Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.848911] ==================================================================
[   18.848964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.849103] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.849163] 
[   18.849194] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.849286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.849325] Hardware name: linux,dummy-virt (DT)
[   18.849360] Call trace:
[   18.849383]  show_stack+0x20/0x38 (C)
[   18.849435]  dump_stack_lvl+0x8c/0xd0
[   18.849482]  print_report+0x118/0x608
[   18.849531]  kasan_report+0xdc/0x128
[   18.849578]  kasan_check_range+0x100/0x1a8
[   18.849629]  __kasan_check_write+0x20/0x30
[   18.849675]  kasan_atomics_helper+0x14e4/0x4858
[   18.849726]  kasan_atomics+0x198/0x2e0
[   18.849775]  kunit_try_run_case+0x170/0x3f0
[   18.849827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.849883]  kthread+0x328/0x630
[   18.849933]  ret_from_fork+0x10/0x20
[   18.849990] 
[   18.850011] Allocated by task 265:
[   18.850042]  kasan_save_stack+0x3c/0x68
[   18.850094]  kasan_save_track+0x20/0x40
[   18.850150]  kasan_save_alloc_info+0x40/0x58
[   18.850193]  __kasan_kmalloc+0xd4/0xd8
[   18.850233]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.850273]  kasan_atomics+0xb8/0x2e0
[   18.850313]  kunit_try_run_case+0x170/0x3f0
[   18.850361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.850408]  kthread+0x328/0x630
[   18.850441]  ret_from_fork+0x10/0x20
[   18.850485] 
[   18.850508] The buggy address belongs to the object at fff00000c635c500
[   18.850508]  which belongs to the cache kmalloc-64 of size 64
[   18.850567] The buggy address is located 0 bytes to the right of
[   18.850567]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.850640] 
[   18.850662] The buggy address belongs to the physical page:
[   18.850695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.850747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.850796] page_type: f5(slab)
[   18.850835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.850897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.850941] page dumped because: kasan: bad access detected
[   18.850975] 
[   18.850996] Memory state around the buggy address:
[   18.851045]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.851474]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.851831] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.851990]                                      ^
[   18.852114]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.852214]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.852305] ==================================================================
[   18.744358] ==================================================================
[   18.744429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.744483] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.744546] 
[   18.744584] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.744676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.744729] Hardware name: linux,dummy-virt (DT)
[   18.744778] Call trace:
[   18.744817]  show_stack+0x20/0x38 (C)
[   18.744877]  dump_stack_lvl+0x8c/0xd0
[   18.744936]  print_report+0x118/0x608
[   18.744989]  kasan_report+0xdc/0x128
[   18.745036]  __asan_report_load8_noabort+0x20/0x30
[   18.745103]  kasan_atomics_helper+0x3f58/0x4858
[   18.745193]  kasan_atomics+0x198/0x2e0
[   18.745355]  kunit_try_run_case+0x170/0x3f0
[   18.745418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.745484]  kthread+0x328/0x630
[   18.745539]  ret_from_fork+0x10/0x20
[   18.745597] 
[   18.745620] Allocated by task 265:
[   18.745660]  kasan_save_stack+0x3c/0x68
[   18.748121]  kasan_save_track+0x20/0x40
[   18.748763]  kasan_save_alloc_info+0x40/0x58
[   18.749109]  __kasan_kmalloc+0xd4/0xd8
[   18.749248]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.749293]  kasan_atomics+0xb8/0x2e0
[   18.749769]  kunit_try_run_case+0x170/0x3f0
[   18.751099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.751171]  kthread+0x328/0x630
[   18.751208]  ret_from_fork+0x10/0x20
[   18.751246] 
[   18.751270] The buggy address belongs to the object at fff00000c635c500
[   18.751270]  which belongs to the cache kmalloc-64 of size 64
[   18.751381] The buggy address is located 0 bytes to the right of
[   18.751381]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.751928] 
[   18.751978] The buggy address belongs to the physical page:
[   18.752012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.752069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.752159] page_type: f5(slab)
[   18.752202] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.752383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.752454] page dumped because: kasan: bad access detected
[   18.752521] 
[   18.752562] Memory state around the buggy address:
[   18.752653]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.752729]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.752793] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.753055]                                      ^
[   18.753134]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.753200]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.753303] ==================================================================
[   18.857612] ==================================================================
[   18.857669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.857720] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.857849] 
[   18.857988] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.858156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.858226] Hardware name: linux,dummy-virt (DT)
[   18.858309] Call trace:
[   18.858348]  show_stack+0x20/0x38 (C)
[   18.858435]  dump_stack_lvl+0x8c/0xd0
[   18.858548]  print_report+0x118/0x608
[   18.858649]  kasan_report+0xdc/0x128
[   18.858709]  kasan_check_range+0x100/0x1a8
[   18.858784]  __kasan_check_write+0x20/0x30
[   18.858842]  kasan_atomics_helper+0x15b4/0x4858
[   18.858894]  kasan_atomics+0x198/0x2e0
[   18.858943]  kunit_try_run_case+0x170/0x3f0
[   18.858991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.859189]  kthread+0x328/0x630
[   18.859417]  ret_from_fork+0x10/0x20
[   18.859505] 
[   18.859750] Allocated by task 265:
[   18.859841]  kasan_save_stack+0x3c/0x68
[   18.859933]  kasan_save_track+0x20/0x40
[   18.860033]  kasan_save_alloc_info+0x40/0x58
[   18.860145]  __kasan_kmalloc+0xd4/0xd8
[   18.860234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.860308]  kasan_atomics+0xb8/0x2e0
[   18.860377]  kunit_try_run_case+0x170/0x3f0
[   18.860473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.860579]  kthread+0x328/0x630
[   18.860632]  ret_from_fork+0x10/0x20
[   18.860671] 
[   18.860797] The buggy address belongs to the object at fff00000c635c500
[   18.860797]  which belongs to the cache kmalloc-64 of size 64
[   18.861058] The buggy address is located 0 bytes to the right of
[   18.861058]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.861163] 
[   18.861337] The buggy address belongs to the physical page:
[   18.861497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.861595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.861645] page_type: f5(slab)
[   18.861691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.861871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.862086] page dumped because: kasan: bad access detected
[   18.862197] 
[   18.862257] Memory state around the buggy address:
[   18.862533]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.862639]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.862721] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.862764]                                      ^
[   18.862799]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.862843]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.862881] ==================================================================
[   18.775059] ==================================================================
[   18.775129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.775182] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.775243] 
[   18.775287] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.775373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.775400] Hardware name: linux,dummy-virt (DT)
[   18.775434] Call trace:
[   18.775458]  show_stack+0x20/0x38 (C)
[   18.775510]  dump_stack_lvl+0x8c/0xd0
[   18.775559]  print_report+0x118/0x608
[   18.775609]  kasan_report+0xdc/0x128
[   18.775656]  kasan_check_range+0x100/0x1a8
[   18.775729]  __kasan_check_write+0x20/0x30
[   18.775779]  kasan_atomics_helper+0xf88/0x4858
[   18.775829]  kasan_atomics+0x198/0x2e0
[   18.775877]  kunit_try_run_case+0x170/0x3f0
[   18.775931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.775989]  kthread+0x328/0x630
[   18.776041]  ret_from_fork+0x10/0x20
[   18.776110] 
[   18.776131] Allocated by task 265:
[   18.776160]  kasan_save_stack+0x3c/0x68
[   18.776204]  kasan_save_track+0x20/0x40
[   18.776243]  kasan_save_alloc_info+0x40/0x58
[   18.776297]  __kasan_kmalloc+0xd4/0xd8
[   18.776335]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.776377]  kasan_atomics+0xb8/0x2e0
[   18.776415]  kunit_try_run_case+0x170/0x3f0
[   18.776456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.776503]  kthread+0x328/0x630
[   18.776544]  ret_from_fork+0x10/0x20
[   18.776586] 
[   18.776607] The buggy address belongs to the object at fff00000c635c500
[   18.776607]  which belongs to the cache kmalloc-64 of size 64
[   18.776680] The buggy address is located 0 bytes to the right of
[   18.776680]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.776745] 
[   18.776767] The buggy address belongs to the physical page:
[   18.776800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.776864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.776916] page_type: f5(slab)
[   18.776957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.777009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.777052] page dumped because: kasan: bad access detected
[   18.777494] 
[   18.777529] Memory state around the buggy address:
[   18.777877]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.778241]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.778287] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.778340]                                      ^
[   18.778374]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.778421]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.778461] ==================================================================
[   18.824467] ==================================================================
[   18.824520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.824592] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.824803] 
[   18.824845] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.825052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.825093] Hardware name: linux,dummy-virt (DT)
[   18.825229] Call trace:
[   18.825304]  show_stack+0x20/0x38 (C)
[   18.825403]  dump_stack_lvl+0x8c/0xd0
[   18.825465]  print_report+0x118/0x608
[   18.825540]  kasan_report+0xdc/0x128
[   18.828207]  kasan_check_range+0x100/0x1a8
[   18.828670]  __kasan_check_write+0x20/0x30
[   18.828739]  kasan_atomics_helper+0x1384/0x4858
[   18.829014]  kasan_atomics+0x198/0x2e0
[   18.829159]  kunit_try_run_case+0x170/0x3f0
[   18.829216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.829286]  kthread+0x328/0x630
[   18.829330]  ret_from_fork+0x10/0x20
[   18.829418] 
[   18.829440] Allocated by task 265:
[   18.829470]  kasan_save_stack+0x3c/0x68
[   18.829515]  kasan_save_track+0x20/0x40
[   18.829714]  kasan_save_alloc_info+0x40/0x58
[   18.829759]  __kasan_kmalloc+0xd4/0xd8
[   18.830216]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.830569]  kasan_atomics+0xb8/0x2e0
[   18.830621]  kunit_try_run_case+0x170/0x3f0
[   18.831185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.831265]  kthread+0x328/0x630
[   18.831542]  ret_from_fork+0x10/0x20
[   18.831590] 
[   18.831616] The buggy address belongs to the object at fff00000c635c500
[   18.831616]  which belongs to the cache kmalloc-64 of size 64
[   18.831678] The buggy address is located 0 bytes to the right of
[   18.831678]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.831898] 
[   18.831957] The buggy address belongs to the physical page:
[   18.832028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.832125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.832212] page_type: f5(slab)
[   18.832275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.832481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.832627] page dumped because: kasan: bad access detected
[   18.832704] 
[   18.832815] Memory state around the buggy address:
[   18.832891]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.832938]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.832983] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.833190]                                      ^
[   18.833273]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.833392]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.833532] ==================================================================
[   18.883449] ==================================================================
[   18.883506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.883560] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.883627] 
[   18.883799] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.884098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.884190] Hardware name: linux,dummy-virt (DT)
[   18.884227] Call trace:
[   18.884252]  show_stack+0x20/0x38 (C)
[   18.884306]  dump_stack_lvl+0x8c/0xd0
[   18.884372]  print_report+0x118/0x608
[   18.884439]  kasan_report+0xdc/0x128
[   18.884495]  kasan_check_range+0x100/0x1a8
[   18.884709]  __kasan_check_write+0x20/0x30
[   18.884789]  kasan_atomics_helper+0x16d0/0x4858
[   18.884843]  kasan_atomics+0x198/0x2e0
[   18.884899]  kunit_try_run_case+0x170/0x3f0
[   18.884966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.885031]  kthread+0x328/0x630
[   18.885089]  ret_from_fork+0x10/0x20
[   18.885147] 
[   18.885176] Allocated by task 265:
[   18.885214]  kasan_save_stack+0x3c/0x68
[   18.885291]  kasan_save_track+0x20/0x40
[   18.885333]  kasan_save_alloc_info+0x40/0x58
[   18.885383]  __kasan_kmalloc+0xd4/0xd8
[   18.885476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.885519]  kasan_atomics+0xb8/0x2e0
[   18.885558]  kunit_try_run_case+0x170/0x3f0
[   18.885598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.885913]  kthread+0x328/0x630
[   18.885996]  ret_from_fork+0x10/0x20
[   18.886048] 
[   18.886092] The buggy address belongs to the object at fff00000c635c500
