Hay
Date
July 3, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   23.095635] ==================================================================
[   23.095799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   23.095932] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.096214] 
[   23.096302] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.096467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.096859] Hardware name: linux,dummy-virt (DT)
[   23.096946] Call trace:
[   23.096998]  show_stack+0x20/0x38 (C)
[   23.097261]  dump_stack_lvl+0x8c/0xd0
[   23.097388]  print_report+0x118/0x608
[   23.097490]  kasan_report+0xdc/0x128
[   23.097692]  __asan_report_load4_noabort+0x20/0x30
[   23.097816]  kasan_atomics_helper+0x42d8/0x4858
[   23.097942]  kasan_atomics+0x198/0x2e0
[   23.098091]  kunit_try_run_case+0x170/0x3f0
[   23.098204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.098326]  kthread+0x328/0x630
[   23.098428]  ret_from_fork+0x10/0x20
[   23.098548] 
[   23.098608] Allocated by task 265:
[   23.098670]  kasan_save_stack+0x3c/0x68
[   23.098745]  kasan_save_track+0x20/0x40
[   23.098957]  kasan_save_alloc_info+0x40/0x58
[   23.099067]  __kasan_kmalloc+0xd4/0xd8
[   23.099359]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.099412]  kasan_atomics+0xb8/0x2e0
[   23.099451]  kunit_try_run_case+0x170/0x3f0
[   23.099497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.099558]  kthread+0x328/0x630
[   23.099593]  ret_from_fork+0x10/0x20
[   23.099631] 
[   23.099654] The buggy address belongs to the object at fff00000c659e300
[   23.099654]  which belongs to the cache kmalloc-64 of size 64
[   23.099717] The buggy address is located 0 bytes to the right of
[   23.099717]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.099781] 
[   23.099806] The buggy address belongs to the physical page:
[   23.099840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.099896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.099950] page_type: f5(slab)
[   23.100146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.100850]                                      ^
[   23.102050] 
[   23.102559] Call trace:
[   23.102612]  show_stack+0x20/0x38 (C)
[   23.102705]  dump_stack_lvl+0x8c/0xd0
[   23.102795]  print_report+0x118/0x608
[   23.102898]  kasan_report+0xdc/0x128
[   23.103003]  kasan_check_range+0x100/0x1a8
[   23.104219]  __kasan_check_write+0x20/0x30
[   23.104461]  kasan_atomics_helper+0x934/0x4858
[   23.104661]  kasan_atomics+0x198/0x2e0
[   23.105068]  kunit_try_run_case+0x170/0x3f0
[   23.105294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.105416]  kthread+0x328/0x630
[   23.105729]  ret_from_fork+0x10/0x20
[   23.105900] 
[   23.106073] Allocated by task 265:
[   23.106184]  kasan_save_stack+0x3c/0x68
[   23.106292]  kasan_save_track+0x20/0x40
[   23.106364]  kasan_save_alloc_info+0x40/0x58
[   23.106880]  __kasan_kmalloc+0xd4/0xd8
[   23.106995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.107116]  kasan_atomics+0xb8/0x2e0
[   23.107207]  kunit_try_run_case+0x170/0x3f0
[   23.107325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.107435]  kthread+0x328/0x630
[   23.107684]  ret_from_fork+0x10/0x20
[   23.107913] 
[   23.108123] The buggy address belongs to the object at fff00000c659e300
[   23.108123]  which belongs to the cache kmalloc-64 of size 64
[   23.108250] The buggy address is located 0 bytes to the right of
[   23.108250]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.108534] 
[   23.108614] The buggy address belongs to the physical page:
[   23.108721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.108869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.109032] page_type: f5(slab)
[   23.109136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.109317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.109459] page dumped because: kasan: bad access detected
[   23.109536] 
[   23.109580] Memory state around the buggy address:
[   23.109668]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.109755]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.109852] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.109952]                                      ^
[   23.110392]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.110619]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.110700] ==================================================================
[   23.306618] ==================================================================
[   23.306727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   23.306838] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.306940] 
[   23.307000] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.307191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.307256] Hardware name: linux,dummy-virt (DT)
[   23.307325] Call trace:
[   23.307383]  show_stack+0x20/0x38 (C)
[   23.307495]  dump_stack_lvl+0x8c/0xd0
[   23.307601]  print_report+0x118/0x608
[   23.307708]  kasan_report+0xdc/0x128
[   23.307812]  kasan_check_range+0x100/0x1a8
[   23.307927]  __kasan_check_write+0x20/0x30
[   23.308048]  kasan_atomics_helper+0xff0/0x4858
[   23.308149]  kasan_atomics+0x198/0x2e0
[   23.308242]  kunit_try_run_case+0x170/0x3f0
[   23.308329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.308444]  kthread+0x328/0x630
[   23.308559]  ret_from_fork+0x10/0x20
[   23.308666] 
[   23.308716] Allocated by task 265:
[   23.308784]  kasan_save_stack+0x3c/0x68
[   23.308872]  kasan_save_track+0x20/0x40
[   23.308959]  kasan_save_alloc_info+0x40/0x58
[   23.309063]  __kasan_kmalloc+0xd4/0xd8
[   23.309150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.309251]  kasan_atomics+0xb8/0x2e0
[   23.309348]  kunit_try_run_case+0x170/0x3f0
[   23.309426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.309517]  kthread+0x328/0x630
[   23.309586]  ret_from_fork+0x10/0x20
[   23.309667] 
[   23.309721] The buggy address belongs to the object at fff00000c659e300
[   23.309721]  which belongs to the cache kmalloc-64 of size 64
[   23.309922] The buggy address is located 0 bytes to the right of
[   23.309922]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.310153] 
[   23.310203] The buggy address belongs to the physical page:
[   23.310309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.310433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.310530] page_type: f5(slab)
[   23.310603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.311121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.311224] page dumped because: kasan: bad access detected
[   23.311303] 
[   23.311351] Memory state around the buggy address:
[   23.311429]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.311543]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.311638] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.311797]                                      ^
[   23.311877]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.311976]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.312078] ==================================================================
[   23.460652] ==================================================================
[   23.460776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   23.460918] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.461060] 
[   23.461132] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.461340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.461408] Hardware name: linux,dummy-virt (DT)
[   23.461487] Call trace:
[   23.461535]  show_stack+0x20/0x38 (C)
[   23.461648]  dump_stack_lvl+0x8c/0xd0
[   23.461794]  print_report+0x118/0x608
[   23.462018]  kasan_report+0xdc/0x128
[   23.462173]  kasan_check_range+0x100/0x1a8
[   23.462305]  __kasan_check_write+0x20/0x30
[   23.462467]  kasan_atomics_helper+0x16d0/0x4858
[   23.462631]  kasan_atomics+0x198/0x2e0
[   23.462756]  kunit_try_run_case+0x170/0x3f0
[   23.462845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.462979]  kthread+0x328/0x630
[   23.463099]  ret_from_fork+0x10/0x20
[   23.463201] 
[   23.463257] Allocated by task 265:
[   23.463316]  kasan_save_stack+0x3c/0x68
[   23.463407]  kasan_save_track+0x20/0x40
[   23.463489]  kasan_save_alloc_info+0x40/0x58
[   23.463636]  __kasan_kmalloc+0xd4/0xd8
[   23.463799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.463936]  kasan_atomics+0xb8/0x2e0
[   23.464039]  kunit_try_run_case+0x170/0x3f0
[   23.464138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.464249]  kthread+0x328/0x630
[   23.464367]  ret_from_fork+0x10/0x20
[   23.464493] 
[   23.464550] The buggy address belongs to the object at fff00000c659e300
[   23.464550]  which belongs to the cache kmalloc-64 of size 64
[   23.464699] The buggy address is located 0 bytes to the right of
[   23.464699]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.464861] 
[   23.464918] The buggy address belongs to the physical page:
[   23.465035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.465244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.465362] page_type: f5(slab)
[   23.465449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.465589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.465748] page dumped because: kasan: bad access detected
[   23.465828] 
[   23.465878] Memory state around the buggy address:
[   23.465967]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.466079]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.466185] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.466285]                                      ^
[   23.466483]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.466589]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.466684] ==================================================================
[   23.353482] ==================================================================
[   23.353591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   23.353697] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.353805] 
[   23.353877] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.354082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.354148] Hardware name: linux,dummy-virt (DT)
[   23.354217] Call trace:
[   23.354278]  show_stack+0x20/0x38 (C)
[   23.354379]  dump_stack_lvl+0x8c/0xd0
[   23.354491]  print_report+0x118/0x608
[   23.354599]  kasan_report+0xdc/0x128
[   23.354700]  kasan_check_range+0x100/0x1a8
[   23.354808]  __kasan_check_write+0x20/0x30
[   23.354910]  kasan_atomics_helper+0x126c/0x4858
[   23.355037]  kasan_atomics+0x198/0x2e0
[   23.356239]  kunit_try_run_case+0x170/0x3f0
[   23.356672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.356833]  kthread+0x328/0x630
[   23.356937]  ret_from_fork+0x10/0x20
[   23.357294] 
[   23.357352] Allocated by task 265:
[   23.357444]  kasan_save_stack+0x3c/0x68
[   23.357549]  kasan_save_track+0x20/0x40
[   23.357639]  kasan_save_alloc_info+0x40/0x58
[   23.357759]  __kasan_kmalloc+0xd4/0xd8
[   23.357918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.358090]  kasan_atomics+0xb8/0x2e0
[   23.358186]  kunit_try_run_case+0x170/0x3f0
[   23.358313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.358426]  kthread+0x328/0x630
[   23.358533]  ret_from_fork+0x10/0x20
[   23.358610] 
[   23.358652] The buggy address belongs to the object at fff00000c659e300
[   23.358652]  which belongs to the cache kmalloc-64 of size 64
[   23.358792] The buggy address is located 0 bytes to the right of
[   23.358792]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.358930] 
[   23.358979] The buggy address belongs to the physical page:
[   23.359122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.359263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.359368] page_type: f5(slab)
[   23.359452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.359599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.359753] page dumped because: kasan: bad access detected
[   23.359865] 
[   23.359911] Memory state around the buggy address:
[   23.360217]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.360347]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.360465] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.360570]                                      ^
[   23.360661]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.360768]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.360867] ==================================================================
[   23.467327] ==================================================================
[   23.467442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   23.467542] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.467639] 
[   23.467695] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.467867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.467928] Hardware name: linux,dummy-virt (DT)
[   23.468006] Call trace:
[   23.468077]  show_stack+0x20/0x38 (C)
[   23.468192]  dump_stack_lvl+0x8c/0xd0
[   23.468302]  print_report+0x118/0x608
[   23.468413]  kasan_report+0xdc/0x128
[   23.468537]  __asan_report_load8_noabort+0x20/0x30
[   23.468659]  kasan_atomics_helper+0x3e10/0x4858
[   23.468784]  kasan_atomics+0x198/0x2e0
[   23.468895]  kunit_try_run_case+0x170/0x3f0
[   23.469013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.470529]  kthread+0x328/0x630
[   23.470660]  ret_from_fork+0x10/0x20
[   23.470870] 
[   23.470926] Allocated by task 265:
[   23.471326]  kasan_save_stack+0x3c/0x68
[   23.471419]  kasan_save_track+0x20/0x40
[   23.471895]  kasan_save_alloc_info+0x40/0x58
[   23.471990]  __kasan_kmalloc+0xd4/0xd8
[   23.472123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.472351]  kasan_atomics+0xb8/0x2e0
[   23.472444]  kunit_try_run_case+0x170/0x3f0
[   23.472583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.472704]  kthread+0x328/0x630
[   23.472889]  ret_from_fork+0x10/0x20
[   23.472989] 
[   23.473052] The buggy address belongs to the object at fff00000c659e300
[   23.473052]  which belongs to the cache kmalloc-64 of size 64
[   23.473184] The buggy address is located 0 bytes to the right of
[   23.473184]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.473338] 
[   23.473391] The buggy address belongs to the physical page:
[   23.473465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.473589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.473760] page_type: f5(slab)
[   23.473837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.473966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.474081] page dumped because: kasan: bad access detected
[   23.474160] 
[   23.474208] Memory state around the buggy address:
[   23.474279]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.474369]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.474518] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.474607]                                      ^
[   23.474717]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.474828]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.474923] ==================================================================
[   23.312549] ==================================================================
[   23.312679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   23.312784] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.312896] 
[   23.312961] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.313216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.313304] Hardware name: linux,dummy-virt (DT)
[   23.313391] Call trace:
[   23.313467]  show_stack+0x20/0x38 (C)
[   23.313580]  dump_stack_lvl+0x8c/0xd0
[   23.313764]  print_report+0x118/0x608
[   23.313869]  kasan_report+0xdc/0x128
[   23.313983]  kasan_check_range+0x100/0x1a8
[   23.314115]  __kasan_check_write+0x20/0x30
[   23.314256]  kasan_atomics_helper+0x1058/0x4858
[   23.314362]  kasan_atomics+0x198/0x2e0
[   23.314472]  kunit_try_run_case+0x170/0x3f0
[   23.314593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.314749]  kthread+0x328/0x630
[   23.314866]  ret_from_fork+0x10/0x20
[   23.314959] 
[   23.315004] Allocated by task 265:
[   23.315078]  kasan_save_stack+0x3c/0x68
[   23.315155]  kasan_save_track+0x20/0x40
[   23.315226]  kasan_save_alloc_info+0x40/0x58
[   23.315305]  __kasan_kmalloc+0xd4/0xd8
[   23.315384]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.315500]  kasan_atomics+0xb8/0x2e0
[   23.315569]  kunit_try_run_case+0x170/0x3f0
[   23.315718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.315820]  kthread+0x328/0x630
[   23.315888]  ret_from_fork+0x10/0x20
[   23.315972] 
[   23.316035] The buggy address belongs to the object at fff00000c659e300
[   23.316035]  which belongs to the cache kmalloc-64 of size 64
[   23.316179] The buggy address is located 0 bytes to the right of
[   23.316179]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.316332] 
[   23.316379] The buggy address belongs to the physical page:
[   23.316452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.316596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.316706] page_type: f5(slab)
[   23.316788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.316903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.317004] page dumped because: kasan: bad access detected
[   23.317096] 
[   23.317143] Memory state around the buggy address:
[   23.317225]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.317316]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.317436] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.317546]                                      ^
[   23.317620]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.317743]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.317872] ==================================================================
[   23.452253] ==================================================================
[   23.452398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   23.452531] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.452725] 
[   23.453109] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.453419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.453491] Hardware name: linux,dummy-virt (DT)
[   23.454595] Call trace:
[   23.455056]  show_stack+0x20/0x38 (C)
[   23.455305]  dump_stack_lvl+0x8c/0xd0
[   23.455469]  print_report+0x118/0x608
[   23.455634]  kasan_report+0xdc/0x128
[   23.455771]  __asan_report_load8_noabort+0x20/0x30
[   23.455898]  kasan_atomics_helper+0x3df4/0x4858
[   23.456087]  kasan_atomics+0x198/0x2e0
[   23.456227]  kunit_try_run_case+0x170/0x3f0
[   23.456343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.456476]  kthread+0x328/0x630
[   23.456597]  ret_from_fork+0x10/0x20
[   23.456720] 
[   23.456800] Allocated by task 265:
[   23.456898]  kasan_save_stack+0x3c/0x68
[   23.457009]  kasan_save_track+0x20/0x40
[   23.457102]  kasan_save_alloc_info+0x40/0x58
[   23.457199]  __kasan_kmalloc+0xd4/0xd8
[   23.457292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.457387]  kasan_atomics+0xb8/0x2e0
[   23.457462]  kunit_try_run_case+0x170/0x3f0
[   23.457548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.457657]  kthread+0x328/0x630
[   23.457759]  ret_from_fork+0x10/0x20
[   23.457917] 
[   23.457970] The buggy address belongs to the object at fff00000c659e300
[   23.457970]  which belongs to the cache kmalloc-64 of size 64
[   23.458134] The buggy address is located 0 bytes to the right of
[   23.458134]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.458277] 
[   23.458325] The buggy address belongs to the physical page:
[   23.458419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.458574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.458730] page_type: f5(slab)
[   23.458812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.458978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.459084] page dumped because: kasan: bad access detected
[   23.459157] 
[   23.459295] Memory state around the buggy address:
[   23.459374]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.459482]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.459598] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.459686]                                      ^
[   23.459767]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.459873]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.460010] ==================================================================
[   23.278096] ==================================================================
[   23.278377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   23.278689] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.278829] 
[   23.278900] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.279094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.279163] Hardware name: linux,dummy-virt (DT)
[   23.279233] Call trace:
[   23.279285]  show_stack+0x20/0x38 (C)
[   23.279392]  dump_stack_lvl+0x8c/0xd0
[   23.279497]  print_report+0x118/0x608
[   23.279584]  kasan_report+0xdc/0x128
[   23.279672]  __asan_report_store8_noabort+0x20/0x30
[   23.279780]  kasan_atomics_helper+0x3e5c/0x4858
[   23.279885]  kasan_atomics+0x198/0x2e0
[   23.279995]  kunit_try_run_case+0x170/0x3f0
[   23.280123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.280247]  kthread+0x328/0x630
[   23.280348]  ret_from_fork+0x10/0x20
[   23.280454] 
[   23.280512] Allocated by task 265:
[   23.280588]  kasan_save_stack+0x3c/0x68
[   23.280682]  kasan_save_track+0x20/0x40
[   23.280770]  kasan_save_alloc_info+0x40/0x58
[   23.280857]  __kasan_kmalloc+0xd4/0xd8
[   23.280944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.281823]  kasan_atomics+0xb8/0x2e0
[   23.281940]  kunit_try_run_case+0x170/0x3f0
[   23.282488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.283010]  kthread+0x328/0x630
[   23.283112]  ret_from_fork+0x10/0x20
[   23.283415] 
[   23.283563] The buggy address belongs to the object at fff00000c659e300
[   23.283563]  which belongs to the cache kmalloc-64 of size 64
[   23.283853] The buggy address is located 0 bytes to the right of
[   23.283853]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.284228] 
[   23.284328] The buggy address belongs to the physical page:
[   23.284416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.284553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.284675] page_type: f5(slab)
[   23.285081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.285214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.285798] page dumped because: kasan: bad access detected
[   23.285889] 
[   23.285947] Memory state around the buggy address:
[   23.286046]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.286477]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.286740] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.286873]                                      ^
[   23.286941]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.287034]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.287117] ==================================================================
[   23.475418] ==================================================================
[   23.475625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   23.475797] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.475911] 
[   23.475971] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.476180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.476239] Hardware name: linux,dummy-virt (DT)
[   23.476304] Call trace:
[   23.476356]  show_stack+0x20/0x38 (C)
[   23.476534]  dump_stack_lvl+0x8c/0xd0
[   23.476656]  print_report+0x118/0x608
[   23.476752]  kasan_report+0xdc/0x128
[   23.476862]  kasan_check_range+0x100/0x1a8
[   23.477005]  __kasan_check_write+0x20/0x30
[   23.477176]  kasan_atomics_helper+0x175c/0x4858
[   23.477351]  kasan_atomics+0x198/0x2e0
[   23.477499]  kunit_try_run_case+0x170/0x3f0
[   23.477652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.477808]  kthread+0x328/0x630
[   23.478143]  ret_from_fork+0x10/0x20
[   23.478397] 
[   23.478753] Allocated by task 265:
[   23.478873]  kasan_save_stack+0x3c/0x68
[   23.479044]  kasan_save_track+0x20/0x40
[   23.479197]  kasan_save_alloc_info+0x40/0x58
[   23.479498]  __kasan_kmalloc+0xd4/0xd8
[   23.479862]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.480161]  kasan_atomics+0xb8/0x2e0
[   23.480211]  kunit_try_run_case+0x170/0x3f0
[   23.480252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.480307]  kthread+0x328/0x630
[   23.480371]  ret_from_fork+0x10/0x20
[   23.480494] 
[   23.480556] The buggy address belongs to the object at fff00000c659e300
[   23.480556]  which belongs to the cache kmalloc-64 of size 64
[   23.480887] The buggy address is located 0 bytes to the right of
[   23.480887]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.481410] 
[   23.481466] The buggy address belongs to the physical page:
[   23.481739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.481991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.482112] page_type: f5(slab)
[   23.482199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.482316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.482397] page dumped because: kasan: bad access detected
[   23.483175] 
[   23.483792] Memory state around the buggy address:
[   23.483907]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.484009]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.484107] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.484181]                                      ^
[   23.484255]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.484347]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.484423] ==================================================================
[   23.239180] ==================================================================
[   23.239467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   23.239586] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.239806] 
[   23.239912] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.240133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.240194] Hardware name: linux,dummy-virt (DT)
[   23.240306] Call trace:
[   23.240441]  show_stack+0x20/0x38 (C)
[   23.240565]  dump_stack_lvl+0x8c/0xd0
[   23.240684]  print_report+0x118/0x608
[   23.240792]  kasan_report+0xdc/0x128
[   23.241322]  __asan_report_load4_noabort+0x20/0x30
[   23.241464]  kasan_atomics_helper+0x3dd8/0x4858
[   23.241571]  kasan_atomics+0x198/0x2e0
[   23.241744]  kunit_try_run_case+0x170/0x3f0
[   23.241861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.242041]  kthread+0x328/0x630
[   23.242144]  ret_from_fork+0x10/0x20
[   23.242256] 
[   23.242303] Allocated by task 265:
[   23.242374]  kasan_save_stack+0x3c/0x68
[   23.242479]  kasan_save_track+0x20/0x40
[   23.242546]  kasan_save_alloc_info+0x40/0x58
[   23.242638]  __kasan_kmalloc+0xd4/0xd8
[   23.242709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.242814]  kasan_atomics+0xb8/0x2e0
[   23.242885]  kunit_try_run_case+0x170/0x3f0
[   23.242964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.243073]  kthread+0x328/0x630
[   23.243149]  ret_from_fork+0x10/0x20
[   23.243225] 
[   23.243284] The buggy address belongs to the object at fff00000c659e300
[   23.243284]  which belongs to the cache kmalloc-64 of size 64
[   23.243418] The buggy address is located 0 bytes to the right of
[   23.243418]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.243570] 
[   23.243615] The buggy address belongs to the physical page:
[   23.243683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.243807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.243908] page_type: f5(slab)
[   23.244001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.244209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.244347] page dumped because: kasan: bad access detected
[   23.244457] 
[   23.244540] Memory state around the buggy address:
[   23.244658]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.244766]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.244877] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.244995]                                      ^
[   23.245102]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.245215]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.245316] ==================================================================
[   23.338062] ==================================================================
[   23.338179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   23.338510] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.338642] 
[   23.338709] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.338892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.338959] Hardware name: linux,dummy-virt (DT)
[   23.339052] Call trace:
[   23.339271]  show_stack+0x20/0x38 (C)
[   23.339390]  dump_stack_lvl+0x8c/0xd0
[   23.339529]  print_report+0x118/0x608
[   23.339645]  kasan_report+0xdc/0x128
[   23.339751]  kasan_check_range+0x100/0x1a8
[   23.339862]  __kasan_check_write+0x20/0x30
[   23.339973]  kasan_atomics_helper+0x1190/0x4858
[   23.340924]  kasan_atomics+0x198/0x2e0
[   23.341101]  kunit_try_run_case+0x170/0x3f0
[   23.342098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.342283]  kthread+0x328/0x630
[   23.342449]  ret_from_fork+0x10/0x20
[   23.342546] 
[   23.342647] Allocated by task 265:
[   23.342713]  kasan_save_stack+0x3c/0x68
[   23.342799]  kasan_save_track+0x20/0x40
[   23.342873]  kasan_save_alloc_info+0x40/0x58
[   23.342959]  __kasan_kmalloc+0xd4/0xd8
[   23.343304]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.343447]  kasan_atomics+0xb8/0x2e0
[   23.343560]  kunit_try_run_case+0x170/0x3f0
[   23.343715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.343820]  kthread+0x328/0x630
[   23.343925]  ret_from_fork+0x10/0x20
[   23.344050] 
[   23.344118] The buggy address belongs to the object at fff00000c659e300
[   23.344118]  which belongs to the cache kmalloc-64 of size 64
[   23.344302] The buggy address is located 0 bytes to the right of
[   23.344302]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.344440] 
[   23.344514] The buggy address belongs to the physical page:
[   23.344632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.344792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.344971] page_type: f5(slab)
[   23.345086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.345204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.345313] page dumped because: kasan: bad access detected
[   23.345387] 
[   23.345664] Memory state around the buggy address:
[   23.345910]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.346014]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.346122] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.346203]                                      ^
[   23.346420]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.346530]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.346649] ==================================================================
[   23.318955] ==================================================================
[   23.319089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   23.319201] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.319313] 
[   23.319385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.319557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.319620] Hardware name: linux,dummy-virt (DT)
[   23.319694] Call trace:
[   23.319746]  show_stack+0x20/0x38 (C)
[   23.319859]  dump_stack_lvl+0x8c/0xd0
[   23.319967]  print_report+0x118/0x608
[   23.321054]  kasan_report+0xdc/0x128
[   23.321219]  kasan_check_range+0x100/0x1a8
[   23.321334]  __kasan_check_write+0x20/0x30
[   23.322008]  kasan_atomics_helper+0x10c0/0x4858
[   23.322243]  kasan_atomics+0x198/0x2e0
[   23.322365]  kunit_try_run_case+0x170/0x3f0
[   23.322485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.322607]  kthread+0x328/0x630
[   23.322729]  ret_from_fork+0x10/0x20
[   23.322969] 
[   23.323141] Allocated by task 265:
[   23.323365]  kasan_save_stack+0x3c/0x68
[   23.323779]  kasan_save_track+0x20/0x40
[   23.324073]  kasan_save_alloc_info+0x40/0x58
[   23.324178]  __kasan_kmalloc+0xd4/0xd8
[   23.324361]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.324928]  kasan_atomics+0xb8/0x2e0
[   23.325218]  kunit_try_run_case+0x170/0x3f0
[   23.325575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.325917]  kthread+0x328/0x630
[   23.326071]  ret_from_fork+0x10/0x20
[   23.326336] 
[   23.326526] The buggy address belongs to the object at fff00000c659e300
[   23.326526]  which belongs to the cache kmalloc-64 of size 64
[   23.326657] The buggy address is located 0 bytes to the right of
[   23.326657]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.326908] 
[   23.326964] The buggy address belongs to the physical page:
[   23.327069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.327265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.327432] page_type: f5(slab)
[   23.327533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.327655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.327755] page dumped because: kasan: bad access detected
[   23.327832] 
[   23.327880] Memory state around the buggy address:
[   23.327955]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.328068]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.328168] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.328258]                                      ^
[   23.328351]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.328442]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.328589] ==================================================================
[   23.484892] ==================================================================
[   23.484993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   23.485140] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.485242] 
[   23.485299] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.488059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.488135] Hardware name: linux,dummy-virt (DT)
[   23.488205] Call trace:
[   23.488248]  show_stack+0x20/0x38 (C)
[   23.488359]  dump_stack_lvl+0x8c/0xd0
[   23.488466]  print_report+0x118/0x608
[   23.488578]  kasan_report+0xdc/0x128
[   23.488678]  __asan_report_load8_noabort+0x20/0x30
[   23.488784]  kasan_atomics_helper+0x3e20/0x4858
[   23.488883]  kasan_atomics+0x198/0x2e0
[   23.488985]  kunit_try_run_case+0x170/0x3f0
[   23.489112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.489239]  kthread+0x328/0x630
[   23.489339]  ret_from_fork+0x10/0x20
[   23.489436] 
[   23.489482] Allocated by task 265:
[   23.489543]  kasan_save_stack+0x3c/0x68
[   23.489632]  kasan_save_track+0x20/0x40
[   23.490789]  kasan_save_alloc_info+0x40/0x58
[   23.490937]  __kasan_kmalloc+0xd4/0xd8
[   23.491052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.491148]  kasan_atomics+0xb8/0x2e0
[   23.491227]  kunit_try_run_case+0x170/0x3f0
[   23.491312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.491404]  kthread+0x328/0x630
[   23.491471]  ret_from_fork+0x10/0x20
[   23.491552] 
[   23.491599] The buggy address belongs to the object at fff00000c659e300
[   23.491599]  which belongs to the cache kmalloc-64 of size 64
[   23.491727] The buggy address is located 0 bytes to the right of
[   23.491727]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.491851] 
[   23.491899] The buggy address belongs to the physical page:
[   23.492018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.492177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.492314] page_type: f5(slab)
[   23.492411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.492581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.492737] page dumped because: kasan: bad access detected
[   23.492854] 
[   23.492911] Memory state around the buggy address:
[   23.493018]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.493166]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.493260] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.493348]                                      ^
[   23.493420]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493509]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.494303] ==================================================================
[   23.158139] ==================================================================
[   23.158230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   23.158336] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.158450] 
[   23.158523] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.158704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.158783] Hardware name: linux,dummy-virt (DT)
[   23.158859] Call trace:
[   23.158913]  show_stack+0x20/0x38 (C)
[   23.159037]  dump_stack_lvl+0x8c/0xd0
[   23.159152]  print_report+0x118/0x608
[   23.159274]  kasan_report+0xdc/0x128
[   23.159381]  __asan_report_load4_noabort+0x20/0x30
[   23.159502]  kasan_atomics_helper+0x3dcc/0x4858
[   23.159615]  kasan_atomics+0x198/0x2e0
[   23.159723]  kunit_try_run_case+0x170/0x3f0
[   23.159843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.159972]  kthread+0x328/0x630
[   23.160450]  ret_from_fork+0x10/0x20
[   23.161013] 
[   23.161137] Allocated by task 265:
[   23.161226]  kasan_save_stack+0x3c/0x68
[   23.161324]  kasan_save_track+0x20/0x40
[   23.161416]  kasan_save_alloc_info+0x40/0x58
[   23.161510]  __kasan_kmalloc+0xd4/0xd8
[   23.161595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.161682]  kasan_atomics+0xb8/0x2e0
[   23.162045]  kunit_try_run_case+0x170/0x3f0
[   23.162191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.162340]  kthread+0x328/0x630
[   23.162424]  ret_from_fork+0x10/0x20
[   23.162506] 
[   23.162559] The buggy address belongs to the object at fff00000c659e300
[   23.162559]  which belongs to the cache kmalloc-64 of size 64
[   23.162740] The buggy address is located 0 bytes to the right of
[   23.162740]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.162884] 
[   23.162944] The buggy address belongs to the physical page:
[   23.163015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.163490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.163611] page_type: f5(slab)
[   23.163760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.163939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.164109] page dumped because: kasan: bad access detected
[   23.164185] 
[   23.164229] Memory state around the buggy address:
[   23.164308]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.164411]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.164534] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.164642]                                      ^
[   23.164731]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.164876]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.165015] ==================================================================
[   23.300996] ==================================================================
[   23.301123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   23.301233] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.301334] 
[   23.301403] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.301587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.301651] Hardware name: linux,dummy-virt (DT)
[   23.301720] Call trace:
[   23.301770]  show_stack+0x20/0x38 (C)
[   23.301865]  dump_stack_lvl+0x8c/0xd0
[   23.301957]  print_report+0x118/0x608
[   23.302066]  kasan_report+0xdc/0x128
[   23.302186]  kasan_check_range+0x100/0x1a8
[   23.302326]  __kasan_check_write+0x20/0x30
[   23.302438]  kasan_atomics_helper+0xf88/0x4858
[   23.302565]  kasan_atomics+0x198/0x2e0
[   23.302699]  kunit_try_run_case+0x170/0x3f0
[   23.302858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.303048]  kthread+0x328/0x630
[   23.303145]  ret_from_fork+0x10/0x20
[   23.303231] 
[   23.303275] Allocated by task 265:
[   23.303343]  kasan_save_stack+0x3c/0x68
[   23.303431]  kasan_save_track+0x20/0x40
[   23.303551]  kasan_save_alloc_info+0x40/0x58
[   23.303673]  __kasan_kmalloc+0xd4/0xd8
[   23.303783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.303872]  kasan_atomics+0xb8/0x2e0
[   23.303959]  kunit_try_run_case+0x170/0x3f0
[   23.304079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.304182]  kthread+0x328/0x630
[   23.304259]  ret_from_fork+0x10/0x20
[   23.304342] 
[   23.304388] The buggy address belongs to the object at fff00000c659e300
[   23.304388]  which belongs to the cache kmalloc-64 of size 64
[   23.304536] The buggy address is located 0 bytes to the right of
[   23.304536]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.304697] 
[   23.304750] The buggy address belongs to the physical page:
[   23.304826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.304974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.305109] page_type: f5(slab)
[   23.305193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.305318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.305423] page dumped because: kasan: bad access detected
[   23.305487] 
[   23.305524] Memory state around the buggy address:
[   23.305591]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.305678]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.305779] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.305876]                                      ^
[   23.305944]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.306049]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.306142] ==================================================================
[   23.370501] ==================================================================
[   23.370619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   23.370734] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.370849] 
[   23.370922] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.371134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.371204] Hardware name: linux,dummy-virt (DT)
[   23.371276] Call trace:
[   23.371333]  show_stack+0x20/0x38 (C)
[   23.371442]  dump_stack_lvl+0x8c/0xd0
[   23.371560]  print_report+0x118/0x608
[   23.371672]  kasan_report+0xdc/0x128
[   23.371778]  kasan_check_range+0x100/0x1a8
[   23.371892]  __kasan_check_write+0x20/0x30
[   23.372000]  kasan_atomics_helper+0x1384/0x4858
[   23.373723]  kasan_atomics+0x198/0x2e0
[   23.373936]  kunit_try_run_case+0x170/0x3f0
[   23.374157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.374292]  kthread+0x328/0x630
[   23.374399]  ret_from_fork+0x10/0x20
[   23.374553] 
[   23.374637] Allocated by task 265:
[   23.375038]  kasan_save_stack+0x3c/0x68
[   23.375327]  kasan_save_track+0x20/0x40
[   23.375635]  kasan_save_alloc_info+0x40/0x58
[   23.375938]  __kasan_kmalloc+0xd4/0xd8
[   23.376043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.376136]  kasan_atomics+0xb8/0x2e0
[   23.376366]  kunit_try_run_case+0x170/0x3f0
[   23.376667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.376999]  kthread+0x328/0x630
[   23.377585]  ret_from_fork+0x10/0x20
[   23.377870] 
[   23.377963] The buggy address belongs to the object at fff00000c659e300
[   23.377963]  which belongs to the cache kmalloc-64 of size 64
[   23.378118] The buggy address is located 0 bytes to the right of
[   23.378118]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.378269] 
[   23.378321] The buggy address belongs to the physical page:
[   23.378384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.378483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.378608] page_type: f5(slab)
[   23.378690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.378810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.378914] page dumped because: kasan: bad access detected
[   23.378998] 
[   23.379064] Memory state around the buggy address:
[   23.379181]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.379292]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.379402] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.379502]                                      ^
[   23.379592]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.379684]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.379771] ==================================================================
[   23.446319] ==================================================================
[   23.446426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   23.446533] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.446645] 
[   23.446714] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.446900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.446965] Hardware name: linux,dummy-virt (DT)
[   23.447052] Call trace:
[   23.447111]  show_stack+0x20/0x38 (C)
[   23.447219]  dump_stack_lvl+0x8c/0xd0
[   23.447332]  print_report+0x118/0x608
[   23.447436]  kasan_report+0xdc/0x128
[   23.447540]  kasan_check_range+0x100/0x1a8
[   23.447655]  __kasan_check_write+0x20/0x30
[   23.447758]  kasan_atomics_helper+0x1644/0x4858
[   23.447869]  kasan_atomics+0x198/0x2e0
[   23.447970]  kunit_try_run_case+0x170/0x3f0
[   23.448083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.448189]  kthread+0x328/0x630
[   23.448334]  ret_from_fork+0x10/0x20
[   23.448449] 
[   23.448952] Allocated by task 265:
[   23.449693]  kasan_save_stack+0x3c/0x68
[   23.449854]  kasan_save_track+0x20/0x40
[   23.449955]  kasan_save_alloc_info+0x40/0x58
[   23.450077]  __kasan_kmalloc+0xd4/0xd8
[   23.450241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.450338]  kasan_atomics+0xb8/0x2e0
[   23.450440]  kunit_try_run_case+0x170/0x3f0
[   23.450530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.450682]  kthread+0x328/0x630
[   23.450750]  ret_from_fork+0x10/0x20
[   23.450948] 
[   23.450980] The buggy address belongs to the object at fff00000c659e300
[   23.450980]  which belongs to the cache kmalloc-64 of size 64
[   23.451097] The buggy address is located 0 bytes to the right of
[   23.451097]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.451169] 
[   23.451194] The buggy address belongs to the physical page:
[   23.451227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.451282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.451334] page_type: f5(slab)
[   23.451376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.451430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.451474] page dumped because: kasan: bad access detected
