x30
[   16.256976]  </TASK>
[   16.256988] 
[   16.264685] Allocated by task 282:
[   16.264887]  kasan_save_stack+0x45/0x70
[   16.265130]  kasan_save_track+0x18/0x40
[   16.265266]  kasan_save_alloc_info+0x3b/0x50
[   16.265519]  __kasan_kmalloc+0xb7/0xc0
[   16.265726]  __kmalloc_cache_noprof+0x189/0x420
[   16.265958]  kasan_atomics+0x95/0x310
[   16.266107]  kunit_try_run_case+0x1a5/0x480
[   16.266295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.266691]  kthread+0x337/0x6f0
[   16.266837]  ret_from_fork+0x116/0x1d0
[   16.267055]  ret_from_fork_asm+0x1a/0x30
[   16.267202] 
[   16.267274] The buggy address belongs to the object at ffff88810342d080
[   16.267274]  which belongs to the cache kmalloc-64 of size 64
[   16.267620] The buggy address is located 0 bytes to the right of
[   16.267620]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.268453] 
[   16.268553] The buggy address belongs to the physical page:
[   16.268779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.269033] flags: 0x200000000000000(node=0|zone=2)
[   16.269198] page_type: f5(slab)
[   16.269366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.270081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.270432] page dumped because: kasan: bad access detected
[   16.270690] 
[   16.270837] Memory state around the buggy address:
[   16.271064]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.271390]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.271661] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.271885]                                      ^
[   16.272213]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.272609]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.273096] ==================================================================
[   15.363858] ==================================================================
[   15.364579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.365058] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.365692] 
[   15.365808] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.365969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.365985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.366017] Call Trace:
[   15.366039]  <TASK>
[   15.366059]  dump_stack_lvl+0x73/0xb0
[   15.366093]  print_report+0xd1/0x610
[   15.366117]  ? __virt_addr_valid+0x1db/0x2d0
[   15.366141]  ? kasan_atomics_helper+0xc70/0x5450
[   15.366163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.366187]  ? kasan_atomics_helper+0xc70/0x5450
[   15.366210]  kasan_report+0x141/0x180
[   15.366232]  ? kasan_atomics_helper+0xc70/0x5450
[   15.366259]  kasan_check_range+0x10c/0x1c0
[   15.366284]  __kasan_check_write+0x18/0x20
[   15.366304]  kasan_atomics_helper+0xc70/0x5450
[   15.366327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.366351]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.366377]  ? kasan_atomics+0x152/0x310
[   15.366404]  kasan_atomics+0x1dc/0x310
[   15.366437]  ? __pfx_kasan_atomics+0x10/0x10
[   15.366461]  ? __pfx_read_tsc+0x10/0x10
[   15.366484]  ? ktime_get_ts64+0x86/0x230
[   15.366510]  kunit_try_run_case+0x1a5/0x480
[   15.366537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.366586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.366611]  ? __kthread_parkme+0x82/0x180
[   15.366633]  ? preempt_count_sub+0x50/0x80
[   15.366658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.366733]  kthread+0x337/0x6f0
[   15.366753]  ? trace_preempt_on+0x20/0xc0
[   15.366777]  ? __pfx_kthread+0x10/0x10
[   15.366798]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.366821]  ? calculate_sigpending+0x7b/0xa0
[   15.366846]  ? __pfx_kthread+0x10/0x10
[   15.366868]  ret_from_fork+0x116/0x1d0
[   15.366888]  ? __pfx_kthread+0x10/0x10
[   15.366909]  ret_from_fork_asm+0x1a/0x30
[   15.366941]  </TASK>
[   15.366952] 
[   15.378352] Allocated by task 282:
[   15.378770]  kasan_save_stack+0x45/0x70
[   15.379068]  kasan_save_track+0x18/0x40
[   15.379232]  kasan_save_alloc_info+0x3b/0x50
[   15.379790]  __kasan_kmalloc+0xb7/0xc0
[   15.380109]  __kmalloc_cache_noprof+0x189/0x420
[   15.380415]  kasan_atomics+0x95/0x310
[   15.380751]  kunit_try_run_case+0x1a5/0x480
[   15.381058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.381425]  kthread+0x337/0x6f0
[   15.381678]  ret_from_fork+0x116/0x1d0
[   15.381877]  ret_from_fork_asm+0x1a/0x30
[   15.382239] 
[   15.382337] The buggy address belongs to the object at ffff88810342d080
[   15.382337]  which belongs to the cache kmalloc-64 of size 64
[   15.383088] The buggy address is located 0 bytes to the right of
[   15.383088]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.383847] 
[   15.383959] The buggy address belongs to the physical page:
[   15.384321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.384810] flags: 0x200000000000000(node=0|zone=2)
[   15.385194] page_type: f5(slab)
[   15.385343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.385589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.385821] page dumped because: kasan: bad access detected
[   15.385994] 
[   15.386100] Memory state around the buggy address:
[   15.386405]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.386848]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.387346] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.387991]                                      ^
[   15.388297]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.388759]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389382] ==================================================================
[   15.390120] ==================================================================
[   15.390798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.391509] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.392170] 
[   15.392317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.392394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.392407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.392450] Call Trace:
[   15.392473]  <TASK>
[   15.392495]  dump_stack_lvl+0x73/0xb0
[   15.392528]  print_report+0xd1/0x610
[   15.392552]  ? __virt_addr_valid+0x1db/0x2d0
[   15.392594]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.392616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.392640]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.392663]  kasan_report+0x141/0x180
[   15.392685]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.392712]  __asan_report_load4_noabort+0x18/0x20
[   15.392738]  kasan_atomics_helper+0x4a84/0x5450
[   15.392761]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.392784]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.392811]  ? kasan_atomics+0x152/0x310
[   15.392837]  kasan_atomics+0x1dc/0x310
[   15.392866]  ? __pfx_kasan_atomics+0x10/0x10
[   15.392893]  ? __pfx_read_tsc+0x10/0x10
[   15.392915]  ? ktime_get_ts64+0x86/0x230
[   15.392941]  kunit_try_run_case+0x1a5/0x480
[   15.392967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.392991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.393025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.393049]  ? __kthread_parkme+0x82/0x180
[   15.393071]  ? preempt_count_sub+0x50/0x80
[   15.393096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.393120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.393145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.393171]  kthread+0x337/0x6f0
[   15.393191]  ? trace_preempt_on+0x20/0xc0
[   15.393215]  ? __pfx_kthread+0x10/0x10
[   15.393236]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.393258]  ? calculate_sigpending+0x7b/0xa0
[   15.393284]  ? __pfx_kthread+0x10/0x10
[   15.393306]  ret_from_fork+0x116/0x1d0
[   15.393325]  ? __pfx_kthread+0x10/0x10
[   15.393346]  ret_from_fork_asm+0x1a/0x30
[   15.393379]  </TASK>
[   15.393389] 
[   15.405649] Allocated by task 282:
[   15.406003]  kasan_save_stack+0x45/0x70
[   15.406173]  kasan_save_track+0x18/0x40
[   15.406310]  kasan_save_alloc_info+0x3b/0x50
[   15.406585]  __kasan_kmalloc+0xb7/0xc0
[   15.406975]  __kmalloc_cache_noprof+0x189/0x420
[   15.407430]  kasan_atomics+0x95/0x310
[   15.407790]  kunit_try_run_case+0x1a5/0x480
[   15.408188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.408685]  kthread+0x337/0x6f0
[   15.409002]  ret_from_fork+0x116/0x1d0
[   15.409147]  ret_from_fork_asm+0x1a/0x30
[   15.409289] 
[   15.409363] The buggy address belongs to the object at ffff88810342d080
[   15.409363]  which belongs to the cache kmalloc-64 of size 64
[   15.410465] The buggy address is located 0 bytes to the right of
[   15.410465]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.411585] 
[   15.411686] The buggy address belongs to the physical page:
[   15.411971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.412704] flags: 0x200000000000000(node=0|zone=2)
[   15.412908] page_type: f5(slab)
[   15.413044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.413280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.413714] page dumped because: kasan: bad access detected
[   15.414195] 
[   15.414350] Memory state around the buggy address:
[   15.414802]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.415429]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.416044] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.416674]                                      ^
[   15.416833]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.417067]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.417281] ==================================================================
[   15.914887] ==================================================================
[   15.915668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.916628] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.917287] 
[   15.917468] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.917516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.917548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.917572] Call Trace:
[   15.917606]  <TASK>
[   15.917627]  dump_stack_lvl+0x73/0xb0
[   15.917660]  print_report+0xd1/0x610
[   15.917684]  ? __virt_addr_valid+0x1db/0x2d0
[   15.917708]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.917731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.917754]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.917777]  kasan_report+0x141/0x180
[   15.917799]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.917826]  kasan_check_range+0x10c/0x1c0
[   15.917850]  __kasan_check_write+0x18/0x20
[   15.917870]  kasan_atomics_helper+0x18b1/0x5450
[   15.917894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.917917]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.917943]  ? kasan_atomics+0x152/0x310
[   15.917970]  kasan_atomics+0x1dc/0x310
[   15.917993]  ? __pfx_kasan_atomics+0x10/0x10
[   15.918028]  ? __pfx_read_tsc+0x10/0x10
[   15.918051]  ? ktime_get_ts64+0x86/0x230
[   15.918076]  kunit_try_run_case+0x1a5/0x480
[   15.918102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.918152]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.918176]  ? __kthread_parkme+0x82/0x180
[   15.918198]  ? preempt_count_sub+0x50/0x80
[   15.918223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.918298]  kthread+0x337/0x6f0
[   15.918318]  ? trace_preempt_on+0x20/0xc0
[   15.918345]  ? __pfx_kthread+0x10/0x10
[   15.918366]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.918387]  ? calculate_sigpending+0x7b/0xa0
[   15.918413]  ? __pfx_kthread+0x10/0x10
[   15.918446]  ret_from_fork+0x116/0x1d0
[   15.918465]  ? __pfx_kthread+0x10/0x10
[   15.918486]  ret_from_fork_asm+0x1a/0x30
[   15.918517]  </TASK>
[   15.918529] 
[   15.928832] Allocated by task 282:
[   15.929028]  kasan_save_stack+0x45/0x70
[   15.929182]  kasan_save_track+0x18/0x40
[   15.929313]  kasan_save_alloc_info+0x3b/0x50
[   15.929607]  __kasan_kmalloc+0xb7/0xc0
[   15.929797]  __kmalloc_cache_noprof+0x189/0x420
[   15.930034]  kasan_atomics+0x95/0x310
[   15.930204]  kunit_try_run_case+0x1a5/0x480
[   15.930392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930620]  kthread+0x337/0x6f0
[   15.930777]  ret_from_fork+0x116/0x1d0
[   15.930924]  ret_from_fork_asm+0x1a/0x30
[   15.931107] 
[   15.931199] The buggy address belongs to the object at ffff88810342d080
[   15.931199]  which belongs to the cache kmalloc-64 of size 64
[   15.931692] The buggy address is located 0 bytes to the right of
[   15.931692]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.932067] 
[   15.932139] The buggy address belongs to the physical page:
[   15.932307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.932598] flags: 0x200000000000000(node=0|zone=2)
[   15.933053] page_type: f5(slab)
[   15.933220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.933547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.933834] page dumped because: kasan: bad access detected
[   15.933998] 
[   15.934201] Memory state around the buggy address:
[   15.934419]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.934732]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935003] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.935284]                                      ^
[   15.935506]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.935780]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936061] ==================================================================
[   16.030133] ==================================================================
[   16.030517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.030809] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   16.031059] 
[   16.031174] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.031221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.031233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.031256] Call Trace:
[   16.031277]  <TASK>
[   16.031321]  dump_stack_lvl+0x73/0xb0
[   16.031352]  print_report+0xd1/0x610
[   16.031375]  ? __virt_addr_valid+0x1db/0x2d0
[   16.031399]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.031421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.031453]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.031476]  kasan_report+0x141/0x180
[   16.031498]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.031525]  __asan_report_load8_noabort+0x18/0x20
[   16.031551]  kasan_atomics_helper+0x4f30/0x5450
[   16.031574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.031618]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.031645]  ? kasan_atomics+0x152/0x310
[   16.031673]  kasan_atomics+0x1dc/0x310
[   16.031696]  ? __pfx_kasan_atomics+0x10/0x10
[   16.031721]  ? __pfx_read_tsc+0x10/0x10
[   16.031743]  ? ktime_get_ts64+0x86/0x230
[   16.031768]  kunit_try_run_case+0x1a5/0x480
[   16.031810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.031833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.031861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.031886]  ? __kthread_parkme+0x82/0x180
[   16.031908]  ? preempt_count_sub+0x50/0x80
[   16.031933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.031977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.032002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.032039]  kthread+0x337/0x6f0
[   16.032059]  ? trace_preempt_on+0x20/0xc0
[   16.032083]  ? __pfx_kthread+0x10/0x10
[   16.032104]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.032126]  ? calculate_sigpending+0x7b/0xa0
[   16.032172]  ? __pfx_kthread+0x10/0x10
[   16.032194]  ret_from_fork+0x116/0x1d0
[   16.032213]  ? __pfx_kthread+0x10/0x10
[   16.032235]  ret_from_fork_asm+0x1a/0x30
[   16.032268]  </TASK>
[   16.032278] 
[   16.039652] Allocated by task 282:
[   16.039795]  kasan_save_stack+0x45/0x70
[   16.039945]  kasan_save_track+0x18/0x40
[   16.040121]  kasan_save_alloc_info+0x3b/0x50
[   16.040342]  __kasan_kmalloc+0xb7/0xc0
[   16.040709]  __kmalloc_cache_noprof+0x189/0x420
[   16.040935]  kasan_atomics+0x95/0x310
[   16.041127]  kunit_try_run_case+0x1a5/0x480
[   16.041331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.041626]  kthread+0x337/0x6f0
[   16.041791]  ret_from_fork+0x116/0x1d0
[   16.041972]  ret_from_fork_asm+0x1a/0x30
[   16.042173] 
[   16.042268] The buggy address belongs to the object at ffff88810342d080
[   16.042268]  which belongs to the cache kmalloc-64 of size 64
[   16.042822] The buggy address is located 0 bytes to the right of
[   16.042822]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   16.043268] 
[   16.043342] The buggy address belongs to the physical page:
[   16.043562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   16.044119] flags: 0x200000000000000(node=0|zone=2)
[   16.044365] page_type: f5(slab)
[   16.044595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.044929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.045163] page dumped because: kasan: bad access detected
[   16.045374] 
[   16.045505] Memory state around the buggy address:
[   16.045750]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.046077]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.046361] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.046759]                                      ^
[   16.046949]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.047244]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.047577] ==================================================================
[   15.035234] ==================================================================
[   15.035646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.035908] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282
[   15.036481] 
[   15.036599] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.036648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.036661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.036684] Call Trace:
[   15.036706]  <TASK>
[   15.036726]  dump_stack_lvl+0x73/0xb0
[   15.036756]  print_report+0xd1/0x610
[   15.036781]  ? __virt_addr_valid+0x1db/0x2d0
[   15.036805]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.036828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.036859]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.036882]  kasan_report+0x141/0x180
[   15.036906]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.036933]  __asan_report_load4_noabort+0x18/0x20
[   15.036959]  kasan_atomics_helper+0x4b54/0x5450
[   15.036983]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.037006]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.037043]  ? kasan_atomics+0x152/0x310
[   15.037070]  kasan_atomics+0x1dc/0x310
[   15.037094]  ? __pfx_kasan_atomics+0x10/0x10
[   15.037120]  ? __pfx_read_tsc+0x10/0x10
[   15.037142]  ? ktime_get_ts64+0x86/0x230
[   15.037168]  kunit_try_run_case+0x1a5/0x480
[   15.037194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.037243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.037268]  ? __kthread_parkme+0x82/0x180
[   15.037290]  ? preempt_count_sub+0x50/0x80
[   15.037315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.037365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.037390]  kthread+0x337/0x6f0
[   15.037410]  ? trace_preempt_on+0x20/0xc0
[   15.037445]  ? __pfx_kthread+0x10/0x10
[   15.037475]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.037498]  ? calculate_sigpending+0x7b/0xa0
[   15.037523]  ? __pfx_kthread+0x10/0x10
[   15.037555]  ret_from_fork+0x116/0x1d0
[   15.037576]  ? __pfx_kthread+0x10/0x10
[   15.037596]  ret_from_fork_asm+0x1a/0x30
[   15.037629]  </TASK>
[   15.037639] 
[   15.045429] Allocated by task 282:
[   15.045655]  kasan_save_stack+0x45/0x70
[   15.045866]  kasan_save_track+0x18/0x40
[   15.046072]  kasan_save_alloc_info+0x3b/0x50
[   15.046268]  __kasan_kmalloc+0xb7/0xc0
[   15.047056]  __kmalloc_cache_noprof+0x189/0x420
[   15.047868]  kasan_atomics+0x95/0x310
[   15.048214]  kunit_try_run_case+0x1a5/0x480
[   15.048842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049388]  kthread+0x337/0x6f0
[   15.049605]  ret_from_fork+0x116/0x1d0
[   15.049740]  ret_from_fork_asm+0x1a/0x30
[   15.049878] 
[   15.049954] The buggy address belongs to the object at ffff88810342d080
[   15.049954]  which belongs to the cache kmalloc-64 of size 64
[   15.051248] The buggy address is located 0 bytes to the right of
[   15.051248]  allocated 48-byte region [ffff88810342d080, ffff88810342d0b0)
[   15.052469] 
[   15.052653] The buggy address belongs to the physical page:
[   15.052826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d
[   15.053259] flags: 0x200000000000000(node=0|zone=2)
[   15.053760] page_type: f5(slab)
[   15.054114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.054830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.055330] page dumped because: kasan: bad access detected
[   15.055738] 
[   15.055939] Memory state around the buggy address:
[   15.056279]  ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.056698]  ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.056918] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.057138]                                      ^
[   15.057292]  ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057853]  ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.058528] ==================================================================

[   15.362391] ==================================================================
[   15.362626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.362864] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.363100] 
[   15.363181] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.363221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.363232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.363253] Call Trace:
[   15.363269]  <TASK>
[   15.363284]  dump_stack_lvl+0x73/0xb0
[   15.363311]  print_report+0xd1/0x610
[   15.363333]  ? __virt_addr_valid+0x1db/0x2d0
[   15.363356]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.363377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.363400]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.363423]  kasan_report+0x141/0x180
[   15.363445]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.363473]  __asan_report_load4_noabort+0x18/0x20
[   15.363497]  kasan_atomics_helper+0x49e8/0x5450
[   15.363520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.363543]  ? kasan_save_alloc_info+0x3b/0x50
[   15.363573]  kasan_atomics+0x1dc/0x310
[   15.363597]  ? __pfx_kasan_atomics+0x10/0x10
[   15.363622]  ? __pfx_read_tsc+0x10/0x10
[   15.363642]  ? ktime_get_ts64+0x86/0x230
[   15.363667]  kunit_try_run_case+0x1a5/0x480
[   15.363691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363713]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.363738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.363761]  ? __kthread_parkme+0x82/0x180
[   15.363782]  ? preempt_count_sub+0x50/0x80
[   15.363805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.363878]  kthread+0x337/0x6f0
[   15.363909]  ? trace_preempt_on+0x20/0xc0
[   15.363933]  ? __pfx_kthread+0x10/0x10
[   15.363954]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.363976]  ? calculate_sigpending+0x7b/0xa0
[   15.363999]  ? __pfx_kthread+0x10/0x10
[   15.364022]  ret_from_fork+0x116/0x1d0
[   15.364040]  ? __pfx_kthread+0x10/0x10
[   15.364061]  ret_from_fork_asm+0x1a/0x30
[   15.364093]  </TASK>
[   15.364104] 
[   15.373091] Allocated by task 282:
[   15.373248]  kasan_save_stack+0x45/0x70
[   15.373443]  kasan_save_track+0x18/0x40
[   15.373625]  kasan_save_alloc_info+0x3b/0x50
[   15.373867]  __kasan_kmalloc+0xb7/0xc0
[   15.374108]  __kmalloc_cache_noprof+0x189/0x420
[   15.374386]  kasan_atomics+0x95/0x310
[   15.374548]  kunit_try_run_case+0x1a5/0x480
[   15.374858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.375117]  kthread+0x337/0x6f0
[   15.375278]  ret_from_fork+0x116/0x1d0
[   15.375414]  ret_from_fork_asm+0x1a/0x30
[   15.375556] 
[   15.375629] The buggy address belongs to the object at ffff8881029b7000
[   15.375629]  which belongs to the cache kmalloc-64 of size 64
[   15.375997] The buggy address is located 0 bytes to the right of
[   15.375997]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.376448] 
[   15.376543] The buggy address belongs to the physical page:
[   15.376797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.377157] flags: 0x200000000000000(node=0|zone=2)
[   15.377388] page_type: f5(slab)
[   15.377554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.377901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.378138] page dumped because: kasan: bad access detected
[   15.378311] 
[   15.378381] Memory state around the buggy address:
[   15.378775]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.379398]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.379840] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.380259]                                      ^
[   15.380642]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.380946]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381162] ==================================================================
[   16.019710] ==================================================================
[   16.020122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.020474] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   16.020854] 
[   16.021018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.021066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.021079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.021102] Call Trace:
[   16.021119]  <TASK>
[   16.021136]  dump_stack_lvl+0x73/0xb0
[   16.021166]  print_report+0xd1/0x610
[   16.021189]  ? __virt_addr_valid+0x1db/0x2d0
[   16.021213]  ? kasan_atomics_helper+0x224c/0x5450
[   16.021262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.021288]  ? kasan_atomics_helper+0x224c/0x5450
[   16.021312]  kasan_report+0x141/0x180
[   16.021335]  ? kasan_atomics_helper+0x224c/0x5450
[   16.021363]  kasan_check_range+0x10c/0x1c0
[   16.021388]  __kasan_check_write+0x18/0x20
[   16.021409]  kasan_atomics_helper+0x224c/0x5450
[   16.021433]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.021458]  ? kasan_save_alloc_info+0x3b/0x50
[   16.021489]  kasan_atomics+0x1dc/0x310
[   16.021514]  ? __pfx_kasan_atomics+0x10/0x10
[   16.021540]  ? __pfx_read_tsc+0x10/0x10
[   16.021562]  ? ktime_get_ts64+0x86/0x230
[   16.021587]  kunit_try_run_case+0x1a5/0x480
[   16.021613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.021638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.021664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.021688]  ? __kthread_parkme+0x82/0x180
[   16.021710]  ? preempt_count_sub+0x50/0x80
[   16.021736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.021761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.021786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.021812]  kthread+0x337/0x6f0
[   16.021832]  ? trace_preempt_on+0x20/0xc0
[   16.021857]  ? __pfx_kthread+0x10/0x10
[   16.021879]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.021913]  ? calculate_sigpending+0x7b/0xa0
[   16.021938]  ? __pfx_kthread+0x10/0x10
[   16.021961]  ret_from_fork+0x116/0x1d0
[   16.022055]  ? __pfx_kthread+0x10/0x10
[   16.022078]  ret_from_fork_asm+0x1a/0x30
[   16.022110]  </TASK>
[   16.022123] 
[   16.029772] Allocated by task 282:
[   16.029919]  kasan_save_stack+0x45/0x70
[   16.030193]  kasan_save_track+0x18/0x40
[   16.030390]  kasan_save_alloc_info+0x3b/0x50
[   16.030602]  __kasan_kmalloc+0xb7/0xc0
[   16.030798]  __kmalloc_cache_noprof+0x189/0x420
[   16.031060]  kasan_atomics+0x95/0x310
[   16.031285]  kunit_try_run_case+0x1a5/0x480
[   16.031502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.031764]  kthread+0x337/0x6f0
[   16.031922]  ret_from_fork+0x116/0x1d0
[   16.032130]  ret_from_fork_asm+0x1a/0x30
[   16.032349] 
[   16.032447] The buggy address belongs to the object at ffff8881029b7000
[   16.032447]  which belongs to the cache kmalloc-64 of size 64
[   16.032989] The buggy address is located 0 bytes to the right of
[   16.032989]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   16.033552] 
[   16.033682] The buggy address belongs to the physical page:
[   16.033952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   16.034314] flags: 0x200000000000000(node=0|zone=2)
[   16.034481] page_type: f5(slab)
[   16.034602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.034843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.035246] page dumped because: kasan: bad access detected
[   16.035501] 
[   16.035594] Memory state around the buggy address:
[   16.035817]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.036171]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.036497] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.036731]                                      ^
[   16.036914]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.037296]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.037609] ==================================================================
[   15.125359] ==================================================================
[   15.125649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.126002] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.126293] 
[   15.126405] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.126465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.126481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.126516] Call Trace:
[   15.126532]  <TASK>
[   15.126548]  dump_stack_lvl+0x73/0xb0
[   15.126579]  print_report+0xd1/0x610
[   15.126605]  ? __virt_addr_valid+0x1db/0x2d0
[   15.126631]  ? kasan_atomics_helper+0xde0/0x5450
[   15.126657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.126686]  ? kasan_atomics_helper+0xde0/0x5450
[   15.126712]  kasan_report+0x141/0x180
[   15.126737]  ? kasan_atomics_helper+0xde0/0x5450
[   15.126777]  kasan_check_range+0x10c/0x1c0
[   15.126804]  __kasan_check_write+0x18/0x20
[   15.126827]  kasan_atomics_helper+0xde0/0x5450
[   15.126854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.126882]  ? kasan_save_alloc_info+0x3b/0x50
[   15.127169]  kasan_atomics+0x1dc/0x310
[   15.127215]  ? __pfx_kasan_atomics+0x10/0x10
[   15.127245]  ? __pfx_read_tsc+0x10/0x10
[   15.127270]  ? ktime_get_ts64+0x86/0x230
[   15.127300]  kunit_try_run_case+0x1a5/0x480
[   15.127329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.127357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.127387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.127427]  ? __kthread_parkme+0x82/0x180
[   15.127452]  ? preempt_count_sub+0x50/0x80
[   15.127481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.127575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.127620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.127653]  kthread+0x337/0x6f0
[   15.127687]  ? trace_preempt_on+0x20/0xc0
[   15.127721]  ? __pfx_kthread+0x10/0x10
[   15.127746]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.127774]  ? calculate_sigpending+0x7b/0xa0
[   15.127804]  ? __pfx_kthread+0x10/0x10
[   15.127829]  ret_from_fork+0x116/0x1d0
[   15.127851]  ? __pfx_kthread+0x10/0x10
[   15.127875]  ret_from_fork_asm+0x1a/0x30
[   15.127924]  </TASK>
[   15.127936] 
[   15.141693] Allocated by task 282:
[   15.142088]  kasan_save_stack+0x45/0x70
[   15.142474]  kasan_save_track+0x18/0x40
[   15.142923]  kasan_save_alloc_info+0x3b/0x50
[   15.143362]  __kasan_kmalloc+0xb7/0xc0
[   15.143756]  __kmalloc_cache_noprof+0x189/0x420
[   15.143940]  kasan_atomics+0x95/0x310
[   15.144333]  kunit_try_run_case+0x1a5/0x480
[   15.144930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.145460]  kthread+0x337/0x6f0
[   15.145825]  ret_from_fork+0x116/0x1d0
[   15.145986]  ret_from_fork_asm+0x1a/0x30
[   15.146330] 
[   15.146500] The buggy address belongs to the object at ffff8881029b7000
[   15.146500]  which belongs to the cache kmalloc-64 of size 64
[   15.147713] The buggy address is located 0 bytes to the right of
[   15.147713]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.148396] 
[   15.148743] The buggy address belongs to the physical page:
[   15.149264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.149990] flags: 0x200000000000000(node=0|zone=2)
[   15.150271] page_type: f5(slab)
[   15.150398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.150643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.151012] page dumped because: kasan: bad access detected
[   15.151606] 
[   15.151773] Memory state around the buggy address:
[   15.152256]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153125]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153817] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.154466]                                      ^
[   15.155021]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.155441]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.156087] ==================================================================
[   15.641676] ==================================================================
[   15.642274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.643095] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.643416] 
[   15.643509] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.643555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.643568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.643591] Call Trace:
[   15.643608]  <TASK>
[   15.643626]  dump_stack_lvl+0x73/0xb0
[   15.643658]  print_report+0xd1/0x610
[   15.643682]  ? __virt_addr_valid+0x1db/0x2d0
[   15.643707]  ? kasan_atomics_helper+0x1818/0x5450
[   15.643730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.643754]  ? kasan_atomics_helper+0x1818/0x5450
[   15.643777]  kasan_report+0x141/0x180
[   15.643812]  ? kasan_atomics_helper+0x1818/0x5450
[   15.643840]  kasan_check_range+0x10c/0x1c0
[   15.643866]  __kasan_check_write+0x18/0x20
[   15.643906]  kasan_atomics_helper+0x1818/0x5450
[   15.643930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.643955]  ? kasan_save_alloc_info+0x3b/0x50
[   15.644005]  kasan_atomics+0x1dc/0x310
[   15.644030]  ? __pfx_kasan_atomics+0x10/0x10
[   15.644056]  ? __pfx_read_tsc+0x10/0x10
[   15.644077]  ? ktime_get_ts64+0x86/0x230
[   15.644104]  kunit_try_run_case+0x1a5/0x480
[   15.644130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.644189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.644215]  ? __kthread_parkme+0x82/0x180
[   15.644236]  ? preempt_count_sub+0x50/0x80
[   15.644273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.644324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.644349]  kthread+0x337/0x6f0
[   15.644380]  ? trace_preempt_on+0x20/0xc0