[   18.886092]  which belongs to the cache kmalloc-64 of size 64
[   18.886167] The buggy address is located 0 bytes to the right of
[   18.886167]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.886410] 
[   18.886441] The buggy address belongs to the physical page:
[   18.886477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.886534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.886585] page_type: f5(slab)
[   18.886790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.886877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.886974] page dumped because: kasan: bad access detected
[   18.887032] 
[   18.887366] Memory state around the buggy address:
[   18.887434]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.887500]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.887563] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.887617]                                      ^
[   18.887654]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.887724]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.887776] ==================================================================
[   18.779317] ==================================================================
[   18.779394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.779449] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.779499] 
[   18.779533] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.779616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.779645] Hardware name: linux,dummy-virt (DT)
[   18.779823] Call trace:
[   18.779858]  show_stack+0x20/0x38 (C)
[   18.779931]  dump_stack_lvl+0x8c/0xd0
[   18.779983]  print_report+0x118/0x608
[   18.780042]  kasan_report+0xdc/0x128
[   18.780266]  kasan_check_range+0x100/0x1a8
[   18.780333]  __kasan_check_write+0x20/0x30
[   18.780409]  kasan_atomics_helper+0xff0/0x4858
[   18.780461]  kasan_atomics+0x198/0x2e0
[   18.780514]  kunit_try_run_case+0x170/0x3f0
[   18.780570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.780635]  kthread+0x328/0x630
[   18.780687]  ret_from_fork+0x10/0x20
[   18.780739] 
[   18.780759] Allocated by task 265:
[   18.780797]  kasan_save_stack+0x3c/0x68
[   18.780849]  kasan_save_track+0x20/0x40
[   18.780896]  kasan_save_alloc_info+0x40/0x58
[   18.780940]  __kasan_kmalloc+0xd4/0xd8
[   18.780989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.781039]  kasan_atomics+0xb8/0x2e0
[   18.781090]  kunit_try_run_case+0x170/0x3f0
[   18.781131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.781271]  kthread+0x328/0x630
[   18.781310]  ret_from_fork+0x10/0x20
[   18.781457] 
[   18.781506] The buggy address belongs to the object at fff00000c635c500
[   18.781506]  which belongs to the cache kmalloc-64 of size 64
[   18.781592] The buggy address is located 0 bytes to the right of
[   18.781592]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.781658] 
[   18.781811] The buggy address belongs to the physical page:
[   18.781870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.781932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.782049] page_type: f5(slab)
[   18.782099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.782180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.782223] page dumped because: kasan: bad access detected
[   18.782257] 
[   18.782306] Memory state around the buggy address:
[   18.782340]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.782386]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.782601] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.782679]                                      ^
[   18.782734]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.782795]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.782837] ==================================================================
[   18.863653] ==================================================================
[   18.866268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.866352] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.867183] 
[   18.867788] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.868353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.868437] Hardware name: linux,dummy-virt (DT)
[   18.868482] Call trace:
[   18.868532]  show_stack+0x20/0x38 (C)
[   18.868655]  dump_stack_lvl+0x8c/0xd0
[   18.868731]  print_report+0x118/0x608
[   18.868848]  kasan_report+0xdc/0x128
[   18.868935]  __asan_report_load8_noabort+0x20/0x30
[   18.868993]  kasan_atomics_helper+0x3db0/0x4858
[   18.869045]  kasan_atomics+0x198/0x2e0
[   18.869341]  kunit_try_run_case+0x170/0x3f0
[   18.869470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.869568]  kthread+0x328/0x630
[   18.869612]  ret_from_fork+0x10/0x20
[   18.869683] 
[   18.869719] Allocated by task 265:
[   18.869749]  kasan_save_stack+0x3c/0x68
[   18.869795]  kasan_save_track+0x20/0x40
[   18.869849]  kasan_save_alloc_info+0x40/0x58
[   18.869892]  __kasan_kmalloc+0xd4/0xd8
[   18.869946]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.869998]  kasan_atomics+0xb8/0x2e0
[   18.870035]  kunit_try_run_case+0x170/0x3f0
[   18.870089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.870135]  kthread+0x328/0x630
[   18.870181]  ret_from_fork+0x10/0x20
[   18.870218] 
[   18.870261] The buggy address belongs to the object at fff00000c635c500
[   18.870261]  which belongs to the cache kmalloc-64 of size 64
[   18.870323] The buggy address is located 0 bytes to the right of
[   18.870323]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.870389] 
[   18.870413] The buggy address belongs to the physical page:
[   18.870447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.870512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.870565] page_type: f5(slab)
[   18.870606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.870660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.870704] page dumped because: kasan: bad access detected
[   18.870737] 
[   18.870767] Memory state around the buggy address:
[   18.870802]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.870854]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.870899] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.870942]                                      ^
[   18.871006]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.871049]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.871976] ==================================================================
[   18.726659] ==================================================================
[   18.726725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.726782] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.726834] 
[   18.726886] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.726969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.726998] Hardware name: linux,dummy-virt (DT)
[   18.727183] Call trace:
[   18.727304]  show_stack+0x20/0x38 (C)
[   18.727419]  dump_stack_lvl+0x8c/0xd0
[   18.727486]  print_report+0x118/0x608
[   18.727540]  kasan_report+0xdc/0x128
[   18.727747]  kasan_check_range+0x100/0x1a8
[   18.727802]  __kasan_check_write+0x20/0x30
[   18.727989]  kasan_atomics_helper+0xd3c/0x4858
[   18.728103]  kasan_atomics+0x198/0x2e0
[   18.728160]  kunit_try_run_case+0x170/0x3f0
[   18.728211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.728275]  kthread+0x328/0x630
[   18.728331]  ret_from_fork+0x10/0x20
[   18.728388] 
[   18.728417] Allocated by task 265:
[   18.728454]  kasan_save_stack+0x3c/0x68
[   18.728499]  kasan_save_track+0x20/0x40
[   18.728555]  kasan_save_alloc_info+0x40/0x58
[   18.728650]  __kasan_kmalloc+0xd4/0xd8
[   18.728692]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.728735]  kasan_atomics+0xb8/0x2e0
[   18.728772]  kunit_try_run_case+0x170/0x3f0
[   18.728813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.728859]  kthread+0x328/0x630
[   18.729110]  ret_from_fork+0x10/0x20
[   18.729262] 
[   18.729290] The buggy address belongs to the object at fff00000c635c500
[   18.729290]  which belongs to the cache kmalloc-64 of size 64
[   18.729707] The buggy address is located 0 bytes to the right of
[   18.729707]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.730054] 
[   18.730110] The buggy address belongs to the physical page:
[   18.730153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.730208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.730285] page_type: f5(slab)
[   18.730327] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.730377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.730419] page dumped because: kasan: bad access detected
[   18.730768] 
[   18.730818] Memory state around the buggy address:
[   18.730875]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.730952]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.731036] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.731076]                                      ^
[   18.731122]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.731284]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.731328] ==================================================================
[   18.763259] ==================================================================
[   18.763312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.763370] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.763456] 
[   18.763495] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.763589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.763754] Hardware name: linux,dummy-virt (DT)
[   18.763791] Call trace:
[   18.763920]  show_stack+0x20/0x38 (C)
[   18.763996]  dump_stack_lvl+0x8c/0xd0
[   18.764052]  print_report+0x118/0x608
[   18.764132]  kasan_report+0xdc/0x128
[   18.764189]  kasan_check_range+0x100/0x1a8
[   18.764241]  __kasan_check_write+0x20/0x30
[   18.764298]  kasan_atomics_helper+0xeb8/0x4858
[   18.764363]  kasan_atomics+0x198/0x2e0
[   18.764419]  kunit_try_run_case+0x170/0x3f0
[   18.764475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.764538]  kthread+0x328/0x630
[   18.764630]  ret_from_fork+0x10/0x20
[   18.764682] 
[   18.764702] Allocated by task 265:
[   18.764731]  kasan_save_stack+0x3c/0x68
[   18.764790]  kasan_save_track+0x20/0x40
[   18.764836]  kasan_save_alloc_info+0x40/0x58
[   18.764994]  __kasan_kmalloc+0xd4/0xd8
[   18.765150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.765205]  kasan_atomics+0xb8/0x2e0
[   18.765247]  kunit_try_run_case+0x170/0x3f0
[   18.765397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.765537]  kthread+0x328/0x630
[   18.765583]  ret_from_fork+0x10/0x20
[   18.765768] 
[   18.765940] The buggy address belongs to the object at fff00000c635c500
[   18.765940]  which belongs to the cache kmalloc-64 of size 64
[   18.766145] The buggy address is located 0 bytes to the right of
[   18.766145]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.766238] 
[   18.766304] The buggy address belongs to the physical page:
[   18.766566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.766693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.766841] page_type: f5(slab)
[   18.766917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.766969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.767012] page dumped because: kasan: bad access detected
[   18.767207] 
[   18.767237] Memory state around the buggy address:
[   18.767274]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.767536]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.767612] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.767688]                                      ^
[   18.768015]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.768109]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.768167] ==================================================================
[   18.797830] ==================================================================
[   18.797924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.797987] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.798060] 
[   18.798401] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.798550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.798630] Hardware name: linux,dummy-virt (DT)
[   18.798723] Call trace:
[   18.798790]  show_stack+0x20/0x38 (C)
[   18.798906]  dump_stack_lvl+0x8c/0xd0
[   18.799004]  print_report+0x118/0x608
[   18.799111]  kasan_report+0xdc/0x128
[   18.799195]  kasan_check_range+0x100/0x1a8
[   18.799247]  __kasan_check_write+0x20/0x30
[   18.799295]  kasan_atomics_helper+0x1128/0x4858
[   18.799346]  kasan_atomics+0x198/0x2e0
[   18.799394]  kunit_try_run_case+0x170/0x3f0
[   18.799444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.799657]  kthread+0x328/0x630
[   18.799763]  ret_from_fork+0x10/0x20
[   18.799881] 
[   18.800210] Allocated by task 265:
[   18.800276]  kasan_save_stack+0x3c/0x68
[   18.800351]  kasan_save_track+0x20/0x40
[   18.800430]  kasan_save_alloc_info+0x40/0x58
[   18.800525]  __kasan_kmalloc+0xd4/0xd8
[   18.800603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.800666]  kasan_atomics+0xb8/0x2e0
[   18.800725]  kunit_try_run_case+0x170/0x3f0
[   18.800792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.800865]  kthread+0x328/0x630
[   18.800923]  ret_from_fork+0x10/0x20
[   18.800980] 
[   18.801001] The buggy address belongs to the object at fff00000c635c500
[   18.801001]  which belongs to the cache kmalloc-64 of size 64
[   18.801370] The buggy address is located 0 bytes to the right of
[   18.801370]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.801486] 
[   18.801524] The buggy address belongs to the physical page:
[   18.801591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.801960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.802033] page_type: f5(slab)
[   18.802120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.802238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.802282] page dumped because: kasan: bad access detected
[   18.802322] 
[   18.802342] Memory state around the buggy address:
[   18.802377]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.802423]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.802469] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.802511]                                      ^
[   18.802686]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.802973]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.803042] ==================================================================
[   18.888223] ==================================================================
[   18.888383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.888448] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.888511] 
[   18.888560] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.888651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.888688] Hardware name: linux,dummy-virt (DT)
[   18.888731] Call trace:
[   18.888767]  show_stack+0x20/0x38 (C)
[   18.888834]  dump_stack_lvl+0x8c/0xd0
[   18.888885]  print_report+0x118/0x608