[   23.451508] 
[   23.451531] Memory state around the buggy address:
[   23.451565]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451611]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451657] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.451696]                                      ^
[   23.451732]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.451775]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.451814] ==================================================================
[   23.112608] ==================================================================
[   23.112732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   23.112858] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.112987] 
[   23.113342] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.113763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.113905] Hardware name: linux,dummy-virt (DT)
[   23.114233] Call trace:
[   23.114297]  show_stack+0x20/0x38 (C)
[   23.114422]  dump_stack_lvl+0x8c/0xd0
[   23.114515]  print_report+0x118/0x608
[   23.114614]  kasan_report+0xdc/0x128
[   23.114725]  kasan_check_range+0x100/0x1a8
[   23.114840]  __kasan_check_write+0x20/0x30
[   23.114947]  kasan_atomics_helper+0x99c/0x4858
[   23.115078]  kasan_atomics+0x198/0x2e0
[   23.115187]  kunit_try_run_case+0x170/0x3f0
[   23.115304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.115899]  kthread+0x328/0x630
[   23.116060]  ret_from_fork+0x10/0x20
[   23.116283] 
[   23.116366] Allocated by task 265:
[   23.116571]  kasan_save_stack+0x3c/0x68
[   23.116968]  kasan_save_track+0x20/0x40
[   23.117077]  kasan_save_alloc_info+0x40/0x58
[   23.117326]  __kasan_kmalloc+0xd4/0xd8
[   23.117445]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.117537]  kasan_atomics+0xb8/0x2e0
[   23.117713]  kunit_try_run_case+0x170/0x3f0
[   23.117805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.118240]  kthread+0x328/0x630
[   23.118335]  ret_from_fork+0x10/0x20
[   23.118419] 
[   23.118460] The buggy address belongs to the object at fff00000c659e300
[   23.118460]  which belongs to the cache kmalloc-64 of size 64
[   23.118578] The buggy address is located 0 bytes to the right of
[   23.118578]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.118724] 
[   23.119396] The buggy address belongs to the physical page:
[   23.119815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.120037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.120951] page_type: f5(slab)
[   23.121602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.121886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.121981] page dumped because: kasan: bad access detected
[   23.122063] 
[   23.122603] Memory state around the buggy address:
[   23.122897]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.123226]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.123400] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.123504]                                      ^
[   23.123580]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.123718]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.123817] ==================================================================
[   23.136116] ==================================================================
[   23.136358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   23.136708] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.136952] 
[   23.137170] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.137585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.137654] Hardware name: linux,dummy-virt (DT)
[   23.137736] Call trace:
[   23.137789]  show_stack+0x20/0x38 (C)
[   23.137904]  dump_stack_lvl+0x8c/0xd0
[   23.138013]  print_report+0x118/0x608
[   23.138130]  kasan_report+0xdc/0x128
[   23.138561]  kasan_check_range+0x100/0x1a8
[   23.138857]  __kasan_check_write+0x20/0x30
[   23.139091]  kasan_atomics_helper+0xa6c/0x4858
[   23.139283]  kasan_atomics+0x198/0x2e0
[   23.139413]  kunit_try_run_case+0x170/0x3f0
[   23.139507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.139608]  kthread+0x328/0x630
[   23.139680]  ret_from_fork+0x10/0x20
[   23.139766] 
[   23.139814] Allocated by task 265:
[   23.140282]  kasan_save_stack+0x3c/0x68
[   23.140553]  kasan_save_track+0x20/0x40
[   23.140797]  kasan_save_alloc_info+0x40/0x58
[   23.141042]  __kasan_kmalloc+0xd4/0xd8
[   23.141130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.141223]  kasan_atomics+0xb8/0x2e0
[   23.141533]  kunit_try_run_case+0x170/0x3f0
[   23.141867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.142253]  kthread+0x328/0x630
[   23.142324]  ret_from_fork+0x10/0x20
[   23.142994] 
[   23.143162] The buggy address belongs to the object at fff00000c659e300
[   23.143162]  which belongs to the cache kmalloc-64 of size 64
[   23.143316] The buggy address is located 0 bytes to the right of
[   23.143316]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.143641] 
[   23.143727] The buggy address belongs to the physical page:
[   23.144742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.145166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.145754] page_type: f5(slab)
[   23.145967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.146341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.146444] page dumped because: kasan: bad access detected
[   23.146527] 
[   23.146575] Memory state around the buggy address:
[   23.146643]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.146725]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.147313] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.147507]                                      ^
[   23.147609]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.147703]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.147791] ==================================================================
[   23.271069] ==================================================================
[   23.271168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   23.271294] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.271461] 
[   23.271562] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.271831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.271922] Hardware name: linux,dummy-virt (DT)
[   23.272033] Call trace:
[   23.272119]  show_stack+0x20/0x38 (C)
[   23.272270]  dump_stack_lvl+0x8c/0xd0
[   23.272425]  print_report+0x118/0x608
[   23.272601]  kasan_report+0xdc/0x128
[   23.272710]  kasan_check_range+0x100/0x1a8
[   23.272834]  __kasan_check_write+0x20/0x30
[   23.272951]  kasan_atomics_helper+0xe44/0x4858
[   23.273078]  kasan_atomics+0x198/0x2e0
[   23.273184]  kunit_try_run_case+0x170/0x3f0
[   23.273373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.273487]  kthread+0x328/0x630
[   23.273608]  ret_from_fork+0x10/0x20
[   23.273719] 
[   23.273777] Allocated by task 265:
[   23.273966]  kasan_save_stack+0x3c/0x68
[   23.274188]  kasan_save_track+0x20/0x40
[   23.274496]  kasan_save_alloc_info+0x40/0x58
[   23.274708]  __kasan_kmalloc+0xd4/0xd8
[   23.274805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.274927]  kasan_atomics+0xb8/0x2e0
[   23.275003]  kunit_try_run_case+0x170/0x3f0
[   23.275124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.275216]  kthread+0x328/0x630
[   23.275283]  ret_from_fork+0x10/0x20
[   23.275352] 
[   23.275523] The buggy address belongs to the object at fff00000c659e300
[   23.275523]  which belongs to the cache kmalloc-64 of size 64
[   23.275651] The buggy address is located 0 bytes to the right of
[   23.275651]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.275795] 
[   23.275854] The buggy address belongs to the physical page:
[   23.275929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.276058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.276175] page_type: f5(slab)
[   23.276261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.276385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.276479] page dumped because: kasan: bad access detected
[   23.276812] 
[   23.276903] Memory state around the buggy address:
[   23.277035]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.277157]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.277258] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.277351]                                      ^
[   23.277465]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.277602]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.277691] ==================================================================
[   23.387284] ==================================================================
[   23.387365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   23.387427] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.387480] 
[   23.387515] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.387599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.387629] Hardware name: linux,dummy-virt (DT)
[   23.387660] Call trace:
[   23.387686]  show_stack+0x20/0x38 (C)
[   23.387735]  dump_stack_lvl+0x8c/0xd0
[   23.387786]  print_report+0x118/0x608
[   23.387835]  kasan_report+0xdc/0x128
[   23.387882]  kasan_check_range+0x100/0x1a8
[   23.387933]  __kasan_check_write+0x20/0x30
[   23.387979]  kasan_atomics_helper+0x1414/0x4858
[   23.388057]  kasan_atomics+0x198/0x2e0
[   23.388158]  kunit_try_run_case+0x170/0x3f0
[   23.388260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.388385]  kthread+0x328/0x630
[   23.388482]  ret_from_fork+0x10/0x20
[   23.388617] 
[   23.388666] Allocated by task 265:
[   23.388732]  kasan_save_stack+0x3c/0x68
[   23.388823]  kasan_save_track+0x20/0x40
[   23.388910]  kasan_save_alloc_info+0x40/0x58
[   23.388993]  __kasan_kmalloc+0xd4/0xd8
[   23.389269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.389361]  kasan_atomics+0xb8/0x2e0
[   23.389447]  kunit_try_run_case+0x170/0x3f0
[   23.389532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.389634]  kthread+0x328/0x630
[   23.389942]  ret_from_fork+0x10/0x20
[   23.390065] 
[   23.390429] The buggy address belongs to the object at fff00000c659e300
[   23.390429]  which belongs to the cache kmalloc-64 of size 64
[   23.390700] The buggy address is located 0 bytes to the right of
[   23.390700]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.391380] 
[   23.391556] The buggy address belongs to the physical page:
[   23.391730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.392243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.392367] page_type: f5(slab)
[   23.392456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.393112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.393282] page dumped because: kasan: bad access detected
[   23.393365] 
[   23.393604] Memory state around the buggy address:
[   23.393684]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.393950]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.394059] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.394150]                                      ^
[   23.394227]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.394779]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.394887] ==================================================================
[   23.407052] ==================================================================
[   23.407160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   23.407516] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.407647] 
[   23.407724] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.407914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.407976] Hardware name: linux,dummy-virt (DT)
[   23.408067] Call trace:
[   23.408122]  show_stack+0x20/0x38 (C)
[   23.408232]  dump_stack_lvl+0x8c/0xd0
[   23.408336]  print_report+0x118/0x608
[   23.408442]  kasan_report+0xdc/0x128
[   23.408571]  kasan_check_range+0x100/0x1a8
[   23.408684]  __kasan_check_write+0x20/0x30
[   23.408791]  kasan_atomics_helper+0x14e4/0x4858
[   23.408900]  kasan_atomics+0x198/0x2e0
[   23.409005]  kunit_try_run_case+0x170/0x3f0
[   23.409332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.409456]  kthread+0x328/0x630
[   23.409550]  ret_from_fork+0x10/0x20
[   23.409653] 
[   23.409709] Allocated by task 265:
[   23.409774]  kasan_save_stack+0x3c/0x68
[   23.409867]  kasan_save_track+0x20/0x40
[   23.409950]  kasan_save_alloc_info+0x40/0x58
[   23.410054]  __kasan_kmalloc+0xd4/0xd8
[   23.410140]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.410228]  kasan_atomics+0xb8/0x2e0
[   23.410306]  kunit_try_run_case+0x170/0x3f0
[   23.410397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.410495]  kthread+0x328/0x630
[   23.410573]  ret_from_fork+0x10/0x20
[   23.410659] 
[   23.410708] The buggy address belongs to the object at fff00000c659e300
[   23.410708]  which belongs to the cache kmalloc-64 of size 64
[   23.410840] The buggy address is located 0 bytes to the right of
[   23.410840]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.410993] 
[   23.413202] The buggy address belongs to the physical page:
[   23.413547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.413679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.414401] page_type: f5(slab)
[   23.414768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.414894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.414988] page dumped because: kasan: bad access detected
[   23.415080] 
[   23.415700] Memory state around the buggy address:
[   23.415851]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.415967]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.416287] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.416390]                                      ^
[   23.416942]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.417226]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.417581] ==================================================================
[   23.329608] ==================================================================
[   23.329773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   23.329931] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.330116] 
[   23.330224] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.330482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.330569] Hardware name: linux,dummy-virt (DT)
[   23.330670] Call trace:
[   23.330745]  show_stack+0x20/0x38 (C)
[   23.330904]  dump_stack_lvl+0x8c/0xd0
[   23.331011]  print_report+0x118/0x608
[   23.331112]  kasan_report+0xdc/0x128
[   23.331569]  kasan_check_range+0x100/0x1a8
[   23.331747]  __kasan_check_write+0x20/0x30
[   23.331989]  kasan_atomics_helper+0x1128/0x4858
[   23.332110]  kasan_atomics+0x198/0x2e0
[   23.332451]  kunit_try_run_case+0x170/0x3f0
[   23.332638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.332848]  kthread+0x328/0x630
[   23.332951]  ret_from_fork+0x10/0x20
[   23.333077] 
[   23.333147] Allocated by task 265:
[   23.333210]  kasan_save_stack+0x3c/0x68
[   23.333336]  kasan_save_track+0x20/0x40
[   23.333422]  kasan_save_alloc_info+0x40/0x58
[   23.333706]  __kasan_kmalloc+0xd4/0xd8
[   23.333792]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.333874]  kasan_atomics+0xb8/0x2e0
[   23.333955]  kunit_try_run_case+0x170/0x3f0
[   23.334064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.334243]  kthread+0x328/0x630
[   23.334357]  ret_from_fork+0x10/0x20
[   23.334461] 
[   23.334539] The buggy address belongs to the object at fff00000c659e300
[   23.334539]  which belongs to the cache kmalloc-64 of size 64
[   23.334664] The buggy address is located 0 bytes to the right of
[   23.334664]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.334847] 
[   23.334921] The buggy address belongs to the physical page:
[   23.335039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.335396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.335545] page_type: f5(slab)
[   23.335670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.335781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.335878] page dumped because: kasan: bad access detected
[   23.335950] 
[   23.335997] Memory state around the buggy address:
[   23.336089]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.336203]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.336302] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.336551]                                      ^
[   23.336849]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.336968]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.337071] ==================================================================
[   23.288257] ==================================================================
[   23.288393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   23.288719] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.289143] 
[   23.289234] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.289433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.289502] Hardware name: linux,dummy-virt (DT)
[   23.289708] Call trace:
[   23.289771]  show_stack+0x20/0x38 (C)
[   23.289871]  dump_stack_lvl+0x8c/0xd0
[   23.289979]  print_report+0x118/0x608
[   23.290117]  kasan_report+0xdc/0x128
[   23.290268]  kasan_check_range+0x100/0x1a8
[   23.290385]  __kasan_check_write+0x20/0x30
[   23.290494]  kasan_atomics_helper+0xeb8/0x4858
[   23.290611]  kasan_atomics+0x198/0x2e0
[   23.290697]  kunit_try_run_case+0x170/0x3f0
[   23.290996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.291124]  kthread+0x328/0x630
[   23.291205]  ret_from_fork+0x10/0x20
[   23.291305] 
[   23.291378] Allocated by task 265:
[   23.291467]  kasan_save_stack+0x3c/0x68
[   23.291609]  kasan_save_track+0x20/0x40
[   23.291739]  kasan_save_alloc_info+0x40/0x58
[   23.291833]  __kasan_kmalloc+0xd4/0xd8
[   23.291914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.292006]  kasan_atomics+0xb8/0x2e0
[   23.292104]  kunit_try_run_case+0x170/0x3f0
[   23.292191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.292334]  kthread+0x328/0x630
[   23.292425]  ret_from_fork+0x10/0x20
[   23.292517] 
[   23.292570] The buggy address belongs to the object at fff00000c659e300
[   23.292570]  which belongs to the cache kmalloc-64 of size 64
[   23.292767] The buggy address is located 0 bytes to the right of
[   23.292767]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.292932] 
[   23.292985] The buggy address belongs to the physical page:
[   23.293072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.293185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.293292] page_type: f5(slab)
[   23.293366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.293471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.293572] page dumped because: kasan: bad access detected
[   23.293655] 
[   23.293693] Memory state around the buggy address:
[   23.293766]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.293853]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.293948] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.294044]                                      ^
[   23.294120]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.294266]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.294349] ==================================================================
[   23.494809] ==================================================================
[   23.494906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   23.495016] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.495139] 
[   23.495201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.495364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.495420] Hardware name: linux,dummy-virt (DT)
[   23.495476] Call trace:
[   23.495524]  show_stack+0x20/0x38 (C)
[   23.495631]  dump_stack_lvl+0x8c/0xd0
[   23.495729]  print_report+0x118/0x608
[   23.495827]  kasan_report+0xdc/0x128
[   23.495913]  kasan_check_range+0x100/0x1a8
[   23.496003]  __kasan_check_write+0x20/0x30
[   23.496298]  kasan_atomics_helper+0x17ec/0x4858
[   23.496439]  kasan_atomics+0x198/0x2e0
[   23.496624]  kunit_try_run_case+0x170/0x3f0
[   23.496793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.496968]  kthread+0x328/0x630
[   23.497145]  ret_from_fork+0x10/0x20
[   23.497254] 
[   23.497308] Allocated by task 265:
[   23.497374]  kasan_save_stack+0x3c/0x68
[   23.497472]  kasan_save_track+0x20/0x40
[   23.497555]  kasan_save_alloc_info+0x40/0x58
[   23.497652]  __kasan_kmalloc+0xd4/0xd8
[   23.497770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.497858]  kasan_atomics+0xb8/0x2e0
[   23.497943]  kunit_try_run_case+0x170/0x3f0
[   23.498527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.498749]  kthread+0x328/0x630
[   23.498837]  ret_from_fork+0x10/0x20
[   23.499036] 
[   23.499242] The buggy address belongs to the object at fff00000c659e300
[   23.499242]  which belongs to the cache kmalloc-64 of size 64
[   23.499479] The buggy address is located 0 bytes to the right of
[   23.499479]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.499845] 
[   23.499900] The buggy address belongs to the physical page:
[   23.499966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.500137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.500457] page_type: f5(slab)
[   23.500701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.501176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.501277] page dumped because: kasan: bad access detected
[   23.501348] 
[   23.501400] Memory state around the buggy address:
[   23.501476]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.501840]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.502340] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.502452]                                      ^
[   23.502524]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.502992]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.503219] ==================================================================
[   23.294807] ==================================================================
[   23.294909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   23.295008] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.295131] 
[   23.295192] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.295360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.295427] Hardware name: linux,dummy-virt (DT)
[   23.295496] Call trace:
[   23.295558]  show_stack+0x20/0x38 (C)
[   23.295770]  dump_stack_lvl+0x8c/0xd0
[   23.295952]  print_report+0x118/0x608
[   23.296099]  kasan_report+0xdc/0x128
[   23.296250]  kasan_check_range+0x100/0x1a8
[   23.296404]  __kasan_check_write+0x20/0x30
[   23.296577]  kasan_atomics_helper+0xf20/0x4858
[   23.296741]  kasan_atomics+0x198/0x2e0
[   23.296884]  kunit_try_run_case+0x170/0x3f0
[   23.297052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.297169]  kthread+0x328/0x630
[   23.297282]  ret_from_fork+0x10/0x20
[   23.297434] 
[   23.297499] Allocated by task 265:
[   23.297592]  kasan_save_stack+0x3c/0x68
[   23.297722]  kasan_save_track+0x20/0x40
[   23.297802]  kasan_save_alloc_info+0x40/0x58
[   23.297889]  __kasan_kmalloc+0xd4/0xd8
[   23.297974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.298074]  kasan_atomics+0xb8/0x2e0
[   23.298141]  kunit_try_run_case+0x170/0x3f0
[   23.298217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.298323]  kthread+0x328/0x630
[   23.298410]  ret_from_fork+0x10/0x20
[   23.298484] 
[   23.298578] The buggy address belongs to the object at fff00000c659e300
[   23.298578]  which belongs to the cache kmalloc-64 of size 64
[   23.298734] The buggy address is located 0 bytes to the right of
[   23.298734]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.298950] 
[   23.299005] The buggy address belongs to the physical page:
[   23.299093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.299195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.299294] page_type: f5(slab)
[   23.299385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.299506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.299611] page dumped because: kasan: bad access detected
[   23.299705] 
[   23.299754] Memory state around the buggy address:
[   23.299818]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.299901]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.299995] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.300100]                                      ^
[   23.300187]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.300291]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.300388] ==================================================================
[   23.433981] ==================================================================
[   23.434095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   23.434203] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.434312] 
[   23.434579] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.434779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.434851] Hardware name: linux,dummy-virt (DT)
[   23.434944] Call trace:
[   23.435047]  show_stack+0x20/0x38 (C)
[   23.435250]  dump_stack_lvl+0x8c/0xd0
[   23.435358]  print_report+0x118/0x608
[   23.435460]  kasan_report+0xdc/0x128
[   23.435571]  __asan_report_load8_noabort+0x20/0x30
[   23.435681]  kasan_atomics_helper+0x3db0/0x4858
[   23.435794]  kasan_atomics+0x198/0x2e0
[   23.435896]  kunit_try_run_case+0x170/0x3f0
[   23.436005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.436413]  kthread+0x328/0x630
[   23.436567]  ret_from_fork+0x10/0x20
[   23.436699] 
[   23.437052] Allocated by task 265:
[   23.437213]  kasan_save_stack+0x3c/0x68
[   23.437351]  kasan_save_track+0x20/0x40
[   23.437439]  kasan_save_alloc_info+0x40/0x58
[   23.437526]  __kasan_kmalloc+0xd4/0xd8
[   23.437610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.438002]  kasan_atomics+0xb8/0x2e0
[   23.438213]  kunit_try_run_case+0x170/0x3f0
[   23.438517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.438660]  kthread+0x328/0x630
[   23.438741]  ret_from_fork+0x10/0x20
[   23.438816] 
[   23.438867] The buggy address belongs to the object at fff00000c659e300
[   23.438867]  which belongs to the cache kmalloc-64 of size 64
[   23.439003] The buggy address is located 0 bytes to the right of
[   23.439003]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.439181] 
[   23.439234] The buggy address belongs to the physical page:
[   23.440247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.440545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.440785] page_type: f5(slab)
[   23.440870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.441896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.442360] page dumped because: kasan: bad access detected
[   23.442434] 
[   23.442474] Memory state around the buggy address:
[   23.442993]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.443349]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.443476] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.443963]                                      ^
[   23.444294]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.444604]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.444694] ==================================================================
[   23.264232] ==================================================================
[   23.264328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   23.264889] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.265247] 
[   23.265474] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.265852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.265932] Hardware name: linux,dummy-virt (DT)
[   23.266031] Call trace:
[   23.266080]  show_stack+0x20/0x38 (C)
[   23.266194]  dump_stack_lvl+0x8c/0xd0
[   23.266286]  print_report+0x118/0x608
[   23.266374]  kasan_report+0xdc/0x128
[   23.266469]  __asan_report_load8_noabort+0x20/0x30
[   23.266577]  kasan_atomics_helper+0x3f58/0x4858
[   23.266889]  kasan_atomics+0x198/0x2e0
[   23.267146]  kunit_try_run_case+0x170/0x3f0
[   23.267345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.267501]  kthread+0x328/0x630
[   23.267747]  ret_from_fork+0x10/0x20
[   23.267948] 
[   23.268003] Allocated by task 265:
[   23.268082]  kasan_save_stack+0x3c/0x68
[   23.268182]  kasan_save_track+0x20/0x40
[   23.268268]  kasan_save_alloc_info+0x40/0x58
[   23.268358]  __kasan_kmalloc+0xd4/0xd8
[   23.268436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.268547]  kasan_atomics+0xb8/0x2e0
[   23.268636]  kunit_try_run_case+0x170/0x3f0
[   23.268732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.268843]  kthread+0x328/0x630
[   23.268939]  ret_from_fork+0x10/0x20
[   23.269040] 
[   23.269088] The buggy address belongs to the object at fff00000c659e300
[   23.269088]  which belongs to the cache kmalloc-64 of size 64
[   23.269322] The buggy address is located 0 bytes to the right of
[   23.269322]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.269788] 
[   23.270101] The buggy address belongs to the physical page:
[   23.270152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.270217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.270271] page_type: f5(slab)
[   23.270312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.270366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.270410] page dumped because: kasan: bad access detected
[   23.270445] 
[   23.270465] Memory state around the buggy address:
[   23.270500]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.270547]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.270592] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.270632]                                      ^
[   23.270667]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.270712]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.270752] ==================================================================
[   23.246048] ==================================================================
[   23.246157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   23.246266] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.246390] 
[   23.246467] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.246659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.246717] Hardware name: linux,dummy-virt (DT)
[   23.246792] Call trace:
[   23.246843]  show_stack+0x20/0x38 (C)
[   23.246952]  dump_stack_lvl+0x8c/0xd0
[   23.247076]  print_report+0x118/0x608
[   23.247180]  kasan_report+0xdc/0x128
[   23.247277]  kasan_check_range+0x100/0x1a8
[   23.247366]  __kasan_check_write+0x20/0x30
[   23.247452]  kasan_atomics_helper+0xd3c/0x4858
[   23.247553]  kasan_atomics+0x198/0x2e0
[   23.247655]  kunit_try_run_case+0x170/0x3f0
[   23.247760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.247880]  kthread+0x328/0x630
[   23.247973]  ret_from_fork+0x10/0x20
[   23.248226] 
[   23.248282] Allocated by task 265:
[   23.248346]  kasan_save_stack+0x3c/0x68
[   23.248431]  kasan_save_track+0x20/0x40
[   23.248521]  kasan_save_alloc_info+0x40/0x58
[   23.248618]  __kasan_kmalloc+0xd4/0xd8
[   23.248759]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.248849]  kasan_atomics+0xb8/0x2e0
[   23.248938]  kunit_try_run_case+0x170/0x3f0
[   23.249043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.249194]  kthread+0x328/0x630
[   23.249301]  ret_from_fork+0x10/0x20
[   23.249421] 
[   23.249472] The buggy address belongs to the object at fff00000c659e300
[   23.249472]  which belongs to the cache kmalloc-64 of size 64
[   23.249594] The buggy address is located 0 bytes to the right of
[   23.249594]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.249762] 
[   23.249835] The buggy address belongs to the physical page:
[   23.249905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.250014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.250151] page_type: f5(slab)
[   23.250250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.250386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.250473] page dumped because: kasan: bad access detected
[   23.250541] 
[   23.250582] Memory state around the buggy address:
[   23.250686]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.250829]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.250972] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.251112]                                      ^
[   23.251233]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.251370]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.251497] ==================================================================
[   23.166464] ==================================================================
[   23.166627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   23.166749] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.166897] 
[   23.166968] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.167158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.167229] Hardware name: linux,dummy-virt (DT)
[   23.167310] Call trace:
[   23.167359]  show_stack+0x20/0x38 (C)
[   23.167725]  dump_stack_lvl+0x8c/0xd0
[   23.167912]  print_report+0x118/0x608
[   23.168038]  kasan_report+0xdc/0x128
[   23.168276]  kasan_check_range+0x100/0x1a8
[   23.168395]  __kasan_check_write+0x20/0x30
[   23.168519]  kasan_atomics_helper+0xb70/0x4858
[   23.168633]  kasan_atomics+0x198/0x2e0
[   23.168964]  kunit_try_run_case+0x170/0x3f0
[   23.169092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.169218]  kthread+0x328/0x630
[   23.169312]  ret_from_fork+0x10/0x20
[   23.169618] 
[   23.169677] Allocated by task 265:
[   23.169762]  kasan_save_stack+0x3c/0x68
[   23.169911]  kasan_save_track+0x20/0x40
[   23.170009]  kasan_save_alloc_info+0x40/0x58
[   23.170120]  __kasan_kmalloc+0xd4/0xd8
[   23.170209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.170304]  kasan_atomics+0xb8/0x2e0
[   23.170400]  kunit_try_run_case+0x170/0x3f0
[   23.170653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.170967]  kthread+0x328/0x630
[   23.171070]  ret_from_fork+0x10/0x20
[   23.171166] 
[   23.171210] The buggy address belongs to the object at fff00000c659e300
[   23.171210]  which belongs to the cache kmalloc-64 of size 64
[   23.171321] The buggy address is located 0 bytes to the right of
[   23.171321]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.171578] 
[   23.171642] The buggy address belongs to the physical page:
[   23.171714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.172037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.172190] page_type: f5(slab)
[   23.172284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.172562] page dumped because: kasan: bad access detected
[   23.172776]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.173114]                                      ^
[   23.175566] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.177767]  kasan_atomics_helper+0x3dbc/0x4858
[   23.179986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.182032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.191729] Call trace:
[   23.200983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.206583] 
[   23.209002]                                      ^
[   23.214942] Call trace:
[   23.219148]  kthread+0x328/0x630
[   23.220432] 
[   23.221501] page dumped because: kasan: bad access detected
[   23.226877]                                      ^
[   23.228898] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.234643] 
[   23.234693] The buggy address belongs to the object at fff00000c659e300
[   23.234693]  which belongs to the cache kmalloc-64 of size 64
[   23.234832] The buggy address is located 0 bytes to the right of
[   23.234832]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.234973] 
[   23.235039] The buggy address belongs to the physical page:
[   23.235101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.235225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.235330] page_type: f5(slab)
[   23.235661] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.235824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.235918] page dumped because: kasan: bad access detected
[   23.235997] 
[   23.236069] Memory state around the buggy address:
[   23.236145]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.236268]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.236429] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.236702]                                      ^
[   23.236858]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.236986]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.237100] ==================================================================
[   23.427677] ==================================================================
[   23.427810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   23.427925] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.428062] 
[   23.428167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.428357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.428412] Hardware name: linux,dummy-virt (DT)
[   23.428482] Call trace:
[   23.428683]  show_stack+0x20/0x38 (C)
[   23.428845]  dump_stack_lvl+0x8c/0xd0
[   23.429000]  print_report+0x118/0x608
[   23.429168]  kasan_report+0xdc/0x128
[   23.429313]  kasan_check_range+0x100/0x1a8
[   23.429461]  __kasan_check_write+0x20/0x30
[   23.429603]  kasan_atomics_helper+0x15b4/0x4858
[   23.429725]  kasan_atomics+0x198/0x2e0
[   23.429823]  kunit_try_run_case+0x170/0x3f0
[   23.429924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.430110]  kthread+0x328/0x630
[   23.430217]  ret_from_fork+0x10/0x20
[   23.430340] 
[   23.430390] Allocated by task 265:
[   23.430484]  kasan_save_stack+0x3c/0x68
[   23.430577]  kasan_save_track+0x20/0x40
[   23.430657]  kasan_save_alloc_info+0x40/0x58
[   23.430735]  __kasan_kmalloc+0xd4/0xd8
[   23.430798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.430875]  kasan_atomics+0xb8/0x2e0
[   23.430953]  kunit_try_run_case+0x170/0x3f0
[   23.431051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.431206]  kthread+0x328/0x630
[   23.431275]  ret_from_fork+0x10/0x20
[   23.431360] 
[   23.431418] The buggy address belongs to the object at fff00000c659e300
[   23.431418]  which belongs to the cache kmalloc-64 of size 64
[   23.431539] The buggy address is located 0 bytes to the right of
[   23.431539]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.431713] 
[   23.431759] The buggy address belongs to the physical page:
[   23.431854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.432034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.432141] page_type: f5(slab)
[   23.432267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.432378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.432474] page dumped because: kasan: bad access detected
[   23.432567] 
[   23.432616] Memory state around the buggy address:
[   23.432695]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.432846]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.432975] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.433116]                                      ^
[   23.433216]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.433325]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.433555] ==================================================================
[   23.148607] ==================================================================
[   23.148945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   23.149099] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.149231] 
[   23.149306] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.149795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.149902] Hardware name: linux,dummy-virt (DT)
[   23.149993] Call trace:
[   23.150056]  show_stack+0x20/0x38 (C)
[   23.150156]  dump_stack_lvl+0x8c/0xd0
[   23.150258]  print_report+0x118/0x608
[   23.150676]  kasan_report+0xdc/0x128
[   23.150834]  kasan_check_range+0x100/0x1a8
[   23.150950]  __kasan_check_write+0x20/0x30
[   23.151064]  kasan_atomics_helper+0xad4/0x4858
[   23.151445]  kasan_atomics+0x198/0x2e0
[   23.151600]  kunit_try_run_case+0x170/0x3f0
[   23.151720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.152048]  kthread+0x328/0x630
[   23.152286]  ret_from_fork+0x10/0x20
[   23.152425] 
[   23.152476] Allocated by task 265:
[   23.152561]  kasan_save_stack+0x3c/0x68
[   23.152879]  kasan_save_track+0x20/0x40
[   23.153126]  kasan_save_alloc_info+0x40/0x58
[   23.153273]  __kasan_kmalloc+0xd4/0xd8
[   23.153376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.153464]  kasan_atomics+0xb8/0x2e0
[   23.153725]  kunit_try_run_case+0x170/0x3f0
[   23.154088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.154198]  kthread+0x328/0x630
[   23.154263]  ret_from_fork+0x10/0x20
[   23.154351] 
[   23.154396] The buggy address belongs to the object at fff00000c659e300
[   23.154396]  which belongs to the cache kmalloc-64 of size 64
[   23.154528] The buggy address is located 0 bytes to the right of
[   23.154528]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.154723] 
[   23.155009] The buggy address belongs to the physical page:
[   23.155118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.155249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.155369] page_type: f5(slab)
[   23.155453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.155882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.156002] page dumped because: kasan: bad access detected
[   23.156106] 
[   23.156158] Memory state around the buggy address:
[   23.156269]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.156370]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.156666] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.156974]                                      ^
[   23.157090]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.157315]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.157605] ==================================================================
[   23.251982] ==================================================================
[   23.252105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   23.252208] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.252349] 
[   23.252419] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.252617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.252677] Hardware name: linux,dummy-virt (DT)
[   23.252752] Call trace:
[   23.252801]  show_stack+0x20/0x38 (C)
[   23.252915]  dump_stack_lvl+0x8c/0xd0
[   23.253078]  print_report+0x118/0x608
[   23.253242]  kasan_report+0xdc/0x128
[   23.253416]  __asan_report_load4_noabort+0x20/0x30
[   23.253524]  kasan_atomics_helper+0x3e04/0x4858
[   23.253822]  kasan_atomics+0x198/0x2e0
[   23.253980]  kunit_try_run_case+0x170/0x3f0
[   23.254109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.254212]  kthread+0x328/0x630
[   23.254309]  ret_from_fork+0x10/0x20
[   23.254410] 
[   23.254475] Allocated by task 265:
[   23.254534]  kasan_save_stack+0x3c/0x68
[   23.254616]  kasan_save_track+0x20/0x40
[   23.254700]  kasan_save_alloc_info+0x40/0x58
[   23.254782]  __kasan_kmalloc+0xd4/0xd8
[   23.254869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.254964]  kasan_atomics+0xb8/0x2e0
[   23.255062]  kunit_try_run_case+0x170/0x3f0
[   23.255155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.255254]  kthread+0x328/0x630
[   23.255340]  ret_from_fork+0x10/0x20
[   23.255421] 
[   23.255486] The buggy address belongs to the object at fff00000c659e300
[   23.255486]  which belongs to the cache kmalloc-64 of size 64
[   23.255681] The buggy address is located 0 bytes to the right of
[   23.255681]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.255846] 
[   23.255892] The buggy address belongs to the physical page:
[   23.255967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.256161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.256319] page_type: f5(slab)
[   23.256446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.256644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.256794] page dumped because: kasan: bad access detected
[   23.256876] 
[   23.256922] Memory state around the buggy address:
[   23.257013]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.257138]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.257259] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.257369]                                      ^
[   23.257433]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.257521]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.257608] ==================================================================
[   23.124686] ==================================================================
[   23.124831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   23.124941] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.125071] 
[   23.125148] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.125342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.125747] Hardware name: linux,dummy-virt (DT)
[   23.125911] Call trace:
[   23.125997]  show_stack+0x20/0x38 (C)
[   23.126424]  dump_stack_lvl+0x8c/0xd0
[   23.126602]  print_report+0x118/0x608
[   23.126854]  kasan_report+0xdc/0x128
[   23.127140]  kasan_check_range+0x100/0x1a8
[   23.127268]  __kasan_check_write+0x20/0x30
[   23.127373]  kasan_atomics_helper+0xa04/0x4858
[   23.127861]  kasan_atomics+0x198/0x2e0
[   23.127990]  kunit_try_run_case+0x170/0x3f0
[   23.128369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.128683]  kthread+0x328/0x630
[   23.128961]  ret_from_fork+0x10/0x20
[   23.129425] 
[   23.129557] Allocated by task 265:
[   23.129728]  kasan_save_stack+0x3c/0x68
[   23.129884]  kasan_save_track+0x20/0x40
[   23.130105]  kasan_save_alloc_info+0x40/0x58
[   23.130349]  __kasan_kmalloc+0xd4/0xd8
[   23.130437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.130525]  kasan_atomics+0xb8/0x2e0
[   23.130773]  kunit_try_run_case+0x170/0x3f0
[   23.131051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.131162]  kthread+0x328/0x630
[   23.131382]  ret_from_fork+0x10/0x20
[   23.131570] 
[   23.131677] The buggy address belongs to the object at fff00000c659e300
[   23.131677]  which belongs to the cache kmalloc-64 of size 64
[   23.131898] The buggy address is located 0 bytes to the right of
[   23.131898]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.132253] 
[   23.132308] The buggy address belongs to the physical page:
[   23.132383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.132519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.132640] page_type: f5(slab)
[   23.133068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.133509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.133718] page dumped because: kasan: bad access detected
[   23.133842] 
[   23.133923] Memory state around the buggy address:
[   23.134251]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.134363]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.134453] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.134703]                                      ^
[   23.134899]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.135169]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.135273] ==================================================================
[   23.347535] ==================================================================
[   23.347607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   23.347670] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.347781] 
[   23.347884] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.348167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.348243] Hardware name: linux,dummy-virt (DT)
[   23.348314] Call trace:
[   23.348369]  show_stack+0x20/0x38 (C)
[   23.348479]  dump_stack_lvl+0x8c/0xd0
[   23.348612]  print_report+0x118/0x608
[   23.348725]  kasan_report+0xdc/0x128
[   23.348834]  kasan_check_range+0x100/0x1a8
[   23.348960]  __kasan_check_write+0x20/0x30
[   23.349095]  kasan_atomics_helper+0x11f8/0x4858
[   23.349226]  kasan_atomics+0x198/0x2e0
[   23.349333]  kunit_try_run_case+0x170/0x3f0
[   23.349441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.349561]  kthread+0x328/0x630
[   23.349655]  ret_from_fork+0x10/0x20
[   23.349803] 
[   23.349903] Allocated by task 265:
[   23.350039]  kasan_save_stack+0x3c/0x68
[   23.350135]  kasan_save_track+0x20/0x40
[   23.350219]  kasan_save_alloc_info+0x40/0x58
[   23.350312]  __kasan_kmalloc+0xd4/0xd8
[   23.350423]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.350517]  kasan_atomics+0xb8/0x2e0
[   23.350592]  kunit_try_run_case+0x170/0x3f0
[   23.350665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.350757]  kthread+0x328/0x630
[   23.350829]  ret_from_fork+0x10/0x20
[   23.350998] 
[   23.351065] The buggy address belongs to the object at fff00000c659e300
[   23.351065]  which belongs to the cache kmalloc-64 of size 64
[   23.351198] The buggy address is located 0 bytes to the right of
[   23.351198]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.351360] 
[   23.351427] The buggy address belongs to the physical page:
[   23.351498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.351622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.351732] page_type: f5(slab)
[   23.351820] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.351936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.352046] page dumped because: kasan: bad access detected
[   23.352125] 
[   23.352176] Memory state around the buggy address:
[   23.352251]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.352356]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.352459] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.352572]                                      ^
[   23.352669]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352766]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352979] ==================================================================
[   23.380225] ==================================================================
[   23.380361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   23.380475] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.380603] 
[   23.380735] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.381067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.381172] Hardware name: linux,dummy-virt (DT)
[   23.381297] Call trace:
[   23.381371]  show_stack+0x20/0x38 (C)
[   23.381536]  dump_stack_lvl+0x8c/0xd0
[   23.381640]  print_report+0x118/0x608
[   23.381775]  kasan_report+0xdc/0x128
[   23.381899]  __asan_report_load8_noabort+0x20/0x30
[   23.382017]  kasan_atomics_helper+0x3f04/0x4858
[   23.382150]  kasan_atomics+0x198/0x2e0
[   23.382264]  kunit_try_run_case+0x170/0x3f0
[   23.382416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.382589]  kthread+0x328/0x630
[   23.382695]  ret_from_fork+0x10/0x20
[   23.382815] 
[   23.382863] Allocated by task 265:
[   23.382985]  kasan_save_stack+0x3c/0x68
[   23.383212]  kasan_save_track+0x20/0x40
[   23.383308]  kasan_save_alloc_info+0x40/0x58
[   23.383399]  __kasan_kmalloc+0xd4/0xd8
[   23.383487]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.383575]  kasan_atomics+0xb8/0x2e0
[   23.383659]  kunit_try_run_case+0x170/0x3f0
[   23.383767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.383880]  kthread+0x328/0x630
[   23.383956]  ret_from_fork+0x10/0x20
[   23.384062] 
[   23.384111] The buggy address belongs to the object at fff00000c659e300
[   23.384111]  which belongs to the cache kmalloc-64 of size 64
[   23.384284] The buggy address is located 0 bytes to the right of
[   23.384284]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.384552] 
[   23.384642] The buggy address belongs to the physical page:
[   23.384718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.384856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.384978] page_type: f5(slab)
[   23.385085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.385242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.385363] page dumped because: kasan: bad access detected
[   23.385445] 
[   23.385491] Memory state around the buggy address:
[   23.385568]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.385746]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.385853] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.385946]                                      ^
[   23.386079]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.386182]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.386302] ==================================================================
[   23.258237] ==================================================================
[   23.258404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   23.258559] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.258711] 
[   23.258772] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.258941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.259000] Hardware name: linux,dummy-virt (DT)
[   23.259109] Call trace:
[   23.259177]  show_stack+0x20/0x38 (C)
[   23.259282]  dump_stack_lvl+0x8c/0xd0
[   23.259393]  print_report+0x118/0x608
[   23.259500]  kasan_report+0xdc/0x128
[   23.259599]  kasan_check_range+0x100/0x1a8
[   23.259704]  __kasan_check_read+0x20/0x30
[   23.259836]  kasan_atomics_helper+0xdd4/0x4858
[   23.259971]  kasan_atomics+0x198/0x2e0
[   23.260144]  kunit_try_run_case+0x170/0x3f0
[   23.260298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.260405]  kthread+0x328/0x630
[   23.260531]  ret_from_fork+0x10/0x20
[   23.260643] 
[   23.260689] Allocated by task 265:
[   23.260786]  kasan_save_stack+0x3c/0x68
[   23.260903]  kasan_save_track+0x20/0x40
[   23.261043]  kasan_save_alloc_info+0x40/0x58
[   23.261162]  __kasan_kmalloc+0xd4/0xd8
[   23.261261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.261385]  kasan_atomics+0xb8/0x2e0
[   23.261484]  kunit_try_run_case+0x170/0x3f0
[   23.261589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.261754]  kthread+0x328/0x630
[   23.261827]  ret_from_fork+0x10/0x20
[   23.261894] 
[   23.261931] The buggy address belongs to the object at fff00000c659e300
[   23.261931]  which belongs to the cache kmalloc-64 of size 64
[   23.262077] The buggy address is located 0 bytes to the right of
[   23.262077]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.262232] 
[   23.262276] The buggy address belongs to the physical page:
[   23.262348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.262457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.262566] page_type: f5(slab)
[   23.262648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.262801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.262919] page dumped because: kasan: bad access detected
[   23.263066] 
[   23.263130] Memory state around the buggy address:
[   23.263210]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.263319]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.263435] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.263520]                                      ^
[   23.263647]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.263774]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.263869] ==================================================================
[   23.396384] ==================================================================
[   23.396682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   23.396803] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.396931] 
[   23.397003] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.397197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.397257] Hardware name: linux,dummy-virt (DT)
[   23.397445] Call trace:
[   23.397688]  show_stack+0x20/0x38 (C)
[   23.397810]  dump_stack_lvl+0x8c/0xd0
[   23.397925]  print_report+0x118/0x608
[   23.398239]  kasan_report+0xdc/0x128
[   23.398489]  kasan_check_range+0x100/0x1a8
[   23.398601]  __kasan_check_write+0x20/0x30
[   23.398817]  kasan_atomics_helper+0x147c/0x4858
[   23.398916]  kasan_atomics+0x198/0x2e0
[   23.399050]  kunit_try_run_case+0x170/0x3f0
[   23.399212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.399455]  kthread+0x328/0x630
[   23.399632]  ret_from_fork+0x10/0x20
[   23.399909] 
[   23.400108] Allocated by task 265:
[   23.400218]  kasan_save_stack+0x3c/0x68
[   23.400340]  kasan_save_track+0x20/0x40
[   23.400424]  kasan_save_alloc_info+0x40/0x58
[   23.400533]  __kasan_kmalloc+0xd4/0xd8
[   23.400632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.400730]  kasan_atomics+0xb8/0x2e0
[   23.401145]  kunit_try_run_case+0x170/0x3f0
[   23.401499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.401725]  kthread+0x328/0x630
[   23.401921]  ret_from_fork+0x10/0x20
[   23.402220] 
[   23.402275] The buggy address belongs to the object at fff00000c659e300
[   23.402275]  which belongs to the cache kmalloc-64 of size 64
[   23.402658] The buggy address is located 0 bytes to the right of
[   23.402658]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.403176] 
[   23.403257] The buggy address belongs to the physical page:
[   23.403394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.403795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.404007] page_type: f5(slab)
[   23.404101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.404216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.404309] page dumped because: kasan: bad access detected
[   23.404721] 
[   23.404905] Memory state around the buggy address:
[   23.405005]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.405499]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.405615] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.406071]                                      ^
[   23.406176]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.406297]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.406392] ==================================================================
[   23.418466] ==================================================================
[   23.418634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   23.418785] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.418898] 
[   23.418974] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.419140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.419201] Hardware name: linux,dummy-virt (DT)
[   23.419269] Call trace:
[   23.419321]  show_stack+0x20/0x38 (C)
[   23.419432]  dump_stack_lvl+0x8c/0xd0
[   23.419541]  print_report+0x118/0x608
[   23.419642]  kasan_report+0xdc/0x128
[   23.419745]  kasan_check_range+0x100/0x1a8
[   23.419849]  __kasan_check_write+0x20/0x30
[   23.419952]  kasan_atomics_helper+0x154c/0x4858
[   23.420065]  kasan_atomics+0x198/0x2e0
[   23.420154]  kunit_try_run_case+0x170/0x3f0
[   23.420255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.420370]  kthread+0x328/0x630
[   23.420460]  ret_from_fork+0x10/0x20
[   23.420590] 
[   23.420644] Allocated by task 265:
[   23.420712]  kasan_save_stack+0x3c/0x68
[   23.420816]  kasan_save_track+0x20/0x40
[   23.421324]  kasan_save_alloc_info+0x40/0x58
[   23.421612]  __kasan_kmalloc+0xd4/0xd8
[   23.421915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.422098]  kasan_atomics+0xb8/0x2e0
[   23.422204]  kunit_try_run_case+0x170/0x3f0
[   23.422285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.422529]  kthread+0x328/0x630
[   23.422619]  ret_from_fork+0x10/0x20
[   23.422702] 
[   23.422907] The buggy address belongs to the object at fff00000c659e300
[   23.422907]  which belongs to the cache kmalloc-64 of size 64
[   23.423064] The buggy address is located 0 bytes to the right of
[   23.423064]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.423428] 
[   23.423507] The buggy address belongs to the physical page:
[   23.423607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.423794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.423904] page_type: f5(slab)
[   23.423988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.424118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.424216] page dumped because: kasan: bad access detected
[   23.424291] 
[   23.424338] Memory state around the buggy address:
[   23.424411]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.424529]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.424681] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.424784]                                      ^
[   23.424888]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.425008]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.425421] ==================================================================
[   23.362590] ==================================================================
[   23.362735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   23.362858] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265
[   23.362970] 
[   23.363058] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.363382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.363452] Hardware name: linux,dummy-virt (DT)
[   23.363520] Call trace:
[   23.363595]  show_stack+0x20/0x38 (C)
[   23.363763]  dump_stack_lvl+0x8c/0xd0
[   23.363879]  print_report+0x118/0x608
[   23.363986]  kasan_report+0xdc/0x128
[   23.364098]  kasan_check_range+0x100/0x1a8
[   23.364209]  __kasan_check_write+0x20/0x30
[   23.364316]  kasan_atomics_helper+0x12d8/0x4858
[   23.364429]  kasan_atomics+0x198/0x2e0
[   23.364558]  kunit_try_run_case+0x170/0x3f0
[   23.364685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.364830]  kthread+0x328/0x630
[   23.364937]  ret_from_fork+0x10/0x20
[   23.365071] 
[   23.365118] Allocated by task 265:
[   23.365193]  kasan_save_stack+0x3c/0x68
[   23.365394]  kasan_save_track+0x20/0x40
[   23.365505]  kasan_save_alloc_info+0x40/0x58
[   23.365600]  __kasan_kmalloc+0xd4/0xd8
[   23.365722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.365825]  kasan_atomics+0xb8/0x2e0
[   23.365918]  kunit_try_run_case+0x170/0x3f0
[   23.365996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.366108]  kthread+0x328/0x630
[   23.366263]  ret_from_fork+0x10/0x20
[   23.366341] 
[   23.366389] The buggy address belongs to the object at fff00000c659e300
[   23.366389]  which belongs to the cache kmalloc-64 of size 64
[   23.366521] The buggy address is located 0 bytes to the right of
[   23.366521]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   23.366703] 
[   23.366795] The buggy address belongs to the physical page:
[   23.366872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e
[   23.366987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.367333] page_type: f5(slab)
[   23.367610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.367741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.367840] page dumped because: kasan: bad access detected
[   23.368179] 
[   23.368424] Memory state around the buggy address:
[   23.368588]  fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.368808]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.368925] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.369013]                                      ^
[   23.369342]  fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.369704]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.369904] ==================================================================

[   14.605220] ==================================================================
[   14.605919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.606321] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.606797] 
[   14.606928] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.606970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.606982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.607034] Call Trace:
[   14.607050]  <TASK>
[   14.607078]  dump_stack_lvl+0x73/0xb0
[   14.607118]  print_report+0xd1/0x650
[   14.607153]  ? __virt_addr_valid+0x1db/0x2d0
[   14.607178]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.607200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.607222]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.607244]  kasan_report+0x141/0x180
[   14.607267]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.607294]  __asan_report_load4_noabort+0x18/0x20
[   14.607319]  kasan_atomics_helper+0x4a36/0x5450
[   14.607342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.607364]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.607438]  ? kasan_atomics+0x152/0x310
[   14.607465]  kasan_atomics+0x1dc/0x310
[   14.607490]  ? __pfx_kasan_atomics+0x10/0x10
[   14.607514]  ? __pfx_read_tsc+0x10/0x10
[   14.607535]  ? ktime_get_ts64+0x86/0x230
[   14.607561]  kunit_try_run_case+0x1a5/0x480
[   14.607585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.607607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.607671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.607695]  ? __kthread_parkme+0x82/0x180
[   14.607745]  ? preempt_count_sub+0x50/0x80
[   14.607770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.607794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.607829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.607853]  kthread+0x337/0x6f0
[   14.607874]  ? trace_preempt_on+0x20/0xc0
[   14.607898]  ? __pfx_kthread+0x10/0x10
[   14.607918]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.607940]  ? calculate_sigpending+0x7b/0xa0
[   14.607966]  ? __pfx_kthread+0x10/0x10
[   14.607989]  ret_from_fork+0x116/0x1d0
[   14.608009]  ? __pfx_kthread+0x10/0x10
[   14.608030]  ret_from_fork_asm+0x1a/0x30
[   14.608061]  </TASK>
[   14.608073] 
[   14.617064] Allocated by task 282:
[   14.617300]  kasan_save_stack+0x45/0x70
[   14.617586]  kasan_save_track+0x18/0x40
[   14.617826]  kasan_save_alloc_info+0x3b/0x50
[   14.617981]  __kasan_kmalloc+0xb7/0xc0
[   14.618179]  __kmalloc_cache_noprof+0x189/0x420
[   14.618451]  kasan_atomics+0x95/0x310
[   14.618596]  kunit_try_run_case+0x1a5/0x480
[   14.618744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.618999]  kthread+0x337/0x6f0
[   14.619350]  ret_from_fork+0x116/0x1d0
[   14.619624]  ret_from_fork_asm+0x1a/0x30
[   14.619867] 
[   14.620006] The buggy address belongs to the object at ffff8881039c5a00
[   14.620006]  which belongs to the cache kmalloc-64 of size 64
[   14.620788] The buggy address is located 0 bytes to the right of
[   14.620788]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.621238] 
[   14.621336] The buggy address belongs to the physical page:
[   14.621840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.622242] flags: 0x200000000000000(node=0|zone=2)
[   14.622518] page_type: f5(slab)
[   14.622660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.623008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.623447] page dumped because: kasan: bad access detected
[   14.623795] 
[   14.623869] Memory state around the buggy address:
[   14.624027]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.624674]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.625053] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.625558]                                      ^
[   14.625816]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626176]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626525] ==================================================================
[   15.378210] ==================================================================
[   15.378614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.378974] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.379361] 
[   15.379451] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.379492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.379505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.379526] Call Trace:
[   15.379539]  <TASK>
[   15.379574]  dump_stack_lvl+0x73/0xb0
[   15.379602]  print_report+0xd1/0x650
[   15.379626]  ? __virt_addr_valid+0x1db/0x2d0
[   15.379650]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.379671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.379693]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.379715]  kasan_report+0x141/0x180
[   15.379737]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.379764]  kasan_check_range+0x10c/0x1c0
[   15.379788]  __kasan_check_write+0x18/0x20
[   15.379808]  kasan_atomics_helper+0x20c8/0x5450
[   15.379831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.379863]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.379888]  ? kasan_atomics+0x152/0x310
[   15.379927]  kasan_atomics+0x1dc/0x310
[   15.379950]  ? __pfx_kasan_atomics+0x10/0x10
[   15.379974]  ? __pfx_read_tsc+0x10/0x10
[   15.379995]  ? ktime_get_ts64+0x86/0x230
[   15.380020]  kunit_try_run_case+0x1a5/0x480
[   15.380043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.380066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.380090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.380112]  ? __kthread_parkme+0x82/0x180
[   15.380161]  ? preempt_count_sub+0x50/0x80
[   15.380184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.380208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.380232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.380255]  kthread+0x337/0x6f0
[   15.380284]  ? trace_preempt_on+0x20/0xc0
[   15.380308]  ? __pfx_kthread+0x10/0x10
[   15.380329]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.380361]  ? calculate_sigpending+0x7b/0xa0
[   15.380385]  ? __pfx_kthread+0x10/0x10
[   15.380407]  ret_from_fork+0x116/0x1d0
[   15.380426]  ? __pfx_kthread+0x10/0x10
[   15.380457]  ret_from_fork_asm+0x1a/0x30
[   15.380490]  </TASK>
[   15.380502] 
[   15.388439] Allocated by task 282:
[   15.388666]  kasan_save_stack+0x45/0x70
[   15.388884]  kasan_save_track+0x18/0x40
[   15.389029]  kasan_save_alloc_info+0x3b/0x50
[   15.389331]  __kasan_kmalloc+0xb7/0xc0
[   15.389551]  __kmalloc_cache_noprof+0x189/0x420
[   15.389802]  kasan_atomics+0x95/0x310
[   15.389953]  kunit_try_run_case+0x1a5/0x480
[   15.390234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.390551]  kthread+0x337/0x6f0
[   15.390751]  ret_from_fork+0x116/0x1d0
[   15.390968]  ret_from_fork_asm+0x1a/0x30
[   15.391163] 
[   15.391236] The buggy address belongs to the object at ffff8881039c5a00
[   15.391236]  which belongs to the cache kmalloc-64 of size 64
[   15.391735] The buggy address is located 0 bytes to the right of
[   15.391735]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.392351] 
[   15.392485] The buggy address belongs to the physical page:
[   15.392759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.393004] flags: 0x200000000000000(node=0|zone=2)
[   15.393278] page_type: f5(slab)
[   15.393494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.393810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.394039] page dumped because: kasan: bad access detected
[   15.394332] 
[   15.394428] Memory state around the buggy address:
[   15.394654]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.394970]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.395275] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.395489]                                      ^
[   15.395663]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.395981]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.396370] ==================================================================
[   14.045492] ==================================================================
[   14.045956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.046776] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.047498] 
[   14.047730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.047775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.047788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.047809] Call Trace:
[   14.047821]  <TASK>
[   14.047835]  dump_stack_lvl+0x73/0xb0
[   14.047882]  print_report+0xd1/0x650
[   14.047904]  ? __virt_addr_valid+0x1db/0x2d0
[   14.047929]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.047949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.047971]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.047991]  kasan_report+0x141/0x180
[   14.048012]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.048038]  __asan_report_store4_noabort+0x1b/0x30
[   14.048057]  kasan_atomics_helper+0x4ba2/0x5450
[   14.048078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.048100]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.048139]  ? kasan_atomics+0x152/0x310
[   14.048166]  kasan_atomics+0x1dc/0x310
[   14.048187]  ? __pfx_kasan_atomics+0x10/0x10
[   14.048211]  ? __pfx_read_tsc+0x10/0x10
[   14.048231]  ? ktime_get_ts64+0x86/0x230
[   14.048254]  kunit_try_run_case+0x1a5/0x480
[   14.048276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.048296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.048319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.048340]  ? __kthread_parkme+0x82/0x180
[   14.048361]  ? preempt_count_sub+0x50/0x80
[   14.048383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.048405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.048427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.048448]  kthread+0x337/0x6f0
[   14.048468]  ? trace_preempt_on+0x20/0xc0
[   14.048491]  ? __pfx_kthread+0x10/0x10
[   14.048511]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.048531]  ? calculate_sigpending+0x7b/0xa0
[   14.048555]  ? __pfx_kthread+0x10/0x10
[   14.048576]  ret_from_fork+0x116/0x1d0
[   14.048592]  ? __pfx_kthread+0x10/0x10
[   14.048612]  ret_from_fork_asm+0x1a/0x30
[   14.048642]  </TASK>
[   14.048664] 
[   14.062475] Allocated by task 282:
[   14.062889]  kasan_save_stack+0x45/0x70
[   14.063324]  kasan_save_track+0x18/0x40
[   14.063728]  kasan_save_alloc_info+0x3b/0x50
[   14.064038]  __kasan_kmalloc+0xb7/0xc0
[   14.064208]  __kmalloc_cache_noprof+0x189/0x420
[   14.064709]  kasan_atomics+0x95/0x310
[   14.065101]  kunit_try_run_case+0x1a5/0x480
[   14.065521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.065700]  kthread+0x337/0x6f0
[   14.065822]  ret_from_fork+0x116/0x1d0
[   14.065957]  ret_from_fork_asm+0x1a/0x30
[   14.066096] 
[   14.066205] The buggy address belongs to the object at ffff8881039c5a00
[   14.066205]  which belongs to the cache kmalloc-64 of size 64
[   14.067115] The buggy address is located 0 bytes to the right of
[   14.067115]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.067667] 
[   14.067775] The buggy address belongs to the physical page:
[   14.068042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.068360] flags: 0x200000000000000(node=0|zone=2)
[   14.068725] page_type: f5(slab)
[   14.068847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.069318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.069651] page dumped because: kasan: bad access detected
[   14.069936] 
[   14.070008] Memory state around the buggy address:
[   14.070236]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.070665]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.070998] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.071650]                                      ^
[   14.071912]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.072247]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.072567] ==================================================================
[   14.539869] ==================================================================
[   14.540226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.540592] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.541048] 
[   14.541180] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.541222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.541235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.541258] Call Trace:
[   14.541272]  <TASK>
[   14.541286]  dump_stack_lvl+0x73/0xb0
[   14.541315]  print_report+0xd1/0x650
[   14.541337]  ? __virt_addr_valid+0x1db/0x2d0
[   14.541361]  ? kasan_atomics_helper+0xe78/0x5450
[   14.541382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.541491]  ? kasan_atomics_helper+0xe78/0x5450
[   14.541513]  kasan_report+0x141/0x180
[   14.541548]  ? kasan_atomics_helper+0xe78/0x5450
[   14.541575]  kasan_check_range+0x10c/0x1c0
[   14.541599]  __kasan_check_write+0x18/0x20
[   14.541618]  kasan_atomics_helper+0xe78/0x5450
[   14.541642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.541665]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.541691]  ? kasan_atomics+0x152/0x310
[   14.541718]  kasan_atomics+0x1dc/0x310
[   14.541742]  ? __pfx_kasan_atomics+0x10/0x10
[   14.541766]  ? __pfx_read_tsc+0x10/0x10
[   14.541788]  ? ktime_get_ts64+0x86/0x230
[   14.541813]  kunit_try_run_case+0x1a5/0x480
[   14.541837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.541859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.541884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.541907]  ? __kthread_parkme+0x82/0x180
[   14.541929]  ? preempt_count_sub+0x50/0x80
[   14.541953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.541977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.542000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.542023]  kthread+0x337/0x6f0
[   14.542043]  ? trace_preempt_on+0x20/0xc0
[   14.542067]  ? __pfx_kthread+0x10/0x10
[   14.542088]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.542109]  ? calculate_sigpending+0x7b/0xa0
[   14.542181]  ? __pfx_kthread+0x10/0x10
[   14.542204]  ret_from_fork+0x116/0x1d0
[   14.542222]  ? __pfx_kthread+0x10/0x10
[   14.542254]  ret_from_fork_asm+0x1a/0x30
[   14.542285]  </TASK>
[   14.542296] 
[   14.551836] Allocated by task 282:
[   14.552033]  kasan_save_stack+0x45/0x70
[   14.552309]  kasan_save_track+0x18/0x40
[   14.552593]  kasan_save_alloc_info+0x3b/0x50
[   14.552838]  __kasan_kmalloc+0xb7/0xc0
[   14.553064]  __kmalloc_cache_noprof+0x189/0x420
[   14.553309]  kasan_atomics+0x95/0x310
[   14.553450]  kunit_try_run_case+0x1a5/0x480
[   14.553807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554200]  kthread+0x337/0x6f0
[   14.554381]  ret_from_fork+0x116/0x1d0
[   14.554571]  ret_from_fork_asm+0x1a/0x30
[   14.554770] 
[   14.554860] The buggy address belongs to the object at ffff8881039c5a00
[   14.554860]  which belongs to the cache kmalloc-64 of size 64
[   14.555509] The buggy address is located 0 bytes to the right of
[   14.555509]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.555967] 
[   14.556079] The buggy address belongs to the physical page:
[   14.556344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.557043] flags: 0x200000000000000(node=0|zone=2)
[   14.557327] page_type: f5(slab)
[   14.557538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.557921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.558348] page dumped because: kasan: bad access detected
[   14.558573] 
[   14.558670] Memory state around the buggy address:
[   14.558895]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559367]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559639] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.559947]                                      ^
[   14.560216]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.560642]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.560988] ==================================================================
[   14.474879] ==================================================================
[   14.475423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.475852] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.476223] 
[   14.476439] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.476485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.476498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.476518] Call Trace:
[   14.476536]  <TASK>
[   14.476551]  dump_stack_lvl+0x73/0xb0
[   14.476577]  print_report+0xd1/0x650
[   14.476601]  ? __virt_addr_valid+0x1db/0x2d0
[   14.476625]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.476647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.476669]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.476692]  kasan_report+0x141/0x180
[   14.476715]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.476741]  __asan_report_load4_noabort+0x18/0x20
[   14.476766]  kasan_atomics_helper+0x4a84/0x5450
[   14.476790]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.476813]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.476838]  ? kasan_atomics+0x152/0x310
[   14.476865]  kasan_atomics+0x1dc/0x310
[   14.476889]  ? __pfx_kasan_atomics+0x10/0x10
[   14.476913]  ? __pfx_read_tsc+0x10/0x10
[   14.476934]  ? ktime_get_ts64+0x86/0x230
[   14.476959]  kunit_try_run_case+0x1a5/0x480
[   14.476983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.477006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.477030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.477054]  ? __kthread_parkme+0x82/0x180
[   14.477075]  ? preempt_count_sub+0x50/0x80
[   14.477099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.477137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.477160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.477184]  kthread+0x337/0x6f0
[   14.477204]  ? trace_preempt_on+0x20/0xc0
[   14.477226]  ? __pfx_kthread+0x10/0x10
[   14.477248]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.477269]  ? calculate_sigpending+0x7b/0xa0
[   14.477293]  ? __pfx_kthread+0x10/0x10
[   14.477315]  ret_from_fork+0x116/0x1d0
[   14.477334]  ? __pfx_kthread+0x10/0x10
[   14.477354]  ret_from_fork_asm+0x1a/0x30
[   14.477385]  </TASK>
[   14.477396] 
[   14.486279] Allocated by task 282:
[   14.486475]  kasan_save_stack+0x45/0x70
[   14.486628]  kasan_save_track+0x18/0x40
[   14.486765]  kasan_save_alloc_info+0x3b/0x50
[   14.486947]  __kasan_kmalloc+0xb7/0xc0
[   14.487164]  __kmalloc_cache_noprof+0x189/0x420
[   14.487497]  kasan_atomics+0x95/0x310
[   14.487692]  kunit_try_run_case+0x1a5/0x480
[   14.488069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.488508]  kthread+0x337/0x6f0
[   14.488697]  ret_from_fork+0x116/0x1d0
[   14.488836]  ret_from_fork_asm+0x1a/0x30
[   14.488980] 
[   14.489053] The buggy address belongs to the object at ffff8881039c5a00
[   14.489053]  which belongs to the cache kmalloc-64 of size 64
[   14.489421] The buggy address is located 0 bytes to the right of
[   14.489421]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.490477] 
[   14.490613] The buggy address belongs to the physical page:
[   14.490944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.491326] flags: 0x200000000000000(node=0|zone=2)
[   14.491495] page_type: f5(slab)
[   14.491618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.491850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.492079] page dumped because: kasan: bad access detected
[   14.492261] 
[   14.492333] Memory state around the buggy address:
[   14.492490]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.492710]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.492931] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.493157]                                      ^
[   14.493314]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.493718]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.493934] ==================================================================
[   14.781996] ==================================================================
[   14.782241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.782877] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.783228] 
[   14.783316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.783359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.783372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.783395] Call Trace:
[   14.783460]  <TASK>
[   14.783477]  dump_stack_lvl+0x73/0xb0
[   14.783505]  print_report+0xd1/0x650
[   14.783529]  ? __virt_addr_valid+0x1db/0x2d0
[   14.783555]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.783576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.783600]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.783622]  kasan_report+0x141/0x180
[   14.783644]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.783671]  kasan_check_range+0x10c/0x1c0
[   14.783695]  __kasan_check_write+0x18/0x20
[   14.783715]  kasan_atomics_helper+0x12e6/0x5450
[   14.783738]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.783759]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.783785]  ? kasan_atomics+0x152/0x310
[   14.783812]  kasan_atomics+0x1dc/0x310
[   14.783835]  ? __pfx_kasan_atomics+0x10/0x10
[   14.783873]  ? __pfx_read_tsc+0x10/0x10
[   14.783894]  ? ktime_get_ts64+0x86/0x230
[   14.783920]  kunit_try_run_case+0x1a5/0x480
[   14.783956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.784004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.784037]  ? __kthread_parkme+0x82/0x180
[   14.784058]  ? preempt_count_sub+0x50/0x80
[   14.784082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.784117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.784162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.784186]  kthread+0x337/0x6f0
[   14.784205]  ? trace_preempt_on+0x20/0xc0
[   14.784230]  ? __pfx_kthread+0x10/0x10
[   14.784250]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.784272]  ? calculate_sigpending+0x7b/0xa0
[   14.784296]  ? __pfx_kthread+0x10/0x10
[   14.784359]  ret_from_fork+0x116/0x1d0
[   14.784379]  ? __pfx_kthread+0x10/0x10
[   14.784400]  ret_from_fork_asm+0x1a/0x30
[   14.784431]  </TASK>
[   14.784444] 
[   14.798644] Allocated by task 282:
[   14.798974]  kasan_save_stack+0x45/0x70
[   14.799442]  kasan_save_track+0x18/0x40
[   14.799812]  kasan_save_alloc_info+0x3b/0x50
[   14.800218]  __kasan_kmalloc+0xb7/0xc0
[   14.800562]  __kmalloc_cache_noprof+0x189/0x420
[   14.800918]  kasan_atomics+0x95/0x310
[   14.801057]  kunit_try_run_case+0x1a5/0x480
[   14.801484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.801976]  kthread+0x337/0x6f0
[   14.802336]  ret_from_fork+0x116/0x1d0
[   14.802753]  ret_from_fork_asm+0x1a/0x30
[   14.802901] 
[   14.802972] The buggy address belongs to the object at ffff8881039c5a00
[   14.802972]  which belongs to the cache kmalloc-64 of size 64
[   14.803862] The buggy address is located 0 bytes to the right of
[   14.803862]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.805163] 
[   14.805379] The buggy address belongs to the physical page:
[   14.805873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.806111] flags: 0x200000000000000(node=0|zone=2)
[   14.806652] page_type: f5(slab)
[   14.806949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.807869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.808465] page dumped because: kasan: bad access detected
[   14.808955] 
[   14.809081] Memory state around the buggy address:
[   14.809563]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.810055]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.810598] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.810976]                                      ^
[   14.811158]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.811877]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.812710] ==================================================================
[   14.921992] ==================================================================
[   14.922487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.922835] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.923104] 
[   14.923247] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.923287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.923301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.923332] Call Trace:
[   14.923348]  <TASK>
[   14.923363]  dump_stack_lvl+0x73/0xb0
[   14.923389]  print_report+0xd1/0x650
[   14.923414]  ? __virt_addr_valid+0x1db/0x2d0
[   14.923437]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.923459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.923481]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.923503]  kasan_report+0x141/0x180
[   14.923526]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.923553]  kasan_check_range+0x10c/0x1c0
[   14.923577]  __kasan_check_write+0x18/0x20
[   14.923597]  kasan_atomics_helper+0x15b6/0x5450
[   14.923621]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.923642]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.923669]  ? kasan_atomics+0x152/0x310
[   14.923705]  kasan_atomics+0x1dc/0x310
[   14.923730]  ? __pfx_kasan_atomics+0x10/0x10
[   14.923754]  ? __pfx_read_tsc+0x10/0x10
[   14.923788]  ? ktime_get_ts64+0x86/0x230
[   14.923813]  kunit_try_run_case+0x1a5/0x480
[   14.923839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.923863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.923889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.923912]  ? __kthread_parkme+0x82/0x180
[   14.923933]  ? preempt_count_sub+0x50/0x80
[   14.923956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.923990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.924013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.924036]  kthread+0x337/0x6f0
[   14.924067]  ? trace_preempt_on+0x20/0xc0
[   14.924090]  ? __pfx_kthread+0x10/0x10
[   14.924112]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.924167]  ? calculate_sigpending+0x7b/0xa0
[   14.924191]  ? __pfx_kthread+0x10/0x10
[   14.924212]  ret_from_fork+0x116/0x1d0
[   14.924242]  ? __pfx_kthread+0x10/0x10
[   14.924264]  ret_from_fork_asm+0x1a/0x30
[   14.924295]  </TASK>
[   14.924317] 
[   14.931842] Allocated by task 282:
[   14.931995]  kasan_save_stack+0x45/0x70
[   14.932245]  kasan_save_track+0x18/0x40
[   14.932422]  kasan_save_alloc_info+0x3b/0x50
[   14.932572]  __kasan_kmalloc+0xb7/0xc0
[   14.932706]  __kmalloc_cache_noprof+0x189/0x420
[   14.932865]  kasan_atomics+0x95/0x310
[   14.933005]  kunit_try_run_case+0x1a5/0x480
[   14.933202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.933483]  kthread+0x337/0x6f0
[   14.933655]  ret_from_fork+0x116/0x1d0
[   14.933842]  ret_from_fork_asm+0x1a/0x30
[   14.934039] 
[   14.934168] The buggy address belongs to the object at ffff8881039c5a00
[   14.934168]  which belongs to the cache kmalloc-64 of size 64
[   14.934699] The buggy address is located 0 bytes to the right of
[   14.934699]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.935272] 
[   14.935377] The buggy address belongs to the physical page:
[   14.935614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.935857] flags: 0x200000000000000(node=0|zone=2)
[   14.936093] page_type: f5(slab)
[   14.936318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.936657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.936980] page dumped because: kasan: bad access detected
[   14.937246] 
[   14.937357] Memory state around the buggy address:
[   14.937564]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.937869]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.938203] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.938533]                                      ^
[   14.938742]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939057]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939392] ==================================================================
[   14.747956] ==================================================================
[   14.748331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.748652] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.749302] 
[   14.749445] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.749491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.749504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.749527] Call Trace:
[   14.749541]  <TASK>
[   14.749555]  dump_stack_lvl+0x73/0xb0
[   14.749583]  print_report+0xd1/0x650
[   14.749606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.749629]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.749651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.749674]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.749696]  kasan_report+0x141/0x180
[   14.749720]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.749749]  __asan_report_load4_noabort+0x18/0x20
[   14.749774]  kasan_atomics_helper+0x49e8/0x5450
[   14.749798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.749821]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.749849]  ? kasan_atomics+0x152/0x310
[   14.749877]  kasan_atomics+0x1dc/0x310
[   14.749902]  ? __pfx_kasan_atomics+0x10/0x10
[   14.749926]  ? __pfx_read_tsc+0x10/0x10
[   14.749948]  ? ktime_get_ts64+0x86/0x230
[   14.749972]  kunit_try_run_case+0x1a5/0x480
[   14.749996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.750018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.750042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.750065]  ? __kthread_parkme+0x82/0x180