[   15.644408]  ? __pfx_kthread+0x10/0x10
[   15.644442]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.644466]  ? calculate_sigpending+0x7b/0xa0
[   15.644492]  ? __pfx_kthread+0x10/0x10
[   15.644516]  ret_from_fork+0x116/0x1d0
[   15.644536]  ? __pfx_kthread+0x10/0x10
[   15.644557]  ret_from_fork_asm+0x1a/0x30
[   15.644592]  </TASK>
[   15.644604] 
[   15.652009] Allocated by task 282:
[   15.652142]  kasan_save_stack+0x45/0x70
[   15.652344]  kasan_save_track+0x18/0x40
[   15.652555]  kasan_save_alloc_info+0x3b/0x50
[   15.652803]  __kasan_kmalloc+0xb7/0xc0
[   15.653029]  __kmalloc_cache_noprof+0x189/0x420
[   15.653259]  kasan_atomics+0x95/0x310
[   15.653469]  kunit_try_run_case+0x1a5/0x480
[   15.653679]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.653983]  kthread+0x337/0x6f0
[   15.654126]  ret_from_fork+0x116/0x1d0
[   15.654326]  ret_from_fork_asm+0x1a/0x30
[   15.654520] 
[   15.654612] The buggy address belongs to the object at ffff8881029b7000
[   15.654612]  which belongs to the cache kmalloc-64 of size 64
[   15.655160] The buggy address is located 0 bytes to the right of
[   15.655160]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.655617] 
[   15.655691] The buggy address belongs to the physical page:
[   15.655866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.656141] flags: 0x200000000000000(node=0|zone=2)
[   15.656306] page_type: f5(slab)
[   15.656505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.656844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.657212] page dumped because: kasan: bad access detected
[   15.657464] 
[   15.657555] Memory state around the buggy address:
[   15.657779]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.658120]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.658429] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.658731]                                      ^
[   15.658898]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659123]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659360] ==================================================================
[   15.678023] ==================================================================
[   15.678376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.678847] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.679126] 
[   15.679264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.679306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.679319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.679340] Call Trace:
[   15.679355]  <TASK>
[   15.679372]  dump_stack_lvl+0x73/0xb0
[   15.679400]  print_report+0xd1/0x610
[   15.679423]  ? __virt_addr_valid+0x1db/0x2d0
[   15.679447]  ? kasan_atomics_helper+0x194a/0x5450
[   15.679470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.679495]  ? kasan_atomics_helper+0x194a/0x5450
[   15.679519]  kasan_report+0x141/0x180
[   15.679542]  ? kasan_atomics_helper+0x194a/0x5450
[   15.679570]  kasan_check_range+0x10c/0x1c0
[   15.679594]  __kasan_check_write+0x18/0x20
[   15.679615]  kasan_atomics_helper+0x194a/0x5450
[   15.679639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.679664]  ? kasan_save_alloc_info+0x3b/0x50
[   15.679694]  kasan_atomics+0x1dc/0x310
[   15.679718]  ? __pfx_kasan_atomics+0x10/0x10
[   15.679744]  ? __pfx_read_tsc+0x10/0x10
[   15.679765]  ? ktime_get_ts64+0x86/0x230
[   15.679790]  kunit_try_run_case+0x1a5/0x480
[   15.679815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.679839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.679865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.679890]  ? __kthread_parkme+0x82/0x180
[   15.679922]  ? preempt_count_sub+0x50/0x80
[   15.679948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.680003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.680028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.680054]  kthread+0x337/0x6f0
[   15.680085]  ? trace_preempt_on+0x20/0xc0
[   15.680110]  ? __pfx_kthread+0x10/0x10
[   15.680131]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.680153]  ? calculate_sigpending+0x7b/0xa0
[   15.680178]  ? __pfx_kthread+0x10/0x10
[   15.680201]  ret_from_fork+0x116/0x1d0
[   15.680220]  ? __pfx_kthread+0x10/0x10
[   15.680243]  ret_from_fork_asm+0x1a/0x30
[   15.680276]  </TASK>
[   15.680287] 
[   15.687781] Allocated by task 282:
[   15.687996]  kasan_save_stack+0x45/0x70
[   15.688168]  kasan_save_track+0x18/0x40
[   15.688380]  kasan_save_alloc_info+0x3b/0x50
[   15.688588]  __kasan_kmalloc+0xb7/0xc0
[   15.688787]  __kmalloc_cache_noprof+0x189/0x420
[   15.689045]  kasan_atomics+0x95/0x310
[   15.689234]  kunit_try_run_case+0x1a5/0x480
[   15.689444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.689674]  kthread+0x337/0x6f0
[   15.689849]  ret_from_fork+0x116/0x1d0
[   15.690066]  ret_from_fork_asm+0x1a/0x30
[   15.690275] 
[   15.690365] The buggy address belongs to the object at ffff8881029b7000
[   15.690365]  which belongs to the cache kmalloc-64 of size 64
[   15.690878] The buggy address is located 0 bytes to the right of
[   15.690878]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.691283] 
[   15.691356] The buggy address belongs to the physical page:
[   15.691530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.691771] flags: 0x200000000000000(node=0|zone=2)
[   15.691982] page_type: f5(slab)
[   15.692171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.692538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.692878] page dumped because: kasan: bad access detected
[   15.693164] 
[   15.693257] Memory state around the buggy address:
[   15.693478]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.693780]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694031] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.694246]                                      ^
[   15.694401]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694752]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.695125] ==================================================================
[   15.288129] ==================================================================
[   15.288467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.288711] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.289355] 
[   15.289592] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.289636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.289649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.289671] Call Trace:
[   15.289688]  <TASK>
[   15.289705]  dump_stack_lvl+0x73/0xb0
[   15.289735]  print_report+0xd1/0x610
[   15.289758]  ? __virt_addr_valid+0x1db/0x2d0
[   15.289782]  ? kasan_atomics_helper+0x1148/0x5450
[   15.289805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.289830]  ? kasan_atomics_helper+0x1148/0x5450
[   15.289853]  kasan_report+0x141/0x180
[   15.289877]  ? kasan_atomics_helper+0x1148/0x5450
[   15.289916]  kasan_check_range+0x10c/0x1c0
[   15.289942]  __kasan_check_write+0x18/0x20
[   15.289962]  kasan_atomics_helper+0x1148/0x5450
[   15.290013]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.290038]  ? kasan_save_alloc_info+0x3b/0x50
[   15.290068]  kasan_atomics+0x1dc/0x310
[   15.290093]  ? __pfx_kasan_atomics+0x10/0x10
[   15.290119]  ? __pfx_read_tsc+0x10/0x10
[   15.290140]  ? ktime_get_ts64+0x86/0x230
[   15.290185]  kunit_try_run_case+0x1a5/0x480
[   15.290211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.290235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.290260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.290285]  ? __kthread_parkme+0x82/0x180
[   15.290306]  ? preempt_count_sub+0x50/0x80
[   15.290332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.290357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.290383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.290408]  kthread+0x337/0x6f0
[   15.290428]  ? trace_preempt_on+0x20/0xc0
[   15.290452]  ? __pfx_kthread+0x10/0x10
[   15.290474]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.290496]  ? calculate_sigpending+0x7b/0xa0
[   15.290521]  ? __pfx_kthread+0x10/0x10
[   15.290544]  ret_from_fork+0x116/0x1d0
[   15.290563]  ? __pfx_kthread+0x10/0x10
[   15.290585]  ret_from_fork_asm+0x1a/0x30
[   15.290619]  </TASK>
[   15.290630] 
[   15.303938] Allocated by task 282:
[   15.304146]  kasan_save_stack+0x45/0x70
[   15.304503]  kasan_save_track+0x18/0x40
[   15.304643]  kasan_save_alloc_info+0x3b/0x50
[   15.304794]  __kasan_kmalloc+0xb7/0xc0
[   15.305201]  __kmalloc_cache_noprof+0x189/0x420
[   15.305379]  kasan_atomics+0x95/0x310
[   15.305518]  kunit_try_run_case+0x1a5/0x480
[   15.305986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306574]  kthread+0x337/0x6f0
[   15.306877]  ret_from_fork+0x116/0x1d0
[   15.307261]  ret_from_fork_asm+0x1a/0x30
[   15.307667] 
[   15.307832] The buggy address belongs to the object at ffff8881029b7000
[   15.307832]  which belongs to the cache kmalloc-64 of size 64
[   15.308831] The buggy address is located 0 bytes to the right of
[   15.308831]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.309487] 
[   15.309569] The buggy address belongs to the physical page:
[   15.309748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.310332] flags: 0x200000000000000(node=0|zone=2)
[   15.310601] page_type: f5(slab)
[   15.310984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.311659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.312427] page dumped because: kasan: bad access detected
[   15.313006] 
[   15.313105] Memory state around the buggy address:
[   15.313624]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314016]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314739] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.315277]                                      ^
[   15.315714]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316138]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316761] ==================================================================
[   14.851487] ==================================================================
[   14.852034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.852349] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.852738] 
[   14.852848] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.852903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.852917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.852940] Call Trace:
[   14.852955]  <TASK>
[   14.852972]  dump_stack_lvl+0x73/0xb0
[   14.853001]  print_report+0xd1/0x610
[   14.853044]  ? __virt_addr_valid+0x1db/0x2d0
[   14.853069]  ? kasan_atomics_helper+0x697/0x5450
[   14.853093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.853118]  ? kasan_atomics_helper+0x697/0x5450
[   14.853142]  kasan_report+0x141/0x180
[   14.853165]  ? kasan_atomics_helper+0x697/0x5450
[   14.853192]  kasan_check_range+0x10c/0x1c0
[   14.853218]  __kasan_check_write+0x18/0x20
[   14.853239]  kasan_atomics_helper+0x697/0x5450
[   14.853267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.853294]  ? kasan_save_alloc_info+0x3b/0x50
[   14.853325]  kasan_atomics+0x1dc/0x310
[   14.853350]  ? __pfx_kasan_atomics+0x10/0x10
[   14.853376]  ? __pfx_read_tsc+0x10/0x10
[   14.853398]  ? ktime_get_ts64+0x86/0x230
[   14.853425]  kunit_try_run_case+0x1a5/0x480
[   14.853451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853474]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.853501]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.853603]  ? __kthread_parkme+0x82/0x180
[   14.853626]  ? preempt_count_sub+0x50/0x80
[   14.853652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.853703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.853728]  kthread+0x337/0x6f0
[   14.853749]  ? trace_preempt_on+0x20/0xc0
[   14.853774]  ? __pfx_kthread+0x10/0x10
[   14.853795]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.853817]  ? calculate_sigpending+0x7b/0xa0
[   14.853843]  ? __pfx_kthread+0x10/0x10
[   14.853864]  ret_from_fork+0x116/0x1d0
[   14.853883]  ? __pfx_kthread+0x10/0x10
[   14.853918]  ret_from_fork_asm+0x1a/0x30
[   14.853952]  </TASK>
[   14.853965] 
[   14.861966] Allocated by task 282:
[   14.862173]  kasan_save_stack+0x45/0x70
[   14.862381]  kasan_save_track+0x18/0x40
[   14.862652]  kasan_save_alloc_info+0x3b/0x50
[   14.862851]  __kasan_kmalloc+0xb7/0xc0
[   14.863069]  __kmalloc_cache_noprof+0x189/0x420
[   14.863270]  kasan_atomics+0x95/0x310
[   14.863435]  kunit_try_run_case+0x1a5/0x480
[   14.863806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.864065]  kthread+0x337/0x6f0
[   14.864253]  ret_from_fork+0x116/0x1d0
[   14.864416]  ret_from_fork_asm+0x1a/0x30
[   14.864689] 
[   14.864780] The buggy address belongs to the object at ffff8881029b7000
[   14.864780]  which belongs to the cache kmalloc-64 of size 64
[   14.865301] The buggy address is located 0 bytes to the right of
[   14.865301]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.865748] 
[   14.865824] The buggy address belongs to the physical page:
[   14.866037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.866361] flags: 0x200000000000000(node=0|zone=2)
[   14.866822] page_type: f5(slab)
[   14.867014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.867385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.867872] page dumped because: kasan: bad access detected
[   14.868070] 
[   14.868183] Memory state around the buggy address:
[   14.868414]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868732]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869044] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.869322]                                      ^
[   14.869526]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869803]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.870200] ==================================================================
[   15.003942] ==================================================================
[   15.004769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.005816] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.006921] 
[   15.007395] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.007459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.007472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.007709] Call Trace:
[   15.007732]  <TASK>
[   15.007753]  dump_stack_lvl+0x73/0xb0
[   15.007784]  print_report+0xd1/0x610
[   15.007809]  ? __virt_addr_valid+0x1db/0x2d0
[   15.007833]  ? kasan_atomics_helper+0xac7/0x5450
[   15.007855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.007879]  ? kasan_atomics_helper+0xac7/0x5450
[   15.007916]  kasan_report+0x141/0x180
[   15.007940]  ? kasan_atomics_helper+0xac7/0x5450
[   15.007991]  kasan_check_range+0x10c/0x1c0
[   15.008016]  __kasan_check_write+0x18/0x20
[   15.008036]  kasan_atomics_helper+0xac7/0x5450
[   15.008060]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.008084]  ? kasan_save_alloc_info+0x3b/0x50
[   15.008115]  kasan_atomics+0x1dc/0x310
[   15.008139]  ? __pfx_kasan_atomics+0x10/0x10
[   15.008164]  ? __pfx_read_tsc+0x10/0x10
[   15.008186]  ? ktime_get_ts64+0x86/0x230
[   15.008212]  kunit_try_run_case+0x1a5/0x480
[   15.008236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.008260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.008285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.008310]  ? __kthread_parkme+0x82/0x180
[   15.008330]  ? preempt_count_sub+0x50/0x80
[   15.008355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.008381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.008407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.008432]  kthread+0x337/0x6f0
[   15.008452]  ? trace_preempt_on+0x20/0xc0
[   15.008477]  ? __pfx_kthread+0x10/0x10
[   15.008498]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.008587]  ? calculate_sigpending+0x7b/0xa0
[   15.008614]  ? __pfx_kthread+0x10/0x10
[   15.008637]  ret_from_fork+0x116/0x1d0
[   15.008656]  ? __pfx_kthread+0x10/0x10
[   15.008677]  ret_from_fork_asm+0x1a/0x30
[   15.008709]  </TASK>
[   15.008721] 
[   15.028122] Allocated by task 282:
[   15.028279]  kasan_save_stack+0x45/0x70
[   15.028441]  kasan_save_track+0x18/0x40
[   15.029212]  kasan_save_alloc_info+0x3b/0x50
[   15.029920]  __kasan_kmalloc+0xb7/0xc0
[   15.030497]  __kmalloc_cache_noprof+0x189/0x420
[   15.031232]  kasan_atomics+0x95/0x310
[   15.031955]  kunit_try_run_case+0x1a5/0x480
[   15.032439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.032689]  kthread+0x337/0x6f0
[   15.032818]  ret_from_fork+0x116/0x1d0
[   15.033474]  ret_from_fork_asm+0x1a/0x30
[   15.034156] 
[   15.034494] The buggy address belongs to the object at ffff8881029b7000
[   15.034494]  which belongs to the cache kmalloc-64 of size 64
[   15.035465] The buggy address is located 0 bytes to the right of
[   15.035465]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.037261] 
[   15.037355] The buggy address belongs to the physical page:
[   15.037885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.038947] flags: 0x200000000000000(node=0|zone=2)
[   15.039619] page_type: f5(slab)
[   15.040272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.040585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.040821] page dumped because: kasan: bad access detected
[   15.041014] 
[   15.041087] Memory state around the buggy address:
[   15.041269]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.041590]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.042051] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.042294]                                      ^
[   15.042628]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.042946]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043264] ==================================================================
[   14.828694] ==================================================================
[   14.829049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.829398] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.829802] 
[   14.829926] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.829970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.829982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.830004] Call Trace:
[   14.830019]  <TASK>
[   14.830033]  dump_stack_lvl+0x73/0xb0
[   14.830061]  print_report+0xd1/0x610
[   14.830084]  ? __virt_addr_valid+0x1db/0x2d0
[   14.830108]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.830130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.830153]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.830176]  kasan_report+0x141/0x180
[   14.830199]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.830228]  kasan_check_range+0x10c/0x1c0
[   14.830253]  __kasan_check_write+0x18/0x20
[   14.830273]  kasan_atomics_helper+0x5fe/0x5450
[   14.830298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.830322]  ? kasan_save_alloc_info+0x3b/0x50
[   14.830353]  kasan_atomics+0x1dc/0x310
[   14.830377]  ? __pfx_kasan_atomics+0x10/0x10
[   14.830403]  ? __pfx_read_tsc+0x10/0x10
[   14.830424]  ? ktime_get_ts64+0x86/0x230
[   14.830449]  kunit_try_run_case+0x1a5/0x480
[   14.830475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.830498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.830523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.830709]  ? __kthread_parkme+0x82/0x180
[   14.830732]  ? preempt_count_sub+0x50/0x80
[   14.830759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.830790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.830816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.830842]  kthread+0x337/0x6f0
[   14.830862]  ? trace_preempt_on+0x20/0xc0
[   14.830886]  ? __pfx_kthread+0x10/0x10
[   14.830922]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.830944]  ? calculate_sigpending+0x7b/0xa0
[   14.830968]  ? __pfx_kthread+0x10/0x10
[   14.830991]  ret_from_fork+0x116/0x1d0
[   14.831010]  ? __pfx_kthread+0x10/0x10
[   14.831031]  ret_from_fork_asm+0x1a/0x30
[   14.831064]  </TASK>
[   14.831075] 
[   14.838526] Allocated by task 282:
[   14.838665]  kasan_save_stack+0x45/0x70
[   14.838816]  kasan_save_track+0x18/0x40
[   14.839228]  kasan_save_alloc_info+0x3b/0x50
[   14.839457]  __kasan_kmalloc+0xb7/0xc0
[   14.839646]  __kmalloc_cache_noprof+0x189/0x420
[   14.839870]  kasan_atomics+0x95/0x310
[   14.840071]  kunit_try_run_case+0x1a5/0x480
[   14.840280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.840533]  kthread+0x337/0x6f0
[   14.840702]  ret_from_fork+0x116/0x1d0
[   14.840999]  ret_from_fork_asm+0x1a/0x30
[   14.841212] 
[   14.841302] The buggy address belongs to the object at ffff8881029b7000
[   14.841302]  which belongs to the cache kmalloc-64 of size 64
[   14.841741] The buggy address is located 0 bytes to the right of
[   14.841741]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.844271] 
[   14.844357] The buggy address belongs to the physical page:
[   14.844911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.845456] flags: 0x200000000000000(node=0|zone=2)
[   14.845912] page_type: f5(slab)
[   14.846232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.846560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.846864] page dumped because: kasan: bad access detected
[   14.847111] 
[   14.847202] Memory state around the buggy address:
[   14.847412]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847710]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.848805] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.849352]                                      ^
[   14.850027]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850418]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.851031] ==================================================================
[   15.742582] ==================================================================
[   15.742887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.743273] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.743606] 
[   15.743737] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.743781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.743793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.743814] Call Trace:
[   15.743831]  <TASK>
[   15.743848]  dump_stack_lvl+0x73/0xb0
[   15.743875]  print_report+0xd1/0x610
[   15.743909]  ? __virt_addr_valid+0x1db/0x2d0
[   15.743952]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.743994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.744018]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.744041]  kasan_report+0x141/0x180
[   15.744064]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.744092]  kasan_check_range+0x10c/0x1c0
[   15.744116]  __kasan_check_write+0x18/0x20
[   15.744137]  kasan_atomics_helper+0x1b22/0x5450
[   15.744161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.744185]  ? kasan_save_alloc_info+0x3b/0x50
[   15.744216]  kasan_atomics+0x1dc/0x310
[   15.744240]  ? __pfx_kasan_atomics+0x10/0x10
[   15.744265]  ? __pfx_read_tsc+0x10/0x10
[   15.744286]  ? ktime_get_ts64+0x86/0x230
[   15.744312]  kunit_try_run_case+0x1a5/0x480
[   15.744338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.744362]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.744408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.744433]  ? __kthread_parkme+0x82/0x180
[   15.744455]  ? preempt_count_sub+0x50/0x80
[   15.744480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.744505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.744532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.744558]  kthread+0x337/0x6f0
[   15.744579]  ? trace_preempt_on+0x20/0xc0
[   15.744604]  ? __pfx_kthread+0x10/0x10
[   15.744626]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.744650]  ? calculate_sigpending+0x7b/0xa0
[   15.744676]  ? __pfx_kthread+0x10/0x10
[   15.744699]  ret_from_fork+0x116/0x1d0
[   15.744719]  ? __pfx_kthread+0x10/0x10
[   15.744740]  ret_from_fork_asm+0x1a/0x30
[   15.744774]  </TASK>
[   15.744785] 
[   15.751963] Allocated by task 282:
[   15.752164]  kasan_save_stack+0x45/0x70
[   15.752347]  kasan_save_track+0x18/0x40
[   15.752485]  kasan_save_alloc_info+0x3b/0x50
[   15.752650]  __kasan_kmalloc+0xb7/0xc0
[   15.752840]  __kmalloc_cache_noprof+0x189/0x420
[   15.753122]  kasan_atomics+0x95/0x310
[   15.753317]  kunit_try_run_case+0x1a5/0x480
[   15.753528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.753780]  kthread+0x337/0x6f0
[   15.753960]  ret_from_fork+0x116/0x1d0
[   15.754168]  ret_from_fork_asm+0x1a/0x30
[   15.754352] 
[   15.754445] The buggy address belongs to the object at ffff8881029b7000
[   15.754445]  which belongs to the cache kmalloc-64 of size 64
[   15.754810] The buggy address is located 0 bytes to the right of
[   15.754810]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.755249] 
[   15.755348] The buggy address belongs to the physical page:
[   15.755603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.755985] flags: 0x200000000000000(node=0|zone=2)
[   15.756225] page_type: f5(slab)
[   15.756415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.756780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.757121] page dumped because: kasan: bad access detected
[   15.757297] 
[   15.757367] Memory state around the buggy address:
[   15.757524]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.757820]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.758198] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.758519]                                      ^
[   15.758773]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.759134]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.759476] ==================================================================
[   15.437640] ==================================================================
[   15.438104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.438580] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.439343] 
[   15.439452] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.439497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.439510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.439533] Call Trace:
[   15.439548]  <TASK>
[   15.439565]  dump_stack_lvl+0x73/0xb0
[   15.439596]  print_report+0xd1/0x610
[   15.439619]  ? __virt_addr_valid+0x1db/0x2d0
[   15.439643]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.439666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.439690]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.439713]  kasan_report+0x141/0x180
[   15.439736]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.439765]  kasan_check_range+0x10c/0x1c0
[   15.439789]  __kasan_check_read+0x15/0x20
[   15.439809]  kasan_atomics_helper+0x13b5/0x5450
[   15.439834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.439858]  ? kasan_save_alloc_info+0x3b/0x50
[   15.439889]  kasan_atomics+0x1dc/0x310
[   15.439926]  ? __pfx_kasan_atomics+0x10/0x10
[   15.439951]  ? __pfx_read_tsc+0x10/0x10
[   15.439973]  ? ktime_get_ts64+0x86/0x230
[   15.440010]  kunit_try_run_case+0x1a5/0x480
[   15.440036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.440059]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.440085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.440110]  ? __kthread_parkme+0x82/0x180
[   15.440132]  ? preempt_count_sub+0x50/0x80
[   15.440158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.440183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.440208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.440233]  kthread+0x337/0x6f0
[   15.440252]  ? trace_preempt_on+0x20/0xc0
[   15.440278]  ? __pfx_kthread+0x10/0x10
[   15.440303]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.440326]  ? calculate_sigpending+0x7b/0xa0
[   15.440352]  ? __pfx_kthread+0x10/0x10
[   15.440375]  ret_from_fork+0x116/0x1d0
[   15.440394]  ? __pfx_kthread+0x10/0x10
[   15.440416]  ret_from_fork_asm+0x1a/0x30
[   15.440450]  </TASK>
[   15.440464] 
[   15.448606] Allocated by task 282:
[   15.448753]  kasan_save_stack+0x45/0x70
[   15.448965]  kasan_save_track+0x18/0x40
[   15.449152]  kasan_save_alloc_info+0x3b/0x50
[   15.449362]  __kasan_kmalloc+0xb7/0xc0
[   15.449528]  __kmalloc_cache_noprof+0x189/0x420
[   15.449690]  kasan_atomics+0x95/0x310
[   15.449825]  kunit_try_run_case+0x1a5/0x480
[   15.450111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.450366]  kthread+0x337/0x6f0
[   15.450523]  ret_from_fork+0x116/0x1d0
[   15.450728]  ret_from_fork_asm+0x1a/0x30
[   15.450889] 
[   15.450971] The buggy address belongs to the object at ffff8881029b7000
[   15.450971]  which belongs to the cache kmalloc-64 of size 64
[   15.451450] The buggy address is located 0 bytes to the right of
[   15.451450]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.452005] 
[   15.452077] The buggy address belongs to the physical page:
[   15.452249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.452489] flags: 0x200000000000000(node=0|zone=2)
[   15.452651] page_type: f5(slab)
[   15.452770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.453089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.453753] page dumped because: kasan: bad access detected
[   15.454264] 
[   15.454451] Memory state around the buggy address:
[   15.454673]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.454964]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455184] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.455400]                                      ^
[   15.455554]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455778]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.456368] ==================================================================
[   15.714690] ==================================================================
[   15.715577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.716312] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.716781] 
[   15.716905] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.716951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.716964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.717426] Call Trace:
[   15.717443]  <TASK>
[   15.717462]  dump_stack_lvl+0x73/0xb0
[   15.717496]  print_report+0xd1/0x610
[   15.717518]  ? __virt_addr_valid+0x1db/0x2d0
[   15.717543]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.717565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.717589]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.717612]  kasan_report+0x141/0x180
[   15.717636]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.717665]  kasan_check_range+0x10c/0x1c0
[   15.717690]  __kasan_check_write+0x18/0x20
[   15.717709]  kasan_atomics_helper+0x1a7f/0x5450
[   15.717733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.717758]  ? kasan_save_alloc_info+0x3b/0x50
[   15.717788]  kasan_atomics+0x1dc/0x310
[   15.717812]  ? __pfx_kasan_atomics+0x10/0x10
[   15.717837]  ? __pfx_read_tsc+0x10/0x10
[   15.717859]  ? ktime_get_ts64+0x86/0x230
[   15.717884]  kunit_try_run_case+0x1a5/0x480
[   15.717926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.717952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.718003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.718029]  ? __kthread_parkme+0x82/0x180
[   15.718050]  ? preempt_count_sub+0x50/0x80
[   15.718076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.718102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.718147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.718173]  kthread+0x337/0x6f0
[   15.718193]  ? trace_preempt_on+0x20/0xc0
[   15.718218]  ? __pfx_kthread+0x10/0x10
[   15.718240]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.718262]  ? calculate_sigpending+0x7b/0xa0
[   15.718288]  ? __pfx_kthread+0x10/0x10
[   15.718310]  ret_from_fork+0x116/0x1d0
[   15.718330]  ? __pfx_kthread+0x10/0x10
[   15.718351]  ret_from_fork_asm+0x1a/0x30
[   15.718384]  </TASK>
[   15.718396] 
[   15.730509] Allocated by task 282:
[   15.730850]  kasan_save_stack+0x45/0x70
[   15.731274]  kasan_save_track+0x18/0x40
[   15.731636]  kasan_save_alloc_info+0x3b/0x50
[   15.732069]  __kasan_kmalloc+0xb7/0xc0
[   15.732442]  __kmalloc_cache_noprof+0x189/0x420
[   15.732865]  kasan_atomics+0x95/0x310
[   15.733251]  kunit_try_run_case+0x1a5/0x480
[   15.733543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.733724]  kthread+0x337/0x6f0
[   15.733846]  ret_from_fork+0x116/0x1d0
[   15.734203]  ret_from_fork_asm+0x1a/0x30
[   15.734598] 
[   15.734786] The buggy address belongs to the object at ffff8881029b7000
[   15.734786]  which belongs to the cache kmalloc-64 of size 64
[   15.735858] The buggy address is located 0 bytes to the right of
[   15.735858]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.736748] 
[   15.736825] The buggy address belongs to the physical page:
[   15.737105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.737778] flags: 0x200000000000000(node=0|zone=2)
[   15.738251] page_type: f5(slab)
[   15.738567] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.739261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.739758] page dumped because: kasan: bad access detected
[   15.740121] 
[   15.740196] Memory state around the buggy address:
[   15.740355]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740573]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740791] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.741056]                                      ^
[   15.741240]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.741566]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.741884] ==================================================================
[   14.730995] ==================================================================
[   14.731373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.731608] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.732008] 
[   14.732122] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.732164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.732176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.732197] Call Trace:
[   14.732213]  <TASK>
[   14.732228]  dump_stack_lvl+0x73/0xb0
[   14.732256]  print_report+0xd1/0x610
[   14.732280]  ? __virt_addr_valid+0x1db/0x2d0
[   14.732307]  ? kasan_atomics_helper+0x3df/0x5450
[   14.732330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.732355]  ? kasan_atomics_helper+0x3df/0x5450
[   14.732377]  kasan_report+0x141/0x180
[   14.732400]  ? kasan_atomics_helper+0x3df/0x5450
[   14.732429]  kasan_check_range+0x10c/0x1c0
[   14.732453]  __kasan_check_read+0x15/0x20
[   14.732473]  kasan_atomics_helper+0x3df/0x5450
[   14.732498]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.732523]  ? kasan_save_alloc_info+0x3b/0x50
[   14.732601]  kasan_atomics+0x1dc/0x310