[   18.888941]  kasan_report+0xdc/0x128
[   18.889184]  __asan_report_load8_noabort+0x20/0x30
[   18.889263]  kasan_atomics_helper+0x3e10/0x4858
[   18.889331]  kasan_atomics+0x198/0x2e0
[   18.889384]  kunit_try_run_case+0x170/0x3f0
[   18.889452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.889529]  kthread+0x328/0x630
[   18.889575]  ret_from_fork+0x10/0x20
[   18.889627] 
[   18.889647] Allocated by task 265:
[   18.889676]  kasan_save_stack+0x3c/0x68
[   18.889742]  kasan_save_track+0x20/0x40
[   18.889837]  kasan_save_alloc_info+0x40/0x58
[   18.889912]  __kasan_kmalloc+0xd4/0xd8
[   18.889951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.890177]  kasan_atomics+0xb8/0x2e0
[   18.890391]  kunit_try_run_case+0x170/0x3f0
[   18.890437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.890492]  kthread+0x328/0x630
[   18.890541]  ret_from_fork+0x10/0x20
[   18.890579] 
[   18.890599] The buggy address belongs to the object at fff00000c635c500
[   18.890599]  which belongs to the cache kmalloc-64 of size 64
[   18.890660] The buggy address is located 0 bytes to the right of
[   18.890660]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.890736] 
[   18.890767] The buggy address belongs to the physical page:
[   18.890813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.890869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.890924] page_type: f5(slab)
[   18.890963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.891016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.891070] page dumped because: kasan: bad access detected
[   18.891130] 
[   18.891150] Memory state around the buggy address:
[   18.891183]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.891238]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.891298] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.891338]                                      ^
[   18.891374]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.891428]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.891466] ==================================================================
[   18.813873] ==================================================================
[   18.814033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.814117] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.814224] 
[   18.814296] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.814432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.814502] Hardware name: linux,dummy-virt (DT)
[   18.814610] Call trace:
[   18.814669]  show_stack+0x20/0x38 (C)
[   18.814720]  dump_stack_lvl+0x8c/0xd0
[   18.814771]  print_report+0x118/0x608
[   18.814922]  kasan_report+0xdc/0x128
[   18.814982]  kasan_check_range+0x100/0x1a8
[   18.815032]  __kasan_check_write+0x20/0x30
[   18.815180]  kasan_atomics_helper+0x126c/0x4858
[   18.815247]  kasan_atomics+0x198/0x2e0
[   18.815329]  kunit_try_run_case+0x170/0x3f0
[   18.815466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.815563]  kthread+0x328/0x630
[   18.815617]  ret_from_fork+0x10/0x20
[   18.815667] 
[   18.815687] Allocated by task 265:
[   18.815871]  kasan_save_stack+0x3c/0x68
[   18.815955]  kasan_save_track+0x20/0x40
[   18.816033]  kasan_save_alloc_info+0x40/0x58
[   18.816136]  __kasan_kmalloc+0xd4/0xd8
[   18.816214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.816333]  kasan_atomics+0xb8/0x2e0
[   18.816411]  kunit_try_run_case+0x170/0x3f0
[   18.816487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.816598]  kthread+0x328/0x630
[   18.816653]  ret_from_fork+0x10/0x20
[   18.816690] 
[   18.816954] The buggy address belongs to the object at fff00000c635c500
[   18.816954]  which belongs to the cache kmalloc-64 of size 64
[   18.817060] The buggy address is located 0 bytes to the right of
[   18.817060]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.817177] 
[   18.817258] The buggy address belongs to the physical page:
[   18.817331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.817690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.817794] page_type: f5(slab)
[   18.817867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.817935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.818000] page dumped because: kasan: bad access detected
[   18.818033] 
[   18.818055] Memory state around the buggy address:
[   18.818343]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.818474]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.818554] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.818641]                                      ^
[   18.818735]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818812]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818871] ==================================================================
[   18.664800] ==================================================================
[   18.664912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.665116] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.665180] 
[   18.665968] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.668249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.668477] Hardware name: linux,dummy-virt (DT)
[   18.668646] Call trace:
[   18.668982]  show_stack+0x20/0x38 (C)
[   18.669976]  dump_stack_lvl+0x8c/0xd0
[   18.670123]  print_report+0x118/0x608
[   18.670994]  kasan_report+0xdc/0x128
[   18.671154]  kasan_check_range+0x100/0x1a8
[   18.671215]  __kasan_check_write+0x20/0x30
[   18.671264]  kasan_atomics_helper+0xa6c/0x4858
[   18.671524]  kasan_atomics+0x198/0x2e0
[   18.671748]  kunit_try_run_case+0x170/0x3f0
[   18.671898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.672016]  kthread+0x328/0x630
[   18.672141]  ret_from_fork+0x10/0x20
[   18.672274] 
[   18.672320] Allocated by task 265:
[   18.672383]  kasan_save_stack+0x3c/0x68
[   18.672555]  kasan_save_track+0x20/0x40
[   18.672693]  kasan_save_alloc_info+0x40/0x58
[   18.672822]  __kasan_kmalloc+0xd4/0xd8
[   18.672900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.672982]  kasan_atomics+0xb8/0x2e0
[   18.673120]  kunit_try_run_case+0x170/0x3f0
[   18.673273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.673348]  kthread+0x328/0x630
[   18.673396]  ret_from_fork+0x10/0x20
[   18.673576] 
[   18.673686] The buggy address belongs to the object at fff00000c635c500
[   18.673686]  which belongs to the cache kmalloc-64 of size 64
[   18.673876] The buggy address is located 0 bytes to the right of
[   18.673876]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.673975] 
[   18.674031] The buggy address belongs to the physical page:
[   18.674094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.674223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.674312] page_type: f5(slab)
[   18.674501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.674651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.674813] page dumped because: kasan: bad access detected
[   18.674863] 
[   18.674960] Memory state around the buggy address:
[   18.675014]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.675059]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.675130] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.675286]                                      ^
[   18.675407]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.675555]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.675634] ==================================================================
[   18.804553] ==================================================================
[   18.804771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.804854] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.804907] 
[   18.804945] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.805058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.805117] Hardware name: linux,dummy-virt (DT)
[   18.805151] Call trace:
[   18.805175]  show_stack+0x20/0x38 (C)
[   18.805235]  dump_stack_lvl+0x8c/0xd0
[   18.805507]  print_report+0x118/0x608
[   18.805603]  kasan_report+0xdc/0x128
[   18.805653]  kasan_check_range+0x100/0x1a8
[   18.805721]  __kasan_check_write+0x20/0x30
[   18.805859]  kasan_atomics_helper+0x1190/0x4858
[   18.806031]  kasan_atomics+0x198/0x2e0
[   18.806265]  kunit_try_run_case+0x170/0x3f0
[   18.806461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.806563]  kthread+0x328/0x630
[   18.806674]  ret_from_fork+0x10/0x20
[   18.806732] 
[   18.806752] Allocated by task 265:
[   18.806813]  kasan_save_stack+0x3c/0x68
[   18.806855]  kasan_save_track+0x20/0x40
[   18.806912]  kasan_save_alloc_info+0x40/0x58
[   18.806954]  __kasan_kmalloc+0xd4/0xd8
[   18.807004]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.807046]  kasan_atomics+0xb8/0x2e0
[   18.807096]  kunit_try_run_case+0x170/0x3f0
[   18.807137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.807411]  kthread+0x328/0x630
[   18.807462]  ret_from_fork+0x10/0x20
[   18.807814] 
[   18.807865] The buggy address belongs to the object at fff00000c635c500
[   18.807865]  which belongs to the cache kmalloc-64 of size 64
[   18.807981] The buggy address is located 0 bytes to the right of
[   18.807981]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.808063] 
[   18.808324] The buggy address belongs to the physical page:
[   18.808388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.808451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.808542] page_type: f5(slab)
[   18.808620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.808674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.808717] page dumped because: kasan: bad access detected
[   18.808951] 
[   18.808978] Memory state around the buggy address:
[   18.809124]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.809207]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.809478] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.809555]                                      ^
[   18.809643]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.809712]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.809760] ==================================================================
[   18.651502] ==================================================================
[   18.651607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   18.651680] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.651736] 
[   18.651787] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.652157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.652266] Hardware name: linux,dummy-virt (DT)
[   18.652392] Call trace:
[   18.652418]  show_stack+0x20/0x38 (C)
[   18.652523]  dump_stack_lvl+0x8c/0xd0
[   18.652576]  print_report+0x118/0x608
[   18.652681]  kasan_report+0xdc/0x128
[   18.652734]  kasan_check_range+0x100/0x1a8
[   18.652788]  __kasan_check_write+0x20/0x30
[   18.652868]  kasan_atomics_helper+0xa04/0x4858
[   18.652922]  kasan_atomics+0x198/0x2e0
[   18.652990]  kunit_try_run_case+0x170/0x3f0
[   18.653103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.653223]  kthread+0x328/0x630
[   18.653273]  ret_from_fork+0x10/0x20
[   18.653330] 
[   18.653358] Allocated by task 265:
[   18.653566]  kasan_save_stack+0x3c/0x68
[   18.653809]  kasan_save_track+0x20/0x40
[   18.653869]  kasan_save_alloc_info+0x40/0x58
[   18.653911]  __kasan_kmalloc+0xd4/0xd8
[   18.654848]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.655074]  kasan_atomics+0xb8/0x2e0
[   18.655301]  kunit_try_run_case+0x170/0x3f0
[   18.655999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.656170]  kthread+0x328/0x630
[   18.656220]  ret_from_fork+0x10/0x20
[   18.656436] 
[   18.656570] The buggy address belongs to the object at fff00000c635c500
[   18.656570]  which belongs to the cache kmalloc-64 of size 64
[   18.656659] The buggy address is located 0 bytes to the right of
[   18.656659]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.656806] 
[   18.657271] The buggy address belongs to the physical page:
[   18.657342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.658604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.660801] page_type: f5(slab)
[   18.661322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.661780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.661840] page dumped because: kasan: bad access detected
[   18.663072] 
[   18.663283] Memory state around the buggy address:
[   18.663327]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.663399]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.663447] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.663496]                                      ^
[   18.663533]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.663579]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.663621] ==================================================================
[   18.843431] ==================================================================
[   18.843480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.843600] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.843753] 
[   18.844010] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.844122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.844159] Hardware name: linux,dummy-virt (DT)
[   18.844195] Call trace:
[   18.844224]  show_stack+0x20/0x38 (C)
[   18.844286]  dump_stack_lvl+0x8c/0xd0
[   18.844393]  print_report+0x118/0x608
[   18.844552]  kasan_report+0xdc/0x128
[   18.844613]  kasan_check_range+0x100/0x1a8
[   18.844666]  __kasan_check_write+0x20/0x30
[   18.844958]  kasan_atomics_helper+0x147c/0x4858
[   18.845044]  kasan_atomics+0x198/0x2e0
[   18.845107]  kunit_try_run_case+0x170/0x3f0
[   18.845164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.845229]  kthread+0x328/0x630
[   18.845292]  ret_from_fork+0x10/0x20
[   18.845394] 
[   18.845562] Allocated by task 265:
[   18.845606]  kasan_save_stack+0x3c/0x68
[   18.845668]  kasan_save_track+0x20/0x40
[   18.845725]  kasan_save_alloc_info+0x40/0x58
[   18.845768]  __kasan_kmalloc+0xd4/0xd8
[   18.845827]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.845905]  kasan_atomics+0xb8/0x2e0
[   18.845945]  kunit_try_run_case+0x170/0x3f0
[   18.845985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.846032]  kthread+0x328/0x630
[   18.846066]  ret_from_fork+0x10/0x20
[   18.846339] 
[   18.846423] The buggy address belongs to the object at fff00000c635c500
[   18.846423]  which belongs to the cache kmalloc-64 of size 64
[   18.846499] The buggy address is located 0 bytes to the right of
[   18.846499]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.846581] 
[   18.846635] The buggy address belongs to the physical page:
[   18.846894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.846994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.847110] page_type: f5(slab)
[   18.847196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.847295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.847338] page dumped because: kasan: bad access detected