[   14.750085]  ? preempt_count_sub+0x50/0x80
[   14.750109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.750213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.750240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.750265]  kthread+0x337/0x6f0
[   14.750296]  ? trace_preempt_on+0x20/0xc0
[   14.750360]  ? __pfx_kthread+0x10/0x10
[   14.750396]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.750417]  ? calculate_sigpending+0x7b/0xa0
[   14.750441]  ? __pfx_kthread+0x10/0x10
[   14.750463]  ret_from_fork+0x116/0x1d0
[   14.750482]  ? __pfx_kthread+0x10/0x10
[   14.750516]  ret_from_fork_asm+0x1a/0x30
[   14.750547]  </TASK>
[   14.750559] 
[   14.766958] Allocated by task 282:
[   14.767343]  kasan_save_stack+0x45/0x70
[   14.767724]  kasan_save_track+0x18/0x40
[   14.767866]  kasan_save_alloc_info+0x3b/0x50
[   14.768012]  __kasan_kmalloc+0xb7/0xc0
[   14.768177]  __kmalloc_cache_noprof+0x189/0x420
[   14.768697]  kasan_atomics+0x95/0x310
[   14.769339]  kunit_try_run_case+0x1a5/0x480
[   14.769789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.770333]  kthread+0x337/0x6f0
[   14.770667]  ret_from_fork+0x116/0x1d0
[   14.771042]  ret_from_fork_asm+0x1a/0x30
[   14.771670] 
[   14.771781] The buggy address belongs to the object at ffff8881039c5a00
[   14.771781]  which belongs to the cache kmalloc-64 of size 64
[   14.772148] The buggy address is located 0 bytes to the right of
[   14.772148]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.773549] 
[   14.773753] The buggy address belongs to the physical page:
[   14.774278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.774978] flags: 0x200000000000000(node=0|zone=2)
[   14.775179] page_type: f5(slab)
[   14.775451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.776054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.776766] page dumped because: kasan: bad access detected
[   14.777422] 
[   14.777566] Memory state around the buggy address:
[   14.777872]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.778095]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.778647] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.779357]                                      ^
[   14.779794]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780496]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.781148] ==================================================================
[   15.041237] ==================================================================
[   15.041970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.042727] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.043040] 
[   15.043324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.043371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.043384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.043408] Call Trace:
[   15.043423]  <TASK>
[   15.043438]  dump_stack_lvl+0x73/0xb0
[   15.043467]  print_report+0xd1/0x650
[   15.043490]  ? __virt_addr_valid+0x1db/0x2d0
[   15.043514]  ? kasan_atomics_helper+0x194a/0x5450
[   15.043537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.043559]  ? kasan_atomics_helper+0x194a/0x5450
[   15.043582]  kasan_report+0x141/0x180
[   15.043604]  ? kasan_atomics_helper+0x194a/0x5450
[   15.043631]  kasan_check_range+0x10c/0x1c0
[   15.043655]  __kasan_check_write+0x18/0x20
[   15.043675]  kasan_atomics_helper+0x194a/0x5450
[   15.043698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.043720]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.043746]  ? kasan_atomics+0x152/0x310
[   15.043772]  kasan_atomics+0x1dc/0x310
[   15.043795]  ? __pfx_kasan_atomics+0x10/0x10
[   15.043820]  ? __pfx_read_tsc+0x10/0x10
[   15.043841]  ? ktime_get_ts64+0x86/0x230
[   15.043867]  kunit_try_run_case+0x1a5/0x480
[   15.043892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.043940]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.043963]  ? __kthread_parkme+0x82/0x180
[   15.043984]  ? preempt_count_sub+0x50/0x80
[   15.044009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.044034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.044058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.044082]  kthread+0x337/0x6f0
[   15.044102]  ? trace_preempt_on+0x20/0xc0
[   15.044297]  ? __pfx_kthread+0x10/0x10
[   15.044323]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.044347]  ? calculate_sigpending+0x7b/0xa0
[   15.044372]  ? __pfx_kthread+0x10/0x10
[   15.044393]  ret_from_fork+0x116/0x1d0
[   15.044413]  ? __pfx_kthread+0x10/0x10
[   15.044434]  ret_from_fork_asm+0x1a/0x30
[   15.044464]  </TASK>
[   15.044476] 
[   15.054855] Allocated by task 282:
[   15.055214]  kasan_save_stack+0x45/0x70
[   15.055421]  kasan_save_track+0x18/0x40
[   15.055753]  kasan_save_alloc_info+0x3b/0x50
[   15.056030]  __kasan_kmalloc+0xb7/0xc0
[   15.056360]  __kmalloc_cache_noprof+0x189/0x420
[   15.056673]  kasan_atomics+0x95/0x310
[   15.056892]  kunit_try_run_case+0x1a5/0x480
[   15.057239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057577]  kthread+0x337/0x6f0
[   15.057816]  ret_from_fork+0x116/0x1d0
[   15.058032]  ret_from_fork_asm+0x1a/0x30
[   15.058359] 
[   15.058482] The buggy address belongs to the object at ffff8881039c5a00
[   15.058482]  which belongs to the cache kmalloc-64 of size 64
[   15.059214] The buggy address is located 0 bytes to the right of
[   15.059214]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.059841] 
[   15.059941] The buggy address belongs to the physical page:
[   15.060336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.060766] flags: 0x200000000000000(node=0|zone=2)
[   15.060985] page_type: f5(slab)
[   15.061332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.061741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.062175] page dumped because: kasan: bad access detected
[   15.062378] 
[   15.062568] Memory state around the buggy address:
[   15.062898]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.063233]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.063701] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.064042]                                      ^
[   15.064376]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.064772]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.065181] ==================================================================
[   15.140655] ==================================================================
[   15.140968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.141699] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.142099] 
[   15.142403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.142453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.142466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.142488] Call Trace:
[   15.142504]  <TASK>
[   15.142529]  dump_stack_lvl+0x73/0xb0
[   15.142557]  print_report+0xd1/0x650
[   15.142581]  ? __virt_addr_valid+0x1db/0x2d0
[   15.142605]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.142627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.142650]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.142672]  kasan_report+0x141/0x180
[   15.142696]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.142723]  kasan_check_range+0x10c/0x1c0
[   15.142747]  __kasan_check_write+0x18/0x20
[   15.142767]  kasan_atomics_helper+0x1c18/0x5450
[   15.142791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.142815]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.142841]  ? kasan_atomics+0x152/0x310
[   15.142869]  kasan_atomics+0x1dc/0x310
[   15.142892]  ? __pfx_kasan_atomics+0x10/0x10
[   15.142917]  ? __pfx_read_tsc+0x10/0x10
[   15.142938]  ? ktime_get_ts64+0x86/0x230
[   15.142962]  kunit_try_run_case+0x1a5/0x480
[   15.142987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.143031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.143054]  ? __kthread_parkme+0x82/0x180
[   15.143075]  ? preempt_count_sub+0x50/0x80
[   15.143099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.143168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.143192]  kthread+0x337/0x6f0
[   15.143212]  ? trace_preempt_on+0x20/0xc0
[   15.143236]  ? __pfx_kthread+0x10/0x10
[   15.143257]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.143278]  ? calculate_sigpending+0x7b/0xa0
[   15.143302]  ? __pfx_kthread+0x10/0x10
[   15.143323]  ret_from_fork+0x116/0x1d0
[   15.143343]  ? __pfx_kthread+0x10/0x10
[   15.143364]  ret_from_fork_asm+0x1a/0x30
[   15.143395]  </TASK>
[   15.143406] 
[   15.154042] Allocated by task 282:
[   15.154431]  kasan_save_stack+0x45/0x70
[   15.154659]  kasan_save_track+0x18/0x40
[   15.154966]  kasan_save_alloc_info+0x3b/0x50
[   15.155211]  __kasan_kmalloc+0xb7/0xc0
[   15.155525]  __kmalloc_cache_noprof+0x189/0x420
[   15.155810]  kasan_atomics+0x95/0x310
[   15.156000]  kunit_try_run_case+0x1a5/0x480
[   15.156401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.156675]  kthread+0x337/0x6f0
[   15.156945]  ret_from_fork+0x116/0x1d0
[   15.157260]  ret_from_fork_asm+0x1a/0x30
[   15.157493] 
[   15.157613] The buggy address belongs to the object at ffff8881039c5a00
[   15.157613]  which belongs to the cache kmalloc-64 of size 64
[   15.158078] The buggy address is located 0 bytes to the right of
[   15.158078]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.158900] 
[   15.159175] The buggy address belongs to the physical page:
[   15.159466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.159881] flags: 0x200000000000000(node=0|zone=2)
[   15.160238] page_type: f5(slab)
[   15.160515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.160837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.161384] page dumped because: kasan: bad access detected
[   15.161718] 
[   15.161840] Memory state around the buggy address:
[   15.162185]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.162498]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.162931] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.163329]                                      ^
[   15.163628]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163997]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164423] ==================================================================
[   14.561673] ==================================================================
[   14.562000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.562446] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.562698] 
[   14.562801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.562928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.562944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.562991] Call Trace:
[   14.563029]  <TASK>
[   14.563045]  dump_stack_lvl+0x73/0xb0
[   14.563073]  print_report+0xd1/0x650
[   14.563116]  ? __virt_addr_valid+0x1db/0x2d0
[   14.563157]  ? kasan_atomics_helper+0xf10/0x5450
[   14.563178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.563200]  ? kasan_atomics_helper+0xf10/0x5450
[   14.563222]  kasan_report+0x141/0x180
[   14.563245]  ? kasan_atomics_helper+0xf10/0x5450
[   14.563271]  kasan_check_range+0x10c/0x1c0
[   14.563295]  __kasan_check_write+0x18/0x20
[   14.563358]  kasan_atomics_helper+0xf10/0x5450
[   14.563382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.563405]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.563431]  ? kasan_atomics+0x152/0x310
[   14.563457]  kasan_atomics+0x1dc/0x310
[   14.563481]  ? __pfx_kasan_atomics+0x10/0x10
[   14.563505]  ? __pfx_read_tsc+0x10/0x10
[   14.563527]  ? ktime_get_ts64+0x86/0x230
[   14.563552]  kunit_try_run_case+0x1a5/0x480
[   14.563612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563637]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.563661]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.563711]  ? __kthread_parkme+0x82/0x180
[   14.563734]  ? preempt_count_sub+0x50/0x80
[   14.563758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.563816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.563840]  kthread+0x337/0x6f0
[   14.563860]  ? trace_preempt_on+0x20/0xc0
[   14.563884]  ? __pfx_kthread+0x10/0x10
[   14.563905]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.563927]  ? calculate_sigpending+0x7b/0xa0
[   14.563951]  ? __pfx_kthread+0x10/0x10
[   14.563973]  ret_from_fork+0x116/0x1d0
[   14.563992]  ? __pfx_kthread+0x10/0x10
[   14.564014]  ret_from_fork_asm+0x1a/0x30
[   14.564045]  </TASK>
[   14.564057] 
[   14.573076] Allocated by task 282:
[   14.573479]  kasan_save_stack+0x45/0x70
[   14.573648]  kasan_save_track+0x18/0x40
[   14.573787]  kasan_save_alloc_info+0x3b/0x50
[   14.573992]  __kasan_kmalloc+0xb7/0xc0
[   14.574300]  __kmalloc_cache_noprof+0x189/0x420
[   14.574860]  kasan_atomics+0x95/0x310
[   14.575108]  kunit_try_run_case+0x1a5/0x480
[   14.575425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.575718]  kthread+0x337/0x6f0
[   14.575844]  ret_from_fork+0x116/0x1d0
[   14.575979]  ret_from_fork_asm+0x1a/0x30
[   14.576245] 
[   14.576432] The buggy address belongs to the object at ffff8881039c5a00
[   14.576432]  which belongs to the cache kmalloc-64 of size 64
[   14.577209] The buggy address is located 0 bytes to the right of
[   14.577209]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.577789] 
[   14.577869] The buggy address belongs to the physical page:
[   14.578155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.578613] flags: 0x200000000000000(node=0|zone=2)
[   14.578922] page_type: f5(slab)
[   14.579053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.579642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.579970] page dumped because: kasan: bad access detected
[   14.580245] 
[   14.580346] Memory state around the buggy address:
[   14.580558]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.580865]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.581546] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.581882]                                      ^
[   14.582044]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.582540]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.582877] ==================================================================
[   14.583511] ==================================================================
[   14.583826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.584210] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.584729] 
[   14.584862] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.584907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.584920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.584943] Call Trace:
[   14.584960]  <TASK>
[   14.584976]  dump_stack_lvl+0x73/0xb0
[   14.585005]  print_report+0xd1/0x650
[   14.585027]  ? __virt_addr_valid+0x1db/0x2d0
[   14.585051]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.585073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.585095]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.585117]  kasan_report+0x141/0x180
[   14.585194]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.585231]  kasan_check_range+0x10c/0x1c0
[   14.585256]  __kasan_check_write+0x18/0x20
[   14.585276]  kasan_atomics_helper+0xfa9/0x5450
[   14.585298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.585321]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.585346]  ? kasan_atomics+0x152/0x310
[   14.585373]  kasan_atomics+0x1dc/0x310
[   14.585397]  ? __pfx_kasan_atomics+0x10/0x10
[   14.585422]  ? __pfx_read_tsc+0x10/0x10
[   14.585443]  ? ktime_get_ts64+0x86/0x230
[   14.585468]  kunit_try_run_case+0x1a5/0x480
[   14.585492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.585514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.585539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.585562]  ? __kthread_parkme+0x82/0x180
[   14.585584]  ? preempt_count_sub+0x50/0x80
[   14.585608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.585632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.585655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.585679]  kthread+0x337/0x6f0
[   14.585699]  ? trace_preempt_on+0x20/0xc0
[   14.585723]  ? __pfx_kthread+0x10/0x10
[   14.585744]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.585765]  ? calculate_sigpending+0x7b/0xa0
[   14.585789]  ? __pfx_kthread+0x10/0x10
[   14.585812]  ret_from_fork+0x116/0x1d0
[   14.585831]  ? __pfx_kthread+0x10/0x10
[   14.585852]  ret_from_fork_asm+0x1a/0x30
[   14.585883]  </TASK>
[   14.585894] 
[   14.595696] Allocated by task 282:
[   14.595872]  kasan_save_stack+0x45/0x70
[   14.596140]  kasan_save_track+0x18/0x40
[   14.596481]  kasan_save_alloc_info+0x3b/0x50
[   14.596703]  __kasan_kmalloc+0xb7/0xc0
[   14.596925]  __kmalloc_cache_noprof+0x189/0x420
[   14.597228]  kasan_atomics+0x95/0x310
[   14.597499]  kunit_try_run_case+0x1a5/0x480
[   14.597737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.598007]  kthread+0x337/0x6f0
[   14.598194]  ret_from_fork+0x116/0x1d0
[   14.598454]  ret_from_fork_asm+0x1a/0x30
[   14.598641] 
[   14.598716] The buggy address belongs to the object at ffff8881039c5a00
[   14.598716]  which belongs to the cache kmalloc-64 of size 64
[   14.599391] The buggy address is located 0 bytes to the right of
[   14.599391]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.599896] 
[   14.599994] The buggy address belongs to the physical page:
[   14.600314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.600995] flags: 0x200000000000000(node=0|zone=2)
[   14.601265] page_type: f5(slab)
[   14.601389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.601695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.602094] page dumped because: kasan: bad access detected
[   14.602366] 
[   14.602464] Memory state around the buggy address:
[   14.602694]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.603075]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.603477] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.603764]                                      ^
[   14.604008]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.604446]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.604828] ==================================================================
[   14.727042] ==================================================================
[   14.727297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.727987] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.728753] 
[   14.728863] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.728908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.728923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.728944] Call Trace:
[   14.728960]  <TASK>
[   14.728976]  dump_stack_lvl+0x73/0xb0
[   14.729004]  print_report+0xd1/0x650
[   14.729028]  ? __virt_addr_valid+0x1db/0x2d0
[   14.729053]  ? kasan_atomics_helper+0x1217/0x5450
[   14.729075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.729098]  ? kasan_atomics_helper+0x1217/0x5450
[   14.729134]  kasan_report+0x141/0x180
[   14.729158]  ? kasan_atomics_helper+0x1217/0x5450
[   14.729185]  kasan_check_range+0x10c/0x1c0
[   14.729209]  __kasan_check_write+0x18/0x20
[   14.729230]  kasan_atomics_helper+0x1217/0x5450
[   14.729253]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.729277]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.729303]  ? kasan_atomics+0x152/0x310
[   14.729330]  kasan_atomics+0x1dc/0x310
[   14.729353]  ? __pfx_kasan_atomics+0x10/0x10
[   14.729379]  ? __pfx_read_tsc+0x10/0x10
[   14.729400]  ? ktime_get_ts64+0x86/0x230
[   14.729479]  kunit_try_run_case+0x1a5/0x480
[   14.729519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.729541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.729565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.729588]  ? __kthread_parkme+0x82/0x180
[   14.729611]  ? preempt_count_sub+0x50/0x80
[   14.729634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.729658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.729682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.729705]  kthread+0x337/0x6f0
[   14.729725]  ? trace_preempt_on+0x20/0xc0
[   14.729748]  ? __pfx_kthread+0x10/0x10
[   14.729770]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.729791]  ? calculate_sigpending+0x7b/0xa0
[   14.729815]  ? __pfx_kthread+0x10/0x10
[   14.729837]  ret_from_fork+0x116/0x1d0
[   14.729855]  ? __pfx_kthread+0x10/0x10
[   14.729876]  ret_from_fork_asm+0x1a/0x30
[   14.729906]  </TASK>
[   14.729918] 
[   14.738808] Allocated by task 282:
[   14.739027]  kasan_save_stack+0x45/0x70
[   14.739246]  kasan_save_track+0x18/0x40
[   14.739385]  kasan_save_alloc_info+0x3b/0x50
[   14.739796]  __kasan_kmalloc+0xb7/0xc0
[   14.740002]  __kmalloc_cache_noprof+0x189/0x420
[   14.740241]  kasan_atomics+0x95/0x310
[   14.740456]  kunit_try_run_case+0x1a5/0x480
[   14.740669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.740908]  kthread+0x337/0x6f0
[   14.741099]  ret_from_fork+0x116/0x1d0
[   14.741294]  ret_from_fork_asm+0x1a/0x30
[   14.741437] 
[   14.741510] The buggy address belongs to the object at ffff8881039c5a00
[   14.741510]  which belongs to the cache kmalloc-64 of size 64
[   14.741966] The buggy address is located 0 bytes to the right of
[   14.741966]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.742505] 
[   14.742598] The buggy address belongs to the physical page:
[   14.742766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.743153] flags: 0x200000000000000(node=0|zone=2)
[   14.743552] page_type: f5(slab)
[   14.743907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.744488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.744784] page dumped because: kasan: bad access detected
[   14.745022] 
[   14.745120] Memory state around the buggy address:
[   14.745518]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.745832]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.746156] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.746575]                                      ^
[   14.746792]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.747105]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.747548] ==================================================================
[   14.813404] ==================================================================
[   14.813674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.813912] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.814153] 
[   14.814249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.814292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.814320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.814341] Call Trace:
[   14.814358]  <TASK>
[   14.814387]  dump_stack_lvl+0x73/0xb0
[   14.814424]  print_report+0xd1/0x650
[   14.814450]  ? __virt_addr_valid+0x1db/0x2d0
[   14.814474]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.814496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.814523]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.814545]  kasan_report+0x141/0x180
[   14.814568]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.814594]  __asan_report_load4_noabort+0x18/0x20
[   14.814619]  kasan_atomics_helper+0x49ce/0x5450
[   14.814642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.814664]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.814689]  ? kasan_atomics+0x152/0x310
[   14.814726]  kasan_atomics+0x1dc/0x310
[   14.814750]  ? __pfx_kasan_atomics+0x10/0x10
[   14.814784]  ? __pfx_read_tsc+0x10/0x10
[   14.814806]  ? ktime_get_ts64+0x86/0x230
[   14.814830]  kunit_try_run_case+0x1a5/0x480
[   14.814855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.814878]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.814911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.814934]  ? __kthread_parkme+0x82/0x180
[   14.814955]  ? preempt_count_sub+0x50/0x80
[   14.814990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.815015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.815062]  kthread+0x337/0x6f0
[   14.815081]  ? trace_preempt_on+0x20/0xc0
[   14.815105]  ? __pfx_kthread+0x10/0x10
[   14.815135]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.815167]  ? calculate_sigpending+0x7b/0xa0
[   14.815192]  ? __pfx_kthread+0x10/0x10
[   14.815214]  ret_from_fork+0x116/0x1d0
[   14.815234]  ? __pfx_kthread+0x10/0x10
[   14.815254]  ret_from_fork_asm+0x1a/0x30
[   14.815285]  </TASK>
[   14.815297] 
[   14.822893] Allocated by task 282:
[   14.823070]  kasan_save_stack+0x45/0x70
[   14.823325]  kasan_save_track+0x18/0x40
[   14.823506]  kasan_save_alloc_info+0x3b/0x50
[   14.823735]  __kasan_kmalloc+0xb7/0xc0
[   14.823920]  __kmalloc_cache_noprof+0x189/0x420
[   14.824200]  kasan_atomics+0x95/0x310
[   14.824380]  kunit_try_run_case+0x1a5/0x480
[   14.824599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.824838]  kthread+0x337/0x6f0
[   14.824974]  ret_from_fork+0x116/0x1d0
[   14.825238]  ret_from_fork_asm+0x1a/0x30
[   14.825439] 
[   14.825533] The buggy address belongs to the object at ffff8881039c5a00
[   14.825533]  which belongs to the cache kmalloc-64 of size 64
[   14.825894] The buggy address is located 0 bytes to the right of
[   14.825894]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.826306] 
[   14.826406] The buggy address belongs to the physical page:
[   14.826665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.827042] flags: 0x200000000000000(node=0|zone=2)
[   14.827309] page_type: f5(slab)
[   14.827478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.827820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.828173] page dumped because: kasan: bad access detected
[   14.828349] 
[   14.828422] Memory state around the buggy address:
[   14.828580]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.828917]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.829283] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.829629]                                      ^
[   14.829858]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.830188]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.830468] ==================================================================
[   14.885487] ==================================================================
[   14.885816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.886194] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.886526] 
[   14.886610] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.886664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.886677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.886708] Call Trace:
[   14.886724]  <TASK>
[   14.886740]  dump_stack_lvl+0x73/0xb0
[   14.886766]  print_report+0xd1/0x650
[   14.886808]  ? __virt_addr_valid+0x1db/0x2d0
[   14.886832]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.886853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.886887]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.886910]  kasan_report+0x141/0x180
[   14.886932]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.886959]  __asan_report_store8_noabort+0x1b/0x30
[   14.886990]  kasan_atomics_helper+0x50d4/0x5450
[   14.887013]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.887036]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.887072]  ? kasan_atomics+0x152/0x310
[   14.887100]  kasan_atomics+0x1dc/0x310
[   14.887153]  ? __pfx_kasan_atomics+0x10/0x10
[   14.887179]  ? __pfx_read_tsc+0x10/0x10
[   14.887212]  ? ktime_get_ts64+0x86/0x230
[   14.887237]  kunit_try_run_case+0x1a5/0x480
[   14.887261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.887295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.887318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.887342]  ? __kthread_parkme+0x82/0x180
[   14.887374]  ? preempt_count_sub+0x50/0x80
[   14.887399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.887423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.887458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.887482]  kthread+0x337/0x6f0
[   14.887502]  ? trace_preempt_on+0x20/0xc0
[   14.887537]  ? __pfx_kthread+0x10/0x10
[   14.887558]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.887580]  ? calculate_sigpending+0x7b/0xa0
[   14.887615]  ? __pfx_kthread+0x10/0x10
[   14.887637]  ret_from_fork+0x116/0x1d0
[   14.887656]  ? __pfx_kthread+0x10/0x10
[   14.887688]  ret_from_fork_asm+0x1a/0x30
[   14.887718]  </TASK>
[   14.887730] 
[   14.895314] Allocated by task 282:
[   14.895493]  kasan_save_stack+0x45/0x70
[   14.895720]  kasan_save_track+0x18/0x40
[   14.895948]  kasan_save_alloc_info+0x3b/0x50
[   14.896221]  __kasan_kmalloc+0xb7/0xc0
[   14.896403]  __kmalloc_cache_noprof+0x189/0x420
[   14.896600]  kasan_atomics+0x95/0x310
[   14.896791]  kunit_try_run_case+0x1a5/0x480
[   14.897014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.897299]  kthread+0x337/0x6f0
[   14.897470]  ret_from_fork+0x116/0x1d0
[   14.897666]  ret_from_fork_asm+0x1a/0x30
[   14.897859] 
[   14.897968] The buggy address belongs to the object at ffff8881039c5a00
[   14.897968]  which belongs to the cache kmalloc-64 of size 64
[   14.898505] The buggy address is located 0 bytes to the right of
[   14.898505]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.899040] 
[   14.899112] The buggy address belongs to the physical page:
[   14.899362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.899734] flags: 0x200000000000000(node=0|zone=2)
[   14.899951] page_type: f5(slab)
[   14.900093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.900468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.900728] page dumped because: kasan: bad access detected
[   14.900901] 
[   14.900972] Memory state around the buggy address:
[   14.901156]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.901374]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.901684] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.902001]                                      ^
[   14.902257]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.902585]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.902901] ==================================================================
[   15.165670] ==================================================================
[   15.165980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.166475] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.166831] 
[   15.166957] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.167004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.167017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.167039] Call Trace:
[   15.167054]  <TASK>
[   15.167069]  dump_stack_lvl+0x73/0xb0
[   15.167097]  print_report+0xd1/0x650
[   15.167120]  ? __virt_addr_valid+0x1db/0x2d0
[   15.167436]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.167464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.167487]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.167510]  kasan_report+0x141/0x180
[   15.167533]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.167560]  __asan_report_load8_noabort+0x18/0x20
[   15.167586]  kasan_atomics_helper+0x4f30/0x5450
[   15.167609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.167631]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.167657]  ? kasan_atomics+0x152/0x310
[   15.167684]  kasan_atomics+0x1dc/0x310
[   15.167707]  ? __pfx_kasan_atomics+0x10/0x10
[   15.167732]  ? __pfx_read_tsc+0x10/0x10
[   15.167753]  ? ktime_get_ts64+0x86/0x230
[   15.167778]  kunit_try_run_case+0x1a5/0x480
[   15.167801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.167824]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.167848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.167871]  ? __kthread_parkme+0x82/0x180
[   15.167892]  ? preempt_count_sub+0x50/0x80
[   15.167916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.167939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.167962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.167986]  kthread+0x337/0x6f0
[   15.168006]  ? trace_preempt_on+0x20/0xc0
[   15.168028]  ? __pfx_kthread+0x10/0x10
[   15.168050]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.168071]  ? calculate_sigpending+0x7b/0xa0
[   15.168095]  ? __pfx_kthread+0x10/0x10
[   15.168116]  ret_from_fork+0x116/0x1d0
[   15.168148]  ? __pfx_kthread+0x10/0x10
[   15.168169]  ret_from_fork_asm+0x1a/0x30
[   15.168200]  </TASK>
[   15.168212] 
[   15.178678] Allocated by task 282:
[   15.178955]  kasan_save_stack+0x45/0x70
[   15.179179]  kasan_save_track+0x18/0x40
[   15.179509]  kasan_save_alloc_info+0x3b/0x50
[   15.179733]  __kasan_kmalloc+0xb7/0xc0
[   15.180025]  __kmalloc_cache_noprof+0x189/0x420
[   15.180334]  kasan_atomics+0x95/0x310
[   15.180602]  kunit_try_run_case+0x1a5/0x480
[   15.180834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181253]  kthread+0x337/0x6f0
[   15.181454]  ret_from_fork+0x116/0x1d0
[   15.181744]  ret_from_fork_asm+0x1a/0x30
[   15.182018] 
[   15.182277] The buggy address belongs to the object at ffff8881039c5a00
[   15.182277]  which belongs to the cache kmalloc-64 of size 64
[   15.182797] The buggy address is located 0 bytes to the right of
[   15.182797]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.183647] 
[   15.183746] The buggy address belongs to the physical page:
[   15.183958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.184489] flags: 0x200000000000000(node=0|zone=2)
[   15.184840] page_type: f5(slab)
[   15.185080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.185611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.186027] page dumped because: kasan: bad access detected
[   15.186413] 
[   15.186568] Memory state around the buggy address:
[   15.186875]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.187362]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.187713] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.188069]                                      ^
[   15.188442]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.188804]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.189230] ==================================================================
[   14.831025] ==================================================================
[   14.831367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.831662] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.831952] 
[   14.832065] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.832108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.832476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.832523] Call Trace:
[   14.832539]  <TASK>
[   14.832554]  dump_stack_lvl+0x73/0xb0
[   14.832582]  print_report+0xd1/0x650
[   14.832605]  ? __virt_addr_valid+0x1db/0x2d0
[   14.832629]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.832652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.832675]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.832697]  kasan_report+0x141/0x180
[   14.832719]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.832746]  kasan_check_range+0x10c/0x1c0
[   14.832780]  __kasan_check_read+0x15/0x20
[   14.832800]  kasan_atomics_helper+0x13b5/0x5450
[   14.832823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.832857]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.832882]  ? kasan_atomics+0x152/0x310
[   14.832908]  kasan_atomics+0x1dc/0x310
[   14.832941]  ? __pfx_kasan_atomics+0x10/0x10
[   14.832965]  ? __pfx_read_tsc+0x10/0x10
[   14.832986]  ? ktime_get_ts64+0x86/0x230
[   14.833020]  kunit_try_run_case+0x1a5/0x480
[   14.833044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.833066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.833090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.833154]  ? __kthread_parkme+0x82/0x180
[   14.833181]  ? preempt_count_sub+0x50/0x80
[   14.833219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.833246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.833279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.833303]  kthread+0x337/0x6f0
[   14.833323]  ? trace_preempt_on+0x20/0xc0
[   14.833346]  ? __pfx_kthread+0x10/0x10
[   14.833368]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.833398]  ? calculate_sigpending+0x7b/0xa0
[   14.833423]  ? __pfx_kthread+0x10/0x10
[   14.833445]  ret_from_fork+0x116/0x1d0
[   14.833474]  ? __pfx_kthread+0x10/0x10
[   14.833495]  ret_from_fork_asm+0x1a/0x30
[   14.833526]  </TASK>
[   14.833537] 
[   14.841157] Allocated by task 282:
[   14.841293]  kasan_save_stack+0x45/0x70
[   14.841437]  kasan_save_track+0x18/0x40
[   14.841574]  kasan_save_alloc_info+0x3b/0x50
[   14.841787]  __kasan_kmalloc+0xb7/0xc0
[   14.842008]  __kmalloc_cache_noprof+0x189/0x420
[   14.842282]  kasan_atomics+0x95/0x310
[   14.842495]  kunit_try_run_case+0x1a5/0x480
[   14.842720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.843001]  kthread+0x337/0x6f0
[   14.843215]  ret_from_fork+0x116/0x1d0
[   14.843421]  ret_from_fork_asm+0x1a/0x30
[   14.843575] 
[   14.843660] The buggy address belongs to the object at ffff8881039c5a00
[   14.843660]  which belongs to the cache kmalloc-64 of size 64
[   14.844232] The buggy address is located 0 bytes to the right of
[   14.844232]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.844606] 
[   14.844680] The buggy address belongs to the physical page:
[   14.844856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.845271] flags: 0x200000000000000(node=0|zone=2)
[   14.845507] page_type: f5(slab)
[   14.845674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.846012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.846383] page dumped because: kasan: bad access detected
[   14.846617] 
[   14.846727] Memory state around the buggy address:
[   14.846922]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.847175]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.847437] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.847781]                                      ^
[   14.848010]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.848385]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.848706] ==================================================================
[   14.849436] ==================================================================
[   14.849769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.850146] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.850503] 
[   14.850645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.850688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.850712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.850733] Call Trace:
[   14.850750]  <TASK>
[   14.850779]  dump_stack_lvl+0x73/0xb0
[   14.850806]  print_report+0xd1/0x650
[   14.850829]  ? __virt_addr_valid+0x1db/0x2d0
[   14.850863]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.850884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.850907]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.850929]  kasan_report+0x141/0x180
[   14.850952]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.850978]  __asan_report_load8_noabort+0x18/0x20
[   14.851003]  kasan_atomics_helper+0x4eae/0x5450
[   14.851026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.851048]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.851074]  ? kasan_atomics+0x152/0x310
[   14.851100]  kasan_atomics+0x1dc/0x310
[   14.851152]  ? __pfx_kasan_atomics+0x10/0x10
[   14.851177]  ? __pfx_read_tsc+0x10/0x10
[   14.851199]  ? ktime_get_ts64+0x86/0x230
[   14.851223]  kunit_try_run_case+0x1a5/0x480
[   14.851247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.851294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.851317]  ? __kthread_parkme+0x82/0x180
[   14.851338]  ? preempt_count_sub+0x50/0x80
[   14.851361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.851418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.851443]  kthread+0x337/0x6f0
[   14.851463]  ? trace_preempt_on+0x20/0xc0
[   14.851507]  ? __pfx_kthread+0x10/0x10
[   14.851528]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.851549]  ? calculate_sigpending+0x7b/0xa0
[   14.851584]  ? __pfx_kthread+0x10/0x10
[   14.851607]  ret_from_fork+0x116/0x1d0
[   14.851626]  ? __pfx_kthread+0x10/0x10
[   14.851648]  ret_from_fork_asm+0x1a/0x30
[   14.851678]  </TASK>
[   14.851691] 
[   14.859168] Allocated by task 282:
[   14.859327]  kasan_save_stack+0x45/0x70
[   14.859557]  kasan_save_track+0x18/0x40
[   14.859755]  kasan_save_alloc_info+0x3b/0x50
[   14.859949]  __kasan_kmalloc+0xb7/0xc0
[   14.860176]  __kmalloc_cache_noprof+0x189/0x420
[   14.860400]  kasan_atomics+0x95/0x310
[   14.860598]  kunit_try_run_case+0x1a5/0x480
[   14.860787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.861046]  kthread+0x337/0x6f0
[   14.861237]  ret_from_fork+0x116/0x1d0
[   14.861423]  ret_from_fork_asm+0x1a/0x30
[   14.861634] 
[   14.861718] The buggy address belongs to the object at ffff8881039c5a00
[   14.861718]  which belongs to the cache kmalloc-64 of size 64
[   14.862256] The buggy address is located 0 bytes to the right of
[   14.862256]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.862747] 
[   14.862843] The buggy address belongs to the physical page:
[   14.863103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.863395] flags: 0x200000000000000(node=0|zone=2)
[   14.863559] page_type: f5(slab)
[   14.863680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.863913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.864286] page dumped because: kasan: bad access detected
[   14.864590] 
[   14.864699] Memory state around the buggy address:
[   14.864973]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.865341]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.865567] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.865783]                                      ^
[   14.865938]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.866295]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.866643] ==================================================================
[   14.274987] ==================================================================
[   14.275532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.275813] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.276162] 
[   14.276258] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.276383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.276397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.276419] Call Trace:
[   14.276436]  <TASK>
[   14.276451]  dump_stack_lvl+0x73/0xb0
[   14.276479]  print_report+0xd1/0x650
[   14.276502]  ? __virt_addr_valid+0x1db/0x2d0
[   14.276526]  ? kasan_atomics_helper+0x72f/0x5450
[   14.276548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.276571]  ? kasan_atomics_helper+0x72f/0x5450
[   14.276594]  kasan_report+0x141/0x180
[   14.276617]  ? kasan_atomics_helper+0x72f/0x5450
[   14.276644]  kasan_check_range+0x10c/0x1c0
[   14.276668]  __kasan_check_write+0x18/0x20
[   14.276688]  kasan_atomics_helper+0x72f/0x5450
[   14.276711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.276735]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.276761]  ? kasan_atomics+0x152/0x310
[   14.276788]  kasan_atomics+0x1dc/0x310
[   14.276811]  ? __pfx_kasan_atomics+0x10/0x10
[   14.276836]  ? __pfx_read_tsc+0x10/0x10
[   14.276858]  ? ktime_get_ts64+0x86/0x230
[   14.276883]  kunit_try_run_case+0x1a5/0x480
[   14.276907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.276929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.276954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.276977]  ? __kthread_parkme+0x82/0x180
[   14.277000]  ? preempt_count_sub+0x50/0x80
[   14.277023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.277047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.277070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.277093]  kthread+0x337/0x6f0
[   14.277113]  ? trace_preempt_on+0x20/0xc0
[   14.277148]  ? __pfx_kthread+0x10/0x10
[   14.277188]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.277209]  ? calculate_sigpending+0x7b/0xa0
[   14.277233]  ? __pfx_kthread+0x10/0x10
[   14.277255]  ret_from_fork+0x116/0x1d0
[   14.277275]  ? __pfx_kthread+0x10/0x10
[   14.277347]  ret_from_fork_asm+0x1a/0x30
[   14.277382]  </TASK>
[   14.277393] 
[   14.285250] Allocated by task 282:
[   14.285700]  kasan_save_stack+0x45/0x70
[   14.285864]  kasan_save_track+0x18/0x40
[   14.286063]  kasan_save_alloc_info+0x3b/0x50
[   14.286281]  __kasan_kmalloc+0xb7/0xc0
[   14.286547]  __kmalloc_cache_noprof+0x189/0x420
[   14.286741]  kasan_atomics+0x95/0x310
[   14.286933]  kunit_try_run_case+0x1a5/0x480
[   14.287088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.287441]  kthread+0x337/0x6f0
[   14.287579]  ret_from_fork+0x116/0x1d0
[   14.287770]  ret_from_fork_asm+0x1a/0x30
[   14.287912] 
[   14.287984] The buggy address belongs to the object at ffff8881039c5a00
[   14.287984]  which belongs to the cache kmalloc-64 of size 64
[   14.288442] The buggy address is located 0 bytes to the right of
[   14.288442]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.288986] 
[   14.289087] The buggy address belongs to the physical page:
[   14.289386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.289748] flags: 0x200000000000000(node=0|zone=2)
[   14.289980] page_type: f5(slab)
[   14.290151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.290451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.290708] page dumped because: kasan: bad access detected
[   14.290880] 
[   14.290952] Memory state around the buggy address:
[   14.291110]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.291733]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.292079] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.292511]                                      ^
[   14.292751]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.293063]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.293414] ==================================================================
[   15.016645] ==================================================================
[   15.016895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.017318] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.017660] 
[   15.017772] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.017814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.017828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.017850] Call Trace:
[   15.017868]  <TASK>