[   14.732626]  ? __pfx_kasan_atomics+0x10/0x10
[   14.732651]  ? __pfx_read_tsc+0x10/0x10
[   14.732674]  ? ktime_get_ts64+0x86/0x230
[   14.732699]  kunit_try_run_case+0x1a5/0x480
[   14.732724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.732747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.732772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.732796]  ? __kthread_parkme+0x82/0x180
[   14.732818]  ? preempt_count_sub+0x50/0x80
[   14.732843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.732869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.732906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.732931]  kthread+0x337/0x6f0
[   14.732951]  ? trace_preempt_on+0x20/0xc0
[   14.732975]  ? __pfx_kthread+0x10/0x10
[   14.733011]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.733034]  ? calculate_sigpending+0x7b/0xa0
[   14.733059]  ? __pfx_kthread+0x10/0x10
[   14.733082]  ret_from_fork+0x116/0x1d0
[   14.733101]  ? __pfx_kthread+0x10/0x10
[   14.733122]  ret_from_fork_asm+0x1a/0x30
[   14.733155]  </TASK>
[   14.733166] 
[   14.741058] Allocated by task 282:
[   14.741239]  kasan_save_stack+0x45/0x70
[   14.741583]  kasan_save_track+0x18/0x40
[   14.741786]  kasan_save_alloc_info+0x3b/0x50
[   14.742053]  __kasan_kmalloc+0xb7/0xc0
[   14.742244]  __kmalloc_cache_noprof+0x189/0x420
[   14.742466]  kasan_atomics+0x95/0x310
[   14.742845]  kunit_try_run_case+0x1a5/0x480
[   14.743150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.743332]  kthread+0x337/0x6f0
[   14.743483]  ret_from_fork+0x116/0x1d0
[   14.744015]  ret_from_fork_asm+0x1a/0x30
[   14.744205] 
[   14.744306] The buggy address belongs to the object at ffff8881029b7000
[   14.744306]  which belongs to the cache kmalloc-64 of size 64
[   14.744841] The buggy address is located 0 bytes to the right of
[   14.744841]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.745389] 
[   14.745474] The buggy address belongs to the physical page:
[   14.745705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.746118] flags: 0x200000000000000(node=0|zone=2)
[   14.746324] page_type: f5(slab)
[   14.746492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.746888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.747214] page dumped because: kasan: bad access detected
[   14.747450] 
[   14.747521] Memory state around the buggy address:
[   14.747762]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.748200]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.748499] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.748862]                                      ^
[   14.749090]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749383]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749715] ==================================================================
[   15.942197] ==================================================================
[   15.942460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.943220] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.943560] 
[   15.943677] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.943723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.943736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.943761] Call Trace:
[   15.943780]  <TASK>
[   15.943797]  dump_stack_lvl+0x73/0xb0
[   15.943830]  print_report+0xd1/0x610
[   15.943855]  ? __virt_addr_valid+0x1db/0x2d0
[   15.943879]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.943914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.943939]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.943962]  kasan_report+0x141/0x180
[   15.944006]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.944075]  kasan_check_range+0x10c/0x1c0
[   15.944102]  __kasan_check_write+0x18/0x20
[   15.944124]  kasan_atomics_helper+0x20c8/0x5450
[   15.944149]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.944174]  ? kasan_save_alloc_info+0x3b/0x50
[   15.944236]  kasan_atomics+0x1dc/0x310
[   15.944261]  ? __pfx_kasan_atomics+0x10/0x10
[   15.944287]  ? __pfx_read_tsc+0x10/0x10
[   15.944308]  ? ktime_get_ts64+0x86/0x230
[   15.944335]  kunit_try_run_case+0x1a5/0x480
[   15.944391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.944417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.944445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.944471]  ? __kthread_parkme+0x82/0x180
[   15.944493]  ? preempt_count_sub+0x50/0x80
[   15.944550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.944576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.944602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.944627]  kthread+0x337/0x6f0
[   15.944648]  ? trace_preempt_on+0x20/0xc0
[   15.944673]  ? __pfx_kthread+0x10/0x10
[   15.944695]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.944717]  ? calculate_sigpending+0x7b/0xa0
[   15.944743]  ? __pfx_kthread+0x10/0x10
[   15.944765]  ret_from_fork+0x116/0x1d0
[   15.944784]  ? __pfx_kthread+0x10/0x10
[   15.944837]  ret_from_fork_asm+0x1a/0x30
[   15.944871]  </TASK>
[   15.944883] 
[   15.952935] Allocated by task 282:
[   15.953072]  kasan_save_stack+0x45/0x70
[   15.953219]  kasan_save_track+0x18/0x40
[   15.953377]  kasan_save_alloc_info+0x3b/0x50
[   15.953587]  __kasan_kmalloc+0xb7/0xc0
[   15.953779]  __kmalloc_cache_noprof+0x189/0x420
[   15.954123]  kasan_atomics+0x95/0x310
[   15.954323]  kunit_try_run_case+0x1a5/0x480
[   15.954535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.954827]  kthread+0x337/0x6f0
[   15.955064]  ret_from_fork+0x116/0x1d0
[   15.955272]  ret_from_fork_asm+0x1a/0x30
[   15.955417] 
[   15.955490] The buggy address belongs to the object at ffff8881029b7000
[   15.955490]  which belongs to the cache kmalloc-64 of size 64
[   15.955847] The buggy address is located 0 bytes to the right of
[   15.955847]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.956491] 
[   15.956639] The buggy address belongs to the physical page:
[   15.956964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.957400] flags: 0x200000000000000(node=0|zone=2)
[   15.957637] page_type: f5(slab)
[   15.957808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.958169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.958407] page dumped because: kasan: bad access detected
[   15.958582] 
[   15.958652] Memory state around the buggy address:
[   15.958984]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.959398]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.959755] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.960113]                                      ^
[   15.960378]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960697]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.961026] ==================================================================
[   15.539765] ==================================================================
[   15.540226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.540822] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.541403] 
[   15.541645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.541693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.541714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.541736] Call Trace:
[   15.541750]  <TASK>
[   15.541766]  dump_stack_lvl+0x73/0xb0
[   15.541796]  print_report+0xd1/0x610
[   15.541819]  ? __virt_addr_valid+0x1db/0x2d0
[   15.541842]  ? kasan_atomics_helper+0x151d/0x5450
[   15.541864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.541889]  ? kasan_atomics_helper+0x151d/0x5450
[   15.541922]  kasan_report+0x141/0x180
[   15.541945]  ? kasan_atomics_helper+0x151d/0x5450
[   15.541973]  kasan_check_range+0x10c/0x1c0
[   15.542113]  __kasan_check_write+0x18/0x20
[   15.542134]  kasan_atomics_helper+0x151d/0x5450
[   15.542159]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.542184]  ? kasan_save_alloc_info+0x3b/0x50
[   15.542214]  kasan_atomics+0x1dc/0x310
[   15.542273]  ? __pfx_kasan_atomics+0x10/0x10
[   15.542297]  ? __pfx_read_tsc+0x10/0x10
[   15.542319]  ? ktime_get_ts64+0x86/0x230
[   15.542345]  kunit_try_run_case+0x1a5/0x480
[   15.542370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.542393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.542418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.542442]  ? __kthread_parkme+0x82/0x180
[   15.542463]  ? preempt_count_sub+0x50/0x80
[   15.542488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.542513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.542537]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.542562]  kthread+0x337/0x6f0
[   15.542582]  ? trace_preempt_on+0x20/0xc0
[   15.542606]  ? __pfx_kthread+0x10/0x10
[   15.542627]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.542649]  ? calculate_sigpending+0x7b/0xa0
[   15.542674]  ? __pfx_kthread+0x10/0x10
[   15.542695]  ret_from_fork+0x116/0x1d0
[   15.542714]  ? __pfx_kthread+0x10/0x10
[   15.542735]  ret_from_fork_asm+0x1a/0x30
[   15.542773]  </TASK>
[   15.542785] 
[   15.552402] Allocated by task 282:
[   15.552542]  kasan_save_stack+0x45/0x70
[   15.552748]  kasan_save_track+0x18/0x40
[   15.552956]  kasan_save_alloc_info+0x3b/0x50
[   15.553219]  __kasan_kmalloc+0xb7/0xc0
[   15.553419]  __kmalloc_cache_noprof+0x189/0x420
[   15.553619]  kasan_atomics+0x95/0x310
[   15.553755]  kunit_try_run_case+0x1a5/0x480
[   15.553913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.554110]  kthread+0x337/0x6f0
[   15.554281]  ret_from_fork+0x116/0x1d0
[   15.554486]  ret_from_fork_asm+0x1a/0x30
[   15.554682] 
[   15.554789] The buggy address belongs to the object at ffff8881029b7000
[   15.554789]  which belongs to the cache kmalloc-64 of size 64
[   15.555284] The buggy address is located 0 bytes to the right of
[   15.555284]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.555801] 
[   15.555911] The buggy address belongs to the physical page:
[   15.556179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.556501] flags: 0x200000000000000(node=0|zone=2)
[   15.556704] page_type: f5(slab)
[   15.556872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.557217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.557524] page dumped because: kasan: bad access detected
[   15.557759] 
[   15.557852] Memory state around the buggy address:
[   15.558119]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558400]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558678] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.558942]                                      ^
[   15.559099]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.559485]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.559920] ==================================================================
[   14.711946] ==================================================================
[   14.712265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.712520] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.712811] 
[   14.713019] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.713064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.713076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.713098] Call Trace:
[   14.713114]  <TASK>
[   14.713130]  dump_stack_lvl+0x73/0xb0
[   14.713158]  print_report+0xd1/0x610
[   14.713181]  ? __virt_addr_valid+0x1db/0x2d0
[   14.713205]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.713226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.713250]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.713274]  kasan_report+0x141/0x180
[   14.713297]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.713325]  __asan_report_store4_noabort+0x1b/0x30
[   14.713351]  kasan_atomics_helper+0x4b6e/0x5450
[   14.713375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.713400]  ? kasan_save_alloc_info+0x3b/0x50
[   14.713430]  kasan_atomics+0x1dc/0x310
[   14.713455]  ? __pfx_kasan_atomics+0x10/0x10
[   14.713481]  ? __pfx_read_tsc+0x10/0x10
[   14.713502]  ? ktime_get_ts64+0x86/0x230
[   14.713529]  kunit_try_run_case+0x1a5/0x480
[   14.713554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.713578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.713603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.713628]  ? __kthread_parkme+0x82/0x180
[   14.713650]  ? preempt_count_sub+0x50/0x80
[   14.713674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.713699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.713724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.713750]  kthread+0x337/0x6f0
[   14.713771]  ? trace_preempt_on+0x20/0xc0
[   14.713796]  ? __pfx_kthread+0x10/0x10
[   14.713817]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.713840]  ? calculate_sigpending+0x7b/0xa0
[   14.713865]  ? __pfx_kthread+0x10/0x10
[   14.713888]  ret_from_fork+0x116/0x1d0
[   14.713917]  ? __pfx_kthread+0x10/0x10
[   14.713939]  ret_from_fork_asm+0x1a/0x30
[   14.713971]  </TASK>
[   14.713984] 
[   14.721910] Allocated by task 282:
[   14.722052]  kasan_save_stack+0x45/0x70
[   14.722204]  kasan_save_track+0x18/0x40
[   14.722343]  kasan_save_alloc_info+0x3b/0x50
[   14.722494]  __kasan_kmalloc+0xb7/0xc0
[   14.722667]  __kmalloc_cache_noprof+0x189/0x420
[   14.723143]  kasan_atomics+0x95/0x310
[   14.723603]  kunit_try_run_case+0x1a5/0x480
[   14.723821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.724124]  kthread+0x337/0x6f0
[   14.724248]  ret_from_fork+0x116/0x1d0
[   14.724382]  ret_from_fork_asm+0x1a/0x30
[   14.724524] 
[   14.724624] The buggy address belongs to the object at ffff8881029b7000
[   14.724624]  which belongs to the cache kmalloc-64 of size 64
[   14.725471] The buggy address is located 0 bytes to the right of
[   14.725471]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.726012] 
[   14.726114] The buggy address belongs to the physical page:
[   14.726359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.726870] flags: 0x200000000000000(node=0|zone=2)
[   14.727113] page_type: f5(slab)
[   14.727263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.727498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.727727] page dumped because: kasan: bad access detected
[   14.727996] 
[   14.728103] Memory state around the buggy address:
[   14.728330]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.728650]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729081] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.729403]                                      ^
[   14.729576]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729794]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730281] ==================================================================
[   15.084257] ==================================================================
[   15.084800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.085071] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.085383] 
[   15.085571] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.085624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.085637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.085660] Call Trace:
[   15.085676]  <TASK>
[   15.085692]  dump_stack_lvl+0x73/0xb0
[   15.085722]  print_report+0xd1/0x610
[   15.085747]  ? __virt_addr_valid+0x1db/0x2d0
[   15.085772]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.085794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.085828]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.085852]  kasan_report+0x141/0x180
[   15.085876]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.085922]  __asan_report_load4_noabort+0x18/0x20
[   15.085948]  kasan_atomics_helper+0x4a84/0x5450
[   15.085990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.086024]  ? kasan_save_alloc_info+0x3b/0x50
[   15.086055]  kasan_atomics+0x1dc/0x310
[   15.086079]  ? __pfx_kasan_atomics+0x10/0x10
[   15.086115]  ? __pfx_read_tsc+0x10/0x10
[   15.086136]  ? ktime_get_ts64+0x86/0x230
[   15.086162]  kunit_try_run_case+0x1a5/0x480
[   15.086187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.086210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.086245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.086270]  ? __kthread_parkme+0x82/0x180
[   15.086291]  ? preempt_count_sub+0x50/0x80
[   15.086328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.086353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.086404]  kthread+0x337/0x6f0
[   15.086424]  ? trace_preempt_on+0x20/0xc0
[   15.086450]  ? __pfx_kthread+0x10/0x10
[   15.086471]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.086494]  ? calculate_sigpending+0x7b/0xa0
[   15.086577]  ? __pfx_kthread+0x10/0x10
[   15.086602]  ret_from_fork+0x116/0x1d0
[   15.086622]  ? __pfx_kthread+0x10/0x10
[   15.086654]  ret_from_fork_asm+0x1a/0x30
[   15.086687]  </TASK>
[   15.086699] 
[   15.094932] Allocated by task 282:
[   15.095160]  kasan_save_stack+0x45/0x70
[   15.095352]  kasan_save_track+0x18/0x40
[   15.095493]  kasan_save_alloc_info+0x3b/0x50
[   15.095708]  __kasan_kmalloc+0xb7/0xc0
[   15.095934]  __kmalloc_cache_noprof+0x189/0x420
[   15.096176]  kasan_atomics+0x95/0x310
[   15.096370]  kunit_try_run_case+0x1a5/0x480
[   15.096806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097139]  kthread+0x337/0x6f0
[   15.097313]  ret_from_fork+0x116/0x1d0
[   15.097508]  ret_from_fork_asm+0x1a/0x30
[   15.097801] 
[   15.097901] The buggy address belongs to the object at ffff8881029b7000
[   15.097901]  which belongs to the cache kmalloc-64 of size 64
[   15.098430] The buggy address is located 0 bytes to the right of
[   15.098430]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.099051] 
[   15.099154] The buggy address belongs to the physical page:
[   15.099363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.099605] flags: 0x200000000000000(node=0|zone=2)
[   15.099768] page_type: f5(slab)
[   15.099888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.100333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.100936] page dumped because: kasan: bad access detected
[   15.101242] 
[   15.101362] Memory state around the buggy address:
[   15.101655]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101962]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102199] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.102414]                                      ^
[   15.102723]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.103119]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.103463] ==================================================================
[   14.959761] ==================================================================
[   14.960141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.960455] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.960914] 
[   14.961053] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.961098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.961110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.961131] Call Trace:
[   14.961145]  <TASK>
[   14.961159]  dump_stack_lvl+0x73/0xb0
[   14.961189]  print_report+0xd1/0x610
[   14.961212]  ? __virt_addr_valid+0x1db/0x2d0
[   14.961235]  ? kasan_atomics_helper+0x992/0x5450
[   14.961258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.961283]  ? kasan_atomics_helper+0x992/0x5450
[   14.961306]  kasan_report+0x141/0x180
[   14.961329]  ? kasan_atomics_helper+0x992/0x5450
[   14.961359]  kasan_check_range+0x10c/0x1c0
[   14.961384]  __kasan_check_write+0x18/0x20
[   14.961404]  kasan_atomics_helper+0x992/0x5450
[   14.961429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.961453]  ? kasan_save_alloc_info+0x3b/0x50
[   14.961484]  kasan_atomics+0x1dc/0x310
[   14.961509]  ? __pfx_kasan_atomics+0x10/0x10
[   14.961534]  ? __pfx_read_tsc+0x10/0x10
[   14.961555]  ? ktime_get_ts64+0x86/0x230
[   14.961582]  kunit_try_run_case+0x1a5/0x480
[   14.961608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.961631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.961656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.961681]  ? __kthread_parkme+0x82/0x180
[   14.961702]  ? preempt_count_sub+0x50/0x80
[   14.961727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.961753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.961803]  kthread+0x337/0x6f0
[   14.961822]  ? trace_preempt_on+0x20/0xc0
[   14.961846]  ? __pfx_kthread+0x10/0x10
[   14.961866]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.961889]  ? calculate_sigpending+0x7b/0xa0
[   14.961925]  ? __pfx_kthread+0x10/0x10
[   14.961947]  ret_from_fork+0x116/0x1d0
[   14.961967]  ? __pfx_kthread+0x10/0x10
[   14.961987]  ret_from_fork_asm+0x1a/0x30
[   14.962202]  </TASK>
[   14.962214] 
[   14.970270] Allocated by task 282:
[   14.970456]  kasan_save_stack+0x45/0x70
[   14.970848]  kasan_save_track+0x18/0x40
[   14.971115]  kasan_save_alloc_info+0x3b/0x50
[   14.971299]  __kasan_kmalloc+0xb7/0xc0
[   14.971458]  __kmalloc_cache_noprof+0x189/0x420
[   14.971640]  kasan_atomics+0x95/0x310
[   14.971830]  kunit_try_run_case+0x1a5/0x480
[   14.972055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.972253]  kthread+0x337/0x6f0
[   14.972376]  ret_from_fork+0x116/0x1d0
[   14.972509]  ret_from_fork_asm+0x1a/0x30
[   14.972650] 
[   14.972722] The buggy address belongs to the object at ffff8881029b7000
[   14.972722]  which belongs to the cache kmalloc-64 of size 64
[   14.973092] The buggy address is located 0 bytes to the right of
[   14.973092]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.973475] 
[   14.973576] The buggy address belongs to the physical page:
[   14.973831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.974936] flags: 0x200000000000000(node=0|zone=2)
[   14.975202] page_type: f5(slab)
[   14.975377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.975855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.976197] page dumped because: kasan: bad access detected
[   14.976373] 
[   14.976444] Memory state around the buggy address:
[   14.976645]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976991]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.977471] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.978008]                                      ^
[   14.978181]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.978401]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.978666] ==================================================================
[   15.760026] ==================================================================
[   15.760397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.760744] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.761115] 
[   15.761223] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.761268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.761280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.761303] Call Trace:
[   15.761318]  <TASK>
[   15.761335]  dump_stack_lvl+0x73/0xb0
[   15.761365]  print_report+0xd1/0x610
[   15.761388]  ? __virt_addr_valid+0x1db/0x2d0
[   15.761412]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.761435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.761460]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.761483]  kasan_report+0x141/0x180
[   15.761507]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.761535]  kasan_check_range+0x10c/0x1c0
[   15.761580]  __kasan_check_write+0x18/0x20
[   15.761601]  kasan_atomics_helper+0x1c18/0x5450
[   15.761627]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.761652]  ? kasan_save_alloc_info+0x3b/0x50
[   15.761683]  kasan_atomics+0x1dc/0x310
[   15.761708]  ? __pfx_kasan_atomics+0x10/0x10
[   15.761734]  ? __pfx_read_tsc+0x10/0x10
[   15.761757]  ? ktime_get_ts64+0x86/0x230
[   15.761782]  kunit_try_run_case+0x1a5/0x480
[   15.761807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.761831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.761856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.761881]  ? __kthread_parkme+0x82/0x180
[   15.761913]  ? preempt_count_sub+0x50/0x80
[   15.761938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.761964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.762009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.762035]  kthread+0x337/0x6f0
[   15.762054]  ? trace_preempt_on+0x20/0xc0
[   15.762079]  ? __pfx_kthread+0x10/0x10
[   15.762100]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.762123]  ? calculate_sigpending+0x7b/0xa0
[   15.762150]  ? __pfx_kthread+0x10/0x10
[   15.762173]  ret_from_fork+0x116/0x1d0
[   15.762192]  ? __pfx_kthread+0x10/0x10
[   15.762213]  ret_from_fork_asm+0x1a/0x30
[   15.762246]  </TASK>
[   15.762256] 
[   15.769548] Allocated by task 282:
[   15.769716]  kasan_save_stack+0x45/0x70
[   15.769910]  kasan_save_track+0x18/0x40
[   15.770097]  kasan_save_alloc_info+0x3b/0x50
[   15.770295]  __kasan_kmalloc+0xb7/0xc0
[   15.770474]  __kmalloc_cache_noprof+0x189/0x420
[   15.770679]  kasan_atomics+0x95/0x310
[   15.770849]  kunit_try_run_case+0x1a5/0x480
[   15.771056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.771292]  kthread+0x337/0x6f0
[   15.771452]  ret_from_fork+0x116/0x1d0
[   15.771617]  ret_from_fork_asm+0x1a/0x30
[   15.771783] 
[   15.771866] The buggy address belongs to the object at ffff8881029b7000
[   15.771866]  which belongs to the cache kmalloc-64 of size 64
[   15.772360] The buggy address is located 0 bytes to the right of
[   15.772360]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.772721] 
[   15.772791] The buggy address belongs to the physical page:
[   15.773098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.773459] flags: 0x200000000000000(node=0|zone=2)
[   15.773696] page_type: f5(slab)
[   15.773865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.774200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.774430] page dumped because: kasan: bad access detected
[   15.774603] 
[   15.774674] Memory state around the buggy address:
[   15.774858]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.775211]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.775527] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.775838]                                      ^
[   15.776123]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.776455]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.776707] ==================================================================
[   15.904200] ==================================================================
[   15.904658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.905050] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.905379] 
[   15.905523] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.905568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.905581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.905633] Call Trace:
[   15.905651]  <TASK>
[   15.905667]  dump_stack_lvl+0x73/0xb0
[   15.905696]  print_report+0xd1/0x610
[   15.905720]  ? __virt_addr_valid+0x1db/0x2d0
[   15.905744]  ? kasan_atomics_helper+0x2006/0x5450
[   15.905766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.905790]  ? kasan_atomics_helper+0x2006/0x5450
[   15.905813]  kasan_report+0x141/0x180
[   15.905836]  ? kasan_atomics_helper+0x2006/0x5450
[   15.905865]  kasan_check_range+0x10c/0x1c0
[   15.905932]  __kasan_check_write+0x18/0x20
[   15.905953]  kasan_atomics_helper+0x2006/0x5450
[   15.906003]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.906028]  ? kasan_save_alloc_info+0x3b/0x50
[   15.906058]  kasan_atomics+0x1dc/0x310
[   15.906111]  ? __pfx_kasan_atomics+0x10/0x10
[   15.906161]  ? __pfx_read_tsc+0x10/0x10
[   15.906183]  ? ktime_get_ts64+0x86/0x230
[   15.906209]  kunit_try_run_case+0x1a5/0x480
[   15.906234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.906257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.906283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.906308]  ? __kthread_parkme+0x82/0x180
[   15.906328]  ? preempt_count_sub+0x50/0x80
[   15.906354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.906380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.906405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.906429]  kthread+0x337/0x6f0
[   15.906449]  ? trace_preempt_on+0x20/0xc0
[   15.906473]  ? __pfx_kthread+0x10/0x10
[   15.906494]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.906517]  ? calculate_sigpending+0x7b/0xa0
[   15.906542]  ? __pfx_kthread+0x10/0x10
[   15.906564]  ret_from_fork+0x116/0x1d0
[   15.906584]  ? __pfx_kthread+0x10/0x10
[   15.906604]  ret_from_fork_asm+0x1a/0x30
[   15.906637]  </TASK>
[   15.906648] 
[   15.914593] Allocated by task 282:
[   15.914802]  kasan_save_stack+0x45/0x70
[   15.915059]  kasan_save_track+0x18/0x40
[   15.915263]  kasan_save_alloc_info+0x3b/0x50
[   15.915502]  __kasan_kmalloc+0xb7/0xc0
[   15.915695]  __kmalloc_cache_noprof+0x189/0x420
[   15.915912]  kasan_atomics+0x95/0x310
[   15.916161]  kunit_try_run_case+0x1a5/0x480
[   15.916370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.916639]  kthread+0x337/0x6f0
[   15.916833]  ret_from_fork+0x116/0x1d0
[   15.917079]  ret_from_fork_asm+0x1a/0x30
[   15.917276] 
[   15.917407] The buggy address belongs to the object at ffff8881029b7000
[   15.917407]  which belongs to the cache kmalloc-64 of size 64
[   15.917937] The buggy address is located 0 bytes to the right of
[   15.917937]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.918379] 
[   15.918470] The buggy address belongs to the physical page:
[   15.918660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.918984] flags: 0x200000000000000(node=0|zone=2)
[   15.919254] page_type: f5(slab)
[   15.919426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.919801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.920177] page dumped because: kasan: bad access detected
[   15.920391] 
[   15.920461] Memory state around the buggy address:
[   15.920618]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920836]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.921201] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.921519]                                      ^
[   15.921739]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.922092]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.922407] ==================================================================
[   15.560499] ==================================================================
[   15.560871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.561294] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.561583] 
[   15.561695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.561739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.561751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.561772] Call Trace:
[   15.561785]  <TASK>
[   15.561803]  dump_stack_lvl+0x73/0xb0
[   15.561831]  print_report+0xd1/0x610
[   15.561854]  ? __virt_addr_valid+0x1db/0x2d0
[   15.561878]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.561911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.561935]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.561958]  kasan_report+0x141/0x180
[   15.561981]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.562020]  kasan_check_range+0x10c/0x1c0
[   15.562045]  __kasan_check_write+0x18/0x20
[   15.562065]  kasan_atomics_helper+0x15b6/0x5450
[   15.562089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.562113]  ? kasan_save_alloc_info+0x3b/0x50
[   15.562144]  kasan_atomics+0x1dc/0x310
[   15.562168]  ? __pfx_kasan_atomics+0x10/0x10
[   15.562193]  ? __pfx_read_tsc+0x10/0x10
[   15.562215]  ? ktime_get_ts64+0x86/0x230
[   15.562241]  kunit_try_run_case+0x1a5/0x480
[   15.562266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.562290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.562315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.562339]  ? __kthread_parkme+0x82/0x180
[   15.562360]  ? preempt_count_sub+0x50/0x80
[   15.562386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.562410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.562435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.562460]  kthread+0x337/0x6f0
[   15.562480]  ? trace_preempt_on+0x20/0xc0
[   15.562504]  ? __pfx_kthread+0x10/0x10
[   15.562525]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.562547]  ? calculate_sigpending+0x7b/0xa0
[   15.562572]  ? __pfx_kthread+0x10/0x10
[   15.562593]  ret_from_fork+0x116/0x1d0
[   15.562612]  ? __pfx_kthread+0x10/0x10
[   15.562633]  ret_from_fork_asm+0x1a/0x30
[   15.562666]  </TASK>
[   15.562678] 
[   15.569735] Allocated by task 282:
[   15.569934]  kasan_save_stack+0x45/0x70
[   15.570252]  kasan_save_track+0x18/0x40
[   15.570451]  kasan_save_alloc_info+0x3b/0x50
[   15.570675]  __kasan_kmalloc+0xb7/0xc0
[   15.570869]  __kmalloc_cache_noprof+0x189/0x420
[   15.571269]  kasan_atomics+0x95/0x310
[   15.571473]  kunit_try_run_case+0x1a5/0x480
[   15.571673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.571851]  kthread+0x337/0x6f0
[   15.572007]  ret_from_fork+0x116/0x1d0
[   15.572199]  ret_from_fork_asm+0x1a/0x30
[   15.572399] 
[   15.572499] The buggy address belongs to the object at ffff8881029b7000
[   15.572499]  which belongs to the cache kmalloc-64 of size 64
[   15.572983] The buggy address is located 0 bytes to the right of
[   15.572983]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.573484] 
[   15.573586] The buggy address belongs to the physical page:
[   15.573806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.574147] flags: 0x200000000000000(node=0|zone=2)
[   15.574338] page_type: f5(slab)
[   15.574476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.574822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.575063] page dumped because: kasan: bad access detected
[   15.575237] 
[   15.575308] Memory state around the buggy address:
[   15.575464]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.575682]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.575935] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.576565]                                      ^
[   15.576787]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.577122]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.577437] ==================================================================
[   14.789694] ==================================================================
[   14.790127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.790426] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.790756] 
[   14.790851] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.790905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.790918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.790939] Call Trace:
[   14.790954]  <TASK>
[   14.790969]  dump_stack_lvl+0x73/0xb0