[   18.847371] 
[   18.847393] Memory state around the buggy address:
[   18.847692]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.847796]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.847870] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.847944]                                      ^
[   18.848242]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.848325]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.848405] ==================================================================
[   18.839108] ==================================================================
[   18.839363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.839424] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.839537] 
[   18.839592] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.839676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.839703] Hardware name: linux,dummy-virt (DT)
[   18.839753] Call trace:
[   18.839982]  show_stack+0x20/0x38 (C)
[   18.840061]  dump_stack_lvl+0x8c/0xd0
[   18.840129]  print_report+0x118/0x608
[   18.840186]  kasan_report+0xdc/0x128
[   18.840242]  kasan_check_range+0x100/0x1a8
[   18.840293]  __kasan_check_write+0x20/0x30
[   18.840342]  kasan_atomics_helper+0x1414/0x4858
[   18.840392]  kasan_atomics+0x198/0x2e0
[   18.840450]  kunit_try_run_case+0x170/0x3f0
[   18.840502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.840558]  kthread+0x328/0x630
[   18.840601]  ret_from_fork+0x10/0x20
[   18.840659] 
[   18.840688] Allocated by task 265:
[   18.840717]  kasan_save_stack+0x3c/0x68
[   18.840760]  kasan_save_track+0x20/0x40
[   18.840808]  kasan_save_alloc_info+0x40/0x58
[   18.840852]  __kasan_kmalloc+0xd4/0xd8
[   18.840903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.840954]  kasan_atomics+0xb8/0x2e0
[   18.840992]  kunit_try_run_case+0x170/0x3f0
[   18.841035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.841344]  kthread+0x328/0x630
[   18.841398]  ret_from_fork+0x10/0x20
[   18.841438] 
[   18.841462] The buggy address belongs to the object at fff00000c635c500
[   18.841462]  which belongs to the cache kmalloc-64 of size 64
[   18.841691] The buggy address is located 0 bytes to the right of
[   18.841691]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.841793] 
[   18.841826] The buggy address belongs to the physical page:
[   18.841879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.841933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.842006] page_type: f5(slab)
[   18.842290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.842387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.842455] page dumped because: kasan: bad access detected
[   18.842552] 
[   18.842581] Memory state around the buggy address:
[   18.842616]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.842662]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.842708] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.842750]                                      ^
[   18.842820]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.842866]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.843026] ==================================================================
[   18.682899] ==================================================================
[   18.682953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   18.683005] Read of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.683056] 
[   18.683101] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.683197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.683485]  __asan_report_load4_noabort+0x20/0x30
[   18.686173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.687435] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.698506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.701109] 
[   18.701979]  kasan_atomics_helper+0xc08/0x4858
[   18.703736]  kunit_try_run_case+0x170/0x3f0
[   18.704819] 
[   18.705128] page_type: f5(slab)
[   18.705793] Memory state around the buggy address:
[   18.706418]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.712379]  kasan_save_track+0x20/0x40
[   18.713330]  kthread+0x328/0x630
[   18.714347] page_type: f5(slab)
[   18.715014]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.717343] 
[   18.717906]  print_report+0x118/0x608
[   18.718919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.719002]  ret_from_fork+0x10/0x20
[   18.719041] 
[   18.719086] The buggy address belongs to the object at fff00000c635c500
[   18.719086]  which belongs to the cache kmalloc-64 of size 64
[   18.719148] The buggy address is located 0 bytes to the right of
[   18.719148]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.719214] 
[   18.719261] The buggy address belongs to the physical page:
[   18.719297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.719362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.719418] page_type: f5(slab)
[   18.719459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.719511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.719554] page dumped because: kasan: bad access detected
[   18.719587] 
[   18.719613] Memory state around the buggy address:
[   18.719645]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.719691]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.719734] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.719774]                                      ^
[   18.719809]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.719868]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.719918] ==================================================================
[   18.783849] ==================================================================
[   18.783915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.783978] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.784293] 
[   18.784350] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.784446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.784483] Hardware name: linux,dummy-virt (DT)
[   18.784517] Call trace:
[   18.784553]  show_stack+0x20/0x38 (C)
[   18.784608]  dump_stack_lvl+0x8c/0xd0
[   18.784665]  print_report+0x118/0x608
[   18.784721]  kasan_report+0xdc/0x128
[   18.784802]  kasan_check_range+0x100/0x1a8
[   18.784869]  __kasan_check_write+0x20/0x30
[   18.784916]  kasan_atomics_helper+0x1058/0x4858
[   18.784968]  kasan_atomics+0x198/0x2e0
[   18.785199]  kunit_try_run_case+0x170/0x3f0
[   18.785339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.785421]  kthread+0x328/0x630
[   18.785474]  ret_from_fork+0x10/0x20
[   18.785537] 
[   18.785657] Allocated by task 265:
[   18.785804]  kasan_save_stack+0x3c/0x68
[   18.785895]  kasan_save_track+0x20/0x40
[   18.785983]  kasan_save_alloc_info+0x40/0x58
[   18.786096]  __kasan_kmalloc+0xd4/0xd8
[   18.786780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.786834]  kasan_atomics+0xb8/0x2e0
[   18.786871]  kunit_try_run_case+0x170/0x3f0
[   18.786912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.786960]  kthread+0x328/0x630
[   18.787769]  ret_from_fork+0x10/0x20
[   18.789338] 
[   18.789688] The buggy address belongs to the object at fff00000c635c500
[   18.789688]  which belongs to the cache kmalloc-64 of size 64
[   18.790371] The buggy address is located 0 bytes to the right of
[   18.790371]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.790642] 
[   18.790679] The buggy address belongs to the physical page:
[   18.790737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.790815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.790901] page_type: f5(slab)
[   18.790988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.791042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.791266] page dumped because: kasan: bad access detected
[   18.791391] 
[   18.791415] Memory state around the buggy address:
[   18.791453]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.791500]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.791598] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.791666]                                      ^
[   18.791719]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.791789]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.791858] ==================================================================
[   18.732522] ==================================================================
[   18.732602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.732656] Read of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.732713] 
[   18.732745] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.732854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.732883] Hardware name: linux,dummy-virt (DT)
[   18.732917] Call trace:
[   18.732940]  show_stack+0x20/0x38 (C)
[   18.733238]  dump_stack_lvl+0x8c/0xd0
[   18.733334]  print_report+0x118/0x608
[   18.733388]  kasan_report+0xdc/0x128
[   18.733444]  __asan_report_load4_noabort+0x20/0x30
[   18.733505]  kasan_atomics_helper+0x3e04/0x4858
[   18.733712]  kasan_atomics+0x198/0x2e0
[   18.733936]  kunit_try_run_case+0x170/0x3f0
[   18.734058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.734155]  kthread+0x328/0x630
[   18.734227]  ret_from_fork+0x10/0x20
[   18.734342] 
[   18.734390] Allocated by task 265:
[   18.734461]  kasan_save_stack+0x3c/0x68
[   18.734506]  kasan_save_track+0x20/0x40
[   18.734568]  kasan_save_alloc_info+0x40/0x58
[   18.734612]  __kasan_kmalloc+0xd4/0xd8
[   18.734652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.734922]  kasan_atomics+0xb8/0x2e0
[   18.735042]  kunit_try_run_case+0x170/0x3f0
[   18.735122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.735440]  kthread+0x328/0x630
[   18.735507]  ret_from_fork+0x10/0x20
[   18.735611] 
[   18.735681] The buggy address belongs to the object at fff00000c635c500
[   18.735681]  which belongs to the cache kmalloc-64 of size 64
[   18.735812] The buggy address is located 0 bytes to the right of
[   18.735812]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.735879] 
[   18.735902] The buggy address belongs to the physical page:
[   18.736052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.736286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.736391] page_type: f5(slab)
[   18.736484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.736729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.736802] page dumped because: kasan: bad access detected
[   18.736895] 
[   18.736954] Memory state around the buggy address:
[   18.737007]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.737054]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.737214] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.737434]                                      ^
[   18.737493]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.737556]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.737733] ==================================================================
[   18.759703] ==================================================================
[   18.759756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.759811] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.759863] 
[   18.759897] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.759980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.760009] Hardware name: linux,dummy-virt (DT)
[   18.760041] Call trace:
[   18.760066]  show_stack+0x20/0x38 (C)
[   18.760140]  dump_stack_lvl+0x8c/0xd0
[   18.760193]  print_report+0x118/0x608
[   18.760241]  kasan_report+0xdc/0x128
[   18.760290]  __asan_report_store8_noabort+0x20/0x30
[   18.760352]  kasan_atomics_helper+0x3e5c/0x4858
[   18.760405]  kasan_atomics+0x198/0x2e0
[   18.760454]  kunit_try_run_case+0x170/0x3f0
[   18.760506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.760563]  kthread+0x328/0x630
[   18.760608]  ret_from_fork+0x10/0x20
[   18.760659] 
[   18.760681] Allocated by task 265:
[   18.760709]  kasan_save_stack+0x3c/0x68
[   18.760751]  kasan_save_track+0x20/0x40
[   18.760791]  kasan_save_alloc_info+0x40/0x58
[   18.760834]  __kasan_kmalloc+0xd4/0xd8
[   18.760882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.760925]  kasan_atomics+0xb8/0x2e0
[   18.760964]  kunit_try_run_case+0x170/0x3f0
[   18.761004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.761051]  kthread+0x328/0x630
[   18.761098]  ret_from_fork+0x10/0x20
[   18.761136] 
[   18.761158] The buggy address belongs to the object at fff00000c635c500
[   18.761158]  which belongs to the cache kmalloc-64 of size 64
[   18.761252] The buggy address is located 0 bytes to the right of
[   18.761252]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.761319] 
[   18.761341] The buggy address belongs to the physical page:
[   18.761374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.761428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.761478] page_type: f5(slab)
[   18.761519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.761572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.761617] page dumped because: kasan: bad access detected
[   18.761651] 
[   18.761671] Memory state around the buggy address:
[   18.762100]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.762180]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.762227] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.762411]                                      ^
[   18.762454]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762516]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762556] ==================================================================
[   18.810291] ==================================================================
[   18.810349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.810547] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.810609] 
[   18.810643] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.810726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.810753] Hardware name: linux,dummy-virt (DT)
[   18.810786] Call trace:
[   18.810811]  show_stack+0x20/0x38 (C)
[   18.810863]  dump_stack_lvl+0x8c/0xd0
[   18.810922]  print_report+0x118/0x608
[   18.810971]  kasan_report+0xdc/0x128
[   18.811028]  kasan_check_range+0x100/0x1a8
[   18.811091]  __kasan_check_write+0x20/0x30
[   18.811140]  kasan_atomics_helper+0x11f8/0x4858
[   18.811201]  kasan_atomics+0x198/0x2e0
[   18.811250]  kunit_try_run_case+0x170/0x3f0
[   18.811302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.811363]  kthread+0x328/0x630
[   18.811416]  ret_from_fork+0x10/0x20
[   18.811466] 
[   18.811502] Allocated by task 265:
[   18.811531]  kasan_save_stack+0x3c/0x68
[   18.811574]  kasan_save_track+0x20/0x40
[   18.811613]  kasan_save_alloc_info+0x40/0x58
[   18.811665]  __kasan_kmalloc+0xd4/0xd8
[   18.811704]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.811752]  kasan_atomics+0xb8/0x2e0
[   18.811790]  kunit_try_run_case+0x170/0x3f0
[   18.811832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.811878]  kthread+0x328/0x630