[   15.017885]  dump_stack_lvl+0x73/0xb0
[   15.017911]  print_report+0xd1/0x650
[   15.017935]  ? __virt_addr_valid+0x1db/0x2d0
[   15.017959]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.017981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.018004]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.018026]  kasan_report+0x141/0x180
[   15.018049]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.018076]  kasan_check_range+0x10c/0x1c0
[   15.018100]  __kasan_check_write+0x18/0x20
[   15.018160]  kasan_atomics_helper+0x18b1/0x5450
[   15.018185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.018207]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.018232]  ? kasan_atomics+0x152/0x310
[   15.018260]  kasan_atomics+0x1dc/0x310
[   15.018283]  ? __pfx_kasan_atomics+0x10/0x10
[   15.018308]  ? __pfx_read_tsc+0x10/0x10
[   15.018328]  ? ktime_get_ts64+0x86/0x230
[   15.018354]  kunit_try_run_case+0x1a5/0x480
[   15.018379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.018402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.018426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.018448]  ? __kthread_parkme+0x82/0x180
[   15.018469]  ? preempt_count_sub+0x50/0x80
[   15.018492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.018524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.018547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.018571]  kthread+0x337/0x6f0
[   15.018591]  ? trace_preempt_on+0x20/0xc0
[   15.018614]  ? __pfx_kthread+0x10/0x10
[   15.018636]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.018656]  ? calculate_sigpending+0x7b/0xa0
[   15.018680]  ? __pfx_kthread+0x10/0x10
[   15.018702]  ret_from_fork+0x116/0x1d0
[   15.018721]  ? __pfx_kthread+0x10/0x10
[   15.018742]  ret_from_fork_asm+0x1a/0x30
[   15.018773]  </TASK>
[   15.018784] 
[   15.028886] Allocated by task 282:
[   15.029023]  kasan_save_stack+0x45/0x70
[   15.029186]  kasan_save_track+0x18/0x40
[   15.029445]  kasan_save_alloc_info+0x3b/0x50
[   15.029665]  __kasan_kmalloc+0xb7/0xc0
[   15.029859]  __kmalloc_cache_noprof+0x189/0x420
[   15.030085]  kasan_atomics+0x95/0x310
[   15.031882]  kunit_try_run_case+0x1a5/0x480
[   15.032184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.032528]  kthread+0x337/0x6f0
[   15.032713]  ret_from_fork+0x116/0x1d0
[   15.032929]  ret_from_fork_asm+0x1a/0x30
[   15.033090] 
[   15.033450] The buggy address belongs to the object at ffff8881039c5a00
[   15.033450]  which belongs to the cache kmalloc-64 of size 64
[   15.034017] The buggy address is located 0 bytes to the right of
[   15.034017]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.034759] 
[   15.034859] The buggy address belongs to the physical page:
[   15.035112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.035750] flags: 0x200000000000000(node=0|zone=2)
[   15.036060] page_type: f5(slab)
[   15.036321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.036743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.037171] page dumped because: kasan: bad access detected
[   15.037444] 
[   15.037669] Memory state around the buggy address:
[   15.037880]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.038391]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.038805] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.039148]                                      ^
[   15.039497]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039930]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.040423] ==================================================================
[   14.698488] ==================================================================
[   14.699132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.699669] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.700410] 
[   14.700528] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.700699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.700718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.700742] Call Trace:
[   14.700761]  <TASK>
[   14.700779]  dump_stack_lvl+0x73/0xb0
[   14.700808]  print_report+0xd1/0x650
[   14.700832]  ? __virt_addr_valid+0x1db/0x2d0
[   14.700856]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.700879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.700901]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.700923]  kasan_report+0x141/0x180
[   14.700945]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.700972]  __asan_report_load4_noabort+0x18/0x20
[   14.700997]  kasan_atomics_helper+0x4a02/0x5450
[   14.701019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.701042]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.701067]  ? kasan_atomics+0x152/0x310
[   14.701094]  kasan_atomics+0x1dc/0x310
[   14.701118]  ? __pfx_kasan_atomics+0x10/0x10
[   14.701152]  ? __pfx_read_tsc+0x10/0x10
[   14.701175]  ? ktime_get_ts64+0x86/0x230
[   14.701200]  kunit_try_run_case+0x1a5/0x480
[   14.701224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.701270]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.701294]  ? __kthread_parkme+0x82/0x180
[   14.701371]  ? preempt_count_sub+0x50/0x80
[   14.701395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.701443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.701468]  kthread+0x337/0x6f0
[   14.701487]  ? trace_preempt_on+0x20/0xc0
[   14.701512]  ? __pfx_kthread+0x10/0x10
[   14.701534]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.701556]  ? calculate_sigpending+0x7b/0xa0
[   14.701580]  ? __pfx_kthread+0x10/0x10
[   14.701601]  ret_from_fork+0x116/0x1d0
[   14.701621]  ? __pfx_kthread+0x10/0x10
[   14.701642]  ret_from_fork_asm+0x1a/0x30
[   14.701673]  </TASK>
[   14.701685] 
[   14.713781] Allocated by task 282:
[   14.713969]  kasan_save_stack+0x45/0x70
[   14.714828]  kasan_save_track+0x18/0x40
[   14.715006]  kasan_save_alloc_info+0x3b/0x50
[   14.715494]  __kasan_kmalloc+0xb7/0xc0
[   14.715871]  __kmalloc_cache_noprof+0x189/0x420
[   14.716074]  kasan_atomics+0x95/0x310
[   14.716526]  kunit_try_run_case+0x1a5/0x480
[   14.716884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717180]  kthread+0x337/0x6f0
[   14.717564]  ret_from_fork+0x116/0x1d0
[   14.717864]  ret_from_fork_asm+0x1a/0x30
[   14.718177] 
[   14.718472] The buggy address belongs to the object at ffff8881039c5a00
[   14.718472]  which belongs to the cache kmalloc-64 of size 64
[   14.718971] The buggy address is located 0 bytes to the right of
[   14.718971]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.720059] 
[   14.720168] The buggy address belongs to the physical page:
[   14.720814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.721386] flags: 0x200000000000000(node=0|zone=2)
[   14.721627] page_type: f5(slab)
[   14.721795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.722119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.722745] page dumped because: kasan: bad access detected
[   14.723004] 
[   14.723096] Memory state around the buggy address:
[   14.723607]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.724013]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.724709] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.725000]                                      ^
[   14.725541]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.725840]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.726282] ==================================================================
[   14.903598] ==================================================================
[   14.903949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.904399] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.904703] 
[   14.904793] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.904836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.904849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.904873] Call Trace:
[   14.904886]  <TASK>
[   14.904901]  dump_stack_lvl+0x73/0xb0
[   14.904928]  print_report+0xd1/0x650
[   14.904951]  ? __virt_addr_valid+0x1db/0x2d0
[   14.904974]  ? kasan_atomics_helper+0x151d/0x5450
[   14.904996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.905019]  ? kasan_atomics_helper+0x151d/0x5450
[   14.905042]  kasan_report+0x141/0x180
[   14.905065]  ? kasan_atomics_helper+0x151d/0x5450
[   14.905095]  kasan_check_range+0x10c/0x1c0
[   14.905148]  __kasan_check_write+0x18/0x20
[   14.905169]  kasan_atomics_helper+0x151d/0x5450
[   14.905202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.905225]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.905262]  ? kasan_atomics+0x152/0x310
[   14.905290]  kasan_atomics+0x1dc/0x310
[   14.905313]  ? __pfx_kasan_atomics+0x10/0x10
[   14.905338]  ? __pfx_read_tsc+0x10/0x10
[   14.905360]  ? ktime_get_ts64+0x86/0x230
[   14.905383]  kunit_try_run_case+0x1a5/0x480
[   14.905407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.905432]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.905455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.905479]  ? __kthread_parkme+0x82/0x180
[   14.905500]  ? preempt_count_sub+0x50/0x80
[   14.905525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.905549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.905597]  kthread+0x337/0x6f0
[   14.905617]  ? trace_preempt_on+0x20/0xc0
[   14.905641]  ? __pfx_kthread+0x10/0x10
[   14.905662]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.905684]  ? calculate_sigpending+0x7b/0xa0
[   14.905709]  ? __pfx_kthread+0x10/0x10
[   14.905741]  ret_from_fork+0x116/0x1d0
[   14.905760]  ? __pfx_kthread+0x10/0x10
[   14.905782]  ret_from_fork_asm+0x1a/0x30
[   14.905822]  </TASK>
[   14.905834] 
[   14.913739] Allocated by task 282:
[   14.913909]  kasan_save_stack+0x45/0x70
[   14.914111]  kasan_save_track+0x18/0x40
[   14.914327]  kasan_save_alloc_info+0x3b/0x50
[   14.914549]  __kasan_kmalloc+0xb7/0xc0
[   14.914729]  __kmalloc_cache_noprof+0x189/0x420
[   14.914952]  kasan_atomics+0x95/0x310
[   14.915203]  kunit_try_run_case+0x1a5/0x480
[   14.915384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.915677]  kthread+0x337/0x6f0
[   14.915867]  ret_from_fork+0x116/0x1d0
[   14.916058]  ret_from_fork_asm+0x1a/0x30
[   14.916292] 
[   14.916388] The buggy address belongs to the object at ffff8881039c5a00
[   14.916388]  which belongs to the cache kmalloc-64 of size 64
[   14.916880] The buggy address is located 0 bytes to the right of
[   14.916880]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.917437] 
[   14.917559] The buggy address belongs to the physical page:
[   14.917796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.918175] flags: 0x200000000000000(node=0|zone=2)
[   14.918418] page_type: f5(slab)
[   14.918595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.918844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.919074] page dumped because: kasan: bad access detected
[   14.919368] 
[   14.919474] Memory state around the buggy address:
[   14.919700]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.919965]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.920216] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.920553]                                      ^
[   14.920781]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.921152]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.921486] ==================================================================
[   14.384725] ==================================================================
[   14.385088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.385474] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.385956] 
[   14.386064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.386207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.386221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.386243] Call Trace:
[   14.386259]  <TASK>
[   14.386276]  dump_stack_lvl+0x73/0xb0
[   14.386363]  print_report+0xd1/0x650
[   14.386389]  ? __virt_addr_valid+0x1db/0x2d0
[   14.386480]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.386518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.386541]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.386563]  kasan_report+0x141/0x180
[   14.386586]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.386614]  kasan_check_range+0x10c/0x1c0
[   14.386637]  __kasan_check_write+0x18/0x20
[   14.386658]  kasan_atomics_helper+0xa2b/0x5450
[   14.386681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.386704]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.386730]  ? kasan_atomics+0x152/0x310
[   14.386757]  kasan_atomics+0x1dc/0x310
[   14.386780]  ? __pfx_kasan_atomics+0x10/0x10
[   14.386806]  ? __pfx_read_tsc+0x10/0x10
[   14.386827]  ? ktime_get_ts64+0x86/0x230
[   14.386852]  kunit_try_run_case+0x1a5/0x480
[   14.386875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.386897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.386921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.386944]  ? __kthread_parkme+0x82/0x180
[   14.386964]  ? preempt_count_sub+0x50/0x80
[   14.386988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.387012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.387034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.387059]  kthread+0x337/0x6f0
[   14.387079]  ? trace_preempt_on+0x20/0xc0
[   14.387103]  ? __pfx_kthread+0x10/0x10
[   14.387150]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.387172]  ? calculate_sigpending+0x7b/0xa0
[   14.387195]  ? __pfx_kthread+0x10/0x10
[   14.387217]  ret_from_fork+0x116/0x1d0
[   14.387236]  ? __pfx_kthread+0x10/0x10
[   14.387258]  ret_from_fork_asm+0x1a/0x30
[   14.387288]  </TASK>
[   14.387307] 
[   14.397234] Allocated by task 282:
[   14.397419]  kasan_save_stack+0x45/0x70
[   14.397606]  kasan_save_track+0x18/0x40
[   14.397779]  kasan_save_alloc_info+0x3b/0x50
[   14.397976]  __kasan_kmalloc+0xb7/0xc0
[   14.398285]  __kmalloc_cache_noprof+0x189/0x420
[   14.398556]  kasan_atomics+0x95/0x310
[   14.398772]  kunit_try_run_case+0x1a5/0x480
[   14.399040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.399355]  kthread+0x337/0x6f0
[   14.399534]  ret_from_fork+0x116/0x1d0
[   14.399800]  ret_from_fork_asm+0x1a/0x30
[   14.399946] 
[   14.400037] The buggy address belongs to the object at ffff8881039c5a00
[   14.400037]  which belongs to the cache kmalloc-64 of size 64
[   14.400933] The buggy address is located 0 bytes to the right of
[   14.400933]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.401603] 
[   14.401796] The buggy address belongs to the physical page:
[   14.402082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.402571] flags: 0x200000000000000(node=0|zone=2)
[   14.402843] page_type: f5(slab)
[   14.403016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.403481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.403857] page dumped because: kasan: bad access detected
[   14.404133] 
[   14.404262] Memory state around the buggy address:
[   14.404651]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.405024]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.405576] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.405931]                                      ^
[   14.406170]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406631]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406961] ==================================================================
[   14.429512] ==================================================================
[   14.429748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.430056] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.430779] 
[   14.430901] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.430984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.431022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.431044] Call Trace:
[   14.431074]  <TASK>
[   14.431091]  dump_stack_lvl+0x73/0xb0
[   14.431148]  print_report+0xd1/0x650
[   14.431173]  ? __virt_addr_valid+0x1db/0x2d0
[   14.431197]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.431218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.431240]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.431262]  kasan_report+0x141/0x180
[   14.431284]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.431371]  kasan_check_range+0x10c/0x1c0
[   14.431396]  __kasan_check_write+0x18/0x20
[   14.431418]  kasan_atomics_helper+0xb6a/0x5450
[   14.431440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.431462]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.431488]  ? kasan_atomics+0x152/0x310
[   14.431515]  kasan_atomics+0x1dc/0x310
[   14.431538]  ? __pfx_kasan_atomics+0x10/0x10
[   14.431563]  ? __pfx_read_tsc+0x10/0x10
[   14.431583]  ? ktime_get_ts64+0x86/0x230
[   14.431608]  kunit_try_run_case+0x1a5/0x480
[   14.431632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.431655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.431679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.431702]  ? __kthread_parkme+0x82/0x180
[   14.431722]  ? preempt_count_sub+0x50/0x80
[   14.431746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.431770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.431793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.431817]  kthread+0x337/0x6f0
[   14.431836]  ? trace_preempt_on+0x20/0xc0
[   14.431860]  ? __pfx_kthread+0x10/0x10
[   14.431880]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.431902]  ? calculate_sigpending+0x7b/0xa0
[   14.431926]  ? __pfx_kthread+0x10/0x10
[   14.431947]  ret_from_fork+0x116/0x1d0
[   14.431966]  ? __pfx_kthread+0x10/0x10
[   14.431987]  ret_from_fork_asm+0x1a/0x30
[   14.432018]  </TASK>
[   14.432029] 
[   14.441659] Allocated by task 282:
[   14.441986]  kasan_save_stack+0x45/0x70
[   14.442237]  kasan_save_track+0x18/0x40
[   14.442546]  kasan_save_alloc_info+0x3b/0x50
[   14.442828]  __kasan_kmalloc+0xb7/0xc0
[   14.442969]  __kmalloc_cache_noprof+0x189/0x420
[   14.443227]  kasan_atomics+0x95/0x310
[   14.443556]  kunit_try_run_case+0x1a5/0x480
[   14.443813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444063]  kthread+0x337/0x6f0
[   14.444283]  ret_from_fork+0x116/0x1d0
[   14.444596]  ret_from_fork_asm+0x1a/0x30
[   14.444798] 
[   14.444895] The buggy address belongs to the object at ffff8881039c5a00
[   14.444895]  which belongs to the cache kmalloc-64 of size 64
[   14.445809] The buggy address is located 0 bytes to the right of
[   14.445809]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.446527] 
[   14.446608] The buggy address belongs to the physical page:
[   14.446980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.447458] flags: 0x200000000000000(node=0|zone=2)
[   14.447740] page_type: f5(slab)
[   14.447883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.448243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.448573] page dumped because: kasan: bad access detected
[   14.448819] 
[   14.448908] Memory state around the buggy address:
[   14.449352]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.449591]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.449915] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.450330]                                      ^
[   14.450787]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451132]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451438] ==================================================================
[   14.518099] ==================================================================
[   14.518714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.519034] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.519408] 
[   14.519693] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.519770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.519784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.519805] Call Trace:
[   14.519836]  <TASK>
[   14.519852]  dump_stack_lvl+0x73/0xb0
[   14.519882]  print_report+0xd1/0x650
[   14.519905]  ? __virt_addr_valid+0x1db/0x2d0
[   14.519930]  ? kasan_atomics_helper+0xde0/0x5450
[   14.519952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.519975]  ? kasan_atomics_helper+0xde0/0x5450
[   14.519996]  kasan_report+0x141/0x180
[   14.520019]  ? kasan_atomics_helper+0xde0/0x5450
[   14.520074]  kasan_check_range+0x10c/0x1c0
[   14.520099]  __kasan_check_write+0x18/0x20
[   14.520120]  kasan_atomics_helper+0xde0/0x5450
[   14.520186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.520210]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.520235]  ? kasan_atomics+0x152/0x310
[   14.520273]  kasan_atomics+0x1dc/0x310
[   14.520345]  ? __pfx_kasan_atomics+0x10/0x10
[   14.520373]  ? __pfx_read_tsc+0x10/0x10
[   14.520396]  ? ktime_get_ts64+0x86/0x230
[   14.520422]  kunit_try_run_case+0x1a5/0x480
[   14.520446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.520468]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.520493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.520517]  ? __kthread_parkme+0x82/0x180
[   14.520539]  ? preempt_count_sub+0x50/0x80
[   14.520564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.520588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.520612]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.520635]  kthread+0x337/0x6f0
[   14.520656]  ? trace_preempt_on+0x20/0xc0
[   14.520681]  ? __pfx_kthread+0x10/0x10
[   14.520702]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.520724]  ? calculate_sigpending+0x7b/0xa0
[   14.520749]  ? __pfx_kthread+0x10/0x10
[   14.520771]  ret_from_fork+0x116/0x1d0
[   14.520789]  ? __pfx_kthread+0x10/0x10
[   14.520811]  ret_from_fork_asm+0x1a/0x30
[   14.520841]  </TASK>
[   14.520854] 
[   14.529818] Allocated by task 282:
[   14.529953]  kasan_save_stack+0x45/0x70
[   14.530235]  kasan_save_track+0x18/0x40
[   14.530449]  kasan_save_alloc_info+0x3b/0x50
[   14.530888]  __kasan_kmalloc+0xb7/0xc0
[   14.531101]  __kmalloc_cache_noprof+0x189/0x420
[   14.531278]  kasan_atomics+0x95/0x310
[   14.531611]  kunit_try_run_case+0x1a5/0x480
[   14.531879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.532149]  kthread+0x337/0x6f0
[   14.532291]  ret_from_fork+0x116/0x1d0
[   14.532486]  ret_from_fork_asm+0x1a/0x30
[   14.532669] 
[   14.532757] The buggy address belongs to the object at ffff8881039c5a00
[   14.532757]  which belongs to the cache kmalloc-64 of size 64
[   14.533486] The buggy address is located 0 bytes to the right of
[   14.533486]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.533949] 
[   14.534024] The buggy address belongs to the physical page:
[   14.534507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.534935] flags: 0x200000000000000(node=0|zone=2)
[   14.535279] page_type: f5(slab)
[   14.535446] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.535851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.536170] page dumped because: kasan: bad access detected
[   14.536479] 
[   14.536577] Memory state around the buggy address:
[   14.536969]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537405]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537702] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.538004]                                      ^
[   14.538284]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538844]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539088] ==================================================================
[   15.396977] ==================================================================
[   15.397401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.397640] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.397933] 
[   15.398076] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.398149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.398163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.398184] Call Trace:
[   15.398200]  <TASK>
[   15.398215]  dump_stack_lvl+0x73/0xb0
[   15.398241]  print_report+0xd1/0x650
[   15.398263]  ? __virt_addr_valid+0x1db/0x2d0
[   15.398288]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.398309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.398333]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.398356]  kasan_report+0x141/0x180
[   15.398378]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.398405]  __asan_report_load8_noabort+0x18/0x20
[   15.398462]  kasan_atomics_helper+0x4fb2/0x5450
[   15.398485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.398521]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.398548]  ? kasan_atomics+0x152/0x310
[   15.398574]  kasan_atomics+0x1dc/0x310
[   15.398597]  ? __pfx_kasan_atomics+0x10/0x10
[   15.398621]  ? __pfx_read_tsc+0x10/0x10
[   15.398642]  ? ktime_get_ts64+0x86/0x230
[   15.398666]  kunit_try_run_case+0x1a5/0x480
[   15.398691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.398714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.398737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.398760]  ? __kthread_parkme+0x82/0x180
[   15.398782]  ? preempt_count_sub+0x50/0x80
[   15.398806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.398830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.398853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.398877]  kthread+0x337/0x6f0
[   15.398897]  ? trace_preempt_on+0x20/0xc0
[   15.398920]  ? __pfx_kthread+0x10/0x10
[   15.398941]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.398962]  ? calculate_sigpending+0x7b/0xa0
[   15.398986]  ? __pfx_kthread+0x10/0x10
[   15.399007]  ret_from_fork+0x116/0x1d0
[   15.399060]  ? __pfx_kthread+0x10/0x10
[   15.399081]  ret_from_fork_asm+0x1a/0x30
[   15.399150]  </TASK>
[   15.399162] 
[   15.407052] Allocated by task 282:
[   15.407252]  kasan_save_stack+0x45/0x70
[   15.407409]  kasan_save_track+0x18/0x40
[   15.407603]  kasan_save_alloc_info+0x3b/0x50
[   15.407864]  __kasan_kmalloc+0xb7/0xc0
[   15.408039]  __kmalloc_cache_noprof+0x189/0x420
[   15.408353]  kasan_atomics+0x95/0x310
[   15.408495]  kunit_try_run_case+0x1a5/0x480
[   15.408673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.408971]  kthread+0x337/0x6f0
[   15.409207]  ret_from_fork+0x116/0x1d0
[   15.409494]  ret_from_fork_asm+0x1a/0x30
[   15.409638] 
[   15.409711] The buggy address belongs to the object at ffff8881039c5a00
[   15.409711]  which belongs to the cache kmalloc-64 of size 64
[   15.410305] The buggy address is located 0 bytes to the right of
[   15.410305]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.410798] 
[   15.410896] The buggy address belongs to the physical page:
[   15.411170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.411560] flags: 0x200000000000000(node=0|zone=2)
[   15.411727] page_type: f5(slab)
[   15.411846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.412172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.412560] page dumped because: kasan: bad access detected
[   15.412818] 
[   15.412912] Memory state around the buggy address:
[   15.413256]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.413530]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.413818] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.414147]                                      ^
[   15.414311]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.414671]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.415152] ==================================================================
[   15.434028] ==================================================================
[   15.434568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.434915] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.435147] 
[   15.435230] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.435271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.435284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.435304] Call Trace:
[   15.435322]  <TASK>
[   15.435338]  dump_stack_lvl+0x73/0xb0
[   15.435364]  print_report+0xd1/0x650
[   15.435388]  ? __virt_addr_valid+0x1db/0x2d0
[   15.435410]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.435432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.435455]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.435476]  kasan_report+0x141/0x180
[   15.435499]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.435526]  __asan_report_load8_noabort+0x18/0x20
[   15.435552]  kasan_atomics_helper+0x4fa5/0x5450
[   15.435587]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.435610]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.435635]  ? kasan_atomics+0x152/0x310
[   15.435674]  kasan_atomics+0x1dc/0x310
[   15.435697]  ? __pfx_kasan_atomics+0x10/0x10
[   15.435722]  ? __pfx_read_tsc+0x10/0x10
[   15.435743]  ? ktime_get_ts64+0x86/0x230
[   15.435767]  kunit_try_run_case+0x1a5/0x480
[   15.435792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.435815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.435839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.435863]  ? __kthread_parkme+0x82/0x180
[   15.435884]  ? preempt_count_sub+0x50/0x80
[   15.435908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.435941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.435965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.435989]  kthread+0x337/0x6f0
[   15.436020]  ? trace_preempt_on+0x20/0xc0
[   15.436042]  ? __pfx_kthread+0x10/0x10
[   15.436064]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.436086]  ? calculate_sigpending+0x7b/0xa0
[   15.436110]  ? __pfx_kthread+0x10/0x10
[   15.436141]  ret_from_fork+0x116/0x1d0
[   15.436161]  ? __pfx_kthread+0x10/0x10
[   15.436185]  ret_from_fork_asm+0x1a/0x30
[   15.436217]  </TASK>
[   15.436229] 
[   15.443994] Allocated by task 282:
[   15.444274]  kasan_save_stack+0x45/0x70
[   15.444478]  kasan_save_track+0x18/0x40
[   15.444698]  kasan_save_alloc_info+0x3b/0x50
[   15.444911]  __kasan_kmalloc+0xb7/0xc0
[   15.445102]  __kmalloc_cache_noprof+0x189/0x420
[   15.445356]  kasan_atomics+0x95/0x310
[   15.445516]  kunit_try_run_case+0x1a5/0x480
[   15.445664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445944]  kthread+0x337/0x6f0
[   15.446116]  ret_from_fork+0x116/0x1d0
[   15.446309]  ret_from_fork_asm+0x1a/0x30
[   15.446446] 
[   15.446524] The buggy address belongs to the object at ffff8881039c5a00
[   15.446524]  which belongs to the cache kmalloc-64 of size 64
[   15.447051] The buggy address is located 0 bytes to the right of
[   15.447051]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.447588] 
[   15.447662] The buggy address belongs to the physical page:
[   15.447838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.448080] flags: 0x200000000000000(node=0|zone=2)
[   15.448328] page_type: f5(slab)
[   15.448511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.448848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.449214] page dumped because: kasan: bad access detected
[   15.449466] 
[   15.449564] Memory state around the buggy address:
[   15.449786]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.450101]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.450431] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.450652]                                      ^
[   15.450809]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.451085]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.451467] ==================================================================
[   14.220268] ==================================================================
[   14.220624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.220977] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.221380] 
[   14.221490] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.221532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.221544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.221581] Call Trace:
[   14.221598]  <TASK>
[   14.221613]  dump_stack_lvl+0x73/0xb0
[   14.221652]  print_report+0xd1/0x650
[   14.221676]  ? __virt_addr_valid+0x1db/0x2d0
[   14.221700]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.221730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.221753]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.221775]  kasan_report+0x141/0x180
[   14.221808]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.221835]  kasan_check_range+0x10c/0x1c0
[   14.221859]  __kasan_check_write+0x18/0x20
[   14.221888]  kasan_atomics_helper+0x5fe/0x5450
[   14.221912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.221936]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.221972]  ? kasan_atomics+0x152/0x310
[   14.222000]  kasan_atomics+0x1dc/0x310
[   14.222023]  ? __pfx_kasan_atomics+0x10/0x10
[   14.222048]  ? __pfx_read_tsc+0x10/0x10
[   14.222077]  ? ktime_get_ts64+0x86/0x230
[   14.222102]  kunit_try_run_case+0x1a5/0x480
[   14.222142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.222166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.222190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.222213]  ? __kthread_parkme+0x82/0x180
[   14.222235]  ? preempt_count_sub+0x50/0x80
[   14.222258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.222283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.222306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.222330]  kthread+0x337/0x6f0
[   14.222351]  ? trace_preempt_on+0x20/0xc0
[   14.222429]  ? __pfx_kthread+0x10/0x10
[   14.222452]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.222484]  ? calculate_sigpending+0x7b/0xa0
[   14.222507]  ? __pfx_kthread+0x10/0x10
[   14.222532]  ret_from_fork+0x116/0x1d0
[   14.222564]  ? __pfx_kthread+0x10/0x10
[   14.222585]  ret_from_fork_asm+0x1a/0x30
[   14.222615]  </TASK>
[   14.222626] 
[   14.232146] Allocated by task 282:
[   14.232283]  kasan_save_stack+0x45/0x70
[   14.232431]  kasan_save_track+0x18/0x40
[   14.232571]  kasan_save_alloc_info+0x3b/0x50
[   14.234035]  __kasan_kmalloc+0xb7/0xc0
[   14.234625]  __kmalloc_cache_noprof+0x189/0x420
[   14.235464]  kasan_atomics+0x95/0x310
[   14.236181]  kunit_try_run_case+0x1a5/0x480
[   14.236893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.237796]  kthread+0x337/0x6f0
[   14.238462]  ret_from_fork+0x116/0x1d0
[   14.239254]  ret_from_fork_asm+0x1a/0x30
[   14.239960] 
[   14.240328] The buggy address belongs to the object at ffff8881039c5a00
[   14.240328]  which belongs to the cache kmalloc-64 of size 64
[   14.241909] The buggy address is located 0 bytes to the right of
[   14.241909]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.242373] 
[   14.242639] The buggy address belongs to the physical page:
[   14.243174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.243989] flags: 0x200000000000000(node=0|zone=2)
[   14.244512] page_type: f5(slab)
[   14.244937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.245357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.245593] page dumped because: kasan: bad access detected
[   14.245769] 
[   14.245845] Memory state around the buggy address:
[   14.246012]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.246277]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.247012] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.247623]                                      ^
[   14.247906]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.248151]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.248955] ==================================================================
[   15.215379] ==================================================================
[   15.215711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.216022] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.216823] 
[   15.217034] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.217082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.217095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.217118] Call Trace:
[   15.217168]  <TASK>
[   15.217261]  dump_stack_lvl+0x73/0xb0
[   15.217291]  print_report+0xd1/0x650
[   15.217314]  ? __virt_addr_valid+0x1db/0x2d0
[   15.217339]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.217361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.217383]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.217405]  kasan_report+0x141/0x180
[   15.217429]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.217457]  kasan_check_range+0x10c/0x1c0
[   15.217481]  __kasan_check_write+0x18/0x20
[   15.217501]  kasan_atomics_helper+0x1d7a/0x5450
[   15.217525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.217547]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.217573]  ? kasan_atomics+0x152/0x310
[   15.217600]  kasan_atomics+0x1dc/0x310
[   15.217624]  ? __pfx_kasan_atomics+0x10/0x10
[   15.217649]  ? __pfx_read_tsc+0x10/0x10
[   15.217670]  ? ktime_get_ts64+0x86/0x230
[   15.217695]  kunit_try_run_case+0x1a5/0x480
[   15.217719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.217765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.217788]  ? __kthread_parkme+0x82/0x180
[   15.217809]  ? preempt_count_sub+0x50/0x80
[   15.217833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.217881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.217904]  kthread+0x337/0x6f0
[   15.217924]  ? trace_preempt_on+0x20/0xc0
[   15.217947]  ? __pfx_kthread+0x10/0x10
[   15.217968]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.217990]  ? calculate_sigpending+0x7b/0xa0
[   15.218014]  ? __pfx_kthread+0x10/0x10
[   15.218036]  ret_from_fork+0x116/0x1d0
[   15.218055]  ? __pfx_kthread+0x10/0x10
[   15.218076]  ret_from_fork_asm+0x1a/0x30
[   15.218106]  </TASK>
[   15.218118] 
[   15.228542] Allocated by task 282:
[   15.228704]  kasan_save_stack+0x45/0x70
[   15.229060]  kasan_save_track+0x18/0x40
[   15.229399]  kasan_save_alloc_info+0x3b/0x50
[   15.229674]  __kasan_kmalloc+0xb7/0xc0
[   15.229882]  __kmalloc_cache_noprof+0x189/0x420
[   15.230280]  kasan_atomics+0x95/0x310
[   15.230485]  kunit_try_run_case+0x1a5/0x480
[   15.230787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.231159]  kthread+0x337/0x6f0
[   15.231299]  ret_from_fork+0x116/0x1d0
[   15.231507]  ret_from_fork_asm+0x1a/0x30
[   15.231905] 
[   15.232023] The buggy address belongs to the object at ffff8881039c5a00
[   15.232023]  which belongs to the cache kmalloc-64 of size 64
[   15.232662] The buggy address is located 0 bytes to the right of
[   15.232662]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.233331] 
[   15.233572] The buggy address belongs to the physical page:
[   15.233841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.234449] flags: 0x200000000000000(node=0|zone=2)
[   15.234755] page_type: f5(slab)
[   15.234948] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.235386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.235807] page dumped because: kasan: bad access detected
[   15.236042] 
[   15.236252] Memory state around the buggy address:
[   15.236582]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.236877]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.237376] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.237766]                                      ^
[   15.238066]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238580]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238872] ==================================================================
[   15.313465] ==================================================================
[   15.313951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.314316] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.314623] 
[   15.314764] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.314806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.314820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.314841] Call Trace:
[   15.314857]  <TASK>
[   15.314874]  dump_stack_lvl+0x73/0xb0
[   15.314901]  print_report+0xd1/0x650
[   15.314924]  ? __virt_addr_valid+0x1db/0x2d0
[   15.314947]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.314969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.314991]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.315014]  kasan_report+0x141/0x180
[   15.315036]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.315063]  __asan_report_load8_noabort+0x18/0x20
[   15.315087]  kasan_atomics_helper+0x4f71/0x5450
[   15.315111]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.315163]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.315189]  ? kasan_atomics+0x152/0x310
[   15.315216]  kasan_atomics+0x1dc/0x310
[   15.315239]  ? __pfx_kasan_atomics+0x10/0x10
[   15.315264]  ? __pfx_read_tsc+0x10/0x10
[   15.315284]  ? ktime_get_ts64+0x86/0x230
[   15.315308]  kunit_try_run_case+0x1a5/0x480
[   15.315333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.315354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.315378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.315401]  ? __kthread_parkme+0x82/0x180
[   15.315423]  ? preempt_count_sub+0x50/0x80
[   15.315447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.315470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.315494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.315518]  kthread+0x337/0x6f0
[   15.315539]  ? trace_preempt_on+0x20/0xc0
[   15.315562]  ? __pfx_kthread+0x10/0x10
[   15.315583]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.315604]  ? calculate_sigpending+0x7b/0xa0
[   15.315628]  ? __pfx_kthread+0x10/0x10
[   15.315650]  ret_from_fork+0x116/0x1d0
[   15.315669]  ? __pfx_kthread+0x10/0x10
[   15.315691]  ret_from_fork_asm+0x1a/0x30
[   15.315721]  </TASK>
[   15.315733] 
[   15.326055] Allocated by task 282:
[   15.326598]  kasan_save_stack+0x45/0x70
[   15.327016]  kasan_save_track+0x18/0x40
[   15.327408]  kasan_save_alloc_info+0x3b/0x50
[   15.327980]  __kasan_kmalloc+0xb7/0xc0
[   15.328625]  __kmalloc_cache_noprof+0x189/0x420
[   15.328846]  kasan_atomics+0x95/0x310
[   15.328988]  kunit_try_run_case+0x1a5/0x480
[   15.329150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.329430]  kthread+0x337/0x6f0
[   15.329569]  ret_from_fork+0x116/0x1d0
[   15.329763]  ret_from_fork_asm+0x1a/0x30
[   15.329916] 
[   15.330153] The buggy address belongs to the object at ffff8881039c5a00
[   15.330153]  which belongs to the cache kmalloc-64 of size 64
[   15.330659] The buggy address is located 0 bytes to the right of
[   15.330659]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.331030] 
[   15.331105] The buggy address belongs to the physical page:
[   15.331739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.332524] flags: 0x200000000000000(node=0|zone=2)
[   15.333177] page_type: f5(slab)
[   15.333516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.334245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.334954] page dumped because: kasan: bad access detected
[   15.335354] 
[   15.335431] Memory state around the buggy address:
[   15.335588]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.335806]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.336022] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.336616]                                      ^
[   15.337089]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.337809]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.338547] ==================================================================
[   15.116062] ==================================================================
[   15.116532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.116882] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.117479] 
[   15.117826] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.117876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.117890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.117912] Call Trace:
[   15.117928]  <TASK>
[   15.117943]  dump_stack_lvl+0x73/0xb0
[   15.117971]  print_report+0xd1/0x650
[   15.117995]  ? __virt_addr_valid+0x1db/0x2d0
[   15.118021]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.118043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.118067]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.118089]  kasan_report+0x141/0x180
[   15.118112]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.118154]  kasan_check_range+0x10c/0x1c0
[   15.118178]  __kasan_check_write+0x18/0x20
[   15.118198]  kasan_atomics_helper+0x1b22/0x5450
[   15.118221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.118243]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.118269]  ? kasan_atomics+0x152/0x310
[   15.118296]  kasan_atomics+0x1dc/0x310
[   15.118319]  ? __pfx_kasan_atomics+0x10/0x10
[   15.118345]  ? __pfx_read_tsc+0x10/0x10
[   15.118366]  ? ktime_get_ts64+0x86/0x230
[   15.118391]  kunit_try_run_case+0x1a5/0x480
[   15.118414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.118437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.118461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.118485]  ? __kthread_parkme+0x82/0x180
[   15.118506]  ? preempt_count_sub+0x50/0x80
[   15.118535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.118559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.118582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.118605]  kthread+0x337/0x6f0
[   15.118625]  ? trace_preempt_on+0x20/0xc0
[   15.118648]  ? __pfx_kthread+0x10/0x10
[   15.118670]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.118691]  ? calculate_sigpending+0x7b/0xa0
[   15.118716]  ? __pfx_kthread+0x10/0x10
[   15.118738]  ret_from_fork+0x116/0x1d0
[   15.118757]  ? __pfx_kthread+0x10/0x10
[   15.118778]  ret_from_fork_asm+0x1a/0x30
[   15.118809]  </TASK>
[   15.118820] 
[   15.129225] Allocated by task 282:
[   15.129548]  kasan_save_stack+0x45/0x70
[   15.129752]  kasan_save_track+0x18/0x40
[   15.130033]  kasan_save_alloc_info+0x3b/0x50
[   15.130371]  __kasan_kmalloc+0xb7/0xc0
[   15.130581]  __kmalloc_cache_noprof+0x189/0x420
[   15.130892]  kasan_atomics+0x95/0x310
[   15.131157]  kunit_try_run_case+0x1a5/0x480
[   15.131490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.131882]  kthread+0x337/0x6f0
[   15.132065]  ret_from_fork+0x116/0x1d0
[   15.132467]  ret_from_fork_asm+0x1a/0x30
[   15.132659] 
[   15.132741] The buggy address belongs to the object at ffff8881039c5a00
[   15.132741]  which belongs to the cache kmalloc-64 of size 64
[   15.133540] The buggy address is located 0 bytes to the right of
[   15.133540]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.134047] 