[   14.791007]  print_report+0xd1/0x610
[   14.791031]  ? __virt_addr_valid+0x1db/0x2d0
[   14.791055]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.791077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.791101]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.791125]  kasan_report+0x141/0x180
[   14.791149]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.791177]  __asan_report_store4_noabort+0x1b/0x30
[   14.791203]  kasan_atomics_helper+0x4b3a/0x5450
[   14.791229]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.791254]  ? kasan_save_alloc_info+0x3b/0x50
[   14.791285]  kasan_atomics+0x1dc/0x310
[   14.791309]  ? __pfx_kasan_atomics+0x10/0x10
[   14.791333]  ? __pfx_read_tsc+0x10/0x10
[   14.791354]  ? ktime_get_ts64+0x86/0x230
[   14.791380]  kunit_try_run_case+0x1a5/0x480
[   14.791404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.791453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.791478]  ? __kthread_parkme+0x82/0x180
[   14.791499]  ? preempt_count_sub+0x50/0x80
[   14.791524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.791574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.791598]  kthread+0x337/0x6f0
[   14.791619]  ? trace_preempt_on+0x20/0xc0
[   14.791643]  ? __pfx_kthread+0x10/0x10
[   14.791664]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.791687]  ? calculate_sigpending+0x7b/0xa0
[   14.791711]  ? __pfx_kthread+0x10/0x10
[   14.791734]  ret_from_fork+0x116/0x1d0
[   14.791753]  ? __pfx_kthread+0x10/0x10
[   14.791774]  ret_from_fork_asm+0x1a/0x30
[   14.791807]  </TASK>
[   14.791818] 
[   14.799657] Allocated by task 282:
[   14.799842]  kasan_save_stack+0x45/0x70
[   14.800058]  kasan_save_track+0x18/0x40
[   14.800252]  kasan_save_alloc_info+0x3b/0x50
[   14.800824]  __kasan_kmalloc+0xb7/0xc0
[   14.801097]  __kmalloc_cache_noprof+0x189/0x420
[   14.801265]  kasan_atomics+0x95/0x310
[   14.801401]  kunit_try_run_case+0x1a5/0x480
[   14.801615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.801874]  kthread+0x337/0x6f0
[   14.802193]  ret_from_fork+0x116/0x1d0
[   14.802396]  ret_from_fork_asm+0x1a/0x30
[   14.802639] 
[   14.802716] The buggy address belongs to the object at ffff8881029b7000
[   14.802716]  which belongs to the cache kmalloc-64 of size 64
[   14.803372] The buggy address is located 0 bytes to the right of
[   14.803372]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.803973] 
[   14.804065] The buggy address belongs to the physical page:
[   14.804269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.804851] flags: 0x200000000000000(node=0|zone=2)
[   14.805102] page_type: f5(slab)
[   14.805227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.805461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.805698] page dumped because: kasan: bad access detected
[   14.806005] 
[   14.806105] Memory state around the buggy address:
[   14.806328]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.806647]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807034] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.807253]                                      ^
[   14.807410]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807630]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.808139] ==================================================================
[   15.695683] ==================================================================
[   15.696050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.696394] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.696692] 
[   15.696799] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.696839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.696852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.696876] Call Trace:
[   15.696900]  <TASK>
[   15.696917]  dump_stack_lvl+0x73/0xb0
[   15.696942]  print_report+0xd1/0x610
[   15.696964]  ? __virt_addr_valid+0x1db/0x2d0
[   15.696988]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.697010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.697033]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.697055]  kasan_report+0x141/0x180
[   15.697077]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.697104]  kasan_check_range+0x10c/0x1c0
[   15.697128]  __kasan_check_write+0x18/0x20
[   15.697148]  kasan_atomics_helper+0x19e3/0x5450
[   15.697171]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.697195]  ? kasan_save_alloc_info+0x3b/0x50
[   15.697225]  kasan_atomics+0x1dc/0x310
[   15.697248]  ? __pfx_kasan_atomics+0x10/0x10
[   15.697273]  ? __pfx_read_tsc+0x10/0x10
[   15.697293]  ? ktime_get_ts64+0x86/0x230
[   15.697319]  kunit_try_run_case+0x1a5/0x480
[   15.697343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.697365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.697390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.697414]  ? __kthread_parkme+0x82/0x180
[   15.697435]  ? preempt_count_sub+0x50/0x80
[   15.697459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.697484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.697507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.697531]  kthread+0x337/0x6f0
[   15.697551]  ? trace_preempt_on+0x20/0xc0
[   15.697574]  ? __pfx_kthread+0x10/0x10
[   15.697595]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.697616]  ? calculate_sigpending+0x7b/0xa0
[   15.697641]  ? __pfx_kthread+0x10/0x10
[   15.697663]  ret_from_fork+0x116/0x1d0
[   15.697681]  ? __pfx_kthread+0x10/0x10
[   15.697701]  ret_from_fork_asm+0x1a/0x30
[   15.697734]  </TASK>
[   15.697745] 
[   15.705034] Allocated by task 282:
[   15.705175]  kasan_save_stack+0x45/0x70
[   15.705321]  kasan_save_track+0x18/0x40
[   15.705457]  kasan_save_alloc_info+0x3b/0x50
[   15.705607]  __kasan_kmalloc+0xb7/0xc0
[   15.705741]  __kmalloc_cache_noprof+0x189/0x420
[   15.705909]  kasan_atomics+0x95/0x310
[   15.706071]  kunit_try_run_case+0x1a5/0x480
[   15.706221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.706404]  kthread+0x337/0x6f0
[   15.706530]  ret_from_fork+0x116/0x1d0
[   15.706666]  ret_from_fork_asm+0x1a/0x30
[   15.706873] 
[   15.707005] The buggy address belongs to the object at ffff8881029b7000
[   15.707005]  which belongs to the cache kmalloc-64 of size 64
[   15.707533] The buggy address is located 0 bytes to the right of
[   15.707533]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.708114] 
[   15.708210] The buggy address belongs to the physical page:
[   15.708462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.708806] flags: 0x200000000000000(node=0|zone=2)
[   15.709006] page_type: f5(slab)
[   15.709127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.709362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.709589] page dumped because: kasan: bad access detected
[   15.709764] 
[   15.709833] Memory state around the buggy address:
[   15.710105]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.710401]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.710670] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.711833]                                      ^
[   15.712246]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.712538]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.712815] ==================================================================
[   15.044049] ==================================================================
[   15.044401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.044818] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.045184] 
[   15.045308] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.045354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.045367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.045390] Call Trace:
[   15.045408]  <TASK>
[   15.045425]  dump_stack_lvl+0x73/0xb0
[   15.045455]  print_report+0xd1/0x610
[   15.045480]  ? __virt_addr_valid+0x1db/0x2d0
[   15.045504]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.045612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.045638]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.045661]  kasan_report+0x141/0x180
[   15.045696]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.045724]  kasan_check_range+0x10c/0x1c0
[   15.045749]  __kasan_check_write+0x18/0x20
[   15.045769]  kasan_atomics_helper+0xb6a/0x5450
[   15.045794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.045819]  ? kasan_save_alloc_info+0x3b/0x50
[   15.045849]  kasan_atomics+0x1dc/0x310
[   15.045874]  ? __pfx_kasan_atomics+0x10/0x10
[   15.045908]  ? __pfx_read_tsc+0x10/0x10
[   15.045931]  ? ktime_get_ts64+0x86/0x230
[   15.045957]  kunit_try_run_case+0x1a5/0x480
[   15.045982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.046057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.046083]  ? __kthread_parkme+0x82/0x180
[   15.046104]  ? preempt_count_sub+0x50/0x80
[   15.046140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.046223]  kthread+0x337/0x6f0
[   15.046243]  ? trace_preempt_on+0x20/0xc0
[   15.046267]  ? __pfx_kthread+0x10/0x10
[   15.046299]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.046323]  ? calculate_sigpending+0x7b/0xa0
[   15.046348]  ? __pfx_kthread+0x10/0x10
[   15.046372]  ret_from_fork+0x116/0x1d0
[   15.046393]  ? __pfx_kthread+0x10/0x10
[   15.046413]  ret_from_fork_asm+0x1a/0x30
[   15.046448]  </TASK>
[   15.046459] 
[   15.054946] Allocated by task 282:
[   15.055162]  kasan_save_stack+0x45/0x70
[   15.055369]  kasan_save_track+0x18/0x40
[   15.055571]  kasan_save_alloc_info+0x3b/0x50
[   15.055995]  __kasan_kmalloc+0xb7/0xc0
[   15.056237]  __kmalloc_cache_noprof+0x189/0x420
[   15.056482]  kasan_atomics+0x95/0x310
[   15.056769]  kunit_try_run_case+0x1a5/0x480
[   15.056993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057232]  kthread+0x337/0x6f0
[   15.057365]  ret_from_fork+0x116/0x1d0
[   15.057644]  ret_from_fork_asm+0x1a/0x30
[   15.057849] 
[   15.057960] The buggy address belongs to the object at ffff8881029b7000
[   15.057960]  which belongs to the cache kmalloc-64 of size 64
[   15.058490] The buggy address is located 0 bytes to the right of
[   15.058490]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.059054] 
[   15.059133] The buggy address belongs to the physical page:
[   15.059308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.059876] flags: 0x200000000000000(node=0|zone=2)
[   15.060162] page_type: f5(slab)
[   15.060340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.060765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.061134] page dumped because: kasan: bad access detected
[   15.061345] 
[   15.061454] Memory state around the buggy address:
[   15.061761]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062104]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062324] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.062679]                                      ^
[   15.062924]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.063269]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.063684] ==================================================================
[   15.104054] ==================================================================
[   15.104403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.104972] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.105249] 
[   15.105388] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.105431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.105444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.105481] Call Trace:
[   15.105499]  <TASK>
[   15.105593]  dump_stack_lvl+0x73/0xb0
[   15.105637]  print_report+0xd1/0x610
[   15.105664]  ? __virt_addr_valid+0x1db/0x2d0
[   15.105692]  ? kasan_atomics_helper+0xd47/0x5450
[   15.105720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.105763]  ? kasan_atomics_helper+0xd47/0x5450
[   15.105791]  kasan_report+0x141/0x180
[   15.105829]  ? kasan_atomics_helper+0xd47/0x5450
[   15.105862]  kasan_check_range+0x10c/0x1c0
[   15.105901]  __kasan_check_write+0x18/0x20
[   15.105934]  kasan_atomics_helper+0xd47/0x5450
[   15.105963]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.105993]  ? kasan_save_alloc_info+0x3b/0x50
[   15.106055]  kasan_atomics+0x1dc/0x310
[   15.106083]  ? __pfx_kasan_atomics+0x10/0x10
[   15.106121]  ? __pfx_read_tsc+0x10/0x10
[   15.106146]  ? ktime_get_ts64+0x86/0x230
[   15.106174]  kunit_try_run_case+0x1a5/0x480
[   15.106214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.106243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.106274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.106304]  ? __kthread_parkme+0x82/0x180
[   15.106330]  ? preempt_count_sub+0x50/0x80
[   15.106359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.106389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.106420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.106454]  kthread+0x337/0x6f0
[   15.106476]  ? trace_preempt_on+0x20/0xc0
[   15.106504]  ? __pfx_kthread+0x10/0x10
[   15.106612]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.106640]  ? calculate_sigpending+0x7b/0xa0
[   15.106670]  ? __pfx_kthread+0x10/0x10
[   15.106704]  ret_from_fork+0x116/0x1d0
[   15.106727]  ? __pfx_kthread+0x10/0x10
[   15.106752]  ret_from_fork_asm+0x1a/0x30
[   15.106804]  </TASK>
[   15.106816] 
[   15.115161] Allocated by task 282:
[   15.115349]  kasan_save_stack+0x45/0x70
[   15.115636]  kasan_save_track+0x18/0x40
[   15.115842]  kasan_save_alloc_info+0x3b/0x50
[   15.116097]  __kasan_kmalloc+0xb7/0xc0
[   15.116291]  __kmalloc_cache_noprof+0x189/0x420
[   15.116467]  kasan_atomics+0x95/0x310
[   15.116883]  kunit_try_run_case+0x1a5/0x480
[   15.117098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.117358]  kthread+0x337/0x6f0
[   15.117623]  ret_from_fork+0x116/0x1d0
[   15.117814]  ret_from_fork_asm+0x1a/0x30
[   15.118045] 
[   15.118148] The buggy address belongs to the object at ffff8881029b7000
[   15.118148]  which belongs to the cache kmalloc-64 of size 64
[   15.118678] The buggy address is located 0 bytes to the right of
[   15.118678]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.119246] 
[   15.119349] The buggy address belongs to the physical page:
[   15.119701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.120135] flags: 0x200000000000000(node=0|zone=2)
[   15.120320] page_type: f5(slab)
[   15.120445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.121026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.121432] page dumped because: kasan: bad access detected
[   15.121808] 
[   15.121918] Memory state around the buggy address:
[   15.122150]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122484]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122904] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.123261]                                      ^
[   15.123476]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.123711]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.124117] ==================================================================
[   15.457161] ==================================================================
[   15.457470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.457821] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.458104] 
[   15.458214] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.458256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.458268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.458290] Call Trace:
[   15.458305]  <TASK>
[   15.458321]  dump_stack_lvl+0x73/0xb0
[   15.458348]  print_report+0xd1/0x610
[   15.458371]  ? __virt_addr_valid+0x1db/0x2d0
[   15.458395]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.458417]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.458441]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.458464]  kasan_report+0x141/0x180
[   15.458488]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.458516]  __asan_report_load8_noabort+0x18/0x20
[   15.458554]  kasan_atomics_helper+0x4eae/0x5450
[   15.458578]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.458604]  ? kasan_save_alloc_info+0x3b/0x50
[   15.458635]  kasan_atomics+0x1dc/0x310
[   15.458659]  ? __pfx_kasan_atomics+0x10/0x10
[   15.458684]  ? __pfx_read_tsc+0x10/0x10
[   15.458706]  ? ktime_get_ts64+0x86/0x230
[   15.458732]  kunit_try_run_case+0x1a5/0x480
[   15.458757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.458812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.458837]  ? __kthread_parkme+0x82/0x180
[   15.458858]  ? preempt_count_sub+0x50/0x80
[   15.458884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.458944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.458970]  kthread+0x337/0x6f0
[   15.458998]  ? trace_preempt_on+0x20/0xc0
[   15.459024]  ? __pfx_kthread+0x10/0x10
[   15.459045]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.459068]  ? calculate_sigpending+0x7b/0xa0
[   15.459093]  ? __pfx_kthread+0x10/0x10
[   15.459115]  ret_from_fork+0x116/0x1d0
[   15.459134]  ? __pfx_kthread+0x10/0x10
[   15.459155]  ret_from_fork_asm+0x1a/0x30
[   15.459188]  </TASK>
[   15.459199] 
[   15.468833] Allocated by task 282:
[   15.469507]  kasan_save_stack+0x45/0x70
[   15.469847]  kasan_save_track+0x18/0x40
[   15.470315]  kasan_save_alloc_info+0x3b/0x50
[   15.470566]  __kasan_kmalloc+0xb7/0xc0
[   15.470962]  __kmalloc_cache_noprof+0x189/0x420
[   15.471220]  kasan_atomics+0x95/0x310
[   15.471406]  kunit_try_run_case+0x1a5/0x480
[   15.471950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.472258]  kthread+0x337/0x6f0
[   15.472567]  ret_from_fork+0x116/0x1d0
[   15.472943]  ret_from_fork_asm+0x1a/0x30
[   15.473283] 
[   15.473388] The buggy address belongs to the object at ffff8881029b7000
[   15.473388]  which belongs to the cache kmalloc-64 of size 64
[   15.474370] The buggy address is located 0 bytes to the right of
[   15.474370]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.475043] 
[   15.475150] The buggy address belongs to the physical page:
[   15.475379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.476007] flags: 0x200000000000000(node=0|zone=2)
[   15.476368] page_type: f5(slab)
[   15.476766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.477463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.478175] page dumped because: kasan: bad access detected
[   15.478479] 
[   15.478723] Memory state around the buggy address:
[   15.479264]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.479607]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.480265] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.480928]                                      ^
[   15.481167]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.481453]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482060] ==================================================================
[   15.828377] ==================================================================
[   15.828880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.829194] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.829413] 
[   15.829540] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.829584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.829597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.829618] Call Trace:
[   15.829634]  <TASK>
[   15.829649]  dump_stack_lvl+0x73/0xb0
[   15.829677]  print_report+0xd1/0x610
[   15.829700]  ? __virt_addr_valid+0x1db/0x2d0
[   15.829723]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.829746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.829771]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.829794]  kasan_report+0x141/0x180
[   15.829817]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.829845]  kasan_check_range+0x10c/0x1c0
[   15.829870]  __kasan_check_write+0x18/0x20
[   15.829903]  kasan_atomics_helper+0x1e12/0x5450
[   15.829928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.829952]  ? kasan_save_alloc_info+0x3b/0x50
[   15.830003]  kasan_atomics+0x1dc/0x310
[   15.830028]  ? __pfx_kasan_atomics+0x10/0x10
[   15.830076]  ? __pfx_read_tsc+0x10/0x10
[   15.830099]  ? ktime_get_ts64+0x86/0x230
[   15.830125]  kunit_try_run_case+0x1a5/0x480
[   15.830150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.830174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.830198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.830223]  ? __kthread_parkme+0x82/0x180
[   15.830244]  ? preempt_count_sub+0x50/0x80
[   15.830270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.830295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.830319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.830345]  kthread+0x337/0x6f0
[   15.830364]  ? trace_preempt_on+0x20/0xc0
[   15.830389]  ? __pfx_kthread+0x10/0x10
[   15.830411]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.830434]  ? calculate_sigpending+0x7b/0xa0
[   15.830459]  ? __pfx_kthread+0x10/0x10
[   15.830481]  ret_from_fork+0x116/0x1d0
[   15.830500]  ? __pfx_kthread+0x10/0x10
[   15.830521]  ret_from_fork_asm+0x1a/0x30
[   15.830554]  </TASK>
[   15.830565] 
[   15.838017] Allocated by task 282:
[   15.838231]  kasan_save_stack+0x45/0x70
[   15.838458]  kasan_save_track+0x18/0x40
[   15.838646]  kasan_save_alloc_info+0x3b/0x50
[   15.838800]  __kasan_kmalloc+0xb7/0xc0
[   15.838960]  __kmalloc_cache_noprof+0x189/0x420
[   15.839233]  kasan_atomics+0x95/0x310
[   15.839420]  kunit_try_run_case+0x1a5/0x480
[   15.839628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.839904]  kthread+0x337/0x6f0
[   15.840109]  ret_from_fork+0x116/0x1d0
[   15.840303]  ret_from_fork_asm+0x1a/0x30
[   15.840516] 
[   15.840631] The buggy address belongs to the object at ffff8881029b7000
[   15.840631]  which belongs to the cache kmalloc-64 of size 64
[   15.841216] The buggy address is located 0 bytes to the right of
[   15.841216]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.841743] 
[   15.841869] The buggy address belongs to the physical page:
[   15.842168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.842524] flags: 0x200000000000000(node=0|zone=2)
[   15.842781] page_type: f5(slab)
[   15.842936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.843333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.843669] page dumped because: kasan: bad access detected
[   15.843930] 
[   15.844048] Memory state around the buggy address:
[   15.844275]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.844514]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.844725] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.845012]                                      ^
[   15.845245]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845597]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845964] ==================================================================
[   15.980884] ==================================================================
[   15.981273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.981668] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.982077] 
[   15.982193] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.982268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.982281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.982303] Call Trace:
[   15.982319]  <TASK>
[   15.982335]  dump_stack_lvl+0x73/0xb0
[   15.982365]  print_report+0xd1/0x610
[   15.982419]  ? __virt_addr_valid+0x1db/0x2d0
[   15.982444]  ? kasan_atomics_helper+0x218a/0x5450
[   15.982467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.982491]  ? kasan_atomics_helper+0x218a/0x5450
[   15.982514]  kasan_report+0x141/0x180
[   15.982537]  ? kasan_atomics_helper+0x218a/0x5450
[   15.982566]  kasan_check_range+0x10c/0x1c0
[   15.982619]  __kasan_check_write+0x18/0x20
[   15.982640]  kasan_atomics_helper+0x218a/0x5450
[   15.982664]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.982689]  ? kasan_save_alloc_info+0x3b/0x50
[   15.982719]  kasan_atomics+0x1dc/0x310
[   15.982744]  ? __pfx_kasan_atomics+0x10/0x10
[   15.982774]  ? __pfx_read_tsc+0x10/0x10
[   15.982797]  ? ktime_get_ts64+0x86/0x230
[   15.982823]  kunit_try_run_case+0x1a5/0x480
[   15.982849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.982911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.982936]  ? __kthread_parkme+0x82/0x180
[   15.982957]  ? preempt_count_sub+0x50/0x80
[   15.983037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.983064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.983089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.983145]  kthread+0x337/0x6f0
[   15.983166]  ? trace_preempt_on+0x20/0xc0
[   15.983190]  ? __pfx_kthread+0x10/0x10
[   15.983211]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.983233]  ? calculate_sigpending+0x7b/0xa0
[   15.983259]  ? __pfx_kthread+0x10/0x10
[   15.983281]  ret_from_fork+0x116/0x1d0
[   15.983300]  ? __pfx_kthread+0x10/0x10
[   15.983322]  ret_from_fork_asm+0x1a/0x30
[   15.983356]  </TASK>
[   15.983397] 
[   15.991198] Allocated by task 282:
[   15.991403]  kasan_save_stack+0x45/0x70
[   15.991612]  kasan_save_track+0x18/0x40
[   15.991805]  kasan_save_alloc_info+0x3b/0x50
[   15.992081]  __kasan_kmalloc+0xb7/0xc0
[   15.992281]  __kmalloc_cache_noprof+0x189/0x420
[   15.992518]  kasan_atomics+0x95/0x310
[   15.992738]  kunit_try_run_case+0x1a5/0x480
[   15.992947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993222]  kthread+0x337/0x6f0
[   15.993403]  ret_from_fork+0x116/0x1d0
[   15.993597]  ret_from_fork_asm+0x1a/0x30
[   15.993827] 
[   15.993919] The buggy address belongs to the object at ffff8881029b7000
[   15.993919]  which belongs to the cache kmalloc-64 of size 64
[   15.994480] The buggy address is located 0 bytes to the right of
[   15.994480]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.995087] 
[   15.995259] The buggy address belongs to the physical page:
[   15.995597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.995962] flags: 0x200000000000000(node=0|zone=2)
[   15.996218] page_type: f5(slab)
[   15.996388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.996641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.996870] page dumped because: kasan: bad access detected
[   15.997159] 
[   15.997287] Memory state around the buggy address:
[   15.997513]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997836]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998142] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.998358]                                      ^
[   15.998567]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998831]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.999220] ==================================================================
[   15.181449] ==================================================================
[   15.181890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.182261] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.182701] 
[   15.182807] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.182853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.182865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.182904] Call Trace:
[   15.182923]  <TASK>
[   15.182938]  dump_stack_lvl+0x73/0xb0
[   15.182997]  print_report+0xd1/0x610
[   15.183020]  ? __virt_addr_valid+0x1db/0x2d0
[   15.183045]  ? kasan_atomics_helper+0xf10/0x5450
[   15.183067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.183091]  ? kasan_atomics_helper+0xf10/0x5450
[   15.183114]  kasan_report+0x141/0x180
[   15.183147]  ? kasan_atomics_helper+0xf10/0x5450
[   15.183175]  kasan_check_range+0x10c/0x1c0
[   15.183210]  __kasan_check_write+0x18/0x20
[   15.183231]  kasan_atomics_helper+0xf10/0x5450
[   15.183255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.183281]  ? kasan_save_alloc_info+0x3b/0x50
[   15.183311]  kasan_atomics+0x1dc/0x310
[   15.183335]  ? __pfx_kasan_atomics+0x10/0x10
[   15.183361]  ? __pfx_read_tsc+0x10/0x10
[   15.183383]  ? ktime_get_ts64+0x86/0x230
[   15.183409]  kunit_try_run_case+0x1a5/0x480
[   15.183434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183466]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.183491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.183581]  ? __kthread_parkme+0x82/0x180
[   15.183606]  ? preempt_count_sub+0x50/0x80
[   15.183631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.183707]  kthread+0x337/0x6f0
[   15.183728]  ? trace_preempt_on+0x20/0xc0
[   15.183753]  ? __pfx_kthread+0x10/0x10
[   15.183774]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.183797]  ? calculate_sigpending+0x7b/0xa0
[   15.183822]  ? __pfx_kthread+0x10/0x10
[   15.183844]  ret_from_fork+0x116/0x1d0
[   15.183863]  ? __pfx_kthread+0x10/0x10
[   15.183884]  ret_from_fork_asm+0x1a/0x30
[   15.183936]  </TASK>
[   15.183948] 
[   15.192143] Allocated by task 282:
[   15.192357]  kasan_save_stack+0x45/0x70
[   15.192737]  kasan_save_track+0x18/0x40
[   15.192959]  kasan_save_alloc_info+0x3b/0x50
[   15.193200]  __kasan_kmalloc+0xb7/0xc0
[   15.193403]  __kmalloc_cache_noprof+0x189/0x420
[   15.193716]  kasan_atomics+0x95/0x310
[   15.193926]  kunit_try_run_case+0x1a5/0x480
[   15.194103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194383]  kthread+0x337/0x6f0
[   15.194662]  ret_from_fork+0x116/0x1d0
[   15.194857]  ret_from_fork_asm+0x1a/0x30
[   15.195111] 
[   15.195211] The buggy address belongs to the object at ffff8881029b7000
[   15.195211]  which belongs to the cache kmalloc-64 of size 64
[   15.195806] The buggy address is located 0 bytes to the right of
[   15.195806]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.196365] 
[   15.196467] The buggy address belongs to the physical page:
[   15.196949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.197274] flags: 0x200000000000000(node=0|zone=2)
[   15.197442] page_type: f5(slab)
[   15.197574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.198028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.198369] page dumped because: kasan: bad access detected
[   15.198704] 
[   15.198811] Memory state around the buggy address:
[   15.199051]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.199377]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.199749] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.200069]                                      ^
[   15.200250]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200804]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.201154] ==================================================================
[   14.750111] ==================================================================
[   14.750406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.750758] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.751209] 
[   14.751322] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.751363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.751375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.751395] Call Trace:
[   14.751411]  <TASK>
[   14.751425]  dump_stack_lvl+0x73/0xb0
[   14.751454]  print_report+0xd1/0x610
[   14.751477]  ? __virt_addr_valid+0x1db/0x2d0
[   14.751499]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.751522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.751707]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.751731]  kasan_report+0x141/0x180
[   14.751755]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.751783]  __asan_report_load4_noabort+0x18/0x20
[   14.751809]  kasan_atomics_helper+0x4b54/0x5450
[   14.751834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.751858]  ? kasan_save_alloc_info+0x3b/0x50
[   14.751889]  kasan_atomics+0x1dc/0x310
[   14.751929]  ? __pfx_kasan_atomics+0x10/0x10
[   14.751954]  ? __pfx_read_tsc+0x10/0x10
[   14.751975]  ? ktime_get_ts64+0x86/0x230
[   14.752000]  kunit_try_run_case+0x1a5/0x480
[   14.752025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.752075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.752099]  ? __kthread_parkme+0x82/0x180
[   14.752121]  ? preempt_count_sub+0x50/0x80
[   14.752146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.752221]  kthread+0x337/0x6f0
[   14.752241]  ? trace_preempt_on+0x20/0xc0
[   14.752266]  ? __pfx_kthread+0x10/0x10
[   14.752287]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.752309]  ? calculate_sigpending+0x7b/0xa0
[   14.752335]  ? __pfx_kthread+0x10/0x10
[   14.752358]  ret_from_fork+0x116/0x1d0
[   14.752377]  ? __pfx_kthread+0x10/0x10
[   14.752398]  ret_from_fork_asm+0x1a/0x30
[   14.752431]  </TASK>
[   14.752442] 
[   14.760177] Allocated by task 282:
[   14.760339]  kasan_save_stack+0x45/0x70
[   14.760516]  kasan_save_track+0x18/0x40
[   14.760699]  kasan_save_alloc_info+0x3b/0x50
[   14.760854]  __kasan_kmalloc+0xb7/0xc0
[   14.761000]  __kmalloc_cache_noprof+0x189/0x420
[   14.761159]  kasan_atomics+0x95/0x310
[   14.761295]  kunit_try_run_case+0x1a5/0x480
[   14.761443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.761621]  kthread+0x337/0x6f0
[   14.761743]  ret_from_fork+0x116/0x1d0
[   14.761877]  ret_from_fork_asm+0x1a/0x30
[   14.762085] 
[   14.762203] The buggy address belongs to the object at ffff8881029b7000
[   14.762203]  which belongs to the cache kmalloc-64 of size 64
[   14.762731] The buggy address is located 0 bytes to the right of
[   14.762731]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.763698] 
[   14.763869] The buggy address belongs to the physical page:
[   14.764637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.764909] flags: 0x200000000000000(node=0|zone=2)
[   14.765321] page_type: f5(slab)
[   14.765493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.765885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.766346] page dumped because: kasan: bad access detected
[   14.766637] 
[   14.766722] Memory state around the buggy address:
[   14.766884]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767458]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768096] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.768380]                                      ^
[   14.768640]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768863]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.769199] ==================================================================
[   15.999763] ==================================================================
[   16.000101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.000480] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   16.000853] 
[   16.001029] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.001074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.001086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.001109] Call Trace:
[   16.001125]  <TASK>
[   16.001172]  dump_stack_lvl+0x73/0xb0
[   16.001202]  print_report+0xd1/0x610