[   18.811913]  ret_from_fork+0x10/0x20
[   18.811950] 
[   18.811987] The buggy address belongs to the object at fff00000c635c500
[   18.811987]  which belongs to the cache kmalloc-64 of size 64
[   18.812046] The buggy address is located 0 bytes to the right of
[   18.812046]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.812359] 
[   18.812394] The buggy address belongs to the physical page:
[   18.812590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.812663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.812850] page_type: f5(slab)
[   18.812897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.812951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.812995] page dumped because: kasan: bad access detected
[   18.813045] 
[   18.813182] Memory state around the buggy address:
[   18.813219]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.813266]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.813348] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.813491]                                      ^
[   18.813568]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.813613]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.813660] ==================================================================
[   18.852755] ==================================================================
[   18.852811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.852862] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.852969] 
[   18.853003] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.853100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.853129] Hardware name: linux,dummy-virt (DT)
[   18.853181] Call trace:
[   18.853205]  show_stack+0x20/0x38 (C)
[   18.853307]  dump_stack_lvl+0x8c/0xd0
[   18.853361]  print_report+0x118/0x608
[   18.853427]  kasan_report+0xdc/0x128
[   18.853475]  kasan_check_range+0x100/0x1a8
[   18.853526]  __kasan_check_write+0x20/0x30
[   18.853597]  kasan_atomics_helper+0x154c/0x4858
[   18.853650]  kasan_atomics+0x198/0x2e0
[   18.853833]  kunit_try_run_case+0x170/0x3f0
[   18.853908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.853980]  kthread+0x328/0x630
[   18.854026]  ret_from_fork+0x10/0x20
[   18.854237] 
[   18.854333] Allocated by task 265:
[   18.854401]  kasan_save_stack+0x3c/0x68
[   18.854471]  kasan_save_track+0x20/0x40
[   18.854512]  kasan_save_alloc_info+0x40/0x58
[   18.854774]  __kasan_kmalloc+0xd4/0xd8
[   18.854843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.854895]  kasan_atomics+0xb8/0x2e0
[   18.854955]  kunit_try_run_case+0x170/0x3f0
[   18.855045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.855127]  kthread+0x328/0x630
[   18.855186]  ret_from_fork+0x10/0x20
[   18.855299] 
[   18.855347] The buggy address belongs to the object at fff00000c635c500
[   18.855347]  which belongs to the cache kmalloc-64 of size 64
[   18.855436] The buggy address is located 0 bytes to the right of
[   18.855436]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.855540] 
[   18.855594] The buggy address belongs to the physical page:
[   18.855627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.855680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.855866] page_type: f5(slab)
[   18.855910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.855963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.856028] page dumped because: kasan: bad access detected
[   18.856061] 
[   18.856094] Memory state around the buggy address:
[   18.856128]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.856466]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.856532] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.856611]                                      ^
[   18.856681]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.857010]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.857122] ==================================================================
[   18.896758] ==================================================================
[   18.896805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.896921] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.896974] 
[   18.897140] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.897241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.897285] Hardware name: linux,dummy-virt (DT)
[   18.897562] Call trace:
[   18.897596]  show_stack+0x20/0x38 (C)
[   18.897652]  dump_stack_lvl+0x8c/0xd0
[   18.897764]  print_report+0x118/0x608
[   18.897886]  kasan_report+0xdc/0x128
[   18.898253]  __asan_report_load8_noabort+0x20/0x30
[   18.898438]  kasan_atomics_helper+0x3e20/0x4858
[   18.898552]  kasan_atomics+0x198/0x2e0
[   18.898639]  kunit_try_run_case+0x170/0x3f0
[   18.898702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.898804]  kthread+0x328/0x630
[   18.898882]  ret_from_fork+0x10/0x20
[   18.898951] 
[   18.898971] Allocated by task 265:
[   18.899186]  kasan_save_stack+0x3c/0x68
[   18.899367]  kasan_save_track+0x20/0x40
[   18.899452]  kasan_save_alloc_info+0x40/0x58
[   18.899521]  __kasan_kmalloc+0xd4/0xd8
[   18.899586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.899855]  kasan_atomics+0xb8/0x2e0
[   18.899968]  kunit_try_run_case+0x170/0x3f0
[   18.900098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.900174]  kthread+0x328/0x630
[   18.900259]  ret_from_fork+0x10/0x20
[   18.900347] 
[   18.900418] The buggy address belongs to the object at fff00000c635c500
[   18.900418]  which belongs to the cache kmalloc-64 of size 64
[   18.900501] The buggy address is located 0 bytes to the right of
[   18.900501]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.900641] 
[   18.900711] The buggy address belongs to the physical page:
[   18.900743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.900798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.901076] page_type: f5(slab)
[   18.901628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.901736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.901815] page dumped because: kasan: bad access detected
[   18.901883] 
[   18.902168] Memory state around the buggy address:
[   18.902235]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.902283]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.902444] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.902495]                                      ^
[   18.902530]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.904965]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.905378] ==================================================================
[   18.739747] ==================================================================
[   18.739819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.739903] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.739963] 
[   18.740000] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.740105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.740148] Hardware name: linux,dummy-virt (DT)
[   18.740197] Call trace:
[   18.740221]  show_stack+0x20/0x38 (C)
[   18.740272]  dump_stack_lvl+0x8c/0xd0
[   18.740328]  print_report+0x118/0x608
[   18.740585]  kasan_report+0xdc/0x128
[   18.740661]  kasan_check_range+0x100/0x1a8
[   18.740733]  __kasan_check_read+0x20/0x30
[   18.740787]  kasan_atomics_helper+0xdd4/0x4858
[   18.740840]  kasan_atomics+0x198/0x2e0
[   18.740896]  kunit_try_run_case+0x170/0x3f0
[   18.741197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.741280]  kthread+0x328/0x630
[   18.741337]  ret_from_fork+0x10/0x20
[   18.741392] 
[   18.741417] Allocated by task 265:
[   18.741455]  kasan_save_stack+0x3c/0x68
[   18.741508]  kasan_save_track+0x20/0x40
[   18.741556]  kasan_save_alloc_info+0x40/0x58
[   18.741600]  __kasan_kmalloc+0xd4/0xd8
[   18.741654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.741716]  kasan_atomics+0xb8/0x2e0
[   18.741823]  kunit_try_run_case+0x170/0x3f0
[   18.741867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.741930]  kthread+0x328/0x630
[   18.741967]  ret_from_fork+0x10/0x20
[   18.742335] 
[   18.742385] The buggy address belongs to the object at fff00000c635c500
[   18.742385]  which belongs to the cache kmalloc-64 of size 64
[   18.742507] The buggy address is located 0 bytes to the right of
[   18.742507]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.742853] 
[   18.742929] The buggy address belongs to the physical page:
[   18.742990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.743063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.743146] page_type: f5(slab)
[   18.743192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.743247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.743288] page dumped because: kasan: bad access detected
[   18.743331] 
[   18.743374] Memory state around the buggy address:
[   18.743409]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.743469]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.743528] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.743577]                                      ^
[   18.743621]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743665]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743720] ==================================================================
[   18.907254] ==================================================================
[   18.907317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.907376] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.907485] 
[   18.907533] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.907719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.907753] Hardware name: linux,dummy-virt (DT)
[   18.907795] Call trace:
[   18.907820]  show_stack+0x20/0x38 (C)
[   18.907876]  dump_stack_lvl+0x8c/0xd0
[   18.907930]  print_report+0x118/0x608
[   18.907988]  kasan_report+0xdc/0x128
[   18.908054]  kasan_check_range+0x100/0x1a8
[   18.908119]  __kasan_check_write+0x20/0x30
[   18.908166]  kasan_atomics_helper+0x17ec/0x4858
[   18.908226]  kasan_atomics+0x198/0x2e0
[   18.908273]  kunit_try_run_case+0x170/0x3f0
[   18.908324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.908513]  kthread+0x328/0x630
[   18.908560]  ret_from_fork+0x10/0x20
[   18.908655] 
[   18.908683] Allocated by task 265:
[   18.908722]  kasan_save_stack+0x3c/0x68
[   18.908775]  kasan_save_track+0x20/0x40
[   18.908817]  kasan_save_alloc_info+0x40/0x58
[   18.908928]  __kasan_kmalloc+0xd4/0xd8
[   18.909005]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.909075]  kasan_atomics+0xb8/0x2e0
[   18.909223]  kunit_try_run_case+0x170/0x3f0
[   18.909276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.909322]  kthread+0x328/0x630
[   18.909378]  ret_from_fork+0x10/0x20
[   18.909418] 
[   18.909440] The buggy address belongs to the object at fff00000c635c500
[   18.909440]  which belongs to the cache kmalloc-64 of size 64
[   18.909500] The buggy address is located 0 bytes to the right of
[   18.909500]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.909575] 
[   18.909599] The buggy address belongs to the physical page:
[   18.909632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.909686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.909738] page_type: f5(slab)
[   18.909787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.909842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.910106] page dumped because: kasan: bad access detected
[   18.910151] 
[   18.910177] Memory state around the buggy address:
[   18.910214]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.910387]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.910522] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.910622]                                      ^
[   18.910668]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.910728]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.910776] ==================================================================
[   18.834159] ==================================================================
[   18.834329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.834417] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.834479] 
[   18.834566] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.834656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.834693] Hardware name: linux,dummy-virt (DT)
[   18.834736] Call trace:
[   18.835029]  show_stack+0x20/0x38 (C)
[   18.835139]  dump_stack_lvl+0x8c/0xd0
[   18.835206]  print_report+0x118/0x608
[   18.835277]  kasan_report+0xdc/0x128
[   18.835333]  __asan_report_load8_noabort+0x20/0x30
[   18.835399]  kasan_atomics_helper+0x3f04/0x4858
[   18.835450]  kasan_atomics+0x198/0x2e0
[   18.835557]  kunit_try_run_case+0x170/0x3f0
[   18.835624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.835689]  kthread+0x328/0x630
[   18.835742]  ret_from_fork+0x10/0x20
[   18.835827] 
[   18.835848] Allocated by task 265:
[   18.835876]  kasan_save_stack+0x3c/0x68
[   18.835920]  kasan_save_track+0x20/0x40
[   18.835959]  kasan_save_alloc_info+0x40/0x58
[   18.836002]  __kasan_kmalloc+0xd4/0xd8
[   18.836192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.836401]  kasan_atomics+0xb8/0x2e0
[   18.836454]  kunit_try_run_case+0x170/0x3f0
[   18.836498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.836631]  kthread+0x328/0x630
[   18.836670]  ret_from_fork+0x10/0x20
[   18.836763] 
[   18.836890] The buggy address belongs to the object at fff00000c635c500
[   18.836890]  which belongs to the cache kmalloc-64 of size 64
[   18.836982] The buggy address is located 0 bytes to the right of
[   18.836982]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.837056] 
[   18.837117] The buggy address belongs to the physical page:
[   18.837151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.837523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.837598] page_type: f5(slab)
[   18.837642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.837696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.837740] page dumped because: kasan: bad access detected
[   18.837780] 
[   18.837802] Memory state around the buggy address:
[   18.837844]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.838048]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.838154] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.838232]                                      ^
[   18.838317]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.838602]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.838700] ==================================================================
[   18.720453] ==================================================================
[   18.721058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.721136] Read of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.721188] 
[   18.721219] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.721302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.721330] Hardware name: linux,dummy-virt (DT)