[   15.134177] The buggy address belongs to the physical page:
[   15.134685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.135117] flags: 0x200000000000000(node=0|zone=2)
[   15.135469] page_type: f5(slab)
[   15.135695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.136051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.136572] page dumped because: kasan: bad access detected
[   15.136844] 
[   15.137059] Memory state around the buggy address:
[   15.137424]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.137719]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.138149] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.138537]                                      ^
[   15.138814]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.139137]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.139683] ==================================================================
[   14.407428] ==================================================================
[   14.407692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.407957] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.408433] 
[   14.408550] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.408634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.408671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.408692] Call Trace:
[   14.408790]  <TASK>
[   14.408806]  dump_stack_lvl+0x73/0xb0
[   14.408834]  print_report+0xd1/0x650
[   14.408858]  ? __virt_addr_valid+0x1db/0x2d0
[   14.408882]  ? kasan_atomics_helper+0xac7/0x5450
[   14.408904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.408926]  ? kasan_atomics_helper+0xac7/0x5450
[   14.408949]  kasan_report+0x141/0x180
[   14.408972]  ? kasan_atomics_helper+0xac7/0x5450
[   14.408998]  kasan_check_range+0x10c/0x1c0
[   14.409023]  __kasan_check_write+0x18/0x20
[   14.409043]  kasan_atomics_helper+0xac7/0x5450
[   14.409065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.409087]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.409113]  ? kasan_atomics+0x152/0x310
[   14.409166]  kasan_atomics+0x1dc/0x310
[   14.409189]  ? __pfx_kasan_atomics+0x10/0x10
[   14.409214]  ? __pfx_read_tsc+0x10/0x10
[   14.409235]  ? ktime_get_ts64+0x86/0x230
[   14.409259]  kunit_try_run_case+0x1a5/0x480
[   14.409283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.409391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.409414]  ? __kthread_parkme+0x82/0x180
[   14.409435]  ? preempt_count_sub+0x50/0x80
[   14.409458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.409506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.409530]  kthread+0x337/0x6f0
[   14.409550]  ? trace_preempt_on+0x20/0xc0
[   14.409574]  ? __pfx_kthread+0x10/0x10
[   14.409594]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.409616]  ? calculate_sigpending+0x7b/0xa0
[   14.409641]  ? __pfx_kthread+0x10/0x10
[   14.409663]  ret_from_fork+0x116/0x1d0
[   14.409681]  ? __pfx_kthread+0x10/0x10
[   14.409703]  ret_from_fork_asm+0x1a/0x30
[   14.409732]  </TASK>
[   14.409744] 
[   14.419548] Allocated by task 282:
[   14.419737]  kasan_save_stack+0x45/0x70
[   14.419943]  kasan_save_track+0x18/0x40
[   14.420212]  kasan_save_alloc_info+0x3b/0x50
[   14.420616]  __kasan_kmalloc+0xb7/0xc0
[   14.420777]  __kmalloc_cache_noprof+0x189/0x420
[   14.421005]  kasan_atomics+0x95/0x310
[   14.421269]  kunit_try_run_case+0x1a5/0x480
[   14.421546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.421920]  kthread+0x337/0x6f0
[   14.422068]  ret_from_fork+0x116/0x1d0
[   14.422432]  ret_from_fork_asm+0x1a/0x30
[   14.422652] 
[   14.422830] The buggy address belongs to the object at ffff8881039c5a00
[   14.422830]  which belongs to the cache kmalloc-64 of size 64
[   14.423715] The buggy address is located 0 bytes to the right of
[   14.423715]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.424284] 
[   14.424535] The buggy address belongs to the physical page:
[   14.424806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.425172] flags: 0x200000000000000(node=0|zone=2)
[   14.425407] page_type: f5(slab)
[   14.425571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.425901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.426395] page dumped because: kasan: bad access detected
[   14.426627] 
[   14.426724] Memory state around the buggy address:
[   14.427073]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.427503]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.427781] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.428235]                                      ^
[   14.428433]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.428748]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429058] ==================================================================
[   15.415692] ==================================================================
[   15.416268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.416576] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.417005] 
[   15.417109] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.417184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.417197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.417219] Call Trace:
[   15.417248]  <TASK>
[   15.417263]  dump_stack_lvl+0x73/0xb0
[   15.417289]  print_report+0xd1/0x650
[   15.417312]  ? __virt_addr_valid+0x1db/0x2d0
[   15.417335]  ? kasan_atomics_helper+0x218a/0x5450
[   15.417356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.417378]  ? kasan_atomics_helper+0x218a/0x5450
[   15.417400]  kasan_report+0x141/0x180
[   15.417422]  ? kasan_atomics_helper+0x218a/0x5450
[   15.417449]  kasan_check_range+0x10c/0x1c0
[   15.417473]  __kasan_check_write+0x18/0x20
[   15.417494]  kasan_atomics_helper+0x218a/0x5450
[   15.417517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.417539]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.417563]  ? kasan_atomics+0x152/0x310
[   15.417590]  kasan_atomics+0x1dc/0x310
[   15.417614]  ? __pfx_kasan_atomics+0x10/0x10
[   15.417638]  ? __pfx_read_tsc+0x10/0x10
[   15.417659]  ? ktime_get_ts64+0x86/0x230
[   15.417683]  kunit_try_run_case+0x1a5/0x480
[   15.417707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.417753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.417776]  ? __kthread_parkme+0x82/0x180
[   15.417798]  ? preempt_count_sub+0x50/0x80
[   15.417832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.417880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.417916]  kthread+0x337/0x6f0
[   15.417936]  ? trace_preempt_on+0x20/0xc0
[   15.417959]  ? __pfx_kthread+0x10/0x10
[   15.417980]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.418002]  ? calculate_sigpending+0x7b/0xa0
[   15.418026]  ? __pfx_kthread+0x10/0x10
[   15.418048]  ret_from_fork+0x116/0x1d0
[   15.418066]  ? __pfx_kthread+0x10/0x10
[   15.418087]  ret_from_fork_asm+0x1a/0x30
[   15.418130]  </TASK>
[   15.418142] 
[   15.425731] Allocated by task 282:
[   15.425900]  kasan_save_stack+0x45/0x70
[   15.426114]  kasan_save_track+0x18/0x40
[   15.426316]  kasan_save_alloc_info+0x3b/0x50
[   15.426534]  __kasan_kmalloc+0xb7/0xc0
[   15.426874]  __kmalloc_cache_noprof+0x189/0x420
[   15.427034]  kasan_atomics+0x95/0x310
[   15.427206]  kunit_try_run_case+0x1a5/0x480
[   15.427422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427823]  kthread+0x337/0x6f0
[   15.428015]  ret_from_fork+0x116/0x1d0
[   15.428268]  ret_from_fork_asm+0x1a/0x30
[   15.428416] 
[   15.428489] The buggy address belongs to the object at ffff8881039c5a00
[   15.428489]  which belongs to the cache kmalloc-64 of size 64
[   15.428885] The buggy address is located 0 bytes to the right of
[   15.428885]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.429439] 
[   15.429566] The buggy address belongs to the physical page:
[   15.429819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.430080] flags: 0x200000000000000(node=0|zone=2)
[   15.430474] page_type: f5(slab)
[   15.430633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.430928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.431248] page dumped because: kasan: bad access detected
[   15.431533] 
[   15.431631] Memory state around the buggy address:
[   15.431855]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.432173]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.432471] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.432776]                                      ^
[   15.432955]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433295]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433571] ==================================================================
[   14.073509] ==================================================================
[   14.073794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.074446] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.074896] 
[   14.075037] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.075093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.075105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.075137] Call Trace:
[   14.075149]  <TASK>
[   14.075162]  dump_stack_lvl+0x73/0xb0
[   14.075190]  print_report+0xd1/0x650
[   14.075211]  ? __virt_addr_valid+0x1db/0x2d0
[   14.075233]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.075254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.075275]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.075295]  kasan_report+0x141/0x180
[   14.075316]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.075341]  __asan_report_load4_noabort+0x18/0x20
[   14.075407]  kasan_atomics_helper+0x4b88/0x5450
[   14.075430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.075451]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.075509]  ? kasan_atomics+0x152/0x310
[   14.075536]  kasan_atomics+0x1dc/0x310
[   14.075559]  ? __pfx_kasan_atomics+0x10/0x10
[   14.075582]  ? __pfx_read_tsc+0x10/0x10
[   14.075601]  ? ktime_get_ts64+0x86/0x230
[   14.075625]  kunit_try_run_case+0x1a5/0x480
[   14.075647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.075668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.075690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.075712]  ? __kthread_parkme+0x82/0x180
[   14.075731]  ? preempt_count_sub+0x50/0x80
[   14.075754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.075777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.075798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.075822]  kthread+0x337/0x6f0
[   14.075840]  ? trace_preempt_on+0x20/0xc0
[   14.075863]  ? __pfx_kthread+0x10/0x10
[   14.075883]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.075902]  ? calculate_sigpending+0x7b/0xa0
[   14.075926]  ? __pfx_kthread+0x10/0x10
[   14.075946]  ret_from_fork+0x116/0x1d0
[   14.075963]  ? __pfx_kthread+0x10/0x10
[   14.075983]  ret_from_fork_asm+0x1a/0x30
[   14.076012]  </TASK>
[   14.076024] 
[   14.084667] Allocated by task 282:
[   14.084848]  kasan_save_stack+0x45/0x70
[   14.085069]  kasan_save_track+0x18/0x40
[   14.085356]  kasan_save_alloc_info+0x3b/0x50
[   14.085573]  __kasan_kmalloc+0xb7/0xc0
[   14.085749]  __kmalloc_cache_noprof+0x189/0x420
[   14.085978]  kasan_atomics+0x95/0x310
[   14.086177]  kunit_try_run_case+0x1a5/0x480
[   14.086427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.086659]  kthread+0x337/0x6f0
[   14.086787]  ret_from_fork+0x116/0x1d0
[   14.086920]  ret_from_fork_asm+0x1a/0x30
[   14.087154] 
[   14.087252] The buggy address belongs to the object at ffff8881039c5a00
[   14.087252]  which belongs to the cache kmalloc-64 of size 64
[   14.087857] The buggy address is located 0 bytes to the right of
[   14.087857]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.088666] 
[   14.088746] The buggy address belongs to the physical page:
[   14.089008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.089492] flags: 0x200000000000000(node=0|zone=2)
[   14.089664] page_type: f5(slab)
[   14.089788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.090089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.090571] page dumped because: kasan: bad access detected
[   14.090827] 
[   14.090938] Memory state around the buggy address:
[   14.091322]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.091666]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.092071] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.092477]                                      ^
[   14.092699]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.093030]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.093633] ==================================================================
[   14.017992] ==================================================================
[   14.018853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.019106] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.019798] 
[   14.019964] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.020236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.020258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.020281] Call Trace:
[   14.020294]  <TASK>
[   14.020363]  dump_stack_lvl+0x73/0xb0
[   14.020397]  print_report+0xd1/0x650
[   14.020421]  ? __virt_addr_valid+0x1db/0x2d0
[   14.020444]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.020466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.020487]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.020508]  kasan_report+0x141/0x180
[   14.020528]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.020553]  __asan_report_load4_noabort+0x18/0x20
[   14.020577]  kasan_atomics_helper+0x4bbc/0x5450
[   14.020598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.020619]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.020644]  ? kasan_atomics+0x152/0x310
[   14.020669]  kasan_atomics+0x1dc/0x310
[   14.020691]  ? __pfx_kasan_atomics+0x10/0x10
[   14.020713]  ? __pfx_read_tsc+0x10/0x10
[   14.020735]  ? ktime_get_ts64+0x86/0x230
[   14.020762]  kunit_try_run_case+0x1a5/0x480
[   14.020787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.020808]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.020832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.020853]  ? __kthread_parkme+0x82/0x180
[   14.020875]  ? preempt_count_sub+0x50/0x80
[   14.020898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.020921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.020944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.020965]  kthread+0x337/0x6f0
[   14.020984]  ? trace_preempt_on+0x20/0xc0
[   14.021008]  ? __pfx_kthread+0x10/0x10
[   14.021029]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.021049]  ? calculate_sigpending+0x7b/0xa0
[   14.021074]  ? __pfx_kthread+0x10/0x10
[   14.021094]  ret_from_fork+0x116/0x1d0
[   14.021112]  ? __pfx_kthread+0x10/0x10
[   14.021144]  ret_from_fork_asm+0x1a/0x30
[   14.021176]  </TASK>
[   14.021187] 
[   14.030838] Allocated by task 282:
[   14.031011]  kasan_save_stack+0x45/0x70
[   14.031710]  kasan_save_track+0x18/0x40
[   14.031856]  kasan_save_alloc_info+0x3b/0x50
[   14.032005]  __kasan_kmalloc+0xb7/0xc0
[   14.032650]  __kmalloc_cache_noprof+0x189/0x420
[   14.032890]  kasan_atomics+0x95/0x310
[   14.033072]  kunit_try_run_case+0x1a5/0x480
[   14.033884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.034362]  kthread+0x337/0x6f0
[   14.034544]  ret_from_fork+0x116/0x1d0
[   14.034722]  ret_from_fork_asm+0x1a/0x30
[   14.034908] 
[   14.034999] The buggy address belongs to the object at ffff8881039c5a00
[   14.034999]  which belongs to the cache kmalloc-64 of size 64
[   14.036323] The buggy address is located 0 bytes to the right of
[   14.036323]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.037270] 
[   14.037588] The buggy address belongs to the physical page:
[   14.037829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.038157] flags: 0x200000000000000(node=0|zone=2)
[   14.038764] page_type: f5(slab)
[   14.039251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.039827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.040145] page dumped because: kasan: bad access detected
[   14.040488] 
[   14.040581] Memory state around the buggy address:
[   14.040778]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.041057]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.041770] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.042064]                                      ^
[   14.042656]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.043246]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.043784] ==================================================================
[   14.094243] ==================================================================
[   14.094693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.095052] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.095467] 
[   14.095579] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.095622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.095636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.095656] Call Trace:
[   14.095669]  <TASK>
[   14.095686]  dump_stack_lvl+0x73/0xb0
[   14.095723]  print_report+0xd1/0x650
[   14.095746]  ? __virt_addr_valid+0x1db/0x2d0
[   14.095781]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.095803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.095825]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.095847]  kasan_report+0x141/0x180
[   14.095869]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.095905]  __asan_report_store4_noabort+0x1b/0x30
[   14.095926]  kasan_atomics_helper+0x4b6e/0x5450
[   14.095960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.095982]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.096008]  ? kasan_atomics+0x152/0x310
[   14.096034]  kasan_atomics+0x1dc/0x310
[   14.096058]  ? __pfx_kasan_atomics+0x10/0x10
[   14.096083]  ? __pfx_read_tsc+0x10/0x10
[   14.096110]  ? ktime_get_ts64+0x86/0x230
[   14.096170]  kunit_try_run_case+0x1a5/0x480
[   14.096194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.096216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.096241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.096263]  ? __kthread_parkme+0x82/0x180
[   14.096283]  ? preempt_count_sub+0x50/0x80
[   14.096365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.096391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.096414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.096439]  kthread+0x337/0x6f0
[   14.096459]  ? trace_preempt_on+0x20/0xc0
[   14.096483]  ? __pfx_kthread+0x10/0x10
[   14.096504]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.096538]  ? calculate_sigpending+0x7b/0xa0
[   14.096562]  ? __pfx_kthread+0x10/0x10
[   14.096584]  ret_from_fork+0x116/0x1d0
[   14.096614]  ? __pfx_kthread+0x10/0x10
[   14.096636]  ret_from_fork_asm+0x1a/0x30
[   14.096667]  </TASK>
[   14.096678] 
[   14.104945] Allocated by task 282:
[   14.105181]  kasan_save_stack+0x45/0x70
[   14.105431]  kasan_save_track+0x18/0x40
[   14.105575]  kasan_save_alloc_info+0x3b/0x50
[   14.105765]  __kasan_kmalloc+0xb7/0xc0
[   14.105906]  __kmalloc_cache_noprof+0x189/0x420
[   14.106199]  kasan_atomics+0x95/0x310
[   14.106433]  kunit_try_run_case+0x1a5/0x480
[   14.106657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.106927]  kthread+0x337/0x6f0
[   14.107054]  ret_from_fork+0x116/0x1d0
[   14.107225]  ret_from_fork_asm+0x1a/0x30
[   14.107505] 
[   14.107606] The buggy address belongs to the object at ffff8881039c5a00
[   14.107606]  which belongs to the cache kmalloc-64 of size 64
[   14.108141] The buggy address is located 0 bytes to the right of
[   14.108141]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.108872] 
[   14.108968] The buggy address belongs to the physical page:
[   14.109278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.109703] flags: 0x200000000000000(node=0|zone=2)
[   14.109951] page_type: f5(slab)
[   14.110163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.110423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.110791] page dumped because: kasan: bad access detected
[   14.111047] 
[   14.111186] Memory state around the buggy address:
[   14.111468]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.111774]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.112074] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.112497]                                      ^
[   14.112680]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.112974]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.113519] ==================================================================
[   14.940251] ==================================================================
[   14.940599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.941240] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.941682] 
[   14.941833] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.941875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941917] Call Trace:
[   14.941935]  <TASK>
[   14.941950]  dump_stack_lvl+0x73/0xb0
[   14.941990]  print_report+0xd1/0x650
[   14.942013]  ? __virt_addr_valid+0x1db/0x2d0
[   14.942037]  ? kasan_atomics_helper+0x164f/0x5450
[   14.942059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.942081]  ? kasan_atomics_helper+0x164f/0x5450
[   14.942104]  kasan_report+0x141/0x180
[   14.942158]  ? kasan_atomics_helper+0x164f/0x5450
[   14.942194]  kasan_check_range+0x10c/0x1c0
[   14.942218]  __kasan_check_write+0x18/0x20
[   14.942237]  kasan_atomics_helper+0x164f/0x5450
[   14.942272]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.942294]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.942320]  ? kasan_atomics+0x152/0x310
[   14.942348]  kasan_atomics+0x1dc/0x310
[   14.942370]  ? __pfx_kasan_atomics+0x10/0x10
[   14.942394]  ? __pfx_read_tsc+0x10/0x10
[   14.942417]  ? ktime_get_ts64+0x86/0x230
[   14.942442]  kunit_try_run_case+0x1a5/0x480
[   14.942466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.942521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.942543]  ? __kthread_parkme+0x82/0x180
[   14.942566]  ? preempt_count_sub+0x50/0x80
[   14.942590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.942683]  kthread+0x337/0x6f0
[   14.942703]  ? trace_preempt_on+0x20/0xc0
[   14.942727]  ? __pfx_kthread+0x10/0x10
[   14.942748]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.942769]  ? calculate_sigpending+0x7b/0xa0
[   14.942794]  ? __pfx_kthread+0x10/0x10
[   14.942816]  ret_from_fork+0x116/0x1d0
[   14.942835]  ? __pfx_kthread+0x10/0x10
[   14.942857]  ret_from_fork_asm+0x1a/0x30
[   14.942890]  </TASK>
[   14.942901] 
[   14.950442] Allocated by task 282:
[   14.950575]  kasan_save_stack+0x45/0x70
[   14.950769]  kasan_save_track+0x18/0x40
[   14.950975]  kasan_save_alloc_info+0x3b/0x50
[   14.951215]  __kasan_kmalloc+0xb7/0xc0
[   14.951410]  __kmalloc_cache_noprof+0x189/0x420
[   14.951631]  kasan_atomics+0x95/0x310
[   14.951806]  kunit_try_run_case+0x1a5/0x480
[   14.952010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952262]  kthread+0x337/0x6f0
[   14.952389]  ret_from_fork+0x116/0x1d0
[   14.952532]  ret_from_fork_asm+0x1a/0x30
[   14.952732] 
[   14.952855] The buggy address belongs to the object at ffff8881039c5a00
[   14.952855]  which belongs to the cache kmalloc-64 of size 64
[   14.953449] The buggy address is located 0 bytes to the right of
[   14.953449]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.953950] 
[   14.954048] The buggy address belongs to the physical page:
[   14.954334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.954687] flags: 0x200000000000000(node=0|zone=2)
[   14.954927] page_type: f5(slab)
[   14.955100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.955388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.955616] page dumped because: kasan: bad access detected
[   14.955790] 
[   14.955861] Memory state around the buggy address:
[   14.956085]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.956445]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.956765] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.957085]                                      ^
[   14.957346]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957695]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957983] ==================================================================
[   14.361788] ==================================================================
[   14.362191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.362658] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.363063] 
[   14.363252] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.363428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.363443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.363465] Call Trace:
[   14.363480]  <TASK>
[   14.363496]  dump_stack_lvl+0x73/0xb0
[   14.363524]  print_report+0xd1/0x650
[   14.363548]  ? __virt_addr_valid+0x1db/0x2d0
[   14.363572]  ? kasan_atomics_helper+0x992/0x5450
[   14.363594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.363668]  ? kasan_atomics_helper+0x992/0x5450
[   14.363691]  kasan_report+0x141/0x180
[   14.363762]  ? kasan_atomics_helper+0x992/0x5450
[   14.363790]  kasan_check_range+0x10c/0x1c0
[   14.363814]  __kasan_check_write+0x18/0x20
[   14.363845]  kasan_atomics_helper+0x992/0x5450
[   14.363869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.363892]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.363918]  ? kasan_atomics+0x152/0x310
[   14.363945]  kasan_atomics+0x1dc/0x310
[   14.363969]  ? __pfx_kasan_atomics+0x10/0x10
[   14.363993]  ? __pfx_read_tsc+0x10/0x10
[   14.364014]  ? ktime_get_ts64+0x86/0x230
[   14.364038]  kunit_try_run_case+0x1a5/0x480
[   14.364062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.364084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.364109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.364141]  ? __kthread_parkme+0x82/0x180
[   14.364181]  ? preempt_count_sub+0x50/0x80
[   14.364206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.364229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.364252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.364276]  kthread+0x337/0x6f0
[   14.364302]  ? trace_preempt_on+0x20/0xc0
[   14.364327]  ? __pfx_kthread+0x10/0x10
[   14.364348]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.364370]  ? calculate_sigpending+0x7b/0xa0
[   14.364394]  ? __pfx_kthread+0x10/0x10
[   14.364416]  ret_from_fork+0x116/0x1d0
[   14.364435]  ? __pfx_kthread+0x10/0x10
[   14.364457]  ret_from_fork_asm+0x1a/0x30
[   14.364487]  </TASK>
[   14.364499] 
[   14.374239] Allocated by task 282:
[   14.374491]  kasan_save_stack+0x45/0x70
[   14.374825]  kasan_save_track+0x18/0x40
[   14.375041]  kasan_save_alloc_info+0x3b/0x50
[   14.375430]  __kasan_kmalloc+0xb7/0xc0
[   14.375601]  __kmalloc_cache_noprof+0x189/0x420
[   14.375830]  kasan_atomics+0x95/0x310
[   14.376018]  kunit_try_run_case+0x1a5/0x480
[   14.376233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.376436]  kthread+0x337/0x6f0
[   14.376621]  ret_from_fork+0x116/0x1d0
[   14.376795]  ret_from_fork_asm+0x1a/0x30
[   14.376961] 
[   14.377064] The buggy address belongs to the object at ffff8881039c5a00
[   14.377064]  which belongs to the cache kmalloc-64 of size 64
[   14.377948] The buggy address is located 0 bytes to the right of
[   14.377948]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.378623] 
[   14.378745] The buggy address belongs to the physical page:
[   14.379096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.379565] flags: 0x200000000000000(node=0|zone=2)
[   14.379842] page_type: f5(slab)
[   14.379987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.380508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.380870] page dumped because: kasan: bad access detected
[   14.381105] 
[   14.381381] Memory state around the buggy address:
[   14.381611]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.382041]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.382644] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.383003]                                      ^
[   14.383232]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.383681]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.384038] ==================================================================
[   15.239603] ==================================================================
[   15.240434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.240772] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.241330] 
[   15.241440] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.241606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.241623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.241645] Call Trace:
[   15.241660]  <TASK>
[   15.241676]  dump_stack_lvl+0x73/0xb0
[   15.241704]  print_report+0xd1/0x650
[   15.241727]  ? __virt_addr_valid+0x1db/0x2d0
[   15.241750]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.241772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.241796]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.241818]  kasan_report+0x141/0x180
[   15.241840]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.241866]  kasan_check_range+0x10c/0x1c0
[   15.241890]  __kasan_check_write+0x18/0x20
[   15.241910]  kasan_atomics_helper+0x1e12/0x5450
[   15.241935]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.241958]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.241984]  ? kasan_atomics+0x152/0x310
[   15.242011]  kasan_atomics+0x1dc/0x310
[   15.242034]  ? __pfx_kasan_atomics+0x10/0x10
[   15.242059]  ? __pfx_read_tsc+0x10/0x10
[   15.242081]  ? ktime_get_ts64+0x86/0x230
[   15.242105]  kunit_try_run_case+0x1a5/0x480
[   15.242150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.242198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.242221]  ? __kthread_parkme+0x82/0x180
[   15.242243]  ? preempt_count_sub+0x50/0x80
[   15.242267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.242314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.242338]  kthread+0x337/0x6f0
[   15.242358]  ? trace_preempt_on+0x20/0xc0
[   15.242382]  ? __pfx_kthread+0x10/0x10
[   15.242404]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.242424]  ? calculate_sigpending+0x7b/0xa0
[   15.242449]  ? __pfx_kthread+0x10/0x10
[   15.242470]  ret_from_fork+0x116/0x1d0
[   15.242488]  ? __pfx_kthread+0x10/0x10
[   15.242518]  ret_from_fork_asm+0x1a/0x30
[   15.242548]  </TASK>
[   15.242561] 
[   15.253231] Allocated by task 282:
[   15.253597]  kasan_save_stack+0x45/0x70
[   15.253824]  kasan_save_track+0x18/0x40
[   15.253987]  kasan_save_alloc_info+0x3b/0x50
[   15.254495]  __kasan_kmalloc+0xb7/0xc0
[   15.254692]  __kmalloc_cache_noprof+0x189/0x420
[   15.254969]  kasan_atomics+0x95/0x310
[   15.255195]  kunit_try_run_case+0x1a5/0x480
[   15.255531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.255787]  kthread+0x337/0x6f0
[   15.256061]  ret_from_fork+0x116/0x1d0
[   15.256378]  ret_from_fork_asm+0x1a/0x30
[   15.256667] 
[   15.256749] The buggy address belongs to the object at ffff8881039c5a00
[   15.256749]  which belongs to the cache kmalloc-64 of size 64
[   15.257518] The buggy address is located 0 bytes to the right of
[   15.257518]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.258379] 
[   15.258483] The buggy address belongs to the physical page:
[   15.258857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.259341] flags: 0x200000000000000(node=0|zone=2)
[   15.259558] page_type: f5(slab)
[   15.259881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.260346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.260769] page dumped because: kasan: bad access detected
[   15.261044] 
[   15.261314] Memory state around the buggy address:
[   15.261530]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.261914]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.262406] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.262733]                                      ^
[   15.263038]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263560]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263930] ==================================================================
[   14.648693] ==================================================================
[   14.648997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.649416] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.649680] 
[   14.649792] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.649834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.649847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.649906] Call Trace:
[   14.649934]  <TASK>
[   14.649962]  dump_stack_lvl+0x73/0xb0
[   14.650017]  print_report+0xd1/0x650
[   14.650041]  ? __virt_addr_valid+0x1db/0x2d0
[   14.650064]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.650097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.650119]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.650150]  kasan_report+0x141/0x180
[   14.650173]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.650199]  __asan_report_load4_noabort+0x18/0x20
[   14.650224]  kasan_atomics_helper+0x4a1c/0x5450
[   14.650278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.650301]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.650337]  ? kasan_atomics+0x152/0x310
[   14.650365]  kasan_atomics+0x1dc/0x310
[   14.650388]  ? __pfx_kasan_atomics+0x10/0x10
[   14.650413]  ? __pfx_read_tsc+0x10/0x10
[   14.650435]  ? ktime_get_ts64+0x86/0x230
[   14.650459]  kunit_try_run_case+0x1a5/0x480
[   14.650483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.650505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.650533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.650625]  ? __kthread_parkme+0x82/0x180
[   14.650663]  ? preempt_count_sub+0x50/0x80
[   14.650688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.650712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.650735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.650759]  kthread+0x337/0x6f0
[   14.650779]  ? trace_preempt_on+0x20/0xc0
[   14.650802]  ? __pfx_kthread+0x10/0x10
[   14.650824]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.650845]  ? calculate_sigpending+0x7b/0xa0
[   14.650869]  ? __pfx_kthread+0x10/0x10
[   14.650891]  ret_from_fork+0x116/0x1d0
[   14.650910]  ? __pfx_kthread+0x10/0x10
[   14.650932]  ret_from_fork_asm+0x1a/0x30
[   14.650962]  </TASK>
[   14.650974] 
[   14.659716] Allocated by task 282:
[   14.659903]  kasan_save_stack+0x45/0x70
[   14.660111]  kasan_save_track+0x18/0x40
[   14.660322]  kasan_save_alloc_info+0x3b/0x50
[   14.660505]  __kasan_kmalloc+0xb7/0xc0
[   14.660688]  __kmalloc_cache_noprof+0x189/0x420
[   14.660904]  kasan_atomics+0x95/0x310
[   14.661054]  kunit_try_run_case+0x1a5/0x480
[   14.661550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.661797]  kthread+0x337/0x6f0
[   14.661963]  ret_from_fork+0x116/0x1d0
[   14.662346]  ret_from_fork_asm+0x1a/0x30
[   14.662617] 
[   14.662694] The buggy address belongs to the object at ffff8881039c5a00
[   14.662694]  which belongs to the cache kmalloc-64 of size 64
[   14.663166] The buggy address is located 0 bytes to the right of
[   14.663166]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.663785] 
[   14.663891] The buggy address belongs to the physical page:
[   14.664230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.664876] flags: 0x200000000000000(node=0|zone=2)
[   14.665053] page_type: f5(slab)
[   14.665189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.665797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.666170] page dumped because: kasan: bad access detected
[   14.666421] 
[   14.666539] Memory state around the buggy address:
[   14.666944]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.667329]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.667597] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.668147]                                      ^
[   14.668448]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.668847]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.669240] ==================================================================
[   15.295884] ==================================================================
[   15.296159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.296499] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.296772] 
[   15.296860] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.296902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.296916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.296939] Call Trace:
[   15.296952]  <TASK>
[   15.296967]  dump_stack_lvl+0x73/0xb0
[   15.296994]  print_report+0xd1/0x650
[   15.297018]  ? __virt_addr_valid+0x1db/0x2d0
[   15.297043]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.297065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.297088]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.297110]  kasan_report+0x141/0x180
[   15.297172]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.297223]  kasan_check_range+0x10c/0x1c0
[   15.297248]  __kasan_check_write+0x18/0x20
[   15.297268]  kasan_atomics_helper+0x1f43/0x5450
[   15.297291]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.297314]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.297341]  ? kasan_atomics+0x152/0x310
[   15.297368]  kasan_atomics+0x1dc/0x310
[   15.297393]  ? __pfx_kasan_atomics+0x10/0x10
[   15.297418]  ? __pfx_read_tsc+0x10/0x10
[   15.297440]  ? ktime_get_ts64+0x86/0x230
[   15.297465]  kunit_try_run_case+0x1a5/0x480
[   15.297489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.297512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.297536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.297559]  ? __kthread_parkme+0x82/0x180
[   15.297581]  ? preempt_count_sub+0x50/0x80
[   15.297622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.297647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.297682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.297706]  kthread+0x337/0x6f0
[   15.297727]  ? trace_preempt_on+0x20/0xc0
[   15.297751]  ? __pfx_kthread+0x10/0x10
[   15.297772]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.297794]  ? calculate_sigpending+0x7b/0xa0
[   15.297818]  ? __pfx_kthread+0x10/0x10
[   15.297840]  ret_from_fork+0x116/0x1d0
[   15.297859]  ? __pfx_kthread+0x10/0x10
[   15.297880]  ret_from_fork_asm+0x1a/0x30
[   15.297911]  </TASK>
[   15.297923] 
[   15.305443] Allocated by task 282:
[   15.305627]  kasan_save_stack+0x45/0x70
[   15.305837]  kasan_save_track+0x18/0x40
[   15.306032]  kasan_save_alloc_info+0x3b/0x50
[   15.306281]  __kasan_kmalloc+0xb7/0xc0
[   15.306473]  __kmalloc_cache_noprof+0x189/0x420
[   15.306693]  kasan_atomics+0x95/0x310
[   15.306900]  kunit_try_run_case+0x1a5/0x480
[   15.307093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.307326]  kthread+0x337/0x6f0
[   15.307452]  ret_from_fork+0x116/0x1d0
[   15.307587]  ret_from_fork_asm+0x1a/0x30
[   15.307810] 
[   15.307910] The buggy address belongs to the object at ffff8881039c5a00
[   15.307910]  which belongs to the cache kmalloc-64 of size 64
[   15.308511] The buggy address is located 0 bytes to the right of
[   15.308511]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.309001] 
[   15.309100] The buggy address belongs to the physical page:
[   15.309363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.309715] flags: 0x200000000000000(node=0|zone=2)
[   15.309878] page_type: f5(slab)
[   15.310000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.310287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.310633] page dumped because: kasan: bad access detected
[   15.310887] 
[   15.310983] Memory state around the buggy address:
[   15.311240]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.311586]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.311895] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.312182]                                      ^
[   15.312365]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312684]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.313000] ==================================================================
[   15.090613] ==================================================================
[   15.090935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.091602] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.092100] 
[   15.092262] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.092309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.092453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.092482] Call Trace:
[   15.092499]  <TASK>
[   15.092515]  dump_stack_lvl+0x73/0xb0
[   15.092544]  print_report+0xd1/0x650
[   15.092567]  ? __virt_addr_valid+0x1db/0x2d0
[   15.092591]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.092614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.092637]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.092661]  kasan_report+0x141/0x180
[   15.092686]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.092715]  kasan_check_range+0x10c/0x1c0
[   15.092740]  __kasan_check_write+0x18/0x20
[   15.092760]  kasan_atomics_helper+0x1a7f/0x5450
[   15.092784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.092806]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.092832]  ? kasan_atomics+0x152/0x310
[   15.092859]  kasan_atomics+0x1dc/0x310
[   15.092883]  ? __pfx_kasan_atomics+0x10/0x10
[   15.092907]  ? __pfx_read_tsc+0x10/0x10
[   15.092927]  ? ktime_get_ts64+0x86/0x230
[   15.092952]  kunit_try_run_case+0x1a5/0x480
[   15.092975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.093021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.093044]  ? __kthread_parkme+0x82/0x180
[   15.093065]  ? preempt_count_sub+0x50/0x80
[   15.093088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.093112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.093170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.093194]  kthread+0x337/0x6f0
[   15.093215]  ? trace_preempt_on+0x20/0xc0
[   15.093237]  ? __pfx_kthread+0x10/0x10
[   15.093261]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.093283]  ? calculate_sigpending+0x7b/0xa0
[   15.093306]  ? __pfx_kthread+0x10/0x10
[   15.093328]  ret_from_fork+0x116/0x1d0
[   15.093347]  ? __pfx_kthread+0x10/0x10
[   15.093368]  ret_from_fork_asm+0x1a/0x30
[   15.093398]  </TASK>
[   15.093411] 
[   15.104140] Allocated by task 282:
[   15.104462]  kasan_save_stack+0x45/0x70
[   15.104656]  kasan_save_track+0x18/0x40
[   15.104992]  kasan_save_alloc_info+0x3b/0x50
[   15.105303]  __kasan_kmalloc+0xb7/0xc0
[   15.105582]  __kmalloc_cache_noprof+0x189/0x420
[   15.105792]  kasan_atomics+0x95/0x310
[   15.106110]  kunit_try_run_case+0x1a5/0x480
[   15.106347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.106635]  kthread+0x337/0x6f0
[   15.106913]  ret_from_fork+0x116/0x1d0
[   15.107205]  ret_from_fork_asm+0x1a/0x30
[   15.107422] 
[   15.107501] The buggy address belongs to the object at ffff8881039c5a00
[   15.107501]  which belongs to the cache kmalloc-64 of size 64
[   15.108024] The buggy address is located 0 bytes to the right of
[   15.108024]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.108830] 
[   15.109061] The buggy address belongs to the physical page:
[   15.109462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.110041] flags: 0x200000000000000(node=0|zone=2)
[   15.110448] page_type: f5(slab)
[   15.110662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.111119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.111477] page dumped because: kasan: bad access detected
[   15.111843] 
[   15.112027] Memory state around the buggy address:
[   15.112293]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.112731]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.113040] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.113601]                                      ^
[   15.113845]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114305]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114622] ==================================================================
[   15.469874] ==================================================================
[   15.470228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.470578] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.470838] 
[   15.470958] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.470998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.471011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.471032] Call Trace:
[   15.471047]  <TASK>
[   15.471063]  dump_stack_lvl+0x73/0xb0
[   15.471098]  print_report+0xd1/0x650
[   15.471154]  ? __virt_addr_valid+0x1db/0x2d0
[   15.471178]  ? kasan_atomics_helper+0x5115/0x5450
[   15.471200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.471233]  ? kasan_atomics_helper+0x5115/0x5450
[   15.471264]  kasan_report+0x141/0x180
[   15.471287]  ? kasan_atomics_helper+0x5115/0x5450
[   15.471314]  __asan_report_load8_noabort+0x18/0x20
[   15.471349]  kasan_atomics_helper+0x5115/0x5450
[   15.471372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.471395]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.471429]  ? kasan_atomics+0x152/0x310
[   15.471457]  kasan_atomics+0x1dc/0x310
[   15.471480]  ? __pfx_kasan_atomics+0x10/0x10
[   15.471515]  ? __pfx_read_tsc+0x10/0x10
[   15.471535]  ? ktime_get_ts64+0x86/0x230
[   15.471559]  kunit_try_run_case+0x1a5/0x480
[   15.471583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471606]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.471629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.471653]  ? __kthread_parkme+0x82/0x180
[   15.471674]  ? preempt_count_sub+0x50/0x80
[   15.471697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.471744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.471768]  kthread+0x337/0x6f0
[   15.471788]  ? trace_preempt_on+0x20/0xc0
[   15.471811]  ? __pfx_kthread+0x10/0x10
[   15.471833]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.471854]  ? calculate_sigpending+0x7b/0xa0
[   15.471879]  ? __pfx_kthread+0x10/0x10
[   15.471900]  ret_from_fork+0x116/0x1d0
[   15.471919]  ? __pfx_kthread+0x10/0x10
[   15.471941]  ret_from_fork_asm+0x1a/0x30
[   15.471972]  </TASK>
[   15.471983] 
[   15.479170] Allocated by task 282:
[   15.479385]  kasan_save_stack+0x45/0x70