[   16.001225]  ? __virt_addr_valid+0x1db/0x2d0
[   16.001249]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.001271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.001295]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.001349]  kasan_report+0x141/0x180
[   16.001372]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.001401]  __asan_report_load8_noabort+0x18/0x20
[   16.001426]  kasan_atomics_helper+0x4fa5/0x5450
[   16.001451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.001505]  ? kasan_save_alloc_info+0x3b/0x50
[   16.001536]  kasan_atomics+0x1dc/0x310
[   16.001561]  ? __pfx_kasan_atomics+0x10/0x10
[   16.001586]  ? __pfx_read_tsc+0x10/0x10
[   16.001608]  ? ktime_get_ts64+0x86/0x230
[   16.001665]  kunit_try_run_case+0x1a5/0x480
[   16.001691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.001741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.001766]  ? __kthread_parkme+0x82/0x180
[   16.001787]  ? preempt_count_sub+0x50/0x80
[   16.001813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.001863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.001889]  kthread+0x337/0x6f0
[   16.001919]  ? trace_preempt_on+0x20/0xc0
[   16.001991]  ? __pfx_kthread+0x10/0x10
[   16.002014]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.002037]  ? calculate_sigpending+0x7b/0xa0
[   16.002062]  ? __pfx_kthread+0x10/0x10
[   16.002084]  ret_from_fork+0x116/0x1d0
[   16.002103]  ? __pfx_kthread+0x10/0x10
[   16.002124]  ret_from_fork_asm+0x1a/0x30
[   16.002157]  </TASK>
[   16.002167] 
[   16.010524] Allocated by task 282:
[   16.010717]  kasan_save_stack+0x45/0x70
[   16.010944]  kasan_save_track+0x18/0x40
[   16.011212]  kasan_save_alloc_info+0x3b/0x50
[   16.011424]  __kasan_kmalloc+0xb7/0xc0
[   16.011646]  __kmalloc_cache_noprof+0x189/0x420
[   16.011915]  kasan_atomics+0x95/0x310
[   16.012140]  kunit_try_run_case+0x1a5/0x480
[   16.012367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.012635]  kthread+0x337/0x6f0
[   16.012800]  ret_from_fork+0x116/0x1d0
[   16.013091]  ret_from_fork_asm+0x1a/0x30
[   16.013341] 
[   16.013439] The buggy address belongs to the object at ffff8881029b7000
[   16.013439]  which belongs to the cache kmalloc-64 of size 64
[   16.013916] The buggy address is located 0 bytes to the right of
[   16.013916]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   16.014514] 
[   16.014604] The buggy address belongs to the physical page:
[   16.014808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   16.015231] flags: 0x200000000000000(node=0|zone=2)
[   16.015503] page_type: f5(slab)
[   16.015671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.016068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.016398] page dumped because: kasan: bad access detected
[   16.016641] 
[   16.016733] Memory state around the buggy address:
[   16.016983]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.017237]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.017496] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.017854]                                      ^
[   16.018123]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.018440]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.018751] ==================================================================
[   15.222455] ==================================================================
[   15.222931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.223291] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.223633] 
[   15.223758] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.223802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.223815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.223848] Call Trace:
[   15.223863]  <TASK>
[   15.223879]  dump_stack_lvl+0x73/0xb0
[   15.223917]  print_report+0xd1/0x610
[   15.223940]  ? __virt_addr_valid+0x1db/0x2d0
[   15.223965]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.223988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.224012]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.224040]  kasan_report+0x141/0x180
[   15.224063]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.224091]  __asan_report_load4_noabort+0x18/0x20
[   15.224117]  kasan_atomics_helper+0x4a36/0x5450
[   15.224141]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.224184]  ? kasan_save_alloc_info+0x3b/0x50
[   15.224216]  kasan_atomics+0x1dc/0x310
[   15.224251]  ? __pfx_kasan_atomics+0x10/0x10
[   15.224277]  ? __pfx_read_tsc+0x10/0x10
[   15.224298]  ? ktime_get_ts64+0x86/0x230
[   15.224324]  kunit_try_run_case+0x1a5/0x480
[   15.224349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.224406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.224442]  ? __kthread_parkme+0x82/0x180
[   15.224463]  ? preempt_count_sub+0x50/0x80
[   15.224488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.224627]  kthread+0x337/0x6f0
[   15.224648]  ? trace_preempt_on+0x20/0xc0
[   15.224672]  ? __pfx_kthread+0x10/0x10
[   15.224694]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.224717]  ? calculate_sigpending+0x7b/0xa0
[   15.224742]  ? __pfx_kthread+0x10/0x10
[   15.224764]  ret_from_fork+0x116/0x1d0
[   15.224795]  ? __pfx_kthread+0x10/0x10
[   15.224817]  ret_from_fork_asm+0x1a/0x30
[   15.224861]  </TASK>
[   15.224873] 
[   15.233256] Allocated by task 282:
[   15.233438]  kasan_save_stack+0x45/0x70
[   15.233857]  kasan_save_track+0x18/0x40
[   15.234113]  kasan_save_alloc_info+0x3b/0x50
[   15.234317]  __kasan_kmalloc+0xb7/0xc0
[   15.234537]  __kmalloc_cache_noprof+0x189/0x420
[   15.234739]  kasan_atomics+0x95/0x310
[   15.234901]  kunit_try_run_case+0x1a5/0x480
[   15.235115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.235366]  kthread+0x337/0x6f0
[   15.235530]  ret_from_fork+0x116/0x1d0
[   15.235693]  ret_from_fork_asm+0x1a/0x30
[   15.235878] 
[   15.236092] The buggy address belongs to the object at ffff8881029b7000
[   15.236092]  which belongs to the cache kmalloc-64 of size 64
[   15.236669] The buggy address is located 0 bytes to the right of
[   15.236669]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.237183] 
[   15.237258] The buggy address belongs to the physical page:
[   15.237433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.237936] flags: 0x200000000000000(node=0|zone=2)
[   15.238221] page_type: f5(slab)
[   15.238392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.238820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.239175] page dumped because: kasan: bad access detected
[   15.239350] 
[   15.239421] Memory state around the buggy address:
[   15.239773]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240137]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240472] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.240833]                                      ^
[   15.241103]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.241333]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.241781] ==================================================================
[   14.913367] ==================================================================
[   14.913948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.914648] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.915200] 
[   14.915291] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.915335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.915348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.915370] Call Trace:
[   14.915386]  <TASK>
[   14.915402]  dump_stack_lvl+0x73/0xb0
[   14.915431]  print_report+0xd1/0x610
[   14.915454]  ? __virt_addr_valid+0x1db/0x2d0
[   14.915478]  ? kasan_atomics_helper+0x860/0x5450
[   14.915500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.915711]  ? kasan_atomics_helper+0x860/0x5450
[   14.915737]  kasan_report+0x141/0x180
[   14.915761]  ? kasan_atomics_helper+0x860/0x5450
[   14.915790]  kasan_check_range+0x10c/0x1c0
[   14.915815]  __kasan_check_write+0x18/0x20
[   14.915835]  kasan_atomics_helper+0x860/0x5450
[   14.915859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.915884]  ? kasan_save_alloc_info+0x3b/0x50
[   14.915929]  kasan_atomics+0x1dc/0x310
[   14.915953]  ? __pfx_kasan_atomics+0x10/0x10
[   14.915978]  ? __pfx_read_tsc+0x10/0x10
[   14.916000]  ? ktime_get_ts64+0x86/0x230
[   14.916026]  kunit_try_run_case+0x1a5/0x480
[   14.916051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.916075]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.916101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.916146]  ? __kthread_parkme+0x82/0x180
[   14.916168]  ? preempt_count_sub+0x50/0x80
[   14.916194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.916219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.916244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.916270]  kthread+0x337/0x6f0
[   14.916291]  ? trace_preempt_on+0x20/0xc0
[   14.916315]  ? __pfx_kthread+0x10/0x10
[   14.916337]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.916360]  ? calculate_sigpending+0x7b/0xa0
[   14.916385]  ? __pfx_kthread+0x10/0x10
[   14.916408]  ret_from_fork+0x116/0x1d0
[   14.916428]  ? __pfx_kthread+0x10/0x10
[   14.916450]  ret_from_fork_asm+0x1a/0x30
[   14.916483]  </TASK>
[   14.916494] 
[   14.930540] Allocated by task 282:
[   14.931106]  kasan_save_stack+0x45/0x70
[   14.931470]  kasan_save_track+0x18/0x40
[   14.931769]  kasan_save_alloc_info+0x3b/0x50
[   14.932242]  __kasan_kmalloc+0xb7/0xc0
[   14.932626]  __kmalloc_cache_noprof+0x189/0x420
[   14.932929]  kasan_atomics+0x95/0x310
[   14.933093]  kunit_try_run_case+0x1a5/0x480
[   14.933245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.933424]  kthread+0x337/0x6f0
[   14.933553]  ret_from_fork+0x116/0x1d0
[   14.933724]  ret_from_fork_asm+0x1a/0x30
[   14.933888] 
[   14.933997] The buggy address belongs to the object at ffff8881029b7000
[   14.933997]  which belongs to the cache kmalloc-64 of size 64
[   14.934489] The buggy address is located 0 bytes to the right of
[   14.934489]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.935246] 
[   14.935352] The buggy address belongs to the physical page:
[   14.935665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.936058] flags: 0x200000000000000(node=0|zone=2)
[   14.936286] page_type: f5(slab)
[   14.936423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.936750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.937046] page dumped because: kasan: bad access detected
[   14.937411] 
[   14.937485] Memory state around the buggy address:
[   14.937917]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938247]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938543] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.938860]                                      ^
[   14.939056]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939338]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939582] ==================================================================
[   14.870706] ==================================================================
[   14.871090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.871324] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.871816] 
[   14.871948] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.872015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.872028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.872049] Call Trace:
[   14.872065]  <TASK>
[   14.872079]  dump_stack_lvl+0x73/0xb0
[   14.872110]  print_report+0xd1/0x610
[   14.872133]  ? __virt_addr_valid+0x1db/0x2d0
[   14.872157]  ? kasan_atomics_helper+0x72f/0x5450
[   14.872179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.872203]  ? kasan_atomics_helper+0x72f/0x5450
[   14.872226]  kasan_report+0x141/0x180
[   14.872249]  ? kasan_atomics_helper+0x72f/0x5450
[   14.872277]  kasan_check_range+0x10c/0x1c0
[   14.872302]  __kasan_check_write+0x18/0x20
[   14.872323]  kasan_atomics_helper+0x72f/0x5450
[   14.872347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.872371]  ? kasan_save_alloc_info+0x3b/0x50
[   14.872402]  kasan_atomics+0x1dc/0x310
[   14.872426]  ? __pfx_kasan_atomics+0x10/0x10
[   14.872452]  ? __pfx_read_tsc+0x10/0x10
[   14.872473]  ? ktime_get_ts64+0x86/0x230
[   14.872499]  kunit_try_run_case+0x1a5/0x480
[   14.872600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.872650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.872676]  ? __kthread_parkme+0x82/0x180
[   14.872697]  ? preempt_count_sub+0x50/0x80
[   14.872723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.872798]  kthread+0x337/0x6f0
[   14.872819]  ? trace_preempt_on+0x20/0xc0
[   14.872843]  ? __pfx_kthread+0x10/0x10
[   14.872865]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.872887]  ? calculate_sigpending+0x7b/0xa0
[   14.872923]  ? __pfx_kthread+0x10/0x10
[   14.872946]  ret_from_fork+0x116/0x1d0
[   14.872964]  ? __pfx_kthread+0x10/0x10
[   14.872985]  ret_from_fork_asm+0x1a/0x30
[   14.873034]  </TASK>
[   14.873046] 
[   14.881110] Allocated by task 282:
[   14.881295]  kasan_save_stack+0x45/0x70
[   14.881470]  kasan_save_track+0x18/0x40
[   14.881740]  kasan_save_alloc_info+0x3b/0x50
[   14.881938]  __kasan_kmalloc+0xb7/0xc0
[   14.882157]  __kmalloc_cache_noprof+0x189/0x420
[   14.882381]  kasan_atomics+0x95/0x310
[   14.882626]  kunit_try_run_case+0x1a5/0x480
[   14.882835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.883100]  kthread+0x337/0x6f0
[   14.883264]  ret_from_fork+0x116/0x1d0
[   14.883446]  ret_from_fork_asm+0x1a/0x30
[   14.883822] 
[   14.883930] The buggy address belongs to the object at ffff8881029b7000
[   14.883930]  which belongs to the cache kmalloc-64 of size 64
[   14.884320] The buggy address is located 0 bytes to the right of
[   14.884320]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.884820] 
[   14.884930] The buggy address belongs to the physical page:
[   14.885208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.885643] flags: 0x200000000000000(node=0|zone=2)
[   14.885879] page_type: f5(slab)
[   14.886085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.886430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.886808] page dumped because: kasan: bad access detected
[   14.887025] 
[   14.887097] Memory state around the buggy address:
[   14.887256]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.887479]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888026] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.888386]                                      ^
[   14.888698]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.889067]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.889385] ==================================================================
[   15.794162] ==================================================================
[   15.794556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.794902] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.795244] 
[   15.795357] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.795400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.795412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.795434] Call Trace:
[   15.795448]  <TASK>
[   15.795463]  dump_stack_lvl+0x73/0xb0
[   15.795491]  print_report+0xd1/0x610
[   15.795514]  ? __virt_addr_valid+0x1db/0x2d0
[   15.795537]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.795559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.795583]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.795606]  kasan_report+0x141/0x180
[   15.795629]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.795657]  kasan_check_range+0x10c/0x1c0
[   15.795682]  __kasan_check_write+0x18/0x20
[   15.795701]  kasan_atomics_helper+0x1ce1/0x5450
[   15.795725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.795749]  ? kasan_save_alloc_info+0x3b/0x50
[   15.795779]  kasan_atomics+0x1dc/0x310
[   15.795803]  ? __pfx_kasan_atomics+0x10/0x10
[   15.795828]  ? __pfx_read_tsc+0x10/0x10
[   15.795849]  ? ktime_get_ts64+0x86/0x230
[   15.795874]  kunit_try_run_case+0x1a5/0x480
[   15.795910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.795933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.795958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.796002]  ? __kthread_parkme+0x82/0x180
[   15.796025]  ? preempt_count_sub+0x50/0x80
[   15.796050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.796075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.796124]  kthread+0x337/0x6f0
[   15.796144]  ? trace_preempt_on+0x20/0xc0
[   15.796168]  ? __pfx_kthread+0x10/0x10
[   15.796189]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.796211]  ? calculate_sigpending+0x7b/0xa0
[   15.796236]  ? __pfx_kthread+0x10/0x10
[   15.796283]  ret_from_fork+0x116/0x1d0
[   15.796302]  ? __pfx_kthread+0x10/0x10
[   15.796323]  ret_from_fork_asm+0x1a/0x30
[   15.796356]  </TASK>
[   15.796366] 
[   15.803549] Allocated by task 282:
[   15.803754]  kasan_save_stack+0x45/0x70
[   15.803956]  kasan_save_track+0x18/0x40
[   15.804190]  kasan_save_alloc_info+0x3b/0x50
[   15.804378]  __kasan_kmalloc+0xb7/0xc0
[   15.804513]  __kmalloc_cache_noprof+0x189/0x420
[   15.804672]  kasan_atomics+0x95/0x310
[   15.804807]  kunit_try_run_case+0x1a5/0x480
[   15.805064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.805328]  kthread+0x337/0x6f0
[   15.805497]  ret_from_fork+0x116/0x1d0
[   15.805686]  ret_from_fork_asm+0x1a/0x30
[   15.805850] 
[   15.805934] The buggy address belongs to the object at ffff8881029b7000
[   15.805934]  which belongs to the cache kmalloc-64 of size 64
[   15.806362] The buggy address is located 0 bytes to the right of
[   15.806362]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.806939] 
[   15.807062] The buggy address belongs to the physical page:
[   15.807269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.807511] flags: 0x200000000000000(node=0|zone=2)
[   15.807674] page_type: f5(slab)
[   15.807795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.808169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.808552] page dumped because: kasan: bad access detected
[   15.808827] 
[   15.808933] Memory state around the buggy address:
[   15.809188]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.809541]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.809875] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.810190]                                      ^
[   15.810390]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810689]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.811013] ==================================================================
[   14.686639] ==================================================================
[   14.687397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.688170] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.688720] 
[   14.688850] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.688904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.688915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.688935] Call Trace:
[   14.688950]  <TASK>
[   14.688999]  dump_stack_lvl+0x73/0xb0
[   14.689030]  print_report+0xd1/0x610
[   14.689053]  ? __virt_addr_valid+0x1db/0x2d0
[   14.689075]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.689096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.689118]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.689140]  kasan_report+0x141/0x180
[   14.689163]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.689190]  __asan_report_load4_noabort+0x18/0x20
[   14.689214]  kasan_atomics_helper+0x4b88/0x5450
[   14.689237]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.689260]  ? kasan_save_alloc_info+0x3b/0x50
[   14.689289]  kasan_atomics+0x1dc/0x310
[   14.689313]  ? __pfx_kasan_atomics+0x10/0x10
[   14.689337]  ? __pfx_read_tsc+0x10/0x10
[   14.689358]  ? ktime_get_ts64+0x86/0x230
[   14.689383]  kunit_try_run_case+0x1a5/0x480
[   14.689407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689429]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.689454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.689478]  ? __kthread_parkme+0x82/0x180
[   14.689499]  ? preempt_count_sub+0x50/0x80
[   14.689694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.689746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.689771]  kthread+0x337/0x6f0
[   14.689791]  ? trace_preempt_on+0x20/0xc0
[   14.689815]  ? __pfx_kthread+0x10/0x10
[   14.689836]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.689858]  ? calculate_sigpending+0x7b/0xa0
[   14.689882]  ? __pfx_kthread+0x10/0x10
[   14.689917]  ret_from_fork+0x116/0x1d0
[   14.689936]  ? __pfx_kthread+0x10/0x10
[   14.689956]  ret_from_fork_asm+0x1a/0x30
[   14.689989]  </TASK>
[   14.690000] 
[   14.702435] Allocated by task 282:
[   14.702750]  kasan_save_stack+0x45/0x70
[   14.702974]  kasan_save_track+0x18/0x40
[   14.703115]  kasan_save_alloc_info+0x3b/0x50
[   14.703342]  __kasan_kmalloc+0xb7/0xc0
[   14.703594]  __kmalloc_cache_noprof+0x189/0x420
[   14.703830]  kasan_atomics+0x95/0x310
[   14.704040]  kunit_try_run_case+0x1a5/0x480
[   14.704235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.704466]  kthread+0x337/0x6f0
[   14.704732]  ret_from_fork+0x116/0x1d0
[   14.704919]  ret_from_fork_asm+0x1a/0x30
[   14.705212] 
[   14.705296] The buggy address belongs to the object at ffff8881029b7000
[   14.705296]  which belongs to the cache kmalloc-64 of size 64
[   14.705947] The buggy address is located 0 bytes to the right of
[   14.705947]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.706572] 
[   14.706650] The buggy address belongs to the physical page:
[   14.706909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.707258] flags: 0x200000000000000(node=0|zone=2)
[   14.707426] page_type: f5(slab)
[   14.707551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.708155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.708507] page dumped because: kasan: bad access detected
[   14.708768] 
[   14.708868] Memory state around the buggy address:
[   14.709116]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.709373]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.709614] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.710151]                                      ^
[   14.710714]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711010]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711331] ==================================================================
[   15.262214] ==================================================================
[   15.262641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.263038] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.263370] 
[   15.263483] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.263624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.263638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.263660] Call Trace:
[   15.263675]  <TASK>
[   15.263690]  dump_stack_lvl+0x73/0xb0
[   15.263719]  print_report+0xd1/0x610
[   15.263741]  ? __virt_addr_valid+0x1db/0x2d0
[   15.263765]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.263786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.263810]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.263834]  kasan_report+0x141/0x180
[   15.263867]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.263914]  __asan_report_load4_noabort+0x18/0x20
[   15.263940]  kasan_atomics_helper+0x4a1c/0x5450
[   15.263964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.263989]  ? kasan_save_alloc_info+0x3b/0x50
[   15.264019]  kasan_atomics+0x1dc/0x310
[   15.264063]  ? __pfx_kasan_atomics+0x10/0x10
[   15.264089]  ? __pfx_read_tsc+0x10/0x10
[   15.264109]  ? ktime_get_ts64+0x86/0x230
[   15.264135]  kunit_try_run_case+0x1a5/0x480
[   15.264159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.264182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.264208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.264233]  ? __kthread_parkme+0x82/0x180
[   15.264254]  ? preempt_count_sub+0x50/0x80
[   15.264278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.264303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.264337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.264362]  kthread+0x337/0x6f0
[   15.264382]  ? trace_preempt_on+0x20/0xc0
[   15.264417]  ? __pfx_kthread+0x10/0x10
[   15.264439]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.264461]  ? calculate_sigpending+0x7b/0xa0
[   15.264497]  ? __pfx_kthread+0x10/0x10
[   15.264586]  ret_from_fork+0x116/0x1d0
[   15.264608]  ? __pfx_kthread+0x10/0x10
[   15.264629]  ret_from_fork_asm+0x1a/0x30
[   15.264663]  </TASK>
[   15.264674] 
[   15.272958] Allocated by task 282:
[   15.273537]  kasan_save_stack+0x45/0x70
[   15.273734]  kasan_save_track+0x18/0x40
[   15.274949]  kasan_save_alloc_info+0x3b/0x50
[   15.275145]  __kasan_kmalloc+0xb7/0xc0
[   15.275281]  __kmalloc_cache_noprof+0x189/0x420
[   15.275557]  kasan_atomics+0x95/0x310
[   15.275789]  kunit_try_run_case+0x1a5/0x480
[   15.275947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.276393]  kthread+0x337/0x6f0
[   15.276824]  ret_from_fork+0x116/0x1d0
[   15.277024]  ret_from_fork_asm+0x1a/0x30
[   15.277166] 
[   15.277241] The buggy address belongs to the object at ffff8881029b7000
[   15.277241]  which belongs to the cache kmalloc-64 of size 64
[   15.278321] The buggy address is located 0 bytes to the right of
[   15.278321]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.279693] 
[   15.279886] The buggy address belongs to the physical page:
[   15.280508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.280882] flags: 0x200000000000000(node=0|zone=2)
[   15.281417] page_type: f5(slab)
[   15.281780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.282320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.282558] page dumped because: kasan: bad access detected
[   15.283176] 
[   15.283352] Memory state around the buggy address:
[   15.283872]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.284546]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.285066] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.285585]                                      ^
[   15.286121]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.286426]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.287162] ==================================================================
[   15.064447] ==================================================================
[   15.064870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.065243] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.065571] 
[   15.065708] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.065765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.065778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.065800] Call Trace:
[   15.065818]  <TASK>
[   15.065834]  dump_stack_lvl+0x73/0xb0
[   15.065864]  print_report+0xd1/0x610
[   15.065888]  ? __virt_addr_valid+0x1db/0x2d0
[   15.065922]  ? kasan_atomics_helper+0xc70/0x5450
[   15.065944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.065987]  ? kasan_atomics_helper+0xc70/0x5450
[   15.066010]  kasan_report+0x141/0x180
[   15.066033]  ? kasan_atomics_helper+0xc70/0x5450
[   15.066071]  kasan_check_range+0x10c/0x1c0
[   15.066096]  __kasan_check_write+0x18/0x20
[   15.066116]  kasan_atomics_helper+0xc70/0x5450
[   15.066151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.066176]  ? kasan_save_alloc_info+0x3b/0x50
[   15.066207]  kasan_atomics+0x1dc/0x310
[   15.066232]  ? __pfx_kasan_atomics+0x10/0x10
[   15.066258]  ? __pfx_read_tsc+0x10/0x10
[   15.066280]  ? ktime_get_ts64+0x86/0x230
[   15.066306]  kunit_try_run_case+0x1a5/0x480
[   15.066332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.066381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.066406]  ? __kthread_parkme+0x82/0x180
[   15.066428]  ? preempt_count_sub+0x50/0x80
[   15.066461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.066574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.066604]  kthread+0x337/0x6f0
[   15.066636]  ? trace_preempt_on+0x20/0xc0
[   15.066662]  ? __pfx_kthread+0x10/0x10
[   15.066683]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.066718]  ? calculate_sigpending+0x7b/0xa0
[   15.066743]  ? __pfx_kthread+0x10/0x10
[   15.066771]  ret_from_fork+0x116/0x1d0
[   15.066791]  ? __pfx_kthread+0x10/0x10
[   15.066813]  ret_from_fork_asm+0x1a/0x30
[   15.066854]  </TASK>
[   15.066866] 
[   15.075297] Allocated by task 282:
[   15.075466]  kasan_save_stack+0x45/0x70
[   15.075874]  kasan_save_track+0x18/0x40
[   15.076043]  kasan_save_alloc_info+0x3b/0x50
[   15.076237]  __kasan_kmalloc+0xb7/0xc0
[   15.076499]  __kmalloc_cache_noprof+0x189/0x420
[   15.076796]  kasan_atomics+0x95/0x310
[   15.077024]  kunit_try_run_case+0x1a5/0x480
[   15.077210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.077472]  kthread+0x337/0x6f0
[   15.077712]  ret_from_fork+0x116/0x1d0
[   15.077923]  ret_from_fork_asm+0x1a/0x30
[   15.078115] 
[   15.078243] The buggy address belongs to the object at ffff8881029b7000
[   15.078243]  which belongs to the cache kmalloc-64 of size 64
[   15.078732] The buggy address is located 0 bytes to the right of
[   15.078732]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.079174] 
[   15.079287] The buggy address belongs to the physical page:
[   15.079546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.079921] flags: 0x200000000000000(node=0|zone=2)
[   15.080167] page_type: f5(slab)
[   15.080337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.080953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.081277] page dumped because: kasan: bad access detected
[   15.081453] 
[   15.081593] Memory state around the buggy address:
[   15.081841]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.082232]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.082555] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.082791]                                      ^
[   15.082980]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.083301]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.083770] ==================================================================
[   15.156977] ==================================================================
[   15.157293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.157979] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.158548] 
[   15.158639] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.158683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.158695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.158717] Call Trace:
[   15.158735]  <TASK>
[   15.158751]  dump_stack_lvl+0x73/0xb0
[   15.158786]  print_report+0xd1/0x610
[   15.158808]  ? __virt_addr_valid+0x1db/0x2d0
[   15.158832]  ? kasan_atomics_helper+0xe78/0x5450
[   15.158853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.158877]  ? kasan_atomics_helper+0xe78/0x5450
[   15.159020]  kasan_report+0x141/0x180
[   15.159059]  ? kasan_atomics_helper+0xe78/0x5450
[   15.159088]  kasan_check_range+0x10c/0x1c0
[   15.159126]  __kasan_check_write+0x18/0x20
[   15.159146]  kasan_atomics_helper+0xe78/0x5450
[   15.159170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.159195]  ? kasan_save_alloc_info+0x3b/0x50
[   15.159226]  kasan_atomics+0x1dc/0x310
[   15.159258]  ? __pfx_kasan_atomics+0x10/0x10
[   15.159284]  ? __pfx_read_tsc+0x10/0x10
[   15.159306]  ? ktime_get_ts64+0x86/0x230
[   15.159342]  kunit_try_run_case+0x1a5/0x480
[   15.159367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.159416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.159441]  ? __kthread_parkme+0x82/0x180
[   15.159462]  ? preempt_count_sub+0x50/0x80
[   15.159487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.159627]  kthread+0x337/0x6f0
[   15.159647]  ? trace_preempt_on+0x20/0xc0
[   15.159671]  ? __pfx_kthread+0x10/0x10
[   15.159693]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.159716]  ? calculate_sigpending+0x7b/0xa0
[   15.159740]  ? __pfx_kthread+0x10/0x10
[   15.159763]  ret_from_fork+0x116/0x1d0
[   15.159783]  ? __pfx_kthread+0x10/0x10
[   15.159804]  ret_from_fork_asm+0x1a/0x30
[   15.159838]  </TASK>
[   15.159849] 
[   15.171948] Allocated by task 282:
[   15.172179]  kasan_save_stack+0x45/0x70
[   15.172388]  kasan_save_track+0x18/0x40
[   15.172567]  kasan_save_alloc_info+0x3b/0x50
[   15.172722]  __kasan_kmalloc+0xb7/0xc0
[   15.172858]  __kmalloc_cache_noprof+0x189/0x420
[   15.173308]  kasan_atomics+0x95/0x310
[   15.173607]  kunit_try_run_case+0x1a5/0x480
[   15.173825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.174139]  kthread+0x337/0x6f0
[   15.174313]  ret_from_fork+0x116/0x1d0
[   15.174454]  ret_from_fork_asm+0x1a/0x30
[   15.174770] 
[   15.174886] The buggy address belongs to the object at ffff8881029b7000
[   15.174886]  which belongs to the cache kmalloc-64 of size 64
[   15.175449] The buggy address is located 0 bytes to the right of
[   15.175449]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.176048] 
[   15.176179] The buggy address belongs to the physical page:
[   15.176405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.176916] flags: 0x200000000000000(node=0|zone=2)
[   15.177091] page_type: f5(slab)
[   15.177303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.177673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.177982] page dumped because: kasan: bad access detected
[   15.178226] 
[   15.178321] Memory state around the buggy address:
[   15.178548]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.178824]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179399] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.179809]                                      ^
[   15.180063]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180376]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180961] ==================================================================
[   14.808618] ==================================================================
[   14.809210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.809645] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.809960] 
[   14.810047] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.810090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.810103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.810124] Call Trace:
[   14.810140]  <TASK>
[   14.810158]  dump_stack_lvl+0x73/0xb0
[   14.810186]  print_report+0xd1/0x610
[   14.810210]  ? __virt_addr_valid+0x1db/0x2d0
[   14.810234]  ? kasan_atomics_helper+0x565/0x5450
[   14.810257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.810281]  ? kasan_atomics_helper+0x565/0x5450