[   18.721363] Call trace:
[   18.721386]  show_stack+0x20/0x38 (C)
[   18.721438]  dump_stack_lvl+0x8c/0xd0
[   18.721488]  print_report+0x118/0x608
[   18.721539]  kasan_report+0xdc/0x128
[   18.721588]  __asan_report_load4_noabort+0x20/0x30
[   18.721645]  kasan_atomics_helper+0x3dd8/0x4858
[   18.721697]  kasan_atomics+0x198/0x2e0
[   18.721753]  kunit_try_run_case+0x170/0x3f0
[   18.721806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.721867]  kthread+0x328/0x630
[   18.721915]  ret_from_fork+0x10/0x20
[   18.721966] 
[   18.721985] Allocated by task 265:
[   18.722015]  kasan_save_stack+0x3c/0x68
[   18.722058]  kasan_save_track+0x20/0x40
[   18.722132]  kasan_save_alloc_info+0x40/0x58
[   18.722191]  __kasan_kmalloc+0xd4/0xd8
[   18.722229]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.722294]  kasan_atomics+0xb8/0x2e0
[   18.722333]  kunit_try_run_case+0x170/0x3f0
[   18.722374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.722819]  kthread+0x328/0x630
[   18.722886]  ret_from_fork+0x10/0x20
[   18.723000] 
[   18.723072] The buggy address belongs to the object at fff00000c635c500
[   18.723072]  which belongs to the cache kmalloc-64 of size 64
[   18.723293] The buggy address is located 0 bytes to the right of
[   18.723293]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.723440] 
[   18.723590] The buggy address belongs to the physical page:
[   18.723626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.723918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.724075] page_type: f5(slab)
[   18.724176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.724258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.724405] page dumped because: kasan: bad access detected
[   18.724591] 
[   18.724651] Memory state around the buggy address:
[   18.724759]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.724831]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.724877] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.724942]                                      ^
[   18.725241]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.725319]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.725429] ==================================================================
[   18.768679] ==================================================================
[   18.768894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.768948] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.769191] 
[   18.769258] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.769350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.769388] Hardware name: linux,dummy-virt (DT)
[   18.769421] Call trace:
[   18.769460]  show_stack+0x20/0x38 (C)
[   18.769538]  dump_stack_lvl+0x8c/0xd0
[   18.769594]  print_report+0x118/0x608
[   18.769660]  kasan_report+0xdc/0x128
[   18.769710]  kasan_check_range+0x100/0x1a8
[   18.769763]  __kasan_check_write+0x20/0x30
[   18.769821]  kasan_atomics_helper+0xf20/0x4858
[   18.769880]  kasan_atomics+0x198/0x2e0
[   18.769939]  kunit_try_run_case+0x170/0x3f0
[   18.769995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.770051]  kthread+0x328/0x630
[   18.770411]  ret_from_fork+0x10/0x20
[   18.770644] 
[   18.770684] Allocated by task 265:
[   18.770761]  kasan_save_stack+0x3c/0x68
[   18.770973]  kasan_save_track+0x20/0x40
[   18.771201]  kasan_save_alloc_info+0x40/0x58
[   18.771325]  __kasan_kmalloc+0xd4/0xd8
[   18.771404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.771490]  kasan_atomics+0xb8/0x2e0
[   18.771610]  kunit_try_run_case+0x170/0x3f0
[   18.771677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.771751]  kthread+0x328/0x630
[   18.771786]  ret_from_fork+0x10/0x20
[   18.771825] 
[   18.772091] The buggy address belongs to the object at fff00000c635c500
[   18.772091]  which belongs to the cache kmalloc-64 of size 64
[   18.772235] The buggy address is located 0 bytes to the right of
[   18.772235]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.772332] 
[   18.772397] The buggy address belongs to the physical page:
[   18.772719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.772839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.772974] page_type: f5(slab)
[   18.773039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.773102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.773304] page dumped because: kasan: bad access detected
[   18.773474] 
[   18.773535] Memory state around the buggy address:
[   18.773658]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.773731]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.774034] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.774093]                                      ^
[   18.774166]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.774213]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.774254] ==================================================================
[   18.819495] ==================================================================
[   18.819765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.819826] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.820067] 
[   18.820260] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.820376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.820414] Hardware name: linux,dummy-virt (DT)
[   18.820448] Call trace:
[   18.820478]  show_stack+0x20/0x38 (C)
[   18.820541]  dump_stack_lvl+0x8c/0xd0
[   18.820616]  print_report+0x118/0x608
[   18.820672]  kasan_report+0xdc/0x128
[   18.820728]  kasan_check_range+0x100/0x1a8
[   18.820778]  __kasan_check_write+0x20/0x30
[   18.820863]  kasan_atomics_helper+0x12d8/0x4858
[   18.820919]  kasan_atomics+0x198/0x2e0
[   18.820975]  kunit_try_run_case+0x170/0x3f0
[   18.821027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.821127]  kthread+0x328/0x630
[   18.821171]  ret_from_fork+0x10/0x20
[   18.821222] 
[   18.821249] Allocated by task 265:
[   18.821285]  kasan_save_stack+0x3c/0x68
[   18.821328]  kasan_save_track+0x20/0x40
[   18.821461]  kasan_save_alloc_info+0x40/0x58
[   18.821508]  __kasan_kmalloc+0xd4/0xd8
[   18.821591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.821742]  kasan_atomics+0xb8/0x2e0
[   18.821883]  kunit_try_run_case+0x170/0x3f0
[   18.822062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.822148]  kthread+0x328/0x630
[   18.822221]  ret_from_fork+0x10/0x20
[   18.822289] 
[   18.822356] The buggy address belongs to the object at fff00000c635c500
[   18.822356]  which belongs to the cache kmalloc-64 of size 64
[   18.822494] The buggy address is located 0 bytes to the right of
[   18.822494]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.822606] 
[   18.822715] The buggy address belongs to the physical page:
[   18.822781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.822834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.822884] page_type: f5(slab)
[   18.823047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.823112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.823157] page dumped because: kasan: bad access detected
[   18.823378] 
[   18.823453] Memory state around the buggy address:
[   18.823518]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.823772]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.823842] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.823897]                                      ^
[   18.823934]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.823976]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.824016] ==================================================================
[   18.792914] ==================================================================
[   18.792981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.793105] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.793170] 
[   18.793217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.793550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.793604] Hardware name: linux,dummy-virt (DT)
[   18.793642] Call trace:
[   18.793678]  show_stack+0x20/0x38 (C)
[   18.793733]  dump_stack_lvl+0x8c/0xd0
[   18.793827]  print_report+0x118/0x608
[   18.793918]  kasan_report+0xdc/0x128
[   18.794028]  kasan_check_range+0x100/0x1a8
[   18.794113]  __kasan_check_write+0x20/0x30
[   18.794284]  kasan_atomics_helper+0x10c0/0x4858
[   18.794337]  kasan_atomics+0x198/0x2e0
[   18.794385]  kunit_try_run_case+0x170/0x3f0
[   18.794436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.794492]  kthread+0x328/0x630
[   18.794689]  ret_from_fork+0x10/0x20
[   18.794776] 
[   18.794816] Allocated by task 265:
[   18.794919]  kasan_save_stack+0x3c/0x68
[   18.794993]  kasan_save_track+0x20/0x40
[   18.795066]  kasan_save_alloc_info+0x40/0x58
[   18.795317]  __kasan_kmalloc+0xd4/0xd8
[   18.795421]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.795508]  kasan_atomics+0xb8/0x2e0
[   18.795587]  kunit_try_run_case+0x170/0x3f0
[   18.795661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.795749]  kthread+0x328/0x630
[   18.795796]  ret_from_fork+0x10/0x20
[   18.795835] 
[   18.795872] The buggy address belongs to the object at fff00000c635c500
[   18.795872]  which belongs to the cache kmalloc-64 of size 64
[   18.795934] The buggy address is located 0 bytes to the right of
[   18.795934]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.795999] 
[   18.796038] The buggy address belongs to the physical page:
[   18.796091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.796146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.796209] page_type: f5(slab)
[   18.796251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.796303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.796346] page dumped because: kasan: bad access detected
[   18.796381] 
[   18.796415] Memory state around the buggy address:
[   18.796451]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.796497]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.796542] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.796584]                                      ^
[   18.796617]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.796670]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.796719] ==================================================================
[   18.754504] ==================================================================
[   18.754560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.754613] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.754825] 
[   18.755015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.755243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.755276] Hardware name: linux,dummy-virt (DT)
[   18.755310] Call trace:
[   18.755430]  show_stack+0x20/0x38 (C)
[   18.755557]  dump_stack_lvl+0x8c/0xd0
[   18.755621]  print_report+0x118/0x608
[   18.755694]  kasan_report+0xdc/0x128
[   18.755749]  kasan_check_range+0x100/0x1a8
[   18.755952]  __kasan_check_write+0x20/0x30
[   18.756069]  kasan_atomics_helper+0xe44/0x4858
[   18.756143]  kasan_atomics+0x198/0x2e0
[   18.756205]  kunit_try_run_case+0x170/0x3f0
[   18.756272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.756337]  kthread+0x328/0x630
[   18.756385]  ret_from_fork+0x10/0x20
[   18.756455] 
[   18.756484] Allocated by task 265:
[   18.756522]  kasan_save_stack+0x3c/0x68
[   18.756566]  kasan_save_track+0x20/0x40
[   18.756623]  kasan_save_alloc_info+0x40/0x58
[   18.756708]  __kasan_kmalloc+0xd4/0xd8
[   18.756755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.756798]  kasan_atomics+0xb8/0x2e0
[   18.756837]  kunit_try_run_case+0x170/0x3f0
[   18.756878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.757094]  kthread+0x328/0x630
[   18.757139]  ret_from_fork+0x10/0x20
[   18.757271] 
[   18.757298] The buggy address belongs to the object at fff00000c635c500
[   18.757298]  which belongs to the cache kmalloc-64 of size 64
[   18.757370] The buggy address is located 0 bytes to the right of
[   18.757370]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.757442] 
[   18.757482] The buggy address belongs to the physical page:
[   18.757526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.757691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.757745] page_type: f5(slab)
[   18.758005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.758096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.758142] page dumped because: kasan: bad access detected
[   18.758176] 
[   18.758196] Memory state around the buggy address:
[   18.758459]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.758566]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.758624] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.758717]                                      ^
[   18.758786]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.758878]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.759105] ==================================================================
[   18.644711] ==================================================================
[   18.644780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.644834] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.644953] 
[   18.645004] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.645196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.645230] Hardware name: linux,dummy-virt (DT)
[   18.645265] Call trace:
[   18.645288]  show_stack+0x20/0x38 (C)
[   18.645350]  dump_stack_lvl+0x8c/0xd0
[   18.645544]  print_report+0x118/0x608
[   18.645608]  kasan_report+0xdc/0x128
[   18.645710]  kasan_check_range+0x100/0x1a8
[   18.645962]  __kasan_check_write+0x20/0x30
[   18.646029]  kasan_atomics_helper+0x99c/0x4858
[   18.646215]  kasan_atomics+0x198/0x2e0
[   18.646275]  kunit_try_run_case+0x170/0x3f0
[   18.646327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.646610]  kthread+0x328/0x630
[   18.646781]  ret_from_fork+0x10/0x20
[   18.646946] 
[   18.647011] Allocated by task 265:
[   18.647095]  kasan_save_stack+0x3c/0x68
[   18.647268]  kasan_save_track+0x20/0x40
[   18.647345]  kasan_save_alloc_info+0x40/0x58
[   18.647398]  __kasan_kmalloc+0xd4/0xd8
[   18.647589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.647695]  kasan_atomics+0xb8/0x2e0
[   18.647778]  kunit_try_run_case+0x170/0x3f0
[   18.647962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.648028]  kthread+0x328/0x630
[   18.648251]  ret_from_fork+0x10/0x20
[   18.648399] 
[   18.648447] The buggy address belongs to the object at fff00000c635c500
[   18.648447]  which belongs to the cache kmalloc-64 of size 64
[   18.648612] The buggy address is located 0 bytes to the right of
[   18.648612]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.648706] 
[   18.648752] The buggy address belongs to the physical page:
[   18.648915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.648982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.649033] page_type: f5(slab)