[   15.479621]  kasan_save_track+0x18/0x40
[   15.479839]  kasan_save_alloc_info+0x3b/0x50
[   15.480050]  __kasan_kmalloc+0xb7/0xc0
[   15.480270]  __kmalloc_cache_noprof+0x189/0x420
[   15.480499]  kasan_atomics+0x95/0x310
[   15.480662]  kunit_try_run_case+0x1a5/0x480
[   15.480810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480986]  kthread+0x337/0x6f0
[   15.481172]  ret_from_fork+0x116/0x1d0
[   15.481385]  ret_from_fork_asm+0x1a/0x30
[   15.481584] 
[   15.481696] The buggy address belongs to the object at ffff8881039c5a00
[   15.481696]  which belongs to the cache kmalloc-64 of size 64
[   15.482283] The buggy address is located 0 bytes to the right of
[   15.482283]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.482798] 
[   15.482895] The buggy address belongs to the physical page:
[   15.483184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.483534] flags: 0x200000000000000(node=0|zone=2)
[   15.483760] page_type: f5(slab)
[   15.483927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.484281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.484619] page dumped because: kasan: bad access detected
[   15.484871] 
[   15.484991] Memory state around the buggy address:
[   15.485188]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.485491]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.485817] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.486166]                                      ^
[   15.486393]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486649]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486863] ==================================================================
[   14.452246] ==================================================================
[   14.452707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.453110] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.453594] 
[   14.453734] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.453846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.453860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.453894] Call Trace:
[   14.453907]  <TASK>
[   14.453922]  dump_stack_lvl+0x73/0xb0
[   14.453951]  print_report+0xd1/0x650
[   14.453973]  ? __virt_addr_valid+0x1db/0x2d0
[   14.453997]  ? kasan_atomics_helper+0xc70/0x5450
[   14.454019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.454042]  ? kasan_atomics_helper+0xc70/0x5450
[   14.454064]  kasan_report+0x141/0x180
[   14.454086]  ? kasan_atomics_helper+0xc70/0x5450
[   14.454113]  kasan_check_range+0x10c/0x1c0
[   14.454163]  __kasan_check_write+0x18/0x20
[   14.454184]  kasan_atomics_helper+0xc70/0x5450
[   14.454207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.454230]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.454256]  ? kasan_atomics+0x152/0x310
[   14.454283]  kasan_atomics+0x1dc/0x310
[   14.454372]  ? __pfx_kasan_atomics+0x10/0x10
[   14.454397]  ? __pfx_read_tsc+0x10/0x10
[   14.454420]  ? ktime_get_ts64+0x86/0x230
[   14.454445]  kunit_try_run_case+0x1a5/0x480
[   14.454470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.454492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.454521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.454544]  ? __kthread_parkme+0x82/0x180
[   14.454565]  ? preempt_count_sub+0x50/0x80
[   14.454590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.454614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.454637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.454661]  kthread+0x337/0x6f0
[   14.454681]  ? trace_preempt_on+0x20/0xc0
[   14.454706]  ? __pfx_kthread+0x10/0x10
[   14.454726]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.454748]  ? calculate_sigpending+0x7b/0xa0
[   14.454771]  ? __pfx_kthread+0x10/0x10
[   14.454793]  ret_from_fork+0x116/0x1d0
[   14.454812]  ? __pfx_kthread+0x10/0x10
[   14.454834]  ret_from_fork_asm+0x1a/0x30
[   14.454865]  </TASK>
[   14.454877] 
[   14.464920] Allocated by task 282:
[   14.465106]  kasan_save_stack+0x45/0x70
[   14.465513]  kasan_save_track+0x18/0x40
[   14.465680]  kasan_save_alloc_info+0x3b/0x50
[   14.465896]  __kasan_kmalloc+0xb7/0xc0
[   14.466229]  __kmalloc_cache_noprof+0x189/0x420
[   14.466433]  kasan_atomics+0x95/0x310
[   14.466610]  kunit_try_run_case+0x1a5/0x480
[   14.466826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467072]  kthread+0x337/0x6f0
[   14.467244]  ret_from_fork+0x116/0x1d0
[   14.467427]  ret_from_fork_asm+0x1a/0x30
[   14.467613] 
[   14.467701] The buggy address belongs to the object at ffff8881039c5a00
[   14.467701]  which belongs to the cache kmalloc-64 of size 64
[   14.468482] The buggy address is located 0 bytes to the right of
[   14.468482]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.469044] 
[   14.469220] The buggy address belongs to the physical page:
[   14.469622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.469934] flags: 0x200000000000000(node=0|zone=2)
[   14.470269] page_type: f5(slab)
[   14.470579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.470894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.471361] page dumped because: kasan: bad access detected
[   14.471623] 
[   14.471811] Memory state around the buggy address:
[   14.472025]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.472489]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.472846] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.473228]                                      ^
[   14.473623]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473993]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.474435] ==================================================================
[   14.976818] ==================================================================
[   14.977272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.977603] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.977831] 
[   14.977913] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.977954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.977967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.977986] Call Trace:
[   14.978002]  <TASK>
[   14.978018]  dump_stack_lvl+0x73/0xb0
[   14.978042]  print_report+0xd1/0x650
[   14.978075]  ? __virt_addr_valid+0x1db/0x2d0
[   14.978099]  ? kasan_atomics_helper+0x177f/0x5450
[   14.978153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.978177]  ? kasan_atomics_helper+0x177f/0x5450
[   14.978199]  kasan_report+0x141/0x180
[   14.978221]  ? kasan_atomics_helper+0x177f/0x5450
[   14.978248]  kasan_check_range+0x10c/0x1c0
[   14.978272]  __kasan_check_write+0x18/0x20
[   14.978292]  kasan_atomics_helper+0x177f/0x5450
[   14.978315]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.978338]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.978364]  ? kasan_atomics+0x152/0x310
[   14.978390]  kasan_atomics+0x1dc/0x310
[   14.978413]  ? __pfx_kasan_atomics+0x10/0x10
[   14.978437]  ? __pfx_read_tsc+0x10/0x10
[   14.978459]  ? ktime_get_ts64+0x86/0x230
[   14.978482]  kunit_try_run_case+0x1a5/0x480
[   14.978507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.978536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.978559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.978582]  ? __kthread_parkme+0x82/0x180
[   14.978604]  ? preempt_count_sub+0x50/0x80
[   14.978627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.978652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.978674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.978698]  kthread+0x337/0x6f0
[   14.978717]  ? trace_preempt_on+0x20/0xc0
[   14.978741]  ? __pfx_kthread+0x10/0x10
[   14.978762]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.978782]  ? calculate_sigpending+0x7b/0xa0
[   14.978806]  ? __pfx_kthread+0x10/0x10
[   14.978828]  ret_from_fork+0x116/0x1d0
[   14.978846]  ? __pfx_kthread+0x10/0x10
[   14.978867]  ret_from_fork_asm+0x1a/0x30
[   14.978899]  </TASK>
[   14.978910] 
[   14.989764] Allocated by task 282:
[   14.990089]  kasan_save_stack+0x45/0x70
[   14.990303]  kasan_save_track+0x18/0x40
[   14.990649]  kasan_save_alloc_info+0x3b/0x50
[   14.990942]  __kasan_kmalloc+0xb7/0xc0
[   14.991096]  __kmalloc_cache_noprof+0x189/0x420
[   14.991548]  kasan_atomics+0x95/0x310
[   14.991742]  kunit_try_run_case+0x1a5/0x480
[   14.992034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992302]  kthread+0x337/0x6f0
[   14.992585]  ret_from_fork+0x116/0x1d0
[   14.992881]  ret_from_fork_asm+0x1a/0x30
[   14.993102] 
[   14.993296] The buggy address belongs to the object at ffff8881039c5a00
[   14.993296]  which belongs to the cache kmalloc-64 of size 64
[   14.993896] The buggy address is located 0 bytes to the right of
[   14.993896]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.994380] 
[   14.994481] The buggy address belongs to the physical page:
[   14.994744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.995046] flags: 0x200000000000000(node=0|zone=2)
[   14.995256] page_type: f5(slab)
[   14.995380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.995742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.996043] page dumped because: kasan: bad access detected
[   14.996297] 
[   14.996390] Memory state around the buggy address:
[   14.996557]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.997008]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.997339] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.997668]                                      ^
[   14.997880]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998150]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998459] ==================================================================
[   15.360453] ==================================================================
[   15.360913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.361266] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.361547] 
[   15.361652] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.361692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.361705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.361725] Call Trace:
[   15.361741]  <TASK>
[   15.361755]  dump_stack_lvl+0x73/0xb0
[   15.361782]  print_report+0xd1/0x650
[   15.361805]  ? __virt_addr_valid+0x1db/0x2d0
[   15.361828]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.361850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.361872]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.361894]  kasan_report+0x141/0x180
[   15.361916]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.361942]  __asan_report_load8_noabort+0x18/0x20
[   15.361966]  kasan_atomics_helper+0x4f98/0x5450
[   15.362021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.362043]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.362082]  ? kasan_atomics+0x152/0x310
[   15.362110]  kasan_atomics+0x1dc/0x310
[   15.362159]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362184]  ? __pfx_read_tsc+0x10/0x10
[   15.362206]  ? ktime_get_ts64+0x86/0x230
[   15.362230]  kunit_try_run_case+0x1a5/0x480
[   15.362254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.362303]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.362327]  ? __kthread_parkme+0x82/0x180
[   15.362349]  ? preempt_count_sub+0x50/0x80
[   15.362373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.362421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.362445]  kthread+0x337/0x6f0
[   15.362464]  ? trace_preempt_on+0x20/0xc0
[   15.362489]  ? __pfx_kthread+0x10/0x10
[   15.362513]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.362534]  ? calculate_sigpending+0x7b/0xa0
[   15.362559]  ? __pfx_kthread+0x10/0x10
[   15.362582]  ret_from_fork+0x116/0x1d0
[   15.362601]  ? __pfx_kthread+0x10/0x10
[   15.362623]  ret_from_fork_asm+0x1a/0x30
[   15.362665]  </TASK>
[   15.362677] 
[   15.370219] Allocated by task 282:
[   15.370397]  kasan_save_stack+0x45/0x70
[   15.370586]  kasan_save_track+0x18/0x40
[   15.370784]  kasan_save_alloc_info+0x3b/0x50
[   15.370931]  __kasan_kmalloc+0xb7/0xc0
[   15.371060]  __kmalloc_cache_noprof+0x189/0x420
[   15.371327]  kasan_atomics+0x95/0x310
[   15.371519]  kunit_try_run_case+0x1a5/0x480
[   15.371712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.371895]  kthread+0x337/0x6f0
[   15.372062]  ret_from_fork+0x116/0x1d0
[   15.372311]  ret_from_fork_asm+0x1a/0x30
[   15.372522] 
[   15.372597] The buggy address belongs to the object at ffff8881039c5a00
[   15.372597]  which belongs to the cache kmalloc-64 of size 64
[   15.373138] The buggy address is located 0 bytes to the right of
[   15.373138]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.373656] 
[   15.373729] The buggy address belongs to the physical page:
[   15.373904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.374183] flags: 0x200000000000000(node=0|zone=2)
[   15.374437] page_type: f5(slab)
[   15.374604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.374974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.375350] page dumped because: kasan: bad access detected
[   15.375594] 
[   15.375715] Memory state around the buggy address:
[   15.375873]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376090]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376354] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.376671]                                      ^
[   15.376922]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377321]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377615] ==================================================================
[   15.190462] ==================================================================
[   15.190797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.191152] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.191709] 
[   15.192065] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.192115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.192154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.192175] Call Trace:
[   15.192193]  <TASK>
[   15.192210]  dump_stack_lvl+0x73/0xb0
[   15.192239]  print_report+0xd1/0x650
[   15.192262]  ? __virt_addr_valid+0x1db/0x2d0
[   15.192287]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.192309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.192331]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.192354]  kasan_report+0x141/0x180
[   15.192377]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.192403]  kasan_check_range+0x10c/0x1c0
[   15.192427]  __kasan_check_write+0x18/0x20
[   15.192448]  kasan_atomics_helper+0x1ce1/0x5450
[   15.192472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.192496]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.192522]  ? kasan_atomics+0x152/0x310
[   15.192549]  kasan_atomics+0x1dc/0x310
[   15.192573]  ? __pfx_kasan_atomics+0x10/0x10
[   15.192598]  ? __pfx_read_tsc+0x10/0x10
[   15.192620]  ? ktime_get_ts64+0x86/0x230
[   15.192644]  kunit_try_run_case+0x1a5/0x480
[   15.192669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.192717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.192741]  ? __kthread_parkme+0x82/0x180
[   15.192762]  ? preempt_count_sub+0x50/0x80
[   15.192786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.192833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.192855]  kthread+0x337/0x6f0
[   15.192876]  ? trace_preempt_on+0x20/0xc0
[   15.192899]  ? __pfx_kthread+0x10/0x10
[   15.192920]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.192941]  ? calculate_sigpending+0x7b/0xa0
[   15.192965]  ? __pfx_kthread+0x10/0x10
[   15.192987]  ret_from_fork+0x116/0x1d0
[   15.193007]  ? __pfx_kthread+0x10/0x10
[   15.193027]  ret_from_fork_asm+0x1a/0x30
[   15.193058]  </TASK>
[   15.193070] 
[   15.203914] Allocated by task 282:
[   15.204388]  kasan_save_stack+0x45/0x70
[   15.204601]  kasan_save_track+0x18/0x40
[   15.204803]  kasan_save_alloc_info+0x3b/0x50
[   15.205103]  __kasan_kmalloc+0xb7/0xc0
[   15.205420]  __kmalloc_cache_noprof+0x189/0x420
[   15.205718]  kasan_atomics+0x95/0x310
[   15.205923]  kunit_try_run_case+0x1a5/0x480
[   15.206320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.206660]  kthread+0x337/0x6f0
[   15.206912]  ret_from_fork+0x116/0x1d0
[   15.207119]  ret_from_fork_asm+0x1a/0x30
[   15.207423] 
[   15.207523] The buggy address belongs to the object at ffff8881039c5a00
[   15.207523]  which belongs to the cache kmalloc-64 of size 64
[   15.208252] The buggy address is located 0 bytes to the right of
[   15.208252]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.208864] 
[   15.208988] The buggy address belongs to the physical page:
[   15.209447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.209795] flags: 0x200000000000000(node=0|zone=2)
[   15.210160] page_type: f5(slab)
[   15.210452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.210889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.211369] page dumped because: kasan: bad access detected
[   15.211705] 
[   15.211785] Memory state around the buggy address:
[   15.212036]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212545]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212881] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.213352]                                      ^
[   15.213606]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214039]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214482] ==================================================================
[   14.133919] ==================================================================
[   14.134190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.134641] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.134891] 
[   14.134982] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.135034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.135048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.135079] Call Trace:
[   14.135095]  <TASK>
[   14.135110]  dump_stack_lvl+0x73/0xb0
[   14.135164]  print_report+0xd1/0x650
[   14.135186]  ? __virt_addr_valid+0x1db/0x2d0
[   14.135209]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.135231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.135253]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.135275]  kasan_report+0x141/0x180
[   14.135368]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.135399]  __asan_report_load4_noabort+0x18/0x20
[   14.135436]  kasan_atomics_helper+0x4b54/0x5450
[   14.135468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.135490]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.135526]  ? kasan_atomics+0x152/0x310
[   14.135554]  kasan_atomics+0x1dc/0x310
[   14.135576]  ? __pfx_kasan_atomics+0x10/0x10
[   14.135601]  ? __pfx_read_tsc+0x10/0x10
[   14.135622]  ? ktime_get_ts64+0x86/0x230
[   14.135646]  kunit_try_run_case+0x1a5/0x480
[   14.135670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.135692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.135716]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.135739]  ? __kthread_parkme+0x82/0x180
[   14.135760]  ? preempt_count_sub+0x50/0x80
[   14.135793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.135817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.135840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.135874]  kthread+0x337/0x6f0
[   14.135894]  ? trace_preempt_on+0x20/0xc0
[   14.135917]  ? __pfx_kthread+0x10/0x10
[   14.135938]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.135968]  ? calculate_sigpending+0x7b/0xa0
[   14.135991]  ? __pfx_kthread+0x10/0x10
[   14.136013]  ret_from_fork+0x116/0x1d0
[   14.136042]  ? __pfx_kthread+0x10/0x10
[   14.136064]  ret_from_fork_asm+0x1a/0x30
[   14.136094]  </TASK>
[   14.136105] 
[   14.145318] Allocated by task 282:
[   14.145491]  kasan_save_stack+0x45/0x70
[   14.145677]  kasan_save_track+0x18/0x40
[   14.145856]  kasan_save_alloc_info+0x3b/0x50
[   14.146052]  __kasan_kmalloc+0xb7/0xc0
[   14.146675]  __kmalloc_cache_noprof+0x189/0x420
[   14.146898]  kasan_atomics+0x95/0x310
[   14.147065]  kunit_try_run_case+0x1a5/0x480
[   14.147259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.147601]  kthread+0x337/0x6f0
[   14.147765]  ret_from_fork+0x116/0x1d0
[   14.147956]  ret_from_fork_asm+0x1a/0x30
[   14.148097] 
[   14.148250] The buggy address belongs to the object at ffff8881039c5a00
[   14.148250]  which belongs to the cache kmalloc-64 of size 64
[   14.148803] The buggy address is located 0 bytes to the right of
[   14.148803]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.149400] 
[   14.149502] The buggy address belongs to the physical page:
[   14.149791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.150179] flags: 0x200000000000000(node=0|zone=2)
[   14.150632] page_type: f5(slab)
[   14.150782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.151137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.151557] page dumped because: kasan: bad access detected
[   14.151798] 
[   14.151912] Memory state around the buggy address:
[   14.152090]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.152530]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.152837] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.153099]                                      ^
[   14.153429]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.153716]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.154038] ==================================================================
[   14.958446] ==================================================================
[   14.958798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.959152] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.959492] 
[   14.959602] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.959642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.959654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.959676] Call Trace:
[   14.959689]  <TASK>
[   14.959702]  dump_stack_lvl+0x73/0xb0
[   14.959726]  print_report+0xd1/0x650
[   14.959749]  ? __virt_addr_valid+0x1db/0x2d0
[   14.959772]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.959793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.959816]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.959837]  kasan_report+0x141/0x180
[   14.959860]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.959886]  kasan_check_range+0x10c/0x1c0
[   14.959910]  __kasan_check_write+0x18/0x20
[   14.959930]  kasan_atomics_helper+0x16e7/0x5450
[   14.959954]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.959976]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.960001]  ? kasan_atomics+0x152/0x310
[   14.960027]  kasan_atomics+0x1dc/0x310
[   14.960050]  ? __pfx_kasan_atomics+0x10/0x10
[   14.960074]  ? __pfx_read_tsc+0x10/0x10
[   14.960095]  ? ktime_get_ts64+0x86/0x230
[   14.960240]  kunit_try_run_case+0x1a5/0x480
[   14.960275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.960313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.960338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.960370]  ? __kthread_parkme+0x82/0x180
[   14.960391]  ? preempt_count_sub+0x50/0x80
[   14.960426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.960450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.960475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.960499]  kthread+0x337/0x6f0
[   14.960528]  ? trace_preempt_on+0x20/0xc0
[   14.960552]  ? __pfx_kthread+0x10/0x10
[   14.960573]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.960606]  ? calculate_sigpending+0x7b/0xa0
[   14.960630]  ? __pfx_kthread+0x10/0x10
[   14.960652]  ret_from_fork+0x116/0x1d0
[   14.960680]  ? __pfx_kthread+0x10/0x10
[   14.960701]  ret_from_fork_asm+0x1a/0x30
[   14.960742]  </TASK>
[   14.960755] 
[   14.968502] Allocated by task 282:
[   14.968685]  kasan_save_stack+0x45/0x70
[   14.968889]  kasan_save_track+0x18/0x40
[   14.969086]  kasan_save_alloc_info+0x3b/0x50
[   14.969264]  __kasan_kmalloc+0xb7/0xc0
[   14.969402]  __kmalloc_cache_noprof+0x189/0x420
[   14.969560]  kasan_atomics+0x95/0x310
[   14.969695]  kunit_try_run_case+0x1a5/0x480
[   14.969842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.970074]  kthread+0x337/0x6f0
[   14.970313]  ret_from_fork+0x116/0x1d0
[   14.970549]  ret_from_fork_asm+0x1a/0x30
[   14.970785] 
[   14.970896] The buggy address belongs to the object at ffff8881039c5a00
[   14.970896]  which belongs to the cache kmalloc-64 of size 64
[   14.971464] The buggy address is located 0 bytes to the right of
[   14.971464]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.972020] 
[   14.972092] The buggy address belongs to the physical page:
[   14.972400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.972656] flags: 0x200000000000000(node=0|zone=2)
[   14.972823] page_type: f5(slab)
[   14.972952] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.973360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.973702] page dumped because: kasan: bad access detected
[   14.973981] 
[   14.974076] Memory state around the buggy address:
[   14.974342]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.974642]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.974960] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.975316]                                      ^
[   14.975544]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.975853]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976205] ==================================================================
[   14.313837] ==================================================================
[   14.314104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.314710] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.314933] 
[   14.315018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.315060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.315073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.315095] Call Trace:
[   14.315109]  <TASK>
[   14.315154]  dump_stack_lvl+0x73/0xb0
[   14.315183]  print_report+0xd1/0x650
[   14.315206]  ? __virt_addr_valid+0x1db/0x2d0
[   14.315272]  ? kasan_atomics_helper+0x860/0x5450
[   14.315378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.315456]  ? kasan_atomics_helper+0x860/0x5450
[   14.315525]  kasan_report+0x141/0x180
[   14.315548]  ? kasan_atomics_helper+0x860/0x5450
[   14.315575]  kasan_check_range+0x10c/0x1c0
[   14.315599]  __kasan_check_write+0x18/0x20
[   14.315620]  kasan_atomics_helper+0x860/0x5450
[   14.315643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.315666]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.315693]  ? kasan_atomics+0x152/0x310
[   14.315721]  kasan_atomics+0x1dc/0x310
[   14.315744]  ? __pfx_kasan_atomics+0x10/0x10
[   14.315770]  ? __pfx_read_tsc+0x10/0x10
[   14.315792]  ? ktime_get_ts64+0x86/0x230
[   14.315816]  kunit_try_run_case+0x1a5/0x480
[   14.315842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.315865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.315922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.315946]  ? __kthread_parkme+0x82/0x180
[   14.315968]  ? preempt_count_sub+0x50/0x80
[   14.315993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.316017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.316071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.316096]  kthread+0x337/0x6f0
[   14.316140]  ? trace_preempt_on+0x20/0xc0
[   14.316165]  ? __pfx_kthread+0x10/0x10
[   14.316187]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.316208]  ? calculate_sigpending+0x7b/0xa0
[   14.316233]  ? __pfx_kthread+0x10/0x10
[   14.316256]  ret_from_fork+0x116/0x1d0
[   14.316275]  ? __pfx_kthread+0x10/0x10
[   14.316353]  ret_from_fork_asm+0x1a/0x30
[   14.316387]  </TASK>
[   14.316399] 
[   14.327110] Allocated by task 282:
[   14.327283]  kasan_save_stack+0x45/0x70
[   14.327491]  kasan_save_track+0x18/0x40
[   14.327670]  kasan_save_alloc_info+0x3b/0x50
[   14.327869]  __kasan_kmalloc+0xb7/0xc0
[   14.328052]  __kmalloc_cache_noprof+0x189/0x420
[   14.328294]  kasan_atomics+0x95/0x310
[   14.328433]  kunit_try_run_case+0x1a5/0x480
[   14.328575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.328747]  kthread+0x337/0x6f0
[   14.328867]  ret_from_fork+0x116/0x1d0
[   14.329064]  ret_from_fork_asm+0x1a/0x30
[   14.329368] 
[   14.329599] The buggy address belongs to the object at ffff8881039c5a00
[   14.329599]  which belongs to the cache kmalloc-64 of size 64
[   14.330722] The buggy address is located 0 bytes to the right of
[   14.330722]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.331552] 
[   14.331711] The buggy address belongs to the physical page:
[   14.332013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.332559] flags: 0x200000000000000(node=0|zone=2)
[   14.332803] page_type: f5(slab)
[   14.333036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.333527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.333969] page dumped because: kasan: bad access detected
[   14.334249] 
[   14.334509] Memory state around the buggy address:
[   14.334739]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.335009]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.335655] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.336067]                                      ^
[   14.336413]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.336685]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.337022] ==================================================================
[   14.494445] ==================================================================
[   14.494707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.494933] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.495695] 
[   14.495828] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.495940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.495955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.496005] Call Trace:
[   14.496020]  <TASK>
[   14.496046]  dump_stack_lvl+0x73/0xb0
[   14.496087]  print_report+0xd1/0x650
[   14.496111]  ? __virt_addr_valid+0x1db/0x2d0
[   14.496145]  ? kasan_atomics_helper+0xd47/0x5450
[   14.496167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.496190]  ? kasan_atomics_helper+0xd47/0x5450
[   14.496212]  kasan_report+0x141/0x180
[   14.496235]  ? kasan_atomics_helper+0xd47/0x5450
[   14.496262]  kasan_check_range+0x10c/0x1c0
[   14.496287]  __kasan_check_write+0x18/0x20
[   14.496307]  kasan_atomics_helper+0xd47/0x5450
[   14.496330]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.496353]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.496379]  ? kasan_atomics+0x152/0x310
[   14.496406]  kasan_atomics+0x1dc/0x310
[   14.496429]  ? __pfx_kasan_atomics+0x10/0x10
[   14.496454]  ? __pfx_read_tsc+0x10/0x10
[   14.496553]  ? ktime_get_ts64+0x86/0x230
[   14.496598]  kunit_try_run_case+0x1a5/0x480
[   14.496623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.496646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.496671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.496694]  ? __kthread_parkme+0x82/0x180
[   14.496716]  ? preempt_count_sub+0x50/0x80
[   14.496740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.496764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.496788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.496812]  kthread+0x337/0x6f0
[   14.496832]  ? trace_preempt_on+0x20/0xc0
[   14.496856]  ? __pfx_kthread+0x10/0x10
[   14.496878]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.496899]  ? calculate_sigpending+0x7b/0xa0
[   14.496923]  ? __pfx_kthread+0x10/0x10
[   14.496945]  ret_from_fork+0x116/0x1d0
[   14.496965]  ? __pfx_kthread+0x10/0x10
[   14.496986]  ret_from_fork_asm+0x1a/0x30
[   14.497017]  </TASK>
[   14.497029] 
[   14.508052] Allocated by task 282:
[   14.508266]  kasan_save_stack+0x45/0x70
[   14.508900]  kasan_save_track+0x18/0x40
[   14.509110]  kasan_save_alloc_info+0x3b/0x50
[   14.509437]  __kasan_kmalloc+0xb7/0xc0
[   14.509579]  __kmalloc_cache_noprof+0x189/0x420
[   14.509794]  kasan_atomics+0x95/0x310
[   14.509985]  kunit_try_run_case+0x1a5/0x480
[   14.510277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.510651]  kthread+0x337/0x6f0
[   14.510787]  ret_from_fork+0x116/0x1d0
[   14.510969]  ret_from_fork_asm+0x1a/0x30
[   14.511223] 
[   14.511325] The buggy address belongs to the object at ffff8881039c5a00
[   14.511325]  which belongs to the cache kmalloc-64 of size 64
[   14.511920] The buggy address is located 0 bytes to the right of
[   14.511920]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.512558] 
[   14.512638] The buggy address belongs to the physical page:
[   14.512930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.513625] flags: 0x200000000000000(node=0|zone=2)
[   14.513892] page_type: f5(slab)
[   14.514091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.514360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.514747] page dumped because: kasan: bad access detected
[   14.515039] 
[   14.515134] Memory state around the buggy address:
[   14.515422]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.515774]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.516081] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.516425]                                      ^
[   14.516751]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.517106]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.517527] ==================================================================
[   15.066017] ==================================================================
[   15.066543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.066992] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.067444] 
[   15.067657] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.067705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.067721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.067895] Call Trace:
[   15.067915]  <TASK>
[   15.067932]  dump_stack_lvl+0x73/0xb0
[   15.067961]  print_report+0xd1/0x650
[   15.067985]  ? __virt_addr_valid+0x1db/0x2d0
[   15.068009]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.068031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.068054]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.068077]  kasan_report+0x141/0x180
[   15.068099]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.068158]  kasan_check_range+0x10c/0x1c0
[   15.068183]  __kasan_check_write+0x18/0x20
[   15.068203]  kasan_atomics_helper+0x19e3/0x5450
[   15.068227]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.068250]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.068277]  ? kasan_atomics+0x152/0x310
[   15.068303]  kasan_atomics+0x1dc/0x310
[   15.068327]  ? __pfx_kasan_atomics+0x10/0x10
[   15.068351]  ? __pfx_read_tsc+0x10/0x10
[   15.068372]  ? ktime_get_ts64+0x86/0x230
[   15.068397]  kunit_try_run_case+0x1a5/0x480
[   15.068422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.068444]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.068467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.068490]  ? __kthread_parkme+0x82/0x180
[   15.068513]  ? preempt_count_sub+0x50/0x80
[   15.068537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.068561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.068585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.068608]  kthread+0x337/0x6f0
[   15.068629]  ? trace_preempt_on+0x20/0xc0
[   15.068653]  ? __pfx_kthread+0x10/0x10
[   15.068674]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.068695]  ? calculate_sigpending+0x7b/0xa0
[   15.068718]  ? __pfx_kthread+0x10/0x10
[   15.068740]  ret_from_fork+0x116/0x1d0
[   15.068758]  ? __pfx_kthread+0x10/0x10
[   15.068780]  ret_from_fork_asm+0x1a/0x30
[   15.068810]  </TASK>
[   15.068822] 
[   15.079397] Allocated by task 282:
[   15.079644]  kasan_save_stack+0x45/0x70
[   15.079907]  kasan_save_track+0x18/0x40
[   15.080219]  kasan_save_alloc_info+0x3b/0x50
[   15.080502]  __kasan_kmalloc+0xb7/0xc0
[   15.080754]  __kmalloc_cache_noprof+0x189/0x420
[   15.081041]  kasan_atomics+0x95/0x310
[   15.081290]  kunit_try_run_case+0x1a5/0x480
[   15.081507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081756]  kthread+0x337/0x6f0
[   15.081911]  ret_from_fork+0x116/0x1d0
[   15.082058]  ret_from_fork_asm+0x1a/0x30
[   15.082571] 
[   15.082770] The buggy address belongs to the object at ffff8881039c5a00
[   15.082770]  which belongs to the cache kmalloc-64 of size 64
[   15.083429] The buggy address is located 0 bytes to the right of
[   15.083429]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.084206] 
[   15.084291] The buggy address belongs to the physical page:
[   15.084675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.085142] flags: 0x200000000000000(node=0|zone=2)
[   15.085467] page_type: f5(slab)
[   15.085714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.086168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.086597] page dumped because: kasan: bad access detected
[   15.086870] 
[   15.087096] Memory state around the buggy address:
[   15.087461]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.087778]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.088238] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.088606]                                      ^
[   15.088862]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.089305]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.089643] ==================================================================
[   14.867300] ==================================================================
[   14.867671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.868020] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.868386] 
[   14.868514] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.868556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.868569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.868602] Call Trace:
[   14.868614]  <TASK>
[   14.868628]  dump_stack_lvl+0x73/0xb0
[   14.868655]  print_report+0xd1/0x650
[   14.868689]  ? __virt_addr_valid+0x1db/0x2d0
[   14.868713]  ? kasan_atomics_helper+0x1467/0x5450
[   14.868735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.868766]  ? kasan_atomics_helper+0x1467/0x5450
[   14.868788]  kasan_report+0x141/0x180
[   14.868811]  ? kasan_atomics_helper+0x1467/0x5450
[   14.868847]  kasan_check_range+0x10c/0x1c0
[   14.868872]  __kasan_check_write+0x18/0x20
[   14.868892]  kasan_atomics_helper+0x1467/0x5450
[   14.868923]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.868946]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.868971]  ? kasan_atomics+0x152/0x310
[   14.869008]  kasan_atomics+0x1dc/0x310
[   14.869032]  ? __pfx_kasan_atomics+0x10/0x10
[   14.869057]  ? __pfx_read_tsc+0x10/0x10
[   14.869078]  ? ktime_get_ts64+0x86/0x230
[   14.869102]  kunit_try_run_case+0x1a5/0x480
[   14.869156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.869178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.869203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.869226]  ? __kthread_parkme+0x82/0x180
[   14.869248]  ? preempt_count_sub+0x50/0x80
[   14.869273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.869307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.869355]  kthread+0x337/0x6f0
[   14.869388]  ? trace_preempt_on+0x20/0xc0
[   14.869412]  ? __pfx_kthread+0x10/0x10
[   14.869433]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.869465]  ? calculate_sigpending+0x7b/0xa0
[   14.869489]  ? __pfx_kthread+0x10/0x10
[   14.869511]  ret_from_fork+0x116/0x1d0
[   14.869530]  ? __pfx_kthread+0x10/0x10
[   14.869551]  ret_from_fork_asm+0x1a/0x30
[   14.869581]  </TASK>
[   14.869593] 
[   14.877320] Allocated by task 282:
[   14.877524]  kasan_save_stack+0x45/0x70
[   14.877710]  kasan_save_track+0x18/0x40
[   14.877900]  kasan_save_alloc_info+0x3b/0x50
[   14.878051]  __kasan_kmalloc+0xb7/0xc0
[   14.878213]  __kmalloc_cache_noprof+0x189/0x420
[   14.878372]  kasan_atomics+0x95/0x310
[   14.878506]  kunit_try_run_case+0x1a5/0x480
[   14.878657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.878853]  kthread+0x337/0x6f0
[   14.879052]  ret_from_fork+0x116/0x1d0
[   14.879279]  ret_from_fork_asm+0x1a/0x30
[   14.879474] 
[   14.879576] The buggy address belongs to the object at ffff8881039c5a00
[   14.879576]  which belongs to the cache kmalloc-64 of size 64
[   14.880110] The buggy address is located 0 bytes to the right of
[   14.880110]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.880697] 
[   14.880783] The buggy address belongs to the physical page:
[   14.880960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.881242] flags: 0x200000000000000(node=0|zone=2)
[   14.881413] page_type: f5(slab)
[   14.881534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.881908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.882309] page dumped because: kasan: bad access detected
[   14.882589] 
[   14.882699] Memory state around the buggy address:
[   14.882924]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.883300]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.883642] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.883948]                                      ^
[   14.884181]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884503]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884823] ==================================================================
[   15.451986] ==================================================================
[   15.452368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.452668] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.452993] 
[   15.453149] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.453192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.453204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.453225] Call Trace:
[   15.453239]  <TASK>
[   15.453254]  dump_stack_lvl+0x73/0xb0
[   15.453281]  print_report+0xd1/0x650
[   15.453314]  ? __virt_addr_valid+0x1db/0x2d0
[   15.453339]  ? kasan_atomics_helper+0x224c/0x5450
[   15.453360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.453395]  ? kasan_atomics_helper+0x224c/0x5450
[   15.453417]  kasan_report+0x141/0x180
[   15.453440]  ? kasan_atomics_helper+0x224c/0x5450
[   15.453467]  kasan_check_range+0x10c/0x1c0
[   15.453501]  __kasan_check_write+0x18/0x20
[   15.453521]  kasan_atomics_helper+0x224c/0x5450
[   15.453544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.453577]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.453603]  ? kasan_atomics+0x152/0x310
[   15.453631]  kasan_atomics+0x1dc/0x310
[   15.453662]  ? __pfx_kasan_atomics+0x10/0x10
[   15.453687]  ? __pfx_read_tsc+0x10/0x10
[   15.453708]  ? ktime_get_ts64+0x86/0x230
[   15.453744]  kunit_try_run_case+0x1a5/0x480
[   15.453768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.453815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.453838]  ? __kthread_parkme+0x82/0x180
[   15.453869]  ? preempt_count_sub+0x50/0x80
[   15.453893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.453975]  kthread+0x337/0x6f0
[   15.453994]  ? trace_preempt_on+0x20/0xc0
[   15.454019]  ? __pfx_kthread+0x10/0x10
[   15.454040]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.454062]  ? calculate_sigpending+0x7b/0xa0
[   15.454086]  ? __pfx_kthread+0x10/0x10
[   15.454107]  ret_from_fork+0x116/0x1d0
[   15.454154]  ? __pfx_kthread+0x10/0x10
[   15.454176]  ret_from_fork_asm+0x1a/0x30
[   15.454206]  </TASK>
[   15.454217] 
[   15.461769] Allocated by task 282:
[   15.461916]  kasan_save_stack+0x45/0x70
[   15.462153]  kasan_save_track+0x18/0x40
[   15.462371]  kasan_save_alloc_info+0x3b/0x50
[   15.462555]  __kasan_kmalloc+0xb7/0xc0
[   15.462770]  __kmalloc_cache_noprof+0x189/0x420
[   15.462978]  kasan_atomics+0x95/0x310
[   15.463193]  kunit_try_run_case+0x1a5/0x480
[   15.463409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.463639]  kthread+0x337/0x6f0
[   15.463814]  ret_from_fork+0x116/0x1d0
[   15.464031]  ret_from_fork_asm+0x1a/0x30
[   15.464221] 
[   15.464293] The buggy address belongs to the object at ffff8881039c5a00
[   15.464293]  which belongs to the cache kmalloc-64 of size 64
[   15.464649] The buggy address is located 0 bytes to the right of
[   15.464649]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.465069] 
[   15.465195] The buggy address belongs to the physical page:
[   15.465488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.465909] flags: 0x200000000000000(node=0|zone=2)
[   15.466207] page_type: f5(slab)
[   15.466379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.466726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.467046] page dumped because: kasan: bad access detected
[   15.467257] 
[   15.467330] Memory state around the buggy address:
[   15.467487]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.467731]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.468080] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.468435]                                      ^
[   15.468690]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469018]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469380] ==================================================================
[   14.999020] ==================================================================
[   14.999345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.999669] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.999975] 
[   15.000077] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.000132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.000145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.000168] Call Trace:
[   15.000183]  <TASK>
[   15.000200]  dump_stack_lvl+0x73/0xb0
[   15.000226]  print_report+0xd1/0x650
[   15.000249]  ? __virt_addr_valid+0x1db/0x2d0
[   15.000273]  ? kasan_atomics_helper+0x1818/0x5450
[   15.000295]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.000319]  ? kasan_atomics_helper+0x1818/0x5450
[   15.000342]  kasan_report+0x141/0x180
[   15.000364]  ? kasan_atomics_helper+0x1818/0x5450
[   15.000390]  kasan_check_range+0x10c/0x1c0
[   15.000414]  __kasan_check_write+0x18/0x20
[   15.000433]  kasan_atomics_helper+0x1818/0x5450
[   15.000457]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.000479]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.000504]  ? kasan_atomics+0x152/0x310
[   15.000530]  kasan_atomics+0x1dc/0x310
[   15.000554]  ? __pfx_kasan_atomics+0x10/0x10