[   14.810305]  kasan_report+0x141/0x180
[   14.810328]  ? kasan_atomics_helper+0x565/0x5450
[   14.810356]  kasan_check_range+0x10c/0x1c0
[   14.810381]  __kasan_check_write+0x18/0x20
[   14.810463]  kasan_atomics_helper+0x565/0x5450
[   14.810489]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.810514]  ? kasan_save_alloc_info+0x3b/0x50
[   14.810545]  kasan_atomics+0x1dc/0x310
[   14.810569]  ? __pfx_kasan_atomics+0x10/0x10
[   14.810595]  ? __pfx_read_tsc+0x10/0x10
[   14.810617]  ? ktime_get_ts64+0x86/0x230
[   14.810643]  kunit_try_run_case+0x1a5/0x480
[   14.810669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.810692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.810717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.810742]  ? __kthread_parkme+0x82/0x180
[   14.810770]  ? preempt_count_sub+0x50/0x80
[   14.810796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.810821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.810847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.810871]  kthread+0x337/0x6f0
[   14.810952]  ? trace_preempt_on+0x20/0xc0
[   14.810977]  ? __pfx_kthread+0x10/0x10
[   14.811006]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.811030]  ? calculate_sigpending+0x7b/0xa0
[   14.811055]  ? __pfx_kthread+0x10/0x10
[   14.811077]  ret_from_fork+0x116/0x1d0
[   14.811097]  ? __pfx_kthread+0x10/0x10
[   14.811118]  ret_from_fork_asm+0x1a/0x30
[   14.811152]  </TASK>
[   14.811163] 
[   14.819835] Allocated by task 282:
[   14.820077]  kasan_save_stack+0x45/0x70
[   14.820249]  kasan_save_track+0x18/0x40
[   14.820385]  kasan_save_alloc_info+0x3b/0x50
[   14.820586]  __kasan_kmalloc+0xb7/0xc0
[   14.820781]  __kmalloc_cache_noprof+0x189/0x420
[   14.821051]  kasan_atomics+0x95/0x310
[   14.821241]  kunit_try_run_case+0x1a5/0x480
[   14.821450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.821909]  kthread+0x337/0x6f0
[   14.822174]  ret_from_fork+0x116/0x1d0
[   14.822312]  ret_from_fork_asm+0x1a/0x30
[   14.822453] 
[   14.822526] The buggy address belongs to the object at ffff8881029b7000
[   14.822526]  which belongs to the cache kmalloc-64 of size 64
[   14.822900] The buggy address is located 0 bytes to the right of
[   14.822900]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.823448] 
[   14.823547] The buggy address belongs to the physical page:
[   14.824075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.824445] flags: 0x200000000000000(node=0|zone=2)
[   14.824841] page_type: f5(slab)
[   14.825004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.825270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.825498] page dumped because: kasan: bad access detected
[   14.826073] 
[   14.826169] Memory state around the buggy address:
[   14.826393]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826680]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.827153] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.827434]                                      ^
[   14.827723]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.828069]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.828339] ==================================================================
[   15.866142] ==================================================================
[   15.866606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.866853] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.867121] 
[   15.867207] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.867249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.867262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.867284] Call Trace:
[   15.867299]  <TASK>
[   15.867316]  dump_stack_lvl+0x73/0xb0
[   15.867387]  print_report+0xd1/0x610
[   15.867437]  ? __virt_addr_valid+0x1db/0x2d0
[   15.867461]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.867484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.867509]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.867532]  kasan_report+0x141/0x180
[   15.867555]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.867583]  kasan_check_range+0x10c/0x1c0
[   15.867642]  __kasan_check_write+0x18/0x20
[   15.867662]  kasan_atomics_helper+0x1f43/0x5450
[   15.867686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.867710]  ? kasan_save_alloc_info+0x3b/0x50
[   15.867741]  kasan_atomics+0x1dc/0x310
[   15.867796]  ? __pfx_kasan_atomics+0x10/0x10
[   15.867821]  ? __pfx_read_tsc+0x10/0x10
[   15.867842]  ? ktime_get_ts64+0x86/0x230
[   15.867867]  kunit_try_run_case+0x1a5/0x480
[   15.867903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.867953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.868005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.868030]  ? __kthread_parkme+0x82/0x180
[   15.868052]  ? preempt_count_sub+0x50/0x80
[   15.868077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.868133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.868159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.868184]  kthread+0x337/0x6f0
[   15.868204]  ? trace_preempt_on+0x20/0xc0
[   15.868229]  ? __pfx_kthread+0x10/0x10
[   15.868250]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.868272]  ? calculate_sigpending+0x7b/0xa0
[   15.868322]  ? __pfx_kthread+0x10/0x10
[   15.868345]  ret_from_fork+0x116/0x1d0
[   15.868364]  ? __pfx_kthread+0x10/0x10
[   15.868384]  ret_from_fork_asm+0x1a/0x30
[   15.868417]  </TASK>
[   15.868428] 
[   15.876565] Allocated by task 282:
[   15.876739]  kasan_save_stack+0x45/0x70
[   15.876952]  kasan_save_track+0x18/0x40
[   15.877175]  kasan_save_alloc_info+0x3b/0x50
[   15.877379]  __kasan_kmalloc+0xb7/0xc0
[   15.877602]  __kmalloc_cache_noprof+0x189/0x420
[   15.877818]  kasan_atomics+0x95/0x310
[   15.878073]  kunit_try_run_case+0x1a5/0x480
[   15.878307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.878571]  kthread+0x337/0x6f0
[   15.878729]  ret_from_fork+0x116/0x1d0
[   15.878872]  ret_from_fork_asm+0x1a/0x30
[   15.879107] 
[   15.879207] The buggy address belongs to the object at ffff8881029b7000
[   15.879207]  which belongs to the cache kmalloc-64 of size 64
[   15.879740] The buggy address is located 0 bytes to the right of
[   15.879740]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.880286] 
[   15.880370] The buggy address belongs to the physical page:
[   15.880685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.881108] flags: 0x200000000000000(node=0|zone=2)
[   15.881319] page_type: f5(slab)
[   15.881478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.881717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.881960] page dumped because: kasan: bad access detected
[   15.882267] 
[   15.882363] Memory state around the buggy address:
[   15.882617]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.882998]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.883325] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.883641]                                      ^
[   15.883800]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.884060]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.884420] ==================================================================
[   15.885224] ==================================================================
[   15.885672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.886133] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.886446] 
[   15.886537] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.886580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.886592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.886614] Call Trace:
[   15.886629]  <TASK>
[   15.886644]  dump_stack_lvl+0x73/0xb0
[   15.886709]  print_report+0xd1/0x610
[   15.886736]  ? __virt_addr_valid+0x1db/0x2d0
[   15.886759]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.886812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.886835]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.886859]  kasan_report+0x141/0x180
[   15.886882]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.886920]  __asan_report_load8_noabort+0x18/0x20
[   15.886995]  kasan_atomics_helper+0x4f71/0x5450
[   15.887022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.887046]  ? kasan_save_alloc_info+0x3b/0x50
[   15.887077]  kasan_atomics+0x1dc/0x310
[   15.887102]  ? __pfx_kasan_atomics+0x10/0x10
[   15.887128]  ? __pfx_read_tsc+0x10/0x10
[   15.887150]  ? ktime_get_ts64+0x86/0x230
[   15.887175]  kunit_try_run_case+0x1a5/0x480
[   15.887200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.887224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.887249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.887274]  ? __kthread_parkme+0x82/0x180
[   15.887295]  ? preempt_count_sub+0x50/0x80
[   15.887320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.887345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.887369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.887394]  kthread+0x337/0x6f0
[   15.887414]  ? trace_preempt_on+0x20/0xc0
[   15.887437]  ? __pfx_kthread+0x10/0x10
[   15.887458]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.887480]  ? calculate_sigpending+0x7b/0xa0
[   15.887505]  ? __pfx_kthread+0x10/0x10
[   15.887527]  ret_from_fork+0x116/0x1d0
[   15.887546]  ? __pfx_kthread+0x10/0x10
[   15.887567]  ret_from_fork_asm+0x1a/0x30
[   15.887600]  </TASK>
[   15.887611] 
[   15.895056] Allocated by task 282:
[   15.895276]  kasan_save_stack+0x45/0x70
[   15.895481]  kasan_save_track+0x18/0x40
[   15.895698]  kasan_save_alloc_info+0x3b/0x50
[   15.895933]  __kasan_kmalloc+0xb7/0xc0
[   15.896172]  __kmalloc_cache_noprof+0x189/0x420
[   15.896426]  kasan_atomics+0x95/0x310
[   15.896607]  kunit_try_run_case+0x1a5/0x480
[   15.896837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.897162]  kthread+0x337/0x6f0
[   15.897337]  ret_from_fork+0x116/0x1d0
[   15.897531]  ret_from_fork_asm+0x1a/0x30
[   15.897748] 
[   15.897847] The buggy address belongs to the object at ffff8881029b7000
[   15.897847]  which belongs to the cache kmalloc-64 of size 64
[   15.898418] The buggy address is located 0 bytes to the right of
[   15.898418]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.899009] 
[   15.899141] The buggy address belongs to the physical page:
[   15.899403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.899732] flags: 0x200000000000000(node=0|zone=2)
[   15.899916] page_type: f5(slab)
[   15.900151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.900525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.900847] page dumped because: kasan: bad access detected
[   15.901057] 
[   15.901143] Memory state around the buggy address:
[   15.901440]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.901818]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.902180] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.902450]                                      ^
[   15.902744]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.903092]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.903400] ==================================================================
[   15.513211] ==================================================================
[   15.513684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.514171] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.514473] 
[   15.514748] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.514805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.514818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.515087] Call Trace:
[   15.515111]  <TASK>
[   15.515131]  dump_stack_lvl+0x73/0xb0
[   15.515165]  print_report+0xd1/0x610
[   15.515188]  ? __virt_addr_valid+0x1db/0x2d0
[   15.515250]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.515274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.515299]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.515323]  kasan_report+0x141/0x180
[   15.515346]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.515375]  __asan_report_store8_noabort+0x1b/0x30
[   15.515401]  kasan_atomics_helper+0x50d4/0x5450
[   15.515425]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.515450]  ? kasan_save_alloc_info+0x3b/0x50
[   15.515480]  kasan_atomics+0x1dc/0x310
[   15.515504]  ? __pfx_kasan_atomics+0x10/0x10
[   15.515529]  ? __pfx_read_tsc+0x10/0x10
[   15.515552]  ? ktime_get_ts64+0x86/0x230
[   15.515577]  kunit_try_run_case+0x1a5/0x480
[   15.515602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.515626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.515652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.515676]  ? __kthread_parkme+0x82/0x180
[   15.515698]  ? preempt_count_sub+0x50/0x80
[   15.515724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.515749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.515773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.515798]  kthread+0x337/0x6f0
[   15.515819]  ? trace_preempt_on+0x20/0xc0
[   15.515843]  ? __pfx_kthread+0x10/0x10
[   15.515864]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.515886]  ? calculate_sigpending+0x7b/0xa0
[   15.515922]  ? __pfx_kthread+0x10/0x10
[   15.515944]  ret_from_fork+0x116/0x1d0
[   15.515963]  ? __pfx_kthread+0x10/0x10
[   15.515984]  ret_from_fork_asm+0x1a/0x30
[   15.516017]  </TASK>
[   15.516028] 
[   15.523913] Allocated by task 282:
[   15.524266]  kasan_save_stack+0x45/0x70
[   15.525312]  kasan_save_track+0x18/0x40
[   15.525977]  kasan_save_alloc_info+0x3b/0x50
[   15.526171]  __kasan_kmalloc+0xb7/0xc0
[   15.526311]  __kmalloc_cache_noprof+0x189/0x420
[   15.526790]  kasan_atomics+0x95/0x310
[   15.527306]  kunit_try_run_case+0x1a5/0x480
[   15.527659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.527948]  kthread+0x337/0x6f0
[   15.528369]  ret_from_fork+0x116/0x1d0
[   15.528646]  ret_from_fork_asm+0x1a/0x30
[   15.528800] 
[   15.528904] The buggy address belongs to the object at ffff8881029b7000
[   15.528904]  which belongs to the cache kmalloc-64 of size 64
[   15.530224] The buggy address is located 0 bytes to the right of
[   15.530224]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.531338] 
[   15.531592] The buggy address belongs to the physical page:
[   15.532060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.532618] flags: 0x200000000000000(node=0|zone=2)
[   15.533234] page_type: f5(slab)
[   15.533469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.534145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.534454] page dumped because: kasan: bad access detected
[   15.534955] 
[   15.535241] Memory state around the buggy address:
[   15.535465]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.535937]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.536478] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.536944]                                      ^
[   15.537498]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.537937]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.538408] ==================================================================
[   15.961620] ==================================================================
[   15.961964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.962482] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.962881] 
[   15.963024] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.963104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.963120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.963142] Call Trace:
[   15.963157]  <TASK>
[   15.963172]  dump_stack_lvl+0x73/0xb0
[   15.963201]  print_report+0xd1/0x610
[   15.963224]  ? __virt_addr_valid+0x1db/0x2d0
[   15.963248]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.963270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.963294]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.963318]  kasan_report+0x141/0x180
[   15.963341]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.963402]  __asan_report_load8_noabort+0x18/0x20
[   15.963428]  kasan_atomics_helper+0x4fb2/0x5450
[   15.963452]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.963477]  ? kasan_save_alloc_info+0x3b/0x50
[   15.963535]  kasan_atomics+0x1dc/0x310
[   15.963560]  ? __pfx_kasan_atomics+0x10/0x10
[   15.963585]  ? __pfx_read_tsc+0x10/0x10
[   15.963607]  ? ktime_get_ts64+0x86/0x230
[   15.963633]  kunit_try_run_case+0x1a5/0x480
[   15.963689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963713]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.963738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.963763]  ? __kthread_parkme+0x82/0x180
[   15.963784]  ? preempt_count_sub+0x50/0x80
[   15.963843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.963929]  kthread+0x337/0x6f0
[   15.963949]  ? trace_preempt_on+0x20/0xc0
[   15.964044]  ? __pfx_kthread+0x10/0x10
[   15.964089]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.964158]  ? calculate_sigpending+0x7b/0xa0
[   15.964184]  ? __pfx_kthread+0x10/0x10
[   15.964206]  ret_from_fork+0x116/0x1d0
[   15.964226]  ? __pfx_kthread+0x10/0x10
[   15.964248]  ret_from_fork_asm+0x1a/0x30
[   15.964281]  </TASK>
[   15.964292] 
[   15.972281] Allocated by task 282:
[   15.972431]  kasan_save_stack+0x45/0x70
[   15.972579]  kasan_save_track+0x18/0x40
[   15.972716]  kasan_save_alloc_info+0x3b/0x50
[   15.972942]  __kasan_kmalloc+0xb7/0xc0
[   15.973111]  __kmalloc_cache_noprof+0x189/0x420
[   15.973512]  kasan_atomics+0x95/0x310
[   15.973705]  kunit_try_run_case+0x1a5/0x480
[   15.973923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974203]  kthread+0x337/0x6f0
[   15.974374]  ret_from_fork+0x116/0x1d0
[   15.974562]  ret_from_fork_asm+0x1a/0x30
[   15.974730] 
[   15.974809] The buggy address belongs to the object at ffff8881029b7000
[   15.974809]  which belongs to the cache kmalloc-64 of size 64
[   15.975204] The buggy address is located 0 bytes to the right of
[   15.975204]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.975827] 
[   15.975964] The buggy address belongs to the physical page:
[   15.976277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.976667] flags: 0x200000000000000(node=0|zone=2)
[   15.976834] page_type: f5(slab)
[   15.977077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.977446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.977791] page dumped because: kasan: bad access detected
[   15.978092] 
[   15.978188] Memory state around the buggy address:
[   15.978415]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978730]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.979125] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.979418]                                      ^
[   15.979596]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.979813]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.980124] ==================================================================
[   15.578004] ==================================================================
[   15.578343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.578721] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.579166] 
[   15.579264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.579306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.579318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.579340] Call Trace:
[   15.579354]  <TASK>
[   15.579369]  dump_stack_lvl+0x73/0xb0
[   15.579397]  print_report+0xd1/0x610
[   15.579419]  ? __virt_addr_valid+0x1db/0x2d0
[   15.579443]  ? kasan_atomics_helper+0x164f/0x5450
[   15.579466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.579490]  ? kasan_atomics_helper+0x164f/0x5450
[   15.579513]  kasan_report+0x141/0x180
[   15.579536]  ? kasan_atomics_helper+0x164f/0x5450
[   15.579564]  kasan_check_range+0x10c/0x1c0
[   15.579589]  __kasan_check_write+0x18/0x20
[   15.579609]  kasan_atomics_helper+0x164f/0x5450
[   15.579633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.579657]  ? kasan_save_alloc_info+0x3b/0x50
[   15.579688]  kasan_atomics+0x1dc/0x310
[   15.579713]  ? __pfx_kasan_atomics+0x10/0x10
[   15.579738]  ? __pfx_read_tsc+0x10/0x10
[   15.579759]  ? ktime_get_ts64+0x86/0x230
[   15.579784]  kunit_try_run_case+0x1a5/0x480
[   15.579809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.579831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.579858]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.579883]  ? __kthread_parkme+0x82/0x180
[   15.579915]  ? preempt_count_sub+0x50/0x80
[   15.579940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.579965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.580001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.580027]  kthread+0x337/0x6f0
[   15.580046]  ? trace_preempt_on+0x20/0xc0
[   15.580071]  ? __pfx_kthread+0x10/0x10
[   15.580091]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.580114]  ? calculate_sigpending+0x7b/0xa0
[   15.580139]  ? __pfx_kthread+0x10/0x10
[   15.580161]  ret_from_fork+0x116/0x1d0
[   15.580181]  ? __pfx_kthread+0x10/0x10
[   15.580202]  ret_from_fork_asm+0x1a/0x30
[   15.580235]  </TASK>
[   15.580246] 
[   15.587357] Allocated by task 282:
[   15.587542]  kasan_save_stack+0x45/0x70
[   15.587748]  kasan_save_track+0x18/0x40
[   15.588099]  kasan_save_alloc_info+0x3b/0x50
[   15.588285]  __kasan_kmalloc+0xb7/0xc0
[   15.588421]  __kmalloc_cache_noprof+0x189/0x420
[   15.588579]  kasan_atomics+0x95/0x310
[   15.588715]  kunit_try_run_case+0x1a5/0x480
[   15.588869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.589059]  kthread+0x337/0x6f0
[   15.589183]  ret_from_fork+0x116/0x1d0
[   15.589315]  ret_from_fork_asm+0x1a/0x30
[   15.589455] 
[   15.589533] The buggy address belongs to the object at ffff8881029b7000
[   15.589533]  which belongs to the cache kmalloc-64 of size 64
[   15.590123] The buggy address is located 0 bytes to the right of
[   15.590123]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.590685] 
[   15.590785] The buggy address belongs to the physical page:
[   15.591128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.591476] flags: 0x200000000000000(node=0|zone=2)
[   15.591639] page_type: f5(slab)
[   15.591760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.592138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.592482] page dumped because: kasan: bad access detected
[   15.592738] 
[   15.592835] Memory state around the buggy address:
[   15.593095]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.593375]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.593626] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.593840]                                      ^
[   15.594007]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.594224]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.594545] ==================================================================
[   15.846657] ==================================================================
[   15.847158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.847628] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.848121] 
[   15.848234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.848279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.848292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.848313] Call Trace:
[   15.848329]  <TASK>
[   15.848345]  dump_stack_lvl+0x73/0xb0
[   15.848374]  print_report+0xd1/0x610
[   15.848398]  ? __virt_addr_valid+0x1db/0x2d0
[   15.848423]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.848445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.848469]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.848493]  kasan_report+0x141/0x180
[   15.848517]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.848546]  kasan_check_range+0x10c/0x1c0
[   15.848571]  __kasan_check_write+0x18/0x20
[   15.848592]  kasan_atomics_helper+0x1eaa/0x5450
[   15.848617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.848641]  ? kasan_save_alloc_info+0x3b/0x50
[   15.848672]  kasan_atomics+0x1dc/0x310
[   15.848697]  ? __pfx_kasan_atomics+0x10/0x10
[   15.848722]  ? __pfx_read_tsc+0x10/0x10
[   15.848744]  ? ktime_get_ts64+0x86/0x230
[   15.848770]  kunit_try_run_case+0x1a5/0x480
[   15.848795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.848819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.848844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.848870]  ? __kthread_parkme+0x82/0x180
[   15.848902]  ? preempt_count_sub+0x50/0x80
[   15.848963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.849066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.849116]  kthread+0x337/0x6f0
[   15.849138]  ? trace_preempt_on+0x20/0xc0
[   15.849184]  ? __pfx_kthread+0x10/0x10
[   15.849206]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.849229]  ? calculate_sigpending+0x7b/0xa0
[   15.849256]  ? __pfx_kthread+0x10/0x10
[   15.849277]  ret_from_fork+0x116/0x1d0
[   15.849297]  ? __pfx_kthread+0x10/0x10
[   15.849318]  ret_from_fork_asm+0x1a/0x30
[   15.849352]  </TASK>
[   15.849363] 
[   15.857293] Allocated by task 282:
[   15.857467]  kasan_save_stack+0x45/0x70
[   15.857668]  kasan_save_track+0x18/0x40
[   15.857856]  kasan_save_alloc_info+0x3b/0x50
[   15.858096]  __kasan_kmalloc+0xb7/0xc0
[   15.858280]  __kmalloc_cache_noprof+0x189/0x420
[   15.858528]  kasan_atomics+0x95/0x310
[   15.858716]  kunit_try_run_case+0x1a5/0x480
[   15.858943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.859220]  kthread+0x337/0x6f0
[   15.859388]  ret_from_fork+0x116/0x1d0
[   15.859600]  ret_from_fork_asm+0x1a/0x30
[   15.859790] 
[   15.859866] The buggy address belongs to the object at ffff8881029b7000
[   15.859866]  which belongs to the cache kmalloc-64 of size 64
[   15.860389] The buggy address is located 0 bytes to the right of
[   15.860389]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.860993] 
[   15.861124] The buggy address belongs to the physical page:
[   15.861380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.861733] flags: 0x200000000000000(node=0|zone=2)
[   15.862012] page_type: f5(slab)
[   15.862182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.862516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.862885] page dumped because: kasan: bad access detected
[   15.863137] 
[   15.863208] Memory state around the buggy address:
[   15.863359]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863639]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864014] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.864326]                                      ^
[   15.864524]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864742]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.865094] ==================================================================
[   15.342769] ==================================================================
[   15.343363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.343801] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.344189] 
[   15.344286] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.344328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.344340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.344361] Call Trace:
[   15.344375]  <TASK>
[   15.344391]  dump_stack_lvl+0x73/0xb0
[   15.344418]  print_report+0xd1/0x610
[   15.344441]  ? __virt_addr_valid+0x1db/0x2d0
[   15.344464]  ? kasan_atomics_helper+0x1217/0x5450
[   15.344486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.344510]  ? kasan_atomics_helper+0x1217/0x5450
[   15.344554]  kasan_report+0x141/0x180
[   15.344578]  ? kasan_atomics_helper+0x1217/0x5450
[   15.344606]  kasan_check_range+0x10c/0x1c0
[   15.344631]  __kasan_check_write+0x18/0x20
[   15.344651]  kasan_atomics_helper+0x1217/0x5450
[   15.344675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.344700]  ? kasan_save_alloc_info+0x3b/0x50
[   15.344731]  kasan_atomics+0x1dc/0x310
[   15.344755]  ? __pfx_kasan_atomics+0x10/0x10
[   15.344781]  ? __pfx_read_tsc+0x10/0x10
[   15.344802]  ? ktime_get_ts64+0x86/0x230
[   15.344827]  kunit_try_run_case+0x1a5/0x480
[   15.344852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.344876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.344912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.344937]  ? __kthread_parkme+0x82/0x180
[   15.344958]  ? preempt_count_sub+0x50/0x80
[   15.344984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.345009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.345034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.345059]  kthread+0x337/0x6f0
[   15.345079]  ? trace_preempt_on+0x20/0xc0
[   15.345103]  ? __pfx_kthread+0x10/0x10
[   15.345124]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.345147]  ? calculate_sigpending+0x7b/0xa0
[   15.345182]  ? __pfx_kthread+0x10/0x10
[   15.345205]  ret_from_fork+0x116/0x1d0
[   15.345224]  ? __pfx_kthread+0x10/0x10
[   15.345246]  ret_from_fork_asm+0x1a/0x30
[   15.345278]  </TASK>
[   15.345290] 
[   15.353449] Allocated by task 282:
[   15.353628]  kasan_save_stack+0x45/0x70
[   15.353919]  kasan_save_track+0x18/0x40
[   15.354285]  kasan_save_alloc_info+0x3b/0x50
[   15.354486]  __kasan_kmalloc+0xb7/0xc0
[   15.354651]  __kmalloc_cache_noprof+0x189/0x420
[   15.354918]  kasan_atomics+0x95/0x310
[   15.355062]  kunit_try_run_case+0x1a5/0x480
[   15.355212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.355389]  kthread+0x337/0x6f0
[   15.355510]  ret_from_fork+0x116/0x1d0
[   15.355819]  ret_from_fork_asm+0x1a/0x30
[   15.356142] 
[   15.356242] The buggy address belongs to the object at ffff8881029b7000
[   15.356242]  which belongs to the cache kmalloc-64 of size 64
[   15.356723] The buggy address is located 0 bytes to the right of
[   15.356723]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.357458] 
[   15.357564] The buggy address belongs to the physical page:
[   15.357786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.358215] flags: 0x200000000000000(node=0|zone=2)
[   15.358518] page_type: f5(slab)
[   15.358802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.359129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.359437] page dumped because: kasan: bad access detected
[   15.359724] 
[   15.359820] Memory state around the buggy address:
[   15.360094]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360383]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360785] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.361099]                                      ^
[   15.361297]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361607]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361974] ==================================================================
[   15.659936] ==================================================================
[   15.660324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.660841] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.661239] 
[   15.661362] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.661405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.661417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.661450] Call Trace:
[   15.661466]  <TASK>
[   15.661481]  dump_stack_lvl+0x73/0xb0
[   15.661510]  print_report+0xd1/0x610
[   15.661533]  ? __virt_addr_valid+0x1db/0x2d0
[   15.661565]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.661588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.661612]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.661645]  kasan_report+0x141/0x180
[   15.661669]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.661697]  kasan_check_range+0x10c/0x1c0
[   15.661730]  __kasan_check_write+0x18/0x20
[   15.661750]  kasan_atomics_helper+0x18b1/0x5450
[   15.661774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.661810]  ? kasan_save_alloc_info+0x3b/0x50
[   15.661840]  kasan_atomics+0x1dc/0x310
[   15.661865]  ? __pfx_kasan_atomics+0x10/0x10
[   15.661907]  ? __pfx_read_tsc+0x10/0x10
[   15.661929]  ? ktime_get_ts64+0x86/0x230
[   15.661954]  kunit_try_run_case+0x1a5/0x480
[   15.662005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.662067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.662100]  ? __kthread_parkme+0x82/0x180
[   15.662121]  ? preempt_count_sub+0x50/0x80
[   15.662146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.662232]  kthread+0x337/0x6f0
[   15.662260]  ? trace_preempt_on+0x20/0xc0
[   15.662285]  ? __pfx_kthread+0x10/0x10
[   15.662306]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.662339]  ? calculate_sigpending+0x7b/0xa0
[   15.662364]  ? __pfx_kthread+0x10/0x10
[   15.662387]  ret_from_fork+0x116/0x1d0
[   15.662406]  ? __pfx_kthread+0x10/0x10
[   15.662428]  ret_from_fork_asm+0x1a/0x30
[   15.662461]  </TASK>
[   15.662472] 
[   15.669903] Allocated by task 282:
[   15.670103]  kasan_save_stack+0x45/0x70
[   15.670249]  kasan_save_track+0x18/0x40
[   15.670405]  kasan_save_alloc_info+0x3b/0x50
[   15.670619]  __kasan_kmalloc+0xb7/0xc0
[   15.670824]  __kmalloc_cache_noprof+0x189/0x420
[   15.671142]  kasan_atomics+0x95/0x310
[   15.671286]  kunit_try_run_case+0x1a5/0x480
[   15.671434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.671611]  kthread+0x337/0x6f0
[   15.671734]  ret_from_fork+0x116/0x1d0
[   15.671868]  ret_from_fork_asm+0x1a/0x30
[   15.672118] 
[   15.672231] The buggy address belongs to the object at ffff8881029b7000
[   15.672231]  which belongs to the cache kmalloc-64 of size 64
[   15.672761] The buggy address is located 0 bytes to the right of
[   15.672761]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.673343] 
[   15.673441] The buggy address belongs to the physical page:
[   15.673696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.674086] flags: 0x200000000000000(node=0|zone=2)
[   15.674279] page_type: f5(slab)
[   15.674401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.674775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.675142] page dumped because: kasan: bad access detected
[   15.675390] 
[   15.675473] Memory state around the buggy address:
[   15.675699]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.676029]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.676345] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.676656]                                      ^
[   15.676870]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.677217]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.677530] ==================================================================
[   15.201920] ==================================================================
[   15.202294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.202630] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.202875] 
[   15.203006] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.203050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.203063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.203084] Call Trace:
[   15.203100]  <TASK>
[   15.203117]  dump_stack_lvl+0x73/0xb0
[   15.203147]  print_report+0xd1/0x610
[   15.203171]  ? __virt_addr_valid+0x1db/0x2d0
[   15.203196]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.203217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.203241]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.203265]  kasan_report+0x141/0x180
[   15.203288]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.203317]  kasan_check_range+0x10c/0x1c0
[   15.203342]  __kasan_check_write+0x18/0x20
[   15.203362]  kasan_atomics_helper+0xfa9/0x5450
[   15.203386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.203411]  ? kasan_save_alloc_info+0x3b/0x50
[   15.203441]  kasan_atomics+0x1dc/0x310
[   15.203466]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203491]  ? __pfx_read_tsc+0x10/0x10
[   15.203512]  ? ktime_get_ts64+0x86/0x230
[   15.203538]  kunit_try_run_case+0x1a5/0x480
[   15.203563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.203612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203637]  ? __kthread_parkme+0x82/0x180
[   15.203658]  ? preempt_count_sub+0x50/0x80
[   15.203683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.203759]  kthread+0x337/0x6f0
[   15.203780]  ? trace_preempt_on+0x20/0xc0
[   15.203805]  ? __pfx_kthread+0x10/0x10
[   15.203826]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.203849]  ? calculate_sigpending+0x7b/0xa0
[   15.203875]  ? __pfx_kthread+0x10/0x10
[   15.204093]  ret_from_fork+0x116/0x1d0
[   15.204120]  ? __pfx_kthread+0x10/0x10
[   15.204141]  ret_from_fork_asm+0x1a/0x30
[   15.204190]  </TASK>
[   15.204202] 
[   15.213025] Allocated by task 282:
[   15.213220]  kasan_save_stack+0x45/0x70
[   15.213420]  kasan_save_track+0x18/0x40
[   15.213794]  kasan_save_alloc_info+0x3b/0x50
[   15.214070]  __kasan_kmalloc+0xb7/0xc0
[   15.214266]  __kmalloc_cache_noprof+0x189/0x420
[   15.214492]  kasan_atomics+0x95/0x310
[   15.214737]  kunit_try_run_case+0x1a5/0x480
[   15.214907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.215111]  kthread+0x337/0x6f0
[   15.215234]  ret_from_fork+0x116/0x1d0
[   15.215441]  ret_from_fork_asm+0x1a/0x30
[   15.215748] 
[   15.215851] The buggy address belongs to the object at ffff8881029b7000
[   15.215851]  which belongs to the cache kmalloc-64 of size 64
[   15.216427] The buggy address is located 0 bytes to the right of
[   15.216427]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.217074] 
[   15.217151] The buggy address belongs to the physical page:
[   15.217338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.217939] flags: 0x200000000000000(node=0|zone=2)
[   15.218226] page_type: f5(slab)
[   15.218400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.218805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.219178] page dumped because: kasan: bad access detected
[   15.219440] 
[   15.219640] Memory state around the buggy address:
[   15.219851]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.220187]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.220483] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.220860]                                      ^
[   15.221125]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221438]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221960] ==================================================================
[   15.777179] ==================================================================
[   15.777661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.778056] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.778357] 
[   15.778441] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.778482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.778493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.778515] Call Trace:
[   15.778529]  <TASK>
[   15.778544]  dump_stack_lvl+0x73/0xb0
[   15.778571]  print_report+0xd1/0x610
[   15.778594]  ? __virt_addr_valid+0x1db/0x2d0
[   15.778618]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.778640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.778664]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.778686]  kasan_report+0x141/0x180
[   15.778709]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.778737]  __asan_report_load8_noabort+0x18/0x20
[   15.778769]  kasan_atomics_helper+0x4f30/0x5450
[   15.778793]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.778817]  ? kasan_save_alloc_info+0x3b/0x50
[   15.778847]  kasan_atomics+0x1dc/0x310
[   15.778907]  ? __pfx_kasan_atomics+0x10/0x10
[   15.778934]  ? __pfx_read_tsc+0x10/0x10
[   15.778956]  ? ktime_get_ts64+0x86/0x230
[   15.779002]  kunit_try_run_case+0x1a5/0x480
[   15.779029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.779052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.779078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.779103]  ? __kthread_parkme+0x82/0x180
[   15.779124]  ? preempt_count_sub+0x50/0x80
[   15.779149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.779173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.779200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.779225]  kthread+0x337/0x6f0
[   15.779245]  ? trace_preempt_on+0x20/0xc0
[   15.779269]  ? __pfx_kthread+0x10/0x10
[   15.779289]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.779312]  ? calculate_sigpending+0x7b/0xa0
[   15.779337]  ? __pfx_kthread+0x10/0x10
[   15.779359]  ret_from_fork+0x116/0x1d0
[   15.779378]  ? __pfx_kthread+0x10/0x10
[   15.779399]  ret_from_fork_asm+0x1a/0x30
[   15.779432]  </TASK>
[   15.779443] 
[   15.786358] Allocated by task 282:
[   15.786552]  kasan_save_stack+0x45/0x70
[   15.786774]  kasan_save_track+0x18/0x40
[   15.786997]  kasan_save_alloc_info+0x3b/0x50
[   15.787194]  __kasan_kmalloc+0xb7/0xc0
[   15.787349]  __kmalloc_cache_noprof+0x189/0x420
[   15.787571]  kasan_atomics+0x95/0x310
[   15.787764]  kunit_try_run_case+0x1a5/0x480
[   15.787961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.788240]  kthread+0x337/0x6f0
[   15.788380]  ret_from_fork+0x116/0x1d0
[   15.788584]  ret_from_fork_asm+0x1a/0x30
[   15.788733] 
[   15.788804] The buggy address belongs to the object at ffff8881029b7000
[   15.788804]  which belongs to the cache kmalloc-64 of size 64
[   15.789179] The buggy address is located 0 bytes to the right of
[   15.789179]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.789536] 
[   15.789605] The buggy address belongs to the physical page:
[   15.789836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.790213] flags: 0x200000000000000(node=0|zone=2)
[   15.790447] page_type: f5(slab)
[   15.790616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.790961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.791317] page dumped because: kasan: bad access detected
[   15.791563] 
[   15.791657] Memory state around the buggy address:
[   15.791909]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.792230]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.792452] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.792667]                                      ^
[   15.792821]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793192]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793528] ==================================================================
[   15.242293] ==================================================================
[   15.242742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.243109] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.243449] 
[   15.243645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.243704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.243716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.243738] Call Trace:
[   15.243754]  <TASK>
[   15.243768]  dump_stack_lvl+0x73/0xb0
[   15.243797]  print_report+0xd1/0x610
[   15.243820]  ? __virt_addr_valid+0x1db/0x2d0
[   15.243844]  ? kasan_atomics_helper+0x1079/0x5450
[   15.243866]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.243900]  ? kasan_atomics_helper+0x1079/0x5450
[   15.243923]  kasan_report+0x141/0x180
[   15.243947]  ? kasan_atomics_helper+0x1079/0x5450
[   15.243983]  kasan_check_range+0x10c/0x1c0
[   15.244008]  __kasan_check_write+0x18/0x20
[   15.244052]  kasan_atomics_helper+0x1079/0x5450
[   15.244078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.244104]  ? kasan_save_alloc_info+0x3b/0x50
[   15.244135]  kasan_atomics+0x1dc/0x310
[   15.244168]  ? __pfx_kasan_atomics+0x10/0x10
[   15.244193]  ? __pfx_read_tsc+0x10/0x10
[   15.244215]  ? ktime_get_ts64+0x86/0x230
[   15.244251]  kunit_try_run_case+0x1a5/0x480
[   15.244276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.244299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.244325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.244350]  ? __kthread_parkme+0x82/0x180
[   15.244371]  ? preempt_count_sub+0x50/0x80
[   15.244397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.244422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.244447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.244471]  kthread+0x337/0x6f0
[   15.244491]  ? trace_preempt_on+0x20/0xc0
[   15.244522]  ? __pfx_kthread+0x10/0x10
[   15.244543]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.244566]  ? calculate_sigpending+0x7b/0xa0
[   15.244668]  ? __pfx_kthread+0x10/0x10
[   15.244690]  ret_from_fork+0x116/0x1d0
[   15.244710]  ? __pfx_kthread+0x10/0x10
[   15.244732]  ret_from_fork_asm+0x1a/0x30
[   15.244765]  </TASK>
[   15.244776] 
[   15.253259] Allocated by task 282:
[   15.253453]  kasan_save_stack+0x45/0x70
[   15.253859]  kasan_save_track+0x18/0x40
[   15.254102]  kasan_save_alloc_info+0x3b/0x50
[   15.254312]  __kasan_kmalloc+0xb7/0xc0
[   15.254507]  __kmalloc_cache_noprof+0x189/0x420
[   15.254794]  kasan_atomics+0x95/0x310
[   15.255013]  kunit_try_run_case+0x1a5/0x480
[   15.255195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.255424]  kthread+0x337/0x6f0
[   15.255554]  ret_from_fork+0x116/0x1d0
[   15.255690]  ret_from_fork_asm+0x1a/0x30
[   15.255831] 
[   15.255918] The buggy address belongs to the object at ffff8881029b7000
[   15.255918]  which belongs to the cache kmalloc-64 of size 64
[   15.256457] The buggy address is located 0 bytes to the right of
[   15.256457]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.257011] 
[   15.257107] The buggy address belongs to the physical page:
[   15.257295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.257583] flags: 0x200000000000000(node=0|zone=2)
[   15.257821] page_type: f5(slab)
[   15.258328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.258766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.259151] page dumped because: kasan: bad access detected
[   15.259383] 
[   15.259501] Memory state around the buggy address:
[   15.259806]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260159]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260480] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.260811]                                      ^
[   15.261025]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.261243]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.261754] ==================================================================
[   14.659720] ==================================================================
[   14.660158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.660413] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.660666] 
[   14.660782] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.660826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.660837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.660857] Call Trace:
[   14.660869]  <TASK>
[   14.660884]  dump_stack_lvl+0x73/0xb0
[   14.660923]  print_report+0xd1/0x610
[   14.660945]  ? __virt_addr_valid+0x1db/0x2d0
[   14.660968]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.660989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.661153]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.661186]  kasan_report+0x141/0x180
[   14.661208]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.661236]  __asan_report_store4_noabort+0x1b/0x30
[   14.661262]  kasan_atomics_helper+0x4ba2/0x5450
[   14.661284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.661309]  ? kasan_save_alloc_info+0x3b/0x50
[   14.661339]  kasan_atomics+0x1dc/0x310
[   14.661361]  ? __pfx_kasan_atomics+0x10/0x10
[   14.661386]  ? __pfx_read_tsc+0x10/0x10
[   14.661407]  ? ktime_get_ts64+0x86/0x230
[   14.661432]  kunit_try_run_case+0x1a5/0x480
[   14.661457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.661479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.661504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.661528]  ? __kthread_parkme+0x82/0x180
[   14.661548]  ? preempt_count_sub+0x50/0x80
[   14.661573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.661597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.661621]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.661645]  kthread+0x337/0x6f0
[   14.661664]  ? trace_preempt_on+0x20/0xc0
[   14.661688]  ? __pfx_kthread+0x10/0x10
[   14.661707]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.661803]  ? calculate_sigpending+0x7b/0xa0
[   14.661828]  ? __pfx_kthread+0x10/0x10
[   14.661849]  ret_from_fork+0x116/0x1d0
[   14.661868]  ? __pfx_kthread+0x10/0x10
[   14.661888]  ret_from_fork_asm+0x1a/0x30
[   14.661934]  </TASK>
[   14.661944] 
[   14.671064] Allocated by task 282:
[   14.671278]  kasan_save_stack+0x45/0x70
[   14.671426]  kasan_save_track+0x18/0x40
[   14.671563]  kasan_save_alloc_info+0x3b/0x50
[   14.671713]  __kasan_kmalloc+0xb7/0xc0
[   14.671847]  __kmalloc_cache_noprof+0x189/0x420
[   14.672971]  kasan_atomics+0x95/0x310
[   14.673694]  kunit_try_run_case+0x1a5/0x480
[   14.674309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675183]  kthread+0x337/0x6f0
[   14.675767]  ret_from_fork+0x116/0x1d0
[   14.676125]  ret_from_fork_asm+0x1a/0x30
[   14.676279] 
[   14.676355] The buggy address belongs to the object at ffff8881029b7000
[   14.676355]  which belongs to the cache kmalloc-64 of size 64
[   14.676716] The buggy address is located 0 bytes to the right of
[   14.676716]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.677103] 
[   14.677176] The buggy address belongs to the physical page:
[   14.677352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.677596] flags: 0x200000000000000(node=0|zone=2)
[   14.677761] page_type: f5(slab)
[   14.677882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.678872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.679113] page dumped because: kasan: bad access detected
[   14.679833] 
[   14.680324] Memory state around the buggy address:
[   14.680996]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.681704]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.682560] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.683481]                                      ^
[   14.683921]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.684729]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.685401] ==================================================================
[   14.627714] ==================================================================
[   14.628418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.628745] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.630325] 
[   14.630465] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.630515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.630528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.630552] Call Trace:
[   14.630566]  <TASK>
[   14.630585]  dump_stack_lvl+0x73/0xb0
[   14.631039]  print_report+0xd1/0x610
[   14.631070]  ? __virt_addr_valid+0x1db/0x2d0
[   14.631096]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.631117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.631140]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.631162]  kasan_report+0x141/0x180
[   14.631184]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.631213]  __asan_report_load4_noabort+0x18/0x20
[   14.631236]  kasan_atomics_helper+0x4bbc/0x5450
[   14.631259]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.631283]  ? kasan_save_alloc_info+0x3b/0x50
[   14.631312]  kasan_atomics+0x1dc/0x310
[   14.631335]  ? __pfx_kasan_atomics+0x10/0x10
[   14.631360]  ? __pfx_read_tsc+0x10/0x10
[   14.631381]  ? ktime_get_ts64+0x86/0x230
[   14.631408]  kunit_try_run_case+0x1a5/0x480
[   14.631434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.631481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.631504]  ? __kthread_parkme+0x82/0x180
[   14.631548]  ? preempt_count_sub+0x50/0x80
[   14.631573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.631621]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.631645]  kthread+0x337/0x6f0
[   14.631664]  ? trace_preempt_on+0x20/0xc0
[   14.631688]  ? __pfx_kthread+0x10/0x10
[   14.631709]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.631730]  ? calculate_sigpending+0x7b/0xa0
[   14.631754]  ? __pfx_kthread+0x10/0x10
[   14.631776]  ret_from_fork+0x116/0x1d0
[   14.631794]  ? __pfx_kthread+0x10/0x10
[   14.631814]  ret_from_fork_asm+0x1a/0x30
[   14.631847]  </TASK>
[   14.631858] 
[   14.643501] Allocated by task 282:
[   14.643870]  kasan_save_stack+0x45/0x70
[   14.644324]  kasan_save_track+0x18/0x40
[   14.644663]  kasan_save_alloc_info+0x3b/0x50
[   14.645190]  __kasan_kmalloc+0xb7/0xc0
[   14.645646]  __kmalloc_cache_noprof+0x189/0x420
[   14.646106]  kasan_atomics+0x95/0x310
[   14.646435]  kunit_try_run_case+0x1a5/0x480
[   14.646888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647396]  kthread+0x337/0x6f0
[   14.647768]  ret_from_fork+0x116/0x1d0
[   14.648097]  ret_from_fork_asm+0x1a/0x30
[   14.648351] 
[   14.648428] The buggy address belongs to the object at ffff8881029b7000
[   14.648428]  which belongs to the cache kmalloc-64 of size 64
[   14.649620] The buggy address is located 0 bytes to the right of
[   14.649620]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.651000] 
[   14.651234] The buggy address belongs to the physical page:
[   14.651415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.651909] flags: 0x200000000000000(node=0|zone=2)
[   14.652396] page_type: f5(slab)
[   14.652830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.653692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.653940] page dumped because: kasan: bad access detected
[   14.654376] 
[   14.654529] Memory state around the buggy address:
[   14.655047]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.655729]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.656227] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.656444]                                      ^
[   14.656852]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657549]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.658314] ==================================================================
[   14.769694] ==================================================================
[   14.769946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.770180] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.770408] 
[   14.770491] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.770547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.770558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.770580] Call Trace:
[   14.770595]  <TASK>
[   14.770611]  dump_stack_lvl+0x73/0xb0
[   14.770638]  print_report+0xd1/0x610
[   14.770661]  ? __virt_addr_valid+0x1db/0x2d0
[   14.770686]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.770708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.770732]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.770755]  kasan_report+0x141/0x180
[   14.770784]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.770811]  kasan_check_range+0x10c/0x1c0
[   14.770836]  __kasan_check_write+0x18/0x20
[   14.770856]  kasan_atomics_helper+0x4a0/0x5450
[   14.770881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.770915]  ? kasan_save_alloc_info+0x3b/0x50
[   14.770945]  kasan_atomics+0x1dc/0x310
[   14.770969]  ? __pfx_kasan_atomics+0x10/0x10
[   14.770994]  ? __pfx_read_tsc+0x10/0x10
[   14.771015]  ? ktime_get_ts64+0x86/0x230
[   14.771041]  kunit_try_run_case+0x1a5/0x480
[   14.771066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.771115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.771140]  ? __kthread_parkme+0x82/0x180
[   14.771161]  ? preempt_count_sub+0x50/0x80
[   14.771186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.771261]  kthread+0x337/0x6f0
[   14.771281]  ? trace_preempt_on+0x20/0xc0
[   14.771306]  ? __pfx_kthread+0x10/0x10
[   14.771327]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.771349]  ? calculate_sigpending+0x7b/0xa0
[   14.771374]  ? __pfx_kthread+0x10/0x10
[   14.771396]  ret_from_fork+0x116/0x1d0
[   14.771415]  ? __pfx_kthread+0x10/0x10
[   14.771437]  ret_from_fork_asm+0x1a/0x30
[   14.771469]  </TASK>
[   14.771480] 
[   14.780495] Allocated by task 282:
[   14.780628]  kasan_save_stack+0x45/0x70
[   14.781005]  kasan_save_track+0x18/0x40
[   14.781216]  kasan_save_alloc_info+0x3b/0x50
[   14.781492]  __kasan_kmalloc+0xb7/0xc0
[   14.781718]  __kmalloc_cache_noprof+0x189/0x420
[   14.781933]  kasan_atomics+0x95/0x310
[   14.782071]  kunit_try_run_case+0x1a5/0x480
[   14.782334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.782741]  kthread+0x337/0x6f0
[   14.782887]  ret_from_fork+0x116/0x1d0
[   14.783036]  ret_from_fork_asm+0x1a/0x30
[   14.783238] 
[   14.783347] The buggy address belongs to the object at ffff8881029b7000
[   14.783347]  which belongs to the cache kmalloc-64 of size 64
[   14.783956] The buggy address is located 0 bytes to the right of
[   14.783956]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.784644] 
[   14.784716] The buggy address belongs to the physical page:
[   14.785207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.785495] flags: 0x200000000000000(node=0|zone=2)
[   14.785730] page_type: f5(slab)
[   14.785865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.786259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.786568] page dumped because: kasan: bad access detected
[   14.786790] 
[   14.786875] Memory state around the buggy address:
[   14.787116]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.787383]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.787665] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.787972]                                      ^
[   14.788244]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.788466]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789258] ==================================================================
[   14.979225] ==================================================================
[   14.979562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.979849] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.980089] 
[   14.980177] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.980220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.980232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.980253] Call Trace:
[   14.980270]  <TASK>
[   14.980286]  dump_stack_lvl+0x73/0xb0
[   14.980313]  print_report+0xd1/0x610
[   14.980401]  ? __virt_addr_valid+0x1db/0x2d0
[   14.980430]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.980453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.980476]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.980498]  kasan_report+0x141/0x180
[   14.980522]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.980551]  kasan_check_range+0x10c/0x1c0
[   14.980575]  __kasan_check_write+0x18/0x20
[   14.980595]  kasan_atomics_helper+0xa2b/0x5450
[   14.980619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.980644]  ? kasan_save_alloc_info+0x3b/0x50
[   14.980674]  kasan_atomics+0x1dc/0x310
[   14.980698]  ? __pfx_kasan_atomics+0x10/0x10
[   14.980723]  ? __pfx_read_tsc+0x10/0x10
[   14.980745]  ? ktime_get_ts64+0x86/0x230
[   14.980772]  kunit_try_run_case+0x1a5/0x480
[   14.980798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.980847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.980871]  ? __kthread_parkme+0x82/0x180
[   14.980905]  ? preempt_count_sub+0x50/0x80
[   14.980930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.980980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.981043]  kthread+0x337/0x6f0
[   14.981064]  ? trace_preempt_on+0x20/0xc0
[   14.981088]  ? __pfx_kthread+0x10/0x10
[   14.981110]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.981133]  ? calculate_sigpending+0x7b/0xa0
[   14.981157]  ? __pfx_kthread+0x10/0x10
[   14.981180]  ret_from_fork+0x116/0x1d0
[   14.981199]  ? __pfx_kthread+0x10/0x10
[   14.981221]  ret_from_fork_asm+0x1a/0x30
[   14.981255]  </TASK>
[   14.981267] 
[   14.989827] Allocated by task 282:
[   14.989974]  kasan_save_stack+0x45/0x70
[   14.990120]  kasan_save_track+0x18/0x40
[   14.990319]  kasan_save_alloc_info+0x3b/0x50
[   14.990537]  __kasan_kmalloc+0xb7/0xc0
[   14.990727]  __kmalloc_cache_noprof+0x189/0x420
[   14.990973]  kasan_atomics+0x95/0x310
[   14.991164]  kunit_try_run_case+0x1a5/0x480
[   14.991379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.991642]  kthread+0x337/0x6f0
[   14.991822]  ret_from_fork+0x116/0x1d0
[   14.992218]  ret_from_fork_asm+0x1a/0x30
[   14.992486] 
[   14.992635] The buggy address belongs to the object at ffff8881029b7000
[   14.992635]  which belongs to the cache kmalloc-64 of size 64
[   14.993025] The buggy address is located 0 bytes to the right of
[   14.993025]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.993468] 
[   14.993566] The buggy address belongs to the physical page:
[   14.993824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.994552] flags: 0x200000000000000(node=0|zone=2)
[   14.994756] page_type: f5(slab)
[   14.994932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.995302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.995784] page dumped because: kasan: bad access detected
[   14.996108] 
[   14.996196] Memory state around the buggy address:
[   14.996353]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.996571]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.996789] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.998293]                                      ^
[   14.999221]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000703]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001762] ==================================================================
[   15.381566] ==================================================================
[   15.381800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.382049] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.382274] 
[   15.382358] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.382400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.382413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.382434] Call Trace:
[   15.382449]  <TASK>
[   15.382463]  dump_stack_lvl+0x73/0xb0
[   15.382490]  print_report+0xd1/0x610
[   15.382513]  ? __virt_addr_valid+0x1db/0x2d0
[   15.382535]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.382556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.382579]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.382617]  kasan_report+0x141/0x180
[   15.382640]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.382678]  kasan_check_range+0x10c/0x1c0
[   15.382704]  __kasan_check_write+0x18/0x20
[   15.382723]  kasan_atomics_helper+0x12e6/0x5450
[   15.382748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.382778]  ? kasan_save_alloc_info+0x3b/0x50
[   15.382809]  kasan_atomics+0x1dc/0x310
[   15.382833]  ? __pfx_kasan_atomics+0x10/0x10
[   15.382858]  ? __pfx_read_tsc+0x10/0x10
[   15.382880]  ? ktime_get_ts64+0x86/0x230
[   15.382916]  kunit_try_run_case+0x1a5/0x480
[   15.382941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.382965]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.382990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.383015]  ? __kthread_parkme+0x82/0x180
[   15.383036]  ? preempt_count_sub+0x50/0x80
[   15.383061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.383086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.383112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.383139]  kthread+0x337/0x6f0
[   15.383158]  ? trace_preempt_on+0x20/0xc0
[   15.383182]  ? __pfx_kthread+0x10/0x10
[   15.383203]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.383226]  ? calculate_sigpending+0x7b/0xa0
[   15.383251]  ? __pfx_kthread+0x10/0x10
[   15.383273]  ret_from_fork+0x116/0x1d0
[   15.383293]  ? __pfx_kthread+0x10/0x10
[   15.383314]  ret_from_fork_asm+0x1a/0x30
[   15.383348]  </TASK>
[   15.383359] 
[   15.395627] Allocated by task 282:
[   15.396665]  kasan_save_stack+0x45/0x70
[   15.397419]  kasan_save_track+0x18/0x40
[   15.398324]  kasan_save_alloc_info+0x3b/0x50
[   15.398914]  __kasan_kmalloc+0xb7/0xc0
[   15.399596]  __kmalloc_cache_noprof+0x189/0x420
[   15.400205]  kasan_atomics+0x95/0x310
[   15.400708]  kunit_try_run_case+0x1a5/0x480
[   15.401349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.402278]  kthread+0x337/0x6f0
[   15.402706]  ret_from_fork+0x116/0x1d0
[   15.403316]  ret_from_fork_asm+0x1a/0x30
[   15.403947] 
[   15.404375] The buggy address belongs to the object at ffff8881029b7000
[   15.404375]  which belongs to the cache kmalloc-64 of size 64
[   15.405579] The buggy address is located 0 bytes to the right of
[   15.405579]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.406340] 
[   15.406444] The buggy address belongs to the physical page:
[   15.406911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.407512] flags: 0x200000000000000(node=0|zone=2)
[   15.407932] page_type: f5(slab)
[   15.408154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.408460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.409043] page dumped because: kasan: bad access detected
[   15.409385] 
[   15.409487] Memory state around the buggy address:
[   15.409810]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.410313]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.410999] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.411318]                                      ^
[   15.411508]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.412057]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.412495] ==================================================================
[   16.038425] ==================================================================
[   16.038819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.039151] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   16.039464] 
[   16.039574] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.039618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.039630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.039652] Call Trace:
[   16.039669]  <TASK>
[   16.039686]  dump_stack_lvl+0x73/0xb0
[   16.039716]  print_report+0xd1/0x610
[   16.039739]  ? __virt_addr_valid+0x1db/0x2d0
[   16.039763]  ? kasan_atomics_helper+0x5115/0x5450
[   16.039786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.039810]  ? kasan_atomics_helper+0x5115/0x5450
[   16.039833]  kasan_report+0x141/0x180
[   16.039856]  ? kasan_atomics_helper+0x5115/0x5450
[   16.039885]  __asan_report_load8_noabort+0x18/0x20
[   16.039922]  kasan_atomics_helper+0x5115/0x5450
[   16.039947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.039978]  ? kasan_save_alloc_info+0x3b/0x50
[   16.040009]  kasan_atomics+0x1dc/0x310
[   16.040034]  ? __pfx_kasan_atomics+0x10/0x10
[   16.040059]  ? __pfx_read_tsc+0x10/0x10
[   16.040081]  ? ktime_get_ts64+0x86/0x230
[   16.040107]  kunit_try_run_case+0x1a5/0x480
[   16.040133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.040158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.040184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.040209]  ? __kthread_parkme+0x82/0x180
[   16.040230]  ? preempt_count_sub+0x50/0x80
[   16.040256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.040281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.040306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.040332]  kthread+0x337/0x6f0
[   16.040352]  ? trace_preempt_on+0x20/0xc0
[   16.040377]  ? __pfx_kthread+0x10/0x10
[   16.040398]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.040421]  ? calculate_sigpending+0x7b/0xa0
[   16.040446]  ? __pfx_kthread+0x10/0x10
[   16.040468]  ret_from_fork+0x116/0x1d0
[   16.040487]  ? __pfx_kthread+0x10/0x10
[   16.040507]  ret_from_fork_asm+0x1a/0x30
[   16.040540]  </TASK>
[   16.040552] 
[   16.048197] Allocated by task 282:
[   16.048373]  kasan_save_stack+0x45/0x70
[   16.048585]  kasan_save_track+0x18/0x40
[   16.048780]  kasan_save_alloc_info+0x3b/0x50
[   16.049061]  __kasan_kmalloc+0xb7/0xc0
[   16.049245]  __kmalloc_cache_noprof+0x189/0x420
[   16.049478]  kasan_atomics+0x95/0x310
[   16.049684]  kunit_try_run_case+0x1a5/0x480
[   16.049928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.050208]  kthread+0x337/0x6f0
[   16.050407]  ret_from_fork+0x116/0x1d0
[   16.050603]  ret_from_fork_asm+0x1a/0x30
[   16.050807] 
[   16.050941] The buggy address belongs to the object at ffff8881029b7000
[   16.050941]  which belongs to the cache kmalloc-64 of size 64
[   16.051482] The buggy address is located 0 bytes to the right of
[   16.051482]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   16.052078] 
[   16.052164] The buggy address belongs to the physical page:
[   16.052382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   16.052759] flags: 0x200000000000000(node=0|zone=2)
[   16.053103] page_type: f5(slab)
[   16.053426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.053804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.054222] page dumped because: kasan: bad access detected
[   16.054479] 
[   16.054571] Memory state around the buggy address:
[   16.054797]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.055144]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.055455] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.055761]                                      ^
[   16.055959]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.056191]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.056509] ==================================================================
[   14.940073] ==================================================================
[   14.940366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.940793] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.941269] 
[   14.941390] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.941432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941466] Call Trace:
[   14.941482]  <TASK>
[   14.941498]  dump_stack_lvl+0x73/0xb0
[   14.941526]  print_report+0xd1/0x610
[   14.941604]  ? __virt_addr_valid+0x1db/0x2d0
[   14.941630]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.941652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.941676]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.941699]  kasan_report+0x141/0x180
[   14.941722]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.941751]  kasan_check_range+0x10c/0x1c0
[   14.941776]  __kasan_check_write+0x18/0x20
[   14.941796]  kasan_atomics_helper+0x8f9/0x5450
[   14.941820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.941845]  ? kasan_save_alloc_info+0x3b/0x50
[   14.941875]  kasan_atomics+0x1dc/0x310
[   14.941915]  ? __pfx_kasan_atomics+0x10/0x10
[   14.941941]  ? __pfx_read_tsc+0x10/0x10
[   14.941961]  ? ktime_get_ts64+0x86/0x230
[   14.941987]  kunit_try_run_case+0x1a5/0x480
[   14.942012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.942061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.942086]  ? __kthread_parkme+0x82/0x180
[   14.942107]  ? preempt_count_sub+0x50/0x80
[   14.942132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942182]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.942208]  kthread+0x337/0x6f0
[   14.942227]  ? trace_preempt_on+0x20/0xc0
[   14.942253]  ? __pfx_kthread+0x10/0x10
[   14.942274]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.942297]  ? calculate_sigpending+0x7b/0xa0
[   14.942322]  ? __pfx_kthread+0x10/0x10
[   14.942344]  ret_from_fork+0x116/0x1d0
[   14.942364]  ? __pfx_kthread+0x10/0x10
[   14.942385]  ret_from_fork_asm+0x1a/0x30
[   14.942418]  </TASK>
[   14.942429] 
[   14.950827] Allocated by task 282:
[   14.950994]  kasan_save_stack+0x45/0x70
[   14.951143]  kasan_save_track+0x18/0x40
[   14.951283]  kasan_save_alloc_info+0x3b/0x50
[   14.951440]  __kasan_kmalloc+0xb7/0xc0
[   14.951576]  __kmalloc_cache_noprof+0x189/0x420
[   14.951835]  kasan_atomics+0x95/0x310
[   14.952046]  kunit_try_run_case+0x1a5/0x480
[   14.952257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952512]  kthread+0x337/0x6f0
[   14.952682]  ret_from_fork+0x116/0x1d0
[   14.952819]  ret_from_fork_asm+0x1a/0x30
[   14.952972] 
[   14.953048] The buggy address belongs to the object at ffff8881029b7000
[   14.953048]  which belongs to the cache kmalloc-64 of size 64
[   14.954037] The buggy address is located 0 bytes to the right of
[   14.954037]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.954744] 
[   14.954846] The buggy address belongs to the physical page:
[   14.955055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.955486] flags: 0x200000000000000(node=0|zone=2)
[   14.955760] page_type: f5(slab)
[   14.955928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.956379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.956741] page dumped because: kasan: bad access detected
[   14.956986] 
[   14.957099] Memory state around the buggy address:
[   14.957320]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957623]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957979] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.958441]                                      ^
[   14.958772]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.959077]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.959345] ==================================================================
[   15.595147] ==================================================================
[   15.595719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.596393] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.596719] 
[   15.596831] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.596874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.596886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.596917] Call Trace:
[   15.596931]  <TASK>
[   15.596947]  dump_stack_lvl+0x73/0xb0
[   15.596974]  print_report+0xd1/0x610
[   15.596997]  ? __virt_addr_valid+0x1db/0x2d0
[   15.597023]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.597053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.597076]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.597099]  kasan_report+0x141/0x180
[   15.597122]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.597151]  kasan_check_range+0x10c/0x1c0
[   15.597176]  __kasan_check_write+0x18/0x20
[   15.597196]  kasan_atomics_helper+0x16e7/0x5450
[   15.597220]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.597245]  ? kasan_save_alloc_info+0x3b/0x50
[   15.597276]  kasan_atomics+0x1dc/0x310
[   15.597300]  ? __pfx_kasan_atomics+0x10/0x10
[   15.597325]  ? __pfx_read_tsc+0x10/0x10
[   15.597347]  ? ktime_get_ts64+0x86/0x230
[   15.597372]  kunit_try_run_case+0x1a5/0x480
[   15.597397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.597420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.597447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.597472]  ? __kthread_parkme+0x82/0x180
[   15.597493]  ? preempt_count_sub+0x50/0x80
[   15.597519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.597544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.597568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.597593]  kthread+0x337/0x6f0
[   15.597612]  ? trace_preempt_on+0x20/0xc0
[   15.597636]  ? __pfx_kthread+0x10/0x10
[   15.597657]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.597680]  ? calculate_sigpending+0x7b/0xa0
[   15.597715]  ? __pfx_kthread+0x10/0x10
[   15.597738]  ret_from_fork+0x116/0x1d0
[   15.597757]  ? __pfx_kthread+0x10/0x10
[   15.597778]  ret_from_fork_asm+0x1a/0x30
[   15.597811]  </TASK>
[   15.597822] 
[   15.604972] Allocated by task 282:
[   15.605149]  kasan_save_stack+0x45/0x70
[   15.605349]  kasan_save_track+0x18/0x40
[   15.605549]  kasan_save_alloc_info+0x3b/0x50
[   15.605764]  __kasan_kmalloc+0xb7/0xc0
[   15.605973]  __kmalloc_cache_noprof+0x189/0x420
[   15.606199]  kasan_atomics+0x95/0x310
[   15.606371]  kunit_try_run_case+0x1a5/0x480
[   15.606564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.606741]  kthread+0x337/0x6f0
[   15.606868]  ret_from_fork+0x116/0x1d0
[   15.607066]  ret_from_fork_asm+0x1a/0x30
[   15.607271] 
[   15.607368] The buggy address belongs to the object at ffff8881029b7000
[   15.607368]  which belongs to the cache kmalloc-64 of size 64
[   15.607909] The buggy address is located 0 bytes to the right of
[   15.607909]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.608386] 
[   15.608476] The buggy address belongs to the physical page:
[   15.608734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.609285] flags: 0x200000000000000(node=0|zone=2)
[   15.609526] page_type: f5(slab)
[   15.609650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.610417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.610831] page dumped because: kasan: bad access detected
[   15.611883] 
[   15.612219] Memory state around the buggy address:
[   15.612682]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.613369]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.613673] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.613970]                                      ^
[   15.614179]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.614459]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.614746] ==================================================================
[   15.413279] ==================================================================
[   15.413616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.413916] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.414223] 
[   15.414355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.414401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.414414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.414436] Call Trace:
[   15.414457]  <TASK>
[   15.414476]  dump_stack_lvl+0x73/0xb0
[   15.414505]  print_report+0xd1/0x610
[   15.414830]  ? __virt_addr_valid+0x1db/0x2d0
[   15.414858]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.414881]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.414918]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.414941]  kasan_report+0x141/0x180
[   15.414966]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.415008]  __asan_report_load4_noabort+0x18/0x20
[   15.415035]  kasan_atomics_helper+0x49ce/0x5450
[   15.415059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.415083]  ? kasan_save_alloc_info+0x3b/0x50
[   15.415114]  kasan_atomics+0x1dc/0x310
[   15.415140]  ? __pfx_kasan_atomics+0x10/0x10
[   15.415169]  ? __pfx_read_tsc+0x10/0x10
[   15.415192]  ? ktime_get_ts64+0x86/0x230
[   15.415219]  kunit_try_run_case+0x1a5/0x480
[   15.415244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.415268]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.415295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.415319]  ? __kthread_parkme+0x82/0x180
[   15.415342]  ? preempt_count_sub+0x50/0x80
[   15.415369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.415394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.415419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.415444]  kthread+0x337/0x6f0
[   15.415466]  ? trace_preempt_on+0x20/0xc0
[   15.415492]  ? __pfx_kthread+0x10/0x10
[   15.415514]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.415734]  ? calculate_sigpending+0x7b/0xa0
[   15.415763]  ? __pfx_kthread+0x10/0x10
[   15.415786]  ret_from_fork+0x116/0x1d0
[   15.415806]  ? __pfx_kthread+0x10/0x10
[   15.415827]  ret_from_fork_asm+0x1a/0x30
[   15.415861]  </TASK>
[   15.415874] 
[   15.426552] Allocated by task 282:
[   15.426716]  kasan_save_stack+0x45/0x70
[   15.426979]  kasan_save_track+0x18/0x40
[   15.427157]  kasan_save_alloc_info+0x3b/0x50
[   15.427382]  __kasan_kmalloc+0xb7/0xc0
[   15.427720]  __kmalloc_cache_noprof+0x189/0x420
[   15.428239]  kasan_atomics+0x95/0x310
[   15.428425]  kunit_try_run_case+0x1a5/0x480
[   15.428799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.429069]  kthread+0x337/0x6f0
[   15.429241]  ret_from_fork+0x116/0x1d0
[   15.429497]  ret_from_fork_asm+0x1a/0x30
[   15.429723] 
[   15.429826] The buggy address belongs to the object at ffff8881029b7000
[   15.429826]  which belongs to the cache kmalloc-64 of size 64
[   15.430507] The buggy address is located 0 bytes to the right of
[   15.430507]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.431142] 
[   15.431323] The buggy address belongs to the physical page:
[   15.431682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.432019] flags: 0x200000000000000(node=0|zone=2)
[   15.432472] page_type: f5(slab)
[   15.432604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.433395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.433817] page dumped because: kasan: bad access detected
[   15.434110] 
[   15.434210] Memory state around the buggy address:
[   15.434399]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.434928]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.435273] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.435565]                                      ^
[   15.435744]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.436502]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.436947] ==================================================================
[   15.616720] ==================================================================
[   15.617402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.617803] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.618259] 
[   15.618455] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.618501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.618514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.618537] Call Trace:
[   15.618553]  <TASK>
[   15.618596]  dump_stack_lvl+0x73/0xb0
[   15.618627]  print_report+0xd1/0x610
[   15.618672]  ? __virt_addr_valid+0x1db/0x2d0
[   15.618696]  ? kasan_atomics_helper+0x177f/0x5450
[   15.618718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.618753]  ? kasan_atomics_helper+0x177f/0x5450
[   15.618782]  kasan_report+0x141/0x180
[   15.618805]  ? kasan_atomics_helper+0x177f/0x5450
[   15.618834]  kasan_check_range+0x10c/0x1c0
[   15.618858]  __kasan_check_write+0x18/0x20
[   15.618879]  kasan_atomics_helper+0x177f/0x5450
[   15.618914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.618938]  ? kasan_save_alloc_info+0x3b/0x50
[   15.618988]  kasan_atomics+0x1dc/0x310
[   15.619013]  ? __pfx_kasan_atomics+0x10/0x10
[   15.619039]  ? __pfx_read_tsc+0x10/0x10
[   15.619061]  ? ktime_get_ts64+0x86/0x230
[   15.619087]  kunit_try_run_case+0x1a5/0x480
[   15.619112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.619136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.619162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.619187]  ? __kthread_parkme+0x82/0x180
[   15.619209]  ? preempt_count_sub+0x50/0x80
[   15.619234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.619258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.619284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.619310]  kthread+0x337/0x6f0
[   15.619330]  ? trace_preempt_on+0x20/0xc0
[   15.619354]  ? __pfx_kthread+0x10/0x10
[   15.619375]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.619398]  ? calculate_sigpending+0x7b/0xa0
[   15.619424]  ? __pfx_kthread+0x10/0x10
[   15.619446]  ret_from_fork+0x116/0x1d0
[   15.619466]  ? __pfx_kthread+0x10/0x10
[   15.619486]  ret_from_fork_asm+0x1a/0x30
[   15.619520]  </TASK>
[   15.619532] 
[   15.631364] Allocated by task 282:
[   15.631689]  kasan_save_stack+0x45/0x70
[   15.632088]  kasan_save_track+0x18/0x40
[   15.632249]  kasan_save_alloc_info+0x3b/0x50
[   15.632622]  __kasan_kmalloc+0xb7/0xc0
[   15.632989]  __kmalloc_cache_noprof+0x189/0x420
[   15.633362]  kasan_atomics+0x95/0x310
[   15.633500]  kunit_try_run_case+0x1a5/0x480
[   15.633650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.633829]  kthread+0x337/0x6f0
[   15.634098]  ret_from_fork+0x116/0x1d0
[   15.634469]  ret_from_fork_asm+0x1a/0x30
[   15.634860] 
[   15.635081] The buggy address belongs to the object at ffff8881029b7000
[   15.635081]  which belongs to the cache kmalloc-64 of size 64
[   15.636140] The buggy address is located 0 bytes to the right of
[   15.636140]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.637196] 
[   15.637276] The buggy address belongs to the physical page:
[   15.637457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.637702] flags: 0x200000000000000(node=0|zone=2)
[   15.637867] page_type: f5(slab)
[   15.638013] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.638319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.638583] page dumped because: kasan: bad access detected
[   15.638835] 
[   15.638928] Memory state around the buggy address:
[   15.639086]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.639407]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.639731] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.640094]                                      ^
[   15.640305]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640605]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640920] ==================================================================
[   15.811647] ==================================================================
[   15.811884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.812167] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.812403] 
[   15.812536] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.812580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.812593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.812614] Call Trace:
[   15.812656]  <TASK>
[   15.812673]  dump_stack_lvl+0x73/0xb0
[   15.812703]  print_report+0xd1/0x610
[   15.812727]  ? __virt_addr_valid+0x1db/0x2d0
[   15.812751]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.812773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.812797]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.812819]  kasan_report+0x141/0x180
[   15.812842]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.812870]  kasan_check_range+0x10c/0x1c0
[   15.812906]  __kasan_check_write+0x18/0x20
[   15.812925]  kasan_atomics_helper+0x1d7a/0x5450
[   15.812951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.812994]  ? kasan_save_alloc_info+0x3b/0x50
[   15.813024]  kasan_atomics+0x1dc/0x310
[   15.813049]  ? __pfx_kasan_atomics+0x10/0x10
[   15.813074]  ? __pfx_read_tsc+0x10/0x10
[   15.813095]  ? ktime_get_ts64+0x86/0x230
[   15.813121]  kunit_try_run_case+0x1a5/0x480
[   15.813146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.813215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.813240]  ? __kthread_parkme+0x82/0x180
[   15.813261]  ? preempt_count_sub+0x50/0x80
[   15.813286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.813336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.813379]  kthread+0x337/0x6f0
[   15.813399]  ? trace_preempt_on+0x20/0xc0
[   15.813423]  ? __pfx_kthread+0x10/0x10
[   15.813455]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.813478]  ? calculate_sigpending+0x7b/0xa0
[   15.813503]  ? __pfx_kthread+0x10/0x10
[   15.813525]  ret_from_fork+0x116/0x1d0
[   15.813544]  ? __pfx_kthread+0x10/0x10
[   15.813565]  ret_from_fork_asm+0x1a/0x30
[   15.813598]  </TASK>
[   15.813609] 
[   15.820702] Allocated by task 282:
[   15.820883]  kasan_save_stack+0x45/0x70
[   15.821118]  kasan_save_track+0x18/0x40
[   15.821311]  kasan_save_alloc_info+0x3b/0x50
[   15.821520]  __kasan_kmalloc+0xb7/0xc0
[   15.821702]  __kmalloc_cache_noprof+0x189/0x420
[   15.821936]  kasan_atomics+0x95/0x310
[   15.822146]  kunit_try_run_case+0x1a5/0x480
[   15.822364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822571]  kthread+0x337/0x6f0
[   15.822757]  ret_from_fork+0x116/0x1d0
[   15.822907]  ret_from_fork_asm+0x1a/0x30
[   15.823083] 
[   15.823174] The buggy address belongs to the object at ffff8881029b7000
[   15.823174]  which belongs to the cache kmalloc-64 of size 64
[   15.823524] The buggy address is located 0 bytes to the right of
[   15.823524]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.823876] 
[   15.823956] The buggy address belongs to the physical page:
[   15.824204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.824552] flags: 0x200000000000000(node=0|zone=2)
[   15.824780] page_type: f5(slab)
[   15.824960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.825324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.825652] page dumped because: kasan: bad access detected
[   15.825909] 
[   15.826050] Memory state around the buggy address:
[   15.826227]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826440]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826665] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.827014]                                      ^
[   15.827234]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.827543]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.827765] ==================================================================
[   15.482918] ==================================================================
[   15.483563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.483888] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.484637] 
[   15.484875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.484941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.484954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.484977] Call Trace:
[   15.484995]  <TASK>
[   15.485013]  dump_stack_lvl+0x73/0xb0
[   15.485051]  print_report+0xd1/0x610
[   15.485074]  ? __virt_addr_valid+0x1db/0x2d0
[   15.485098]  ? kasan_atomics_helper+0x1467/0x5450
[   15.485120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.485144]  ? kasan_atomics_helper+0x1467/0x5450
[   15.485167]  kasan_report+0x141/0x180
[   15.485190]  ? kasan_atomics_helper+0x1467/0x5450
[   15.485219]  kasan_check_range+0x10c/0x1c0
[   15.485244]  __kasan_check_write+0x18/0x20
[   15.485264]  kasan_atomics_helper+0x1467/0x5450
[   15.485288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.485312]  ? kasan_save_alloc_info+0x3b/0x50
[   15.485343]  kasan_atomics+0x1dc/0x310
[   15.485368]  ? __pfx_kasan_atomics+0x10/0x10
[   15.485392]  ? __pfx_read_tsc+0x10/0x10
[   15.485414]  ? ktime_get_ts64+0x86/0x230
[   15.485440]  kunit_try_run_case+0x1a5/0x480
[   15.485466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.485489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.485514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.485578]  ? __kthread_parkme+0x82/0x180
[   15.485599]  ? preempt_count_sub+0x50/0x80
[   15.485625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.485650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.485675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.485700]  kthread+0x337/0x6f0
[   15.485720]  ? trace_preempt_on+0x20/0xc0
[   15.485745]  ? __pfx_kthread+0x10/0x10
[   15.485766]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.485788]  ? calculate_sigpending+0x7b/0xa0
[   15.485813]  ? __pfx_kthread+0x10/0x10
[   15.485836]  ret_from_fork+0x116/0x1d0
[   15.485856]  ? __pfx_kthread+0x10/0x10
[   15.485876]  ret_from_fork_asm+0x1a/0x30
[   15.485921]  </TASK>
[   15.485932] 
[   15.498997] Allocated by task 282:
[   15.499197]  kasan_save_stack+0x45/0x70
[   15.499394]  kasan_save_track+0x18/0x40
[   15.499567]  kasan_save_alloc_info+0x3b/0x50
[   15.500112]  __kasan_kmalloc+0xb7/0xc0
[   15.500471]  __kmalloc_cache_noprof+0x189/0x420
[   15.500888]  kasan_atomics+0x95/0x310
[   15.501326]  kunit_try_run_case+0x1a5/0x480
[   15.501710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.501974]  kthread+0x337/0x6f0
[   15.502285]  ret_from_fork+0x116/0x1d0
[   15.502471]  ret_from_fork_asm+0x1a/0x30
[   15.503082] 
[   15.503187] The buggy address belongs to the object at ffff8881029b7000
[   15.503187]  which belongs to the cache kmalloc-64 of size 64
[   15.504279] The buggy address is located 0 bytes to the right of
[   15.504279]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.505029] 
[   15.505309] The buggy address belongs to the physical page:
[   15.505727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.506273] flags: 0x200000000000000(node=0|zone=2)
[   15.506681] page_type: f5(slab)
[   15.507010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.507329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.508032] page dumped because: kasan: bad access detected
[   15.508496] 
[   15.508780] Memory state around the buggy address:
[   15.509258]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.509725]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510233] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.510710]                                      ^
[   15.511042]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.511493]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.511935] ==================================================================
[   14.889864] ==================================================================
[   14.890252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.890500] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   14.890911] 
[   14.891049] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.891093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891126] Call Trace:
[   14.891142]  <TASK>
[   14.891156]  dump_stack_lvl+0x73/0xb0
[   14.891185]  print_report+0xd1/0x610
[   14.891208]  ? __virt_addr_valid+0x1db/0x2d0
[   14.891232]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.891254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.891279]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.891302]  kasan_report+0x141/0x180
[   14.891325]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.891354]  kasan_check_range+0x10c/0x1c0
[   14.891378]  __kasan_check_write+0x18/0x20
[   14.891399]  kasan_atomics_helper+0x7c7/0x5450
[   14.891422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.891447]  ? kasan_save_alloc_info+0x3b/0x50
[   14.891478]  kasan_atomics+0x1dc/0x310
[   14.891502]  ? __pfx_kasan_atomics+0x10/0x10
[   14.891772]  ? __pfx_read_tsc+0x10/0x10
[   14.891797]  ? ktime_get_ts64+0x86/0x230
[   14.891824]  kunit_try_run_case+0x1a5/0x480
[   14.891851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.891875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.891914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.891939]  ? __kthread_parkme+0x82/0x180
[   14.891961]  ? preempt_count_sub+0x50/0x80
[   14.892004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892081]  kthread+0x337/0x6f0
[   14.892101]  ? trace_preempt_on+0x20/0xc0
[   14.892126]  ? __pfx_kthread+0x10/0x10
[   14.892148]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892170]  ? calculate_sigpending+0x7b/0xa0
[   14.892196]  ? __pfx_kthread+0x10/0x10
[   14.892218]  ret_from_fork+0x116/0x1d0
[   14.892238]  ? __pfx_kthread+0x10/0x10
[   14.892260]  ret_from_fork_asm+0x1a/0x30
[   14.892292]  </TASK>
[   14.892304] 
[   14.900167] Allocated by task 282:
[   14.900336]  kasan_save_stack+0x45/0x70
[   14.900600]  kasan_save_track+0x18/0x40
[   14.900746]  kasan_save_alloc_info+0x3b/0x50
[   14.900911]  __kasan_kmalloc+0xb7/0xc0
[   14.901070]  __kmalloc_cache_noprof+0x189/0x420
[   14.901274]  kasan_atomics+0x95/0x310
[   14.901468]  kunit_try_run_case+0x1a5/0x480
[   14.901740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.902034]  kthread+0x337/0x6f0
[   14.902180]  ret_from_fork+0x116/0x1d0
[   14.902315]  ret_from_fork_asm+0x1a/0x30
[   14.902559] 
[   14.902668] The buggy address belongs to the object at ffff8881029b7000
[   14.902668]  which belongs to the cache kmalloc-64 of size 64
[   14.903254] The buggy address is located 0 bytes to the right of
[   14.903254]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   14.905256] 
[   14.905365] The buggy address belongs to the physical page:
[   14.905862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   14.906298] flags: 0x200000000000000(node=0|zone=2)
[   14.906485] page_type: f5(slab)
[   14.906847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.907332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.908289] page dumped because: kasan: bad access detected
[   14.908480] 
[   14.908863] Memory state around the buggy address:
[   14.909412]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909784]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.910131] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.910811]                                      ^
[   14.911266]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912106]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912486] ==================================================================
[   15.317591] ==================================================================
[   15.318255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.318536] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.319341] 
[   15.319551] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.319597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.319609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.319632] Call Trace:
[   15.319650]  <TASK>
[   15.319667]  dump_stack_lvl+0x73/0xb0
[   15.319698]  print_report+0xd1/0x610
[   15.319721]  ? __virt_addr_valid+0x1db/0x2d0
[   15.319746]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.319768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.319792]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.319815]  kasan_report+0x141/0x180
[   15.319841]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.319870]  __asan_report_load4_noabort+0x18/0x20
[   15.319907]  kasan_atomics_helper+0x4a02/0x5450
[   15.319932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.319956]  ? kasan_save_alloc_info+0x3b/0x50
[   15.319987]  kasan_atomics+0x1dc/0x310
[   15.320013]  ? __pfx_kasan_atomics+0x10/0x10
[   15.320039]  ? __pfx_read_tsc+0x10/0x10
[   15.320061]  ? ktime_get_ts64+0x86/0x230
[   15.320087]  kunit_try_run_case+0x1a5/0x480
[   15.320112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.320161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.320186]  ? __kthread_parkme+0x82/0x180
[   15.320208]  ? preempt_count_sub+0x50/0x80
[   15.320233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.320284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.320309]  kthread+0x337/0x6f0
[   15.320329]  ? trace_preempt_on+0x20/0xc0
[   15.320354]  ? __pfx_kthread+0x10/0x10
[   15.320376]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.320398]  ? calculate_sigpending+0x7b/0xa0
[   15.320423]  ? __pfx_kthread+0x10/0x10
[   15.320445]  ret_from_fork+0x116/0x1d0
[   15.320464]  ? __pfx_kthread+0x10/0x10
[   15.320486]  ret_from_fork_asm+0x1a/0x30
[   15.320519]  </TASK>
[   15.320530] 
[   15.334513] Allocated by task 282:
[   15.334886]  kasan_save_stack+0x45/0x70
[   15.335141]  kasan_save_track+0x18/0x40
[   15.335279]  kasan_save_alloc_info+0x3b/0x50
[   15.335432]  __kasan_kmalloc+0xb7/0xc0
[   15.335566]  __kmalloc_cache_noprof+0x189/0x420
[   15.335809]  kasan_atomics+0x95/0x310
[   15.336158]  kunit_try_run_case+0x1a5/0x480
[   15.336415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.336807]  kthread+0x337/0x6f0
[   15.336947]  ret_from_fork+0x116/0x1d0
[   15.337146]  ret_from_fork_asm+0x1a/0x30
[   15.337296] 
[   15.337372] The buggy address belongs to the object at ffff8881029b7000
[   15.337372]  which belongs to the cache kmalloc-64 of size 64
[   15.337756] The buggy address is located 0 bytes to the right of
[   15.337756]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.338273] 
[   15.338347] The buggy address belongs to the physical page:
[   15.338636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.339054] flags: 0x200000000000000(node=0|zone=2)
[   15.339301] page_type: f5(slab)
[   15.339424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.339750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.340137] page dumped because: kasan: bad access detected
[   15.340368] 
[   15.340489] Memory state around the buggy address:
[   15.340683]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.340979]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.341381] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.341595]                                      ^
[   15.341783]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.342125]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.342401] ==================================================================
[   15.922943] ==================================================================
[   15.923211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.923575] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282
[   15.924049] 
[   15.924190] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.924236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.924250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.924274] Call Trace:
[   15.924290]  <TASK>
[   15.924307]  dump_stack_lvl+0x73/0xb0
[   15.924336]  print_report+0xd1/0x610
[   15.924359]  ? __virt_addr_valid+0x1db/0x2d0
[   15.924385]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.924409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.924472]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.924498]  kasan_report+0x141/0x180
[   15.924522]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.924551]  __asan_report_load8_noabort+0x18/0x20
[   15.924576]  kasan_atomics_helper+0x4f98/0x5450
[   15.924629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.924655]  ? kasan_save_alloc_info+0x3b/0x50
[   15.924686]  kasan_atomics+0x1dc/0x310
[   15.924711]  ? __pfx_kasan_atomics+0x10/0x10
[   15.924735]  ? __pfx_read_tsc+0x10/0x10
[   15.924756]  ? ktime_get_ts64+0x86/0x230
[   15.924782]  kunit_try_run_case+0x1a5/0x480
[   15.924807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.924829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.924855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.924880]  ? __kthread_parkme+0x82/0x180
[   15.924939]  ? preempt_count_sub+0x50/0x80
[   15.924985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.925011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.925036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.925061]  kthread+0x337/0x6f0
[   15.925114]  ? trace_preempt_on+0x20/0xc0
[   15.925139]  ? __pfx_kthread+0x10/0x10
[   15.925161]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.925183]  ? calculate_sigpending+0x7b/0xa0
[   15.925208]  ? __pfx_kthread+0x10/0x10
[   15.925260]  ret_from_fork+0x116/0x1d0
[   15.925280]  ? __pfx_kthread+0x10/0x10
[   15.925301]  ret_from_fork_asm+0x1a/0x30
[   15.925334]  </TASK>
[   15.925344] 
[   15.933080] Allocated by task 282:
[   15.933269]  kasan_save_stack+0x45/0x70
[   15.933453]  kasan_save_track+0x18/0x40
[   15.933626]  kasan_save_alloc_info+0x3b/0x50
[   15.933843]  __kasan_kmalloc+0xb7/0xc0
[   15.934102]  __kmalloc_cache_noprof+0x189/0x420
[   15.934332]  kasan_atomics+0x95/0x310
[   15.934498]  kunit_try_run_case+0x1a5/0x480
[   15.934736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.935042]  kthread+0x337/0x6f0
[   15.935245]  ret_from_fork+0x116/0x1d0
[   15.935396]  ret_from_fork_asm+0x1a/0x30
[   15.935706] 
[   15.935903] The buggy address belongs to the object at ffff8881029b7000
[   15.935903]  which belongs to the cache kmalloc-64 of size 64
[   15.936461] The buggy address is located 0 bytes to the right of
[   15.936461]  allocated 48-byte region [ffff8881029b7000, ffff8881029b7030)
[   15.937038] 
[   15.937133] The buggy address belongs to the physical page:
[   15.937360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7
[   15.937687] flags: 0x200000000000000(node=0|zone=2)
[   15.937962] page_type: f5(slab)
[   15.938181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.938433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.938660] page dumped because: kasan: bad access detected
[   15.938839] 
[   15.938959] Memory state around the buggy address:
[   15.939203]  ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.939521]  ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.939840] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.940152]                                      ^
[   15.940311]  ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.940624]  ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.940963] ==================================================================