[   15.000578]  ? __pfx_read_tsc+0x10/0x10
[   15.000600]  ? ktime_get_ts64+0x86/0x230
[   15.000623]  kunit_try_run_case+0x1a5/0x480
[   15.000647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.000670]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.000693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.000717]  ? __kthread_parkme+0x82/0x180
[   15.000738]  ? preempt_count_sub+0x50/0x80
[   15.000761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.000785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.000808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.000833]  kthread+0x337/0x6f0
[   15.000852]  ? trace_preempt_on+0x20/0xc0
[   15.000876]  ? __pfx_kthread+0x10/0x10
[   15.000898]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.000921]  ? calculate_sigpending+0x7b/0xa0
[   15.000947]  ? __pfx_kthread+0x10/0x10
[   15.000971]  ret_from_fork+0x116/0x1d0
[   15.000992]  ? __pfx_kthread+0x10/0x10
[   15.001015]  ret_from_fork_asm+0x1a/0x30
[   15.001046]  </TASK>
[   15.001058] 
[   15.008819] Allocated by task 282:
[   15.009013]  kasan_save_stack+0x45/0x70
[   15.009276]  kasan_save_track+0x18/0x40
[   15.009451]  kasan_save_alloc_info+0x3b/0x50
[   15.009644]  __kasan_kmalloc+0xb7/0xc0
[   15.009812]  __kmalloc_cache_noprof+0x189/0x420
[   15.009985]  kasan_atomics+0x95/0x310
[   15.010221]  kunit_try_run_case+0x1a5/0x480
[   15.010401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.010586]  kthread+0x337/0x6f0
[   15.010768]  ret_from_fork+0x116/0x1d0
[   15.010954]  ret_from_fork_asm+0x1a/0x30
[   15.011192] 
[   15.011288] The buggy address belongs to the object at ffff8881039c5a00
[   15.011288]  which belongs to the cache kmalloc-64 of size 64
[   15.011696] The buggy address is located 0 bytes to the right of
[   15.011696]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.012069] 
[   15.012202] The buggy address belongs to the physical page:
[   15.012454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.012805] flags: 0x200000000000000(node=0|zone=2)
[   15.013037] page_type: f5(slab)
[   15.013233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.013468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.013697] page dumped because: kasan: bad access detected
[   15.013926] 
[   15.014022] Memory state around the buggy address:
[   15.014278]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.014605]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.014931] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.015265]                                      ^
[   15.015485]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.015759]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016033] ==================================================================
[   14.627079] ==================================================================
[   14.627527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.627929] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.628235] 
[   14.628410] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.628492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.628544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.628567] Call Trace:
[   14.628583]  <TASK>
[   14.628598]  dump_stack_lvl+0x73/0xb0
[   14.628638]  print_report+0xd1/0x650
[   14.628660]  ? __virt_addr_valid+0x1db/0x2d0
[   14.628684]  ? kasan_atomics_helper+0x1079/0x5450
[   14.628708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.628731]  ? kasan_atomics_helper+0x1079/0x5450
[   14.628753]  kasan_report+0x141/0x180
[   14.628805]  ? kasan_atomics_helper+0x1079/0x5450
[   14.628833]  kasan_check_range+0x10c/0x1c0
[   14.628858]  __kasan_check_write+0x18/0x20
[   14.628888]  kasan_atomics_helper+0x1079/0x5450
[   14.628911]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.628934]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.628960]  ? kasan_atomics+0x152/0x310
[   14.628987]  kasan_atomics+0x1dc/0x310
[   14.629011]  ? __pfx_kasan_atomics+0x10/0x10
[   14.629035]  ? __pfx_read_tsc+0x10/0x10
[   14.629084]  ? ktime_get_ts64+0x86/0x230
[   14.629136]  kunit_try_run_case+0x1a5/0x480
[   14.629162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.629185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.629209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.629231]  ? __kthread_parkme+0x82/0x180
[   14.629253]  ? preempt_count_sub+0x50/0x80
[   14.629278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.629301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.629341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.629365]  kthread+0x337/0x6f0
[   14.629387]  ? trace_preempt_on+0x20/0xc0
[   14.629413]  ? __pfx_kthread+0x10/0x10
[   14.629434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.629456]  ? calculate_sigpending+0x7b/0xa0
[   14.629480]  ? __pfx_kthread+0x10/0x10
[   14.629502]  ret_from_fork+0x116/0x1d0
[   14.629522]  ? __pfx_kthread+0x10/0x10
[   14.629543]  ret_from_fork_asm+0x1a/0x30
[   14.629573]  </TASK>
[   14.629585] 
[   14.639064] Allocated by task 282:
[   14.639304]  kasan_save_stack+0x45/0x70
[   14.639472]  kasan_save_track+0x18/0x40
[   14.639611]  kasan_save_alloc_info+0x3b/0x50
[   14.640034]  __kasan_kmalloc+0xb7/0xc0
[   14.640259]  __kmalloc_cache_noprof+0x189/0x420
[   14.640466]  kasan_atomics+0x95/0x310
[   14.640792]  kunit_try_run_case+0x1a5/0x480
[   14.641016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.641294]  kthread+0x337/0x6f0
[   14.641511]  ret_from_fork+0x116/0x1d0
[   14.641840]  ret_from_fork_asm+0x1a/0x30
[   14.642048] 
[   14.642206] The buggy address belongs to the object at ffff8881039c5a00
[   14.642206]  which belongs to the cache kmalloc-64 of size 64
[   14.642678] The buggy address is located 0 bytes to the right of
[   14.642678]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.643455] 
[   14.643583] The buggy address belongs to the physical page:
[   14.643846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.644209] flags: 0x200000000000000(node=0|zone=2)
[   14.644549] page_type: f5(slab)
[   14.644717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.645082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.645324] page dumped because: kasan: bad access detected
[   14.645643] 
[   14.645796] Memory state around the buggy address:
[   14.646026]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.646459]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.646797] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.647016]                                      ^
[   14.647553]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.647892]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.648183] ==================================================================
[   14.337632] ==================================================================
[   14.338003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.338488] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.339031] 
[   14.339158] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.339203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.339216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.339240] Call Trace:
[   14.339257]  <TASK>
[   14.339274]  dump_stack_lvl+0x73/0xb0
[   14.339302]  print_report+0xd1/0x650
[   14.339324]  ? __virt_addr_valid+0x1db/0x2d0
[   14.339419]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.339496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.339523]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.339546]  kasan_report+0x141/0x180
[   14.339569]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.339596]  kasan_check_range+0x10c/0x1c0
[   14.339620]  __kasan_check_write+0x18/0x20
[   14.339708]  kasan_atomics_helper+0x8f9/0x5450
[   14.339744]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.339767]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.339793]  ? kasan_atomics+0x152/0x310
[   14.339821]  kasan_atomics+0x1dc/0x310
[   14.339844]  ? __pfx_kasan_atomics+0x10/0x10
[   14.339869]  ? __pfx_read_tsc+0x10/0x10
[   14.339892]  ? ktime_get_ts64+0x86/0x230
[   14.339918]  kunit_try_run_case+0x1a5/0x480
[   14.339943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.339966]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.339990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.340013]  ? __kthread_parkme+0x82/0x180
[   14.340034]  ? preempt_count_sub+0x50/0x80
[   14.340058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.340082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.340139]  kthread+0x337/0x6f0
[   14.340159]  ? trace_preempt_on+0x20/0xc0
[   14.340184]  ? __pfx_kthread+0x10/0x10
[   14.340205]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.340227]  ? calculate_sigpending+0x7b/0xa0
[   14.340251]  ? __pfx_kthread+0x10/0x10
[   14.340274]  ret_from_fork+0x116/0x1d0
[   14.340293]  ? __pfx_kthread+0x10/0x10
[   14.340363]  ret_from_fork_asm+0x1a/0x30
[   14.340396]  </TASK>
[   14.340408] 
[   14.351173] Allocated by task 282:
[   14.351358]  kasan_save_stack+0x45/0x70
[   14.351639]  kasan_save_track+0x18/0x40
[   14.351837]  kasan_save_alloc_info+0x3b/0x50
[   14.352106]  __kasan_kmalloc+0xb7/0xc0
[   14.352372]  __kmalloc_cache_noprof+0x189/0x420
[   14.352826]  kasan_atomics+0x95/0x310
[   14.353030]  kunit_try_run_case+0x1a5/0x480
[   14.353258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353578]  kthread+0x337/0x6f0
[   14.353977]  ret_from_fork+0x116/0x1d0
[   14.354193]  ret_from_fork_asm+0x1a/0x30
[   14.354556] 
[   14.354716] The buggy address belongs to the object at ffff8881039c5a00
[   14.354716]  which belongs to the cache kmalloc-64 of size 64
[   14.355298] The buggy address is located 0 bytes to the right of
[   14.355298]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.356140] 
[   14.356254] The buggy address belongs to the physical page:
[   14.356484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.356850] flags: 0x200000000000000(node=0|zone=2)
[   14.357076] page_type: f5(slab)
[   14.357335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.357709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.358261] page dumped because: kasan: bad access detected
[   14.358589] 
[   14.358689] Memory state around the buggy address:
[   14.358859]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.359464]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.359772] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.360076]                                      ^
[   14.360503]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.360811]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.361237] ==================================================================
[   14.200582] ==================================================================
[   14.200998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.201398] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.201682] 
[   14.201807] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.201859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.201872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.201893] Call Trace:
[   14.201906]  <TASK>
[   14.201921]  dump_stack_lvl+0x73/0xb0
[   14.201947]  print_report+0xd1/0x650
[   14.201971]  ? __virt_addr_valid+0x1db/0x2d0
[   14.201995]  ? kasan_atomics_helper+0x565/0x5450
[   14.202017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.202040]  ? kasan_atomics_helper+0x565/0x5450
[   14.202062]  kasan_report+0x141/0x180
[   14.202085]  ? kasan_atomics_helper+0x565/0x5450
[   14.202120]  kasan_check_range+0x10c/0x1c0
[   14.202162]  __kasan_check_write+0x18/0x20
[   14.202182]  kasan_atomics_helper+0x565/0x5450
[   14.202206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.202239]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.202265]  ? kasan_atomics+0x152/0x310
[   14.202293]  kasan_atomics+0x1dc/0x310
[   14.202316]  ? __pfx_kasan_atomics+0x10/0x10
[   14.202411]  ? __pfx_read_tsc+0x10/0x10
[   14.202434]  ? ktime_get_ts64+0x86/0x230
[   14.202460]  kunit_try_run_case+0x1a5/0x480
[   14.202484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.202535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.202558]  ? __kthread_parkme+0x82/0x180
[   14.202580]  ? preempt_count_sub+0x50/0x80
[   14.202604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.202652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.202676]  kthread+0x337/0x6f0
[   14.202696]  ? trace_preempt_on+0x20/0xc0
[   14.202720]  ? __pfx_kthread+0x10/0x10
[   14.202751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.202774]  ? calculate_sigpending+0x7b/0xa0
[   14.202797]  ? __pfx_kthread+0x10/0x10
[   14.202829]  ret_from_fork+0x116/0x1d0
[   14.202851]  ? __pfx_kthread+0x10/0x10
[   14.202872]  ret_from_fork_asm+0x1a/0x30
[   14.202902]  </TASK>
[   14.202923] 
[   14.211058] Allocated by task 282:
[   14.211518]  kasan_save_stack+0x45/0x70
[   14.211777]  kasan_save_track+0x18/0x40
[   14.211978]  kasan_save_alloc_info+0x3b/0x50
[   14.212207]  __kasan_kmalloc+0xb7/0xc0
[   14.212473]  __kmalloc_cache_noprof+0x189/0x420
[   14.212674]  kasan_atomics+0x95/0x310
[   14.212852]  kunit_try_run_case+0x1a5/0x480
[   14.213078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.213413]  kthread+0x337/0x6f0
[   14.213609]  ret_from_fork+0x116/0x1d0
[   14.213798]  ret_from_fork_asm+0x1a/0x30
[   14.213983] 
[   14.214101] The buggy address belongs to the object at ffff8881039c5a00
[   14.214101]  which belongs to the cache kmalloc-64 of size 64
[   14.214538] The buggy address is located 0 bytes to the right of
[   14.214538]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.215051] 
[   14.215189] The buggy address belongs to the physical page:
[   14.215534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.215898] flags: 0x200000000000000(node=0|zone=2)
[   14.216153] page_type: f5(slab)
[   14.216542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.216905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.217227] page dumped because: kasan: bad access detected
[   14.217579] 
[   14.217685] Memory state around the buggy address:
[   14.217881]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.218216]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.218502] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.218780]                                      ^
[   14.219022]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.219450]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.219794] ==================================================================
[   14.113928] ==================================================================
[   14.114320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.114714] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.115017] 
[   14.115186] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.115228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.115241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.115264] Call Trace:
[   14.115277]  <TASK>
[   14.115342]  dump_stack_lvl+0x73/0xb0
[   14.115373]  print_report+0xd1/0x650
[   14.115408]  ? __virt_addr_valid+0x1db/0x2d0
[   14.115434]  ? kasan_atomics_helper+0x3df/0x5450
[   14.115455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.115489]  ? kasan_atomics_helper+0x3df/0x5450
[   14.115510]  kasan_report+0x141/0x180
[   14.115533]  ? kasan_atomics_helper+0x3df/0x5450
[   14.115559]  kasan_check_range+0x10c/0x1c0
[   14.115584]  __kasan_check_read+0x15/0x20
[   14.115603]  kasan_atomics_helper+0x3df/0x5450
[   14.115626]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.115648]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.115674]  ? kasan_atomics+0x152/0x310
[   14.115701]  kasan_atomics+0x1dc/0x310
[   14.115724]  ? __pfx_kasan_atomics+0x10/0x10
[   14.115758]  ? __pfx_read_tsc+0x10/0x10
[   14.115779]  ? ktime_get_ts64+0x86/0x230
[   14.115804]  kunit_try_run_case+0x1a5/0x480
[   14.115838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.115862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.115886]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.115909]  ? __kthread_parkme+0x82/0x180
[   14.115940]  ? preempt_count_sub+0x50/0x80
[   14.115965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.115988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.116021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.116045]  kthread+0x337/0x6f0
[   14.116065]  ? trace_preempt_on+0x20/0xc0
[   14.116097]  ? __pfx_kthread+0x10/0x10
[   14.116151]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.116173]  ? calculate_sigpending+0x7b/0xa0
[   14.116197]  ? __pfx_kthread+0x10/0x10
[   14.116219]  ret_from_fork+0x116/0x1d0
[   14.116239]  ? __pfx_kthread+0x10/0x10
[   14.116260]  ret_from_fork_asm+0x1a/0x30
[   14.116337]  </TASK>
[   14.116352] 
[   14.124905] Allocated by task 282:
[   14.125103]  kasan_save_stack+0x45/0x70
[   14.125421]  kasan_save_track+0x18/0x40
[   14.125649]  kasan_save_alloc_info+0x3b/0x50
[   14.125835]  __kasan_kmalloc+0xb7/0xc0
[   14.126010]  __kmalloc_cache_noprof+0x189/0x420
[   14.126253]  kasan_atomics+0x95/0x310
[   14.126535]  kunit_try_run_case+0x1a5/0x480
[   14.126742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.126945]  kthread+0x337/0x6f0
[   14.127070]  ret_from_fork+0x116/0x1d0
[   14.127239]  ret_from_fork_asm+0x1a/0x30
[   14.127524] 
[   14.127623] The buggy address belongs to the object at ffff8881039c5a00
[   14.127623]  which belongs to the cache kmalloc-64 of size 64
[   14.128168] The buggy address is located 0 bytes to the right of
[   14.128168]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.128556] 
[   14.128653] The buggy address belongs to the physical page:
[   14.129181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.129636] flags: 0x200000000000000(node=0|zone=2)
[   14.129898] page_type: f5(slab)
[   14.130069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.130447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.130753] page dumped because: kasan: bad access detected
[   14.131026] 
[   14.131144] Memory state around the buggy address:
[   14.131355]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.131682]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.132028] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.132352]                                      ^
[   14.132618]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.132941]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.133467] ==================================================================
[   15.264978] ==================================================================
[   15.265928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.266195] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.266427] 
[   15.266521] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.266565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.266579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.266600] Call Trace:
[   15.266618]  <TASK>
[   15.266636]  dump_stack_lvl+0x73/0xb0
[   15.266663]  print_report+0xd1/0x650
[   15.266686]  ? __virt_addr_valid+0x1db/0x2d0
[   15.266710]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.266732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.266754]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.266776]  kasan_report+0x141/0x180
[   15.266799]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.266826]  kasan_check_range+0x10c/0x1c0
[   15.266850]  __kasan_check_write+0x18/0x20
[   15.266870]  kasan_atomics_helper+0x1eaa/0x5450
[   15.266892]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.266915]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.266940]  ? kasan_atomics+0x152/0x310
[   15.266968]  kasan_atomics+0x1dc/0x310
[   15.266991]  ? __pfx_kasan_atomics+0x10/0x10
[   15.267016]  ? __pfx_read_tsc+0x10/0x10
[   15.267037]  ? ktime_get_ts64+0x86/0x230
[   15.267061]  kunit_try_run_case+0x1a5/0x480
[   15.267086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.267109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.267143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.267166]  ? __kthread_parkme+0x82/0x180
[   15.267187]  ? preempt_count_sub+0x50/0x80
[   15.267212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.267236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.267259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.267283]  kthread+0x337/0x6f0
[   15.267303]  ? trace_preempt_on+0x20/0xc0
[   15.267326]  ? __pfx_kthread+0x10/0x10
[   15.267347]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.267369]  ? calculate_sigpending+0x7b/0xa0
[   15.267393]  ? __pfx_kthread+0x10/0x10
[   15.267415]  ret_from_fork+0x116/0x1d0
[   15.267433]  ? __pfx_kthread+0x10/0x10
[   15.267454]  ret_from_fork_asm+0x1a/0x30
[   15.267484]  </TASK>
[   15.267496] 
[   15.280195] Allocated by task 282:
[   15.280510]  kasan_save_stack+0x45/0x70
[   15.280858]  kasan_save_track+0x18/0x40
[   15.281221]  kasan_save_alloc_info+0x3b/0x50
[   15.281672]  __kasan_kmalloc+0xb7/0xc0
[   15.282009]  __kmalloc_cache_noprof+0x189/0x420
[   15.282741]  kasan_atomics+0x95/0x310
[   15.282899]  kunit_try_run_case+0x1a5/0x480
[   15.283045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.283507]  kthread+0x337/0x6f0
[   15.283804]  ret_from_fork+0x116/0x1d0
[   15.284142]  ret_from_fork_asm+0x1a/0x30
[   15.285216] 
[   15.285592] The buggy address belongs to the object at ffff8881039c5a00
[   15.285592]  which belongs to the cache kmalloc-64 of size 64
[   15.286495] The buggy address is located 0 bytes to the right of
[   15.286495]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.288435] 
[   15.288522] The buggy address belongs to the physical page:
[   15.288705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.289042] flags: 0x200000000000000(node=0|zone=2)
[   15.289282] page_type: f5(slab)
[   15.289443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.289748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.290049] page dumped because: kasan: bad access detected
[   15.291859] 
[   15.291943] Memory state around the buggy address:
[   15.292108]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292739]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292963] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.293353]                                      ^
[   15.293813]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294479]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.295093] ==================================================================
[   14.180883] ==================================================================
[   14.181238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.181704] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.182046] 
[   14.182154] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.182199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.182212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.182235] Call Trace:
[   14.182263]  <TASK>
[   14.182279]  dump_stack_lvl+0x73/0xb0
[   14.182307]  print_report+0xd1/0x650
[   14.182343]  ? __virt_addr_valid+0x1db/0x2d0
[   14.182367]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.182389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.182412]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.182434]  kasan_report+0x141/0x180
[   14.182465]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.182507]  __asan_report_store4_noabort+0x1b/0x30
[   14.182581]  kasan_atomics_helper+0x4b3a/0x5450
[   14.182606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.182629]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.182655]  ? kasan_atomics+0x152/0x310
[   14.182683]  kasan_atomics+0x1dc/0x310
[   14.182706]  ? __pfx_kasan_atomics+0x10/0x10
[   14.182732]  ? __pfx_read_tsc+0x10/0x10
[   14.182754]  ? ktime_get_ts64+0x86/0x230
[   14.182778]  kunit_try_run_case+0x1a5/0x480
[   14.182803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.182851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.182874]  ? __kthread_parkme+0x82/0x180
[   14.182895]  ? preempt_count_sub+0x50/0x80
[   14.182920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.182967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.182991]  kthread+0x337/0x6f0
[   14.183021]  ? trace_preempt_on+0x20/0xc0
[   14.183045]  ? __pfx_kthread+0x10/0x10
[   14.183066]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.183099]  ? calculate_sigpending+0x7b/0xa0
[   14.183130]  ? __pfx_kthread+0x10/0x10
[   14.183153]  ret_from_fork+0x116/0x1d0
[   14.183172]  ? __pfx_kthread+0x10/0x10
[   14.183192]  ret_from_fork_asm+0x1a/0x30
[   14.183223]  </TASK>
[   14.183235] 
[   14.191760] Allocated by task 282:
[   14.191927]  kasan_save_stack+0x45/0x70
[   14.192162]  kasan_save_track+0x18/0x40
[   14.192356]  kasan_save_alloc_info+0x3b/0x50
[   14.192569]  __kasan_kmalloc+0xb7/0xc0
[   14.192787]  __kmalloc_cache_noprof+0x189/0x420
[   14.193004]  kasan_atomics+0x95/0x310
[   14.193240]  kunit_try_run_case+0x1a5/0x480
[   14.193502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.193684]  kthread+0x337/0x6f0
[   14.193807]  ret_from_fork+0x116/0x1d0
[   14.193990]  ret_from_fork_asm+0x1a/0x30
[   14.194221] 
[   14.194318] The buggy address belongs to the object at ffff8881039c5a00
[   14.194318]  which belongs to the cache kmalloc-64 of size 64
[   14.194760] The buggy address is located 0 bytes to the right of
[   14.194760]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.195685] 
[   14.195775] The buggy address belongs to the physical page:
[   14.195993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.196262] flags: 0x200000000000000(node=0|zone=2)
[   14.196541] page_type: f5(slab)
[   14.196709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.197053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.197665] page dumped because: kasan: bad access detected
[   14.197928] 
[   14.198016] Memory state around the buggy address:
[   14.198185]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.198639]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.198981] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.199274]                                      ^
[   14.199550]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.199790]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.200184] ==================================================================
[   14.154626] ==================================================================
[   14.154945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.155268] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.155777] 
[   14.155875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.155920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.155934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.155956] Call Trace:
[   14.155982]  <TASK>
[   14.155996]  dump_stack_lvl+0x73/0xb0
[   14.156025]  print_report+0xd1/0x650
[   14.156060]  ? __virt_addr_valid+0x1db/0x2d0
[   14.156084]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.156105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.156137]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.156159]  kasan_report+0x141/0x180
[   14.156182]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.156208]  kasan_check_range+0x10c/0x1c0
[   14.156233]  __kasan_check_write+0x18/0x20
[   14.156259]  kasan_atomics_helper+0x4a0/0x5450
[   14.156324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.156357]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.156382]  ? kasan_atomics+0x152/0x310
[   14.156461]  kasan_atomics+0x1dc/0x310
[   14.156488]  ? __pfx_kasan_atomics+0x10/0x10
[   14.156513]  ? __pfx_read_tsc+0x10/0x10
[   14.156534]  ? ktime_get_ts64+0x86/0x230
[   14.156558]  kunit_try_run_case+0x1a5/0x480
[   14.156582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.156605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.156628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.156651]  ? __kthread_parkme+0x82/0x180
[   14.156672]  ? preempt_count_sub+0x50/0x80
[   14.156695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.156731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.156754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.156779]  kthread+0x337/0x6f0
[   14.156810]  ? trace_preempt_on+0x20/0xc0
[   14.156842]  ? __pfx_kthread+0x10/0x10
[   14.156863]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.156884]  ? calculate_sigpending+0x7b/0xa0
[   14.156919]  ? __pfx_kthread+0x10/0x10
[   14.156940]  ret_from_fork+0x116/0x1d0
[   14.156959]  ? __pfx_kthread+0x10/0x10
[   14.156980]  ret_from_fork_asm+0x1a/0x30
[   14.157011]  </TASK>
[   14.157023] 
[   14.168550] Allocated by task 282:
[   14.168819]  kasan_save_stack+0x45/0x70
[   14.169139]  kasan_save_track+0x18/0x40
[   14.169558]  kasan_save_alloc_info+0x3b/0x50
[   14.169977]  __kasan_kmalloc+0xb7/0xc0
[   14.170192]  __kmalloc_cache_noprof+0x189/0x420
[   14.170842]  kasan_atomics+0x95/0x310
[   14.171345]  kunit_try_run_case+0x1a5/0x480
[   14.171699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.171883]  kthread+0x337/0x6f0
[   14.172005]  ret_from_fork+0x116/0x1d0
[   14.172203]  ret_from_fork_asm+0x1a/0x30
[   14.172647] 
[   14.172841] The buggy address belongs to the object at ffff8881039c5a00
[   14.172841]  which belongs to the cache kmalloc-64 of size 64
[   14.173998] The buggy address is located 0 bytes to the right of
[   14.173998]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.175039] 
[   14.175142] The buggy address belongs to the physical page:
[   14.175878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.176490] flags: 0x200000000000000(node=0|zone=2)
[   14.176664] page_type: f5(slab)
[   14.176787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.177020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.177287] page dumped because: kasan: bad access detected
[   14.177644] 
[   14.177787] Memory state around the buggy address:
[   14.178027]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.178371]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.178671] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.179045]                                      ^
[   14.179450]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179725]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180049] ==================================================================
[   15.339476] ==================================================================
[   15.340357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.341052] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   15.341714] 
[   15.341810] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.341854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.341867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.341889] Call Trace:
[   15.341905]  <TASK>
[   15.341921]  dump_stack_lvl+0x73/0xb0
[   15.341949]  print_report+0xd1/0x650
[   15.341971]  ? __virt_addr_valid+0x1db/0x2d0
[   15.341995]  ? kasan_atomics_helper+0x2006/0x5450
[   15.342017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.342039]  ? kasan_atomics_helper+0x2006/0x5450
[   15.342062]  kasan_report+0x141/0x180
[   15.342085]  ? kasan_atomics_helper+0x2006/0x5450
[   15.342111]  kasan_check_range+0x10c/0x1c0
[   15.342148]  __kasan_check_write+0x18/0x20
[   15.342200]  kasan_atomics_helper+0x2006/0x5450
[   15.342225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.342249]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.342301]  ? kasan_atomics+0x152/0x310
[   15.342329]  kasan_atomics+0x1dc/0x310
[   15.342364]  ? __pfx_kasan_atomics+0x10/0x10
[   15.342389]  ? __pfx_read_tsc+0x10/0x10
[   15.342410]  ? ktime_get_ts64+0x86/0x230
[   15.342434]  kunit_try_run_case+0x1a5/0x480
[   15.342458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.342504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.342534]  ? __kthread_parkme+0x82/0x180
[   15.342555]  ? preempt_count_sub+0x50/0x80
[   15.342580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.342627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.342651]  kthread+0x337/0x6f0
[   15.342671]  ? trace_preempt_on+0x20/0xc0
[   15.342695]  ? __pfx_kthread+0x10/0x10
[   15.342716]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.342738]  ? calculate_sigpending+0x7b/0xa0
[   15.342762]  ? __pfx_kthread+0x10/0x10
[   15.342784]  ret_from_fork+0x116/0x1d0
[   15.342803]  ? __pfx_kthread+0x10/0x10
[   15.342824]  ret_from_fork_asm+0x1a/0x30
[   15.342854]  </TASK>
[   15.342867] 
[   15.352002] Allocated by task 282:
[   15.352148]  kasan_save_stack+0x45/0x70
[   15.352432]  kasan_save_track+0x18/0x40
[   15.352644]  kasan_save_alloc_info+0x3b/0x50
[   15.352858]  __kasan_kmalloc+0xb7/0xc0
[   15.353023]  __kmalloc_cache_noprof+0x189/0x420
[   15.353287]  kasan_atomics+0x95/0x310
[   15.353533]  kunit_try_run_case+0x1a5/0x480
[   15.353805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.354085]  kthread+0x337/0x6f0
[   15.354324]  ret_from_fork+0x116/0x1d0
[   15.354539]  ret_from_fork_asm+0x1a/0x30
[   15.354779] 
[   15.354853] The buggy address belongs to the object at ffff8881039c5a00
[   15.354853]  which belongs to the cache kmalloc-64 of size 64
[   15.355250] The buggy address is located 0 bytes to the right of
[   15.355250]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   15.355855] 
[   15.355957] The buggy address belongs to the physical page:
[   15.356235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   15.356481] flags: 0x200000000000000(node=0|zone=2)
[   15.356717] page_type: f5(slab)
[   15.356886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.357252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.357482] page dumped because: kasan: bad access detected
[   15.357655] 
[   15.357731] Memory state around the buggy address:
[   15.357958]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358349]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358680] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.359162]                                      ^
[   15.359415]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359698]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359914] ==================================================================
[   14.249929] ==================================================================
[   14.250593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.251002] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.251501] 
[   14.251767] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.251813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.251828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.251851] Call Trace:
[   14.251867]  <TASK>
[   14.251883]  dump_stack_lvl+0x73/0xb0
[   14.251912]  print_report+0xd1/0x650
[   14.251967]  ? __virt_addr_valid+0x1db/0x2d0
[   14.251990]  ? kasan_atomics_helper+0x697/0x5450
[   14.252012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.252035]  ? kasan_atomics_helper+0x697/0x5450
[   14.252057]  kasan_report+0x141/0x180
[   14.252080]  ? kasan_atomics_helper+0x697/0x5450
[   14.252107]  kasan_check_range+0x10c/0x1c0
[   14.252154]  __kasan_check_write+0x18/0x20
[   14.252175]  kasan_atomics_helper+0x697/0x5450
[   14.252198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.252221]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.252247]  ? kasan_atomics+0x152/0x310
[   14.252275]  kasan_atomics+0x1dc/0x310
[   14.252298]  ? __pfx_kasan_atomics+0x10/0x10
[   14.252374]  ? __pfx_read_tsc+0x10/0x10
[   14.252395]  ? ktime_get_ts64+0x86/0x230
[   14.252420]  kunit_try_run_case+0x1a5/0x480
[   14.252444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.252467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.252491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.252514]  ? __kthread_parkme+0x82/0x180
[   14.252535]  ? preempt_count_sub+0x50/0x80
[   14.252560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.252584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.252608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.252631]  kthread+0x337/0x6f0
[   14.252651]  ? trace_preempt_on+0x20/0xc0
[   14.252675]  ? __pfx_kthread+0x10/0x10
[   14.252695]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.252718]  ? calculate_sigpending+0x7b/0xa0
[   14.252742]  ? __pfx_kthread+0x10/0x10
[   14.252767]  ret_from_fork+0x116/0x1d0
[   14.252787]  ? __pfx_kthread+0x10/0x10
[   14.252808]  ret_from_fork_asm+0x1a/0x30
[   14.252839]  </TASK>
[   14.252852] 
[   14.266616] Allocated by task 282:
[   14.266805]  kasan_save_stack+0x45/0x70
[   14.266994]  kasan_save_track+0x18/0x40
[   14.267163]  kasan_save_alloc_info+0x3b/0x50
[   14.267440]  __kasan_kmalloc+0xb7/0xc0
[   14.267637]  __kmalloc_cache_noprof+0x189/0x420
[   14.267830]  kasan_atomics+0x95/0x310
[   14.268016]  kunit_try_run_case+0x1a5/0x480
[   14.268219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.268453]  kthread+0x337/0x6f0
[   14.268605]  ret_from_fork+0x116/0x1d0
[   14.268738]  ret_from_fork_asm+0x1a/0x30
[   14.268878] 
[   14.268958] The buggy address belongs to the object at ffff8881039c5a00
[   14.268958]  which belongs to the cache kmalloc-64 of size 64
[   14.269616] The buggy address is located 0 bytes to the right of
[   14.269616]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.270035] 
[   14.270170] The buggy address belongs to the physical page:
[   14.270598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.270966] flags: 0x200000000000000(node=0|zone=2)
[   14.271206] page_type: f5(slab)
[   14.271450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.271699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.271999] page dumped because: kasan: bad access detected
[   14.272357] 
[   14.272459] Memory state around the buggy address:
[   14.272684]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.272915]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.273268] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.273640]                                      ^
[   14.273842]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.274088]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.274499] ==================================================================
[   14.293840] ==================================================================
[   14.294220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.294609] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.294932] 
[   14.295031] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.295073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.295087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.295108] Call Trace:
[   14.295134]  <TASK>
[   14.295151]  dump_stack_lvl+0x73/0xb0
[   14.295198]  print_report+0xd1/0x650
[   14.295223]  ? __virt_addr_valid+0x1db/0x2d0
[   14.295247]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.295271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.295355]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.295381]  kasan_report+0x141/0x180
[   14.295405]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.295432]  kasan_check_range+0x10c/0x1c0
[   14.295457]  __kasan_check_write+0x18/0x20
[   14.295478]  kasan_atomics_helper+0x7c7/0x5450
[   14.295501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.295523]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.295550]  ? kasan_atomics+0x152/0x310
[   14.295578]  kasan_atomics+0x1dc/0x310
[   14.295601]  ? __pfx_kasan_atomics+0x10/0x10
[   14.295626]  ? __pfx_read_tsc+0x10/0x10
[   14.295648]  ? ktime_get_ts64+0x86/0x230
[   14.295671]  kunit_try_run_case+0x1a5/0x480
[   14.295696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.295718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.295743]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.295766]  ? __kthread_parkme+0x82/0x180
[   14.295787]  ? preempt_count_sub+0x50/0x80
[   14.295811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.295835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.295859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.295883]  kthread+0x337/0x6f0
[   14.295903]  ? trace_preempt_on+0x20/0xc0
[   14.295927]  ? __pfx_kthread+0x10/0x10
[   14.295948]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.295970]  ? calculate_sigpending+0x7b/0xa0
[   14.295993]  ? __pfx_kthread+0x10/0x10
[   14.296015]  ret_from_fork+0x116/0x1d0
[   14.296034]  ? __pfx_kthread+0x10/0x10
[   14.296054]  ret_from_fork_asm+0x1a/0x30
[   14.296084]  </TASK>
[   14.296097] 
[   14.304674] Allocated by task 282:
[   14.304881]  kasan_save_stack+0x45/0x70
[   14.305076]  kasan_save_track+0x18/0x40
[   14.305372]  kasan_save_alloc_info+0x3b/0x50
[   14.305592]  __kasan_kmalloc+0xb7/0xc0
[   14.305779]  __kmalloc_cache_noprof+0x189/0x420
[   14.305998]  kasan_atomics+0x95/0x310
[   14.306220]  kunit_try_run_case+0x1a5/0x480
[   14.306478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.306663]  kthread+0x337/0x6f0
[   14.306864]  ret_from_fork+0x116/0x1d0
[   14.307075]  ret_from_fork_asm+0x1a/0x30
[   14.307305] 
[   14.307423] The buggy address belongs to the object at ffff8881039c5a00
[   14.307423]  which belongs to the cache kmalloc-64 of size 64
[   14.307955] The buggy address is located 0 bytes to the right of
[   14.307955]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.308634] 
[   14.308779] The buggy address belongs to the physical page:
[   14.308968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.309622] flags: 0x200000000000000(node=0|zone=2)
[   14.309806] page_type: f5(slab)
[   14.310016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.310410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.310823] page dumped because: kasan: bad access detected
[   14.311079] 
[   14.311234] Memory state around the buggy address:
[   14.311564]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.311901]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.312239] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.312664]                                      ^
[   14.312823]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.313058]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.313377] ==================================================================
[   14.669856] ==================================================================
[   14.670239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.670808] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282
[   14.671080] 
[   14.671316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.671376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.671426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.671450] Call Trace:
[   14.671469]  <TASK>
[   14.671497]  dump_stack_lvl+0x73/0xb0
[   14.671528]  print_report+0xd1/0x650
[   14.671551]  ? __virt_addr_valid+0x1db/0x2d0
[   14.671575]  ? kasan_atomics_helper+0x1148/0x5450
[   14.671596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.671619]  ? kasan_atomics_helper+0x1148/0x5450
[   14.671641]  kasan_report+0x141/0x180
[   14.671664]  ? kasan_atomics_helper+0x1148/0x5450
[   14.671691]  kasan_check_range+0x10c/0x1c0
[   14.671715]  __kasan_check_write+0x18/0x20
[   14.671734]  kasan_atomics_helper+0x1148/0x5450
[   14.671757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.671779]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.671804]  ? kasan_atomics+0x152/0x310
[   14.671832]  kasan_atomics+0x1dc/0x310
[   14.671855]  ? __pfx_kasan_atomics+0x10/0x10
[   14.671880]  ? __pfx_read_tsc+0x10/0x10
[   14.671901]  ? ktime_get_ts64+0x86/0x230
[   14.671926]  kunit_try_run_case+0x1a5/0x480
[   14.671950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.671972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.671995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.672019]  ? __kthread_parkme+0x82/0x180
[   14.672040]  ? preempt_count_sub+0x50/0x80
[   14.672065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.672089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.672112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.672237]  kthread+0x337/0x6f0
[   14.672265]  ? trace_preempt_on+0x20/0xc0
[   14.672303]  ? __pfx_kthread+0x10/0x10
[   14.672324]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.672388]  ? calculate_sigpending+0x7b/0xa0
[   14.672416]  ? __pfx_kthread+0x10/0x10
[   14.672438]  ret_from_fork+0x116/0x1d0
[   14.672457]  ? __pfx_kthread+0x10/0x10
[   14.672478]  ret_from_fork_asm+0x1a/0x30
[   14.672509]  </TASK>
[   14.672520] 
[   14.685137] Allocated by task 282:
[   14.685753]  kasan_save_stack+0x45/0x70
[   14.685981]  kasan_save_track+0x18/0x40
[   14.686379]  kasan_save_alloc_info+0x3b/0x50
[   14.686783]  __kasan_kmalloc+0xb7/0xc0
[   14.687084]  __kmalloc_cache_noprof+0x189/0x420
[   14.687616]  kasan_atomics+0x95/0x310
[   14.687808]  kunit_try_run_case+0x1a5/0x480
[   14.687974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688539]  kthread+0x337/0x6f0
[   14.688687]  ret_from_fork+0x116/0x1d0
[   14.689019]  ret_from_fork_asm+0x1a/0x30
[   14.689499] 
[   14.689600] The buggy address belongs to the object at ffff8881039c5a00
[   14.689600]  which belongs to the cache kmalloc-64 of size 64
[   14.690392] The buggy address is located 0 bytes to the right of
[   14.690392]  allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30)
[   14.691268] 
[   14.691369] The buggy address belongs to the physical page:
[   14.691760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5
[   14.692119] flags: 0x200000000000000(node=0|zone=2)
[   14.692685] page_type: f5(slab)
[   14.693004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.693469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.693864] page dumped because: kasan: bad access detected
[   14.694109] 
[   14.694260] Memory state around the buggy address:
[   14.694869]  ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695362]  ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695965] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.696545]                                      ^
[   14.696886]  ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697395]  ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697821] ==================================================================