[   18.649324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.649448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.649531] page dumped because: kasan: bad access detected
[   18.649888] 
[   18.650104] Memory state around the buggy address:
[   18.650143]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.650191]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.650238] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.650279]                                      ^
[   18.650315]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.650359]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.650402] ==================================================================
[   18.891714] ==================================================================
[   18.891764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.891813] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.891863] 
[   18.891893] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.891975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.892003] Hardware name: linux,dummy-virt (DT)
[   18.892046] Call trace:
[   18.892071]  show_stack+0x20/0x38 (C)
[   18.892610]  dump_stack_lvl+0x8c/0xd0
[   18.892829]  print_report+0x118/0x608
[   18.892894]  kasan_report+0xdc/0x128
[   18.892975]  kasan_check_range+0x100/0x1a8
[   18.893031]  __kasan_check_write+0x20/0x30
[   18.893127]  kasan_atomics_helper+0x175c/0x4858
[   18.893179]  kasan_atomics+0x198/0x2e0
[   18.893228]  kunit_try_run_case+0x170/0x3f0
[   18.893564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.893648]  kthread+0x328/0x630
[   18.893824]  ret_from_fork+0x10/0x20
[   18.894106] 
[   18.894152] Allocated by task 265:
[   18.894181]  kasan_save_stack+0x3c/0x68
[   18.894240]  kasan_save_track+0x20/0x40
[   18.894320]  kasan_save_alloc_info+0x40/0x58
[   18.894390]  __kasan_kmalloc+0xd4/0xd8
[   18.894458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.894518]  kasan_atomics+0xb8/0x2e0
[   18.894562]  kunit_try_run_case+0x170/0x3f0
[   18.894642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.894708]  kthread+0x328/0x630
[   18.894757]  ret_from_fork+0x10/0x20
[   18.894835] 
[   18.894926] The buggy address belongs to the object at fff00000c635c500
[   18.894926]  which belongs to the cache kmalloc-64 of size 64
[   18.894987] The buggy address is located 0 bytes to the right of
[   18.894987]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.895072] 
[   18.895105] The buggy address belongs to the physical page:
[   18.895138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.895191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.895294] page_type: f5(slab)
[   18.895481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.895559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.895649] page dumped because: kasan: bad access detected
[   18.895717] 
[   18.895771] Memory state around the buggy address:
[   18.896072]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.896169]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.896273] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.896341]                                      ^
[   18.896427]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.896508]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.896566] ==================================================================
[   18.877471] ==================================================================
[   18.877527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.877581] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.877638] 
[   18.877671] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.877752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.877835] Hardware name: linux,dummy-virt (DT)
[   18.878007] Call trace:
[   18.878242]  show_stack+0x20/0x38 (C)
[   18.878331]  dump_stack_lvl+0x8c/0xd0
[   18.878425]  print_report+0x118/0x608
[   18.878504]  kasan_report+0xdc/0x128
[   18.878616]  __asan_report_load8_noabort+0x20/0x30
[   18.878712]  kasan_atomics_helper+0x3df4/0x4858
[   18.878765]  kasan_atomics+0x198/0x2e0
[   18.878923]  kunit_try_run_case+0x170/0x3f0
[   18.878975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.879201]  kthread+0x328/0x630
[   18.879279]  ret_from_fork+0x10/0x20
[   18.879352] 
[   18.879433] Allocated by task 265:
[   18.879512]  kasan_save_stack+0x3c/0x68
[   18.879785]  kasan_save_track+0x20/0x40
[   18.879920]  kasan_save_alloc_info+0x40/0x58
[   18.879993]  __kasan_kmalloc+0xd4/0xd8
[   18.880059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.880169]  kasan_atomics+0xb8/0x2e0
[   18.880247]  kunit_try_run_case+0x170/0x3f0
[   18.880312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.880408]  kthread+0x328/0x630
[   18.880454]  ret_from_fork+0x10/0x20
[   18.880493] 
[   18.880513] The buggy address belongs to the object at fff00000c635c500
[   18.880513]  which belongs to the cache kmalloc-64 of size 64
[   18.880735] The buggy address is located 0 bytes to the right of
[   18.880735]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.880917] 
[   18.880976] The buggy address belongs to the physical page:
[   18.881052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.881322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.881399] page_type: f5(slab)
[   18.881482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.881557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.881645] page dumped because: kasan: bad access detected
[   18.881679] 
[   18.881699] Memory state around the buggy address:
[   18.881732]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.881779]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.881829] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.881871]                                      ^
[   18.881907]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.882040]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.882222] ==================================================================
[   18.872307] ==================================================================
[   18.872356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.872408] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.872506] 
[   18.872648] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.872791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.872837] Hardware name: linux,dummy-virt (DT)
[   18.873021] Call trace:
[   18.873090]  show_stack+0x20/0x38 (C)
[   18.873166]  dump_stack_lvl+0x8c/0xd0
[   18.873220]  print_report+0x118/0x608
[   18.873282]  kasan_report+0xdc/0x128
[   18.873347]  kasan_check_range+0x100/0x1a8
[   18.873398]  __kasan_check_write+0x20/0x30
[   18.873446]  kasan_atomics_helper+0x1644/0x4858
[   18.873496]  kasan_atomics+0x198/0x2e0
[   18.873566]  kunit_try_run_case+0x170/0x3f0
[   18.873721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.873825]  kthread+0x328/0x630
[   18.873904]  ret_from_fork+0x10/0x20
[   18.873999] 
[   18.874261] Allocated by task 265:
[   18.874333]  kasan_save_stack+0x3c/0x68
[   18.874409]  kasan_save_track+0x20/0x40
[   18.874451]  kasan_save_alloc_info+0x40/0x58
[   18.874519]  __kasan_kmalloc+0xd4/0xd8
[   18.874598]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.874669]  kasan_atomics+0xb8/0x2e0
[   18.874731]  kunit_try_run_case+0x170/0x3f0
[   18.874785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.874859]  kthread+0x328/0x630
[   18.874928]  ret_from_fork+0x10/0x20
[   18.874983] 
[   18.875006] The buggy address belongs to the object at fff00000c635c500
[   18.875006]  which belongs to the cache kmalloc-64 of size 64
[   18.875088] The buggy address is located 0 bytes to the right of
[   18.875088]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.875159] 
[   18.875182] The buggy address belongs to the physical page:
[   18.875214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.875267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.875316] page_type: f5(slab)
[   18.875504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.875589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.875654] page dumped because: kasan: bad access detected
[   18.875751] 
[   18.875813] Memory state around the buggy address:
[   18.876062]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.876238]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.876285] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.876328]                                      ^
[   18.876384]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.876725]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.876822] ==================================================================
[   18.676999] ==================================================================
[   18.677061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   18.677132] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265
[   18.677374] 
[   18.677447] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.677537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.677566] Hardware name: linux,dummy-virt (DT)
[   18.677694] Call trace:
[   18.677729]  show_stack+0x20/0x38 (C)
[   18.677902]  dump_stack_lvl+0x8c/0xd0
[   18.677955]  print_report+0x118/0x608
[   18.678004]  kasan_report+0xdc/0x128
[   18.678443]  kasan_check_range+0x100/0x1a8
[   18.678605]  __kasan_check_write+0x20/0x30
[   18.678703]  kasan_atomics_helper+0xad4/0x4858
[   18.678790]  kasan_atomics+0x198/0x2e0
[   18.678920]  kunit_try_run_case+0x170/0x3f0
[   18.678984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.679274]  kthread+0x328/0x630
[   18.679380]  ret_from_fork+0x10/0x20
[   18.679543] 
[   18.679582] Allocated by task 265:
[   18.679631]  kasan_save_stack+0x3c/0x68
[   18.679709]  kasan_save_track+0x20/0x40
[   18.679807]  kasan_save_alloc_info+0x40/0x58
[   18.679884]  __kasan_kmalloc+0xd4/0xd8
[   18.679962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.680006]  kasan_atomics+0xb8/0x2e0
[   18.680342]  kunit_try_run_case+0x170/0x3f0
[   18.680478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.680545]  kthread+0x328/0x630
[   18.680604]  ret_from_fork+0x10/0x20
[   18.680748] 
[   18.680787] The buggy address belongs to the object at fff00000c635c500
[   18.680787]  which belongs to the cache kmalloc-64 of size 64
[   18.680925] The buggy address is located 0 bytes to the right of
[   18.680925]  allocated 48-byte region [fff00000c635c500, fff00000c635c530)
[   18.681043] 
[   18.681288] The buggy address belongs to the physical page:
[   18.681436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c
[   18.681588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.681674] page_type: f5(slab)
[   18.681724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.681851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.681912] page dumped because: kasan: bad access detected
[   18.681947] 
[   18.681967] Memory state around the buggy address:
[   18.682012]  fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.682059]  fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.682126] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.682167]                                      ^
[   18.682201]  fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.682247]  fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.682298] ==================================================================

[   16.488272] ==================================================================
[   16.488870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.489423] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.489857] 
[   16.489957] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.489998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.490010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.490031] Call Trace:
[   16.490045]  <TASK>
[   16.490060]  dump_stack_lvl+0x73/0xb0
[   16.490091]  print_report+0xd1/0x650
[   16.490114]  ? __virt_addr_valid+0x1db/0x2d0
[   16.490138]  ? kasan_atomics_helper+0x5115/0x5450
[   16.490161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.490186]  ? kasan_atomics_helper+0x5115/0x5450
[   16.490209]  kasan_report+0x141/0x180
[   16.490232]  ? kasan_atomics_helper+0x5115/0x5450
[   16.490260]  __asan_report_load8_noabort+0x18/0x20
[   16.490286]  kasan_atomics_helper+0x5115/0x5450
[   16.490310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.490335]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.490376]  ? kasan_atomics+0x152/0x310
[   16.490404]  kasan_atomics+0x1dc/0x310
[   16.490429]  ? __pfx_kasan_atomics+0x10/0x10
[   16.490454]  ? __pfx_read_tsc+0x10/0x10
[   16.490476]  ? ktime_get_ts64+0x86/0x230
[   16.490502]  kunit_try_run_case+0x1a5/0x480
[   16.490527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.490551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.490576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.490602]  ? __kthread_parkme+0x82/0x180
[   16.490624]  ? preempt_count_sub+0x50/0x80
[   16.490649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.490675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.490701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.490727]  kthread+0x337/0x6f0
[   16.490747]  ? trace_preempt_on+0x20/0xc0
[   16.490772]  ? __pfx_kthread+0x10/0x10
[   16.490793]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.490817]  ? calculate_sigpending+0x7b/0xa0
[   16.490842]  ? __pfx_kthread+0x10/0x10
[   16.490864]  ret_from_fork+0x116/0x1d0
[   16.490884]  ? __pfx_kthread+0x10/0x10
[   16.490905]  ret_from_fork_asm+0x1a/0x30
[   16.490938]  </TASK>
[   16.490949] 
[   16.499101] Allocated by task 283:
[   16.499300]  kasan_save_stack+0x45/0x70
[   16.499615]  kasan_save_track+0x18/0x40
[   16.499813]  kasan_save_alloc_info+0x3b/0x50
[   16.500038]  __kasan_kmalloc+0xb7/0xc0
[   16.500254]  __kmalloc_cache_noprof+0x189/0x420
[   16.500553]  kasan_atomics+0x95/0x310
[   16.500770]  kunit_try_run_case+0x1a5/0x480
[   16.500998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.501282]  kthread+0x337/0x6f0
[   16.501514]  ret_from_fork+0x116/0x1d0
[   16.501708]  ret_from_fork_asm+0x1a/0x30
[   16.501906] 
[   16.502047] The buggy address belongs to the object at ffff8881039b8c80
[   16.502047]  which belongs to the cache kmalloc-64 of size 64
[   16.502592] The buggy address is located 0 bytes to the right of
[   16.502592]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.503151] 
[   16.503259] The buggy address belongs to the physical page:
[   16.503556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.503965] flags: 0x200000000000000(node=0|zone=2)
[   16.504236] page_type: f5(slab)
[   16.504471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.504828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.505166] page dumped because: kasan: bad access detected
[   16.505373] 
[   16.505531] Memory state around the buggy address:
[   16.505758]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.506017]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.506233] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.506747]                                      ^
[   16.507006]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507389]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507744] ==================================================================
[   15.575551] ==================================================================
[   15.575884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.576231] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.576634] 
[   15.576750] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.576792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.576805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.576826] Call Trace:
[   15.576840]  <TASK>
[   15.576855]  dump_stack_lvl+0x73/0xb0
[   15.576886]  print_report+0xd1/0x650
[   15.576908]  ? __virt_addr_valid+0x1db/0x2d0
[   15.576932]  ? kasan_atomics_helper+0xde0/0x5450
[   15.576956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.576980]  ? kasan_atomics_helper+0xde0/0x5450
[   15.577004]  kasan_report+0x141/0x180
[   15.577026]  ? kasan_atomics_helper+0xde0/0x5450
[   15.577054]  kasan_check_range+0x10c/0x1c0
[   15.577079]  __kasan_check_write+0x18/0x20
[   15.577099]  kasan_atomics_helper+0xde0/0x5450
[   15.577123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.577147]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.577173]  ? kasan_atomics+0x152/0x310
[   15.577200]  kasan_atomics+0x1dc/0x310
[   15.577224]  ? __pfx_kasan_atomics+0x10/0x10
[   15.577250]  ? __pfx_read_tsc+0x10/0x10
[   15.577273]  ? ktime_get_ts64+0x86/0x230
[   15.577297]  kunit_try_run_case+0x1a5/0x480
[   15.577322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.577361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.577387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.577455]  ? __kthread_parkme+0x82/0x180
[   15.577480]  ? preempt_count_sub+0x50/0x80
[   15.577505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.577532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.577559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.577586]  kthread+0x337/0x6f0
[   15.577606]  ? trace_preempt_on+0x20/0xc0
[   15.577630]  ? __pfx_kthread+0x10/0x10
[   15.577652]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.577675]  ? calculate_sigpending+0x7b/0xa0
[   15.577700]  ? __pfx_kthread+0x10/0x10
[   15.577723]  ret_from_fork+0x116/0x1d0
[   15.577743]  ? __pfx_kthread+0x10/0x10
[   15.577765]  ret_from_fork_asm+0x1a/0x30
[   15.577797]  </TASK>
[   15.577808] 
[   15.585188] Allocated by task 283:
[   15.585319]  kasan_save_stack+0x45/0x70
[   15.585534]  kasan_save_track+0x18/0x40
[   15.585732]  kasan_save_alloc_info+0x3b/0x50
[   15.585949]  __kasan_kmalloc+0xb7/0xc0
[   15.586388]  __kmalloc_cache_noprof+0x189/0x420
[   15.586628]  kasan_atomics+0x95/0x310
[   15.587138]  kunit_try_run_case+0x1a5/0x480
[   15.588122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.588635]  kthread+0x337/0x6f0
[   15.589119]  ret_from_fork+0x116/0x1d0
[   15.589775]  ret_from_fork_asm+0x1a/0x30
[   15.590377] 
[   15.590505] The buggy address belongs to the object at ffff8881039b8c80
[   15.590505]  which belongs to the cache kmalloc-64 of size 64
[   15.590867] The buggy address is located 0 bytes to the right of
[   15.590867]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.591235] 
[   15.591309] The buggy address belongs to the physical page:
[   15.592533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.593798] flags: 0x200000000000000(node=0|zone=2)
[   15.594573] page_type: f5(slab)
[   15.594962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.595999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.597061] page dumped because: kasan: bad access detected
[   15.597609] 
[   15.597690] Memory state around the buggy address:
[   15.597848]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.598947]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.599848] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.600510]                                      ^
[   15.601042]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.601536]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.601757] ==================================================================
[   16.200625] ==================================================================
[   16.200961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.201566] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.201867] 
[   16.201977] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.202018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.202030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.202051] Call Trace:
[   16.202066]  <TASK>
[   16.202081]  dump_stack_lvl+0x73/0xb0
[   16.202132]  print_report+0xd1/0x650
[   16.202170]  ? __virt_addr_valid+0x1db/0x2d0
[   16.202209]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.202245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.202297]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.202333]  kasan_report+0x141/0x180
[   16.202382]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.202423]  __asan_report_load8_noabort+0x18/0x20
[   16.202464]  kasan_atomics_helper+0x4f30/0x5450
[   16.202488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.202513]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.202538]  ? kasan_atomics+0x152/0x310
[   16.202566]  kasan_atomics+0x1dc/0x310
[   16.202590]  ? __pfx_kasan_atomics+0x10/0x10
[   16.202616]  ? __pfx_read_tsc+0x10/0x10
[   16.202638]  ? ktime_get_ts64+0x86/0x230
[   16.202663]  kunit_try_run_case+0x1a5/0x480
[   16.202688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.202711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.202738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.202764]  ? __kthread_parkme+0x82/0x180
[   16.202785]  ? preempt_count_sub+0x50/0x80
[   16.202821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.202846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.202871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.202899]  kthread+0x337/0x6f0
[   16.202919]  ? trace_preempt_on+0x20/0xc0
[   16.202943]  ? __pfx_kthread+0x10/0x10
[   16.202964]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.202987]  ? calculate_sigpending+0x7b/0xa0
[   16.203012]  ? __pfx_kthread+0x10/0x10
[   16.203034]  ret_from_fork+0x116/0x1d0
[   16.203054]  ? __pfx_kthread+0x10/0x10
[   16.203076]  ret_from_fork_asm+0x1a/0x30
[   16.203107]  </TASK>
[   16.203118] 
[   16.211892] Allocated by task 283:
[   16.212073]  kasan_save_stack+0x45/0x70
[   16.212265]  kasan_save_track+0x18/0x40
[   16.212805]  kasan_save_alloc_info+0x3b/0x50
[   16.213053]  __kasan_kmalloc+0xb7/0xc0
[   16.213480]  __kmalloc_cache_noprof+0x189/0x420
[   16.213763]  kasan_atomics+0x95/0x310
[   16.213952]  kunit_try_run_case+0x1a5/0x480
[   16.214143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.214695]  kthread+0x337/0x6f0
[   16.215004]  ret_from_fork+0x116/0x1d0
[   16.215318]  ret_from_fork_asm+0x1a/0x30
[   16.215704] 
[   16.215801] The buggy address belongs to the object at ffff8881039b8c80
[   16.215801]  which belongs to the cache kmalloc-64 of size 64
[   16.216274] The buggy address is located 0 bytes to the right of
[   16.216274]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.217510] 
[   16.217600] The buggy address belongs to the physical page:
[   16.217980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.218602] flags: 0x200000000000000(node=0|zone=2)
[   16.218963] page_type: f5(slab)
[   16.219249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.219925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.220380] page dumped because: kasan: bad access detected
[   16.220889] 
[   16.220993] Memory state around the buggy address:
[   16.221333]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.222131]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.222584] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.222875]                                      ^
[   16.223063]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.223356]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.224194] ==================================================================
[   16.247913] ==================================================================
[   16.248548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.248932] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.249244] 
[   16.249380] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.249424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.249437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.249478] Call Trace:
[   16.249493]  <TASK>
[   16.249508]  dump_stack_lvl+0x73/0xb0
[   16.249539]  print_report+0xd1/0x650
[   16.249562]  ? __virt_addr_valid+0x1db/0x2d0
[   16.249585]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.249608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.249649]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.249686]  kasan_report+0x141/0x180
[   16.249723]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.249777]  kasan_check_range+0x10c/0x1c0
[   16.249803]  __kasan_check_write+0x18/0x20
[   16.249837]  kasan_atomics_helper+0x1d7a/0x5450
[   16.249875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.249913]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.249952]  ? kasan_atomics+0x152/0x310
[   16.249979]  kasan_atomics+0x1dc/0x310
[   16.250003]  ? __pfx_kasan_atomics+0x10/0x10
[   16.250028]  ? __pfx_read_tsc+0x10/0x10
[   16.250051]  ? ktime_get_ts64+0x86/0x230
[   16.250075]  kunit_try_run_case+0x1a5/0x480
[   16.250100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.250124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.250148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.250174]  ? __kthread_parkme+0x82/0x180
[   16.250195]  ? preempt_count_sub+0x50/0x80
[   16.250219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.250245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.250271]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.250297]  kthread+0x337/0x6f0
[   16.250317]  ? trace_preempt_on+0x20/0xc0
[   16.250351]  ? __pfx_kthread+0x10/0x10
[   16.250373]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.250396]  ? calculate_sigpending+0x7b/0xa0
[   16.250431]  ? __pfx_kthread+0x10/0x10
[   16.250454]  ret_from_fork+0x116/0x1d0
[   16.250473]  ? __pfx_kthread+0x10/0x10
[   16.250495]  ret_from_fork_asm+0x1a/0x30
[   16.250545]  </TASK>
[   16.250556] 
[   16.258318] Allocated by task 283:
[   16.258459]  kasan_save_stack+0x45/0x70
[   16.258604]  kasan_save_track+0x18/0x40
[   16.258740]  kasan_save_alloc_info+0x3b/0x50
[   16.258952]  __kasan_kmalloc+0xb7/0xc0
[   16.259145]  __kmalloc_cache_noprof+0x189/0x420
[   16.259407]  kasan_atomics+0x95/0x310
[   16.259705]  kunit_try_run_case+0x1a5/0x480
[   16.259877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.260052]  kthread+0x337/0x6f0
[   16.260176]  ret_from_fork+0x116/0x1d0
[   16.260309]  ret_from_fork_asm+0x1a/0x30
[   16.260736] 
[   16.260836] The buggy address belongs to the object at ffff8881039b8c80
[   16.260836]  which belongs to the cache kmalloc-64 of size 64
[   16.261408] The buggy address is located 0 bytes to the right of
[   16.261408]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.262037] 
[   16.262168] The buggy address belongs to the physical page:
[   16.262451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.263077] flags: 0x200000000000000(node=0|zone=2)
[   16.263314] page_type: f5(slab)
[   16.263608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.263950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.264201] page dumped because: kasan: bad access detected
[   16.264388] 
[   16.264574] Memory state around the buggy address:
[   16.264807]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.265153]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.265543] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.265800]                                      ^
[   16.265957]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.266173]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.266597] ==================================================================
[   15.379496] ==================================================================
[   15.379841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.380178] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.380611] 
[   15.380727] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.380768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.380781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.380801] Call Trace:
[   15.380817]  <TASK>
[   15.380833]  dump_stack_lvl+0x73/0xb0
[   15.380862]  print_report+0xd1/0x650
[   15.380885]  ? __virt_addr_valid+0x1db/0x2d0
[   15.380908]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.380931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.380955]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.380979]  kasan_report+0x141/0x180
[   15.381002]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.381030]  kasan_check_range+0x10c/0x1c0
[   15.381055]  __kasan_check_write+0x18/0x20
[   15.381075]  kasan_atomics_helper+0x7c7/0x5450
[   15.381099]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.381124]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.381150]  ? kasan_atomics+0x152/0x310
[   15.381177]  kasan_atomics+0x1dc/0x310
[   15.381201]  ? __pfx_kasan_atomics+0x10/0x10
[   15.381227]  ? __pfx_read_tsc+0x10/0x10
[   15.381249]  ? ktime_get_ts64+0x86/0x230
[   15.381274]  kunit_try_run_case+0x1a5/0x480
[   15.381299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.381323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.381436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.381469]  ? __kthread_parkme+0x82/0x180
[   15.381491]  ? preempt_count_sub+0x50/0x80
[   15.381516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.381542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.381569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.381596]  kthread+0x337/0x6f0
[   15.381616]  ? trace_preempt_on+0x20/0xc0
[   15.381640]  ? __pfx_kthread+0x10/0x10
[   15.381661]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.381684]  ? calculate_sigpending+0x7b/0xa0
[   15.381707]  ? __pfx_kthread+0x10/0x10
[   15.381750]  ret_from_fork+0x116/0x1d0
[   15.381784]  ? __pfx_kthread+0x10/0x10
[   15.381806]  ret_from_fork_asm+0x1a/0x30
[   15.381850]  </TASK>
[   15.381875] 
[   15.390514] Allocated by task 283:
[   15.390693]  kasan_save_stack+0x45/0x70
[   15.390870]  kasan_save_track+0x18/0x40
[   15.391009]  kasan_save_alloc_info+0x3b/0x50
[   15.391157]  __kasan_kmalloc+0xb7/0xc0
[   15.391308]  __kmalloc_cache_noprof+0x189/0x420
[   15.391842]  kasan_atomics+0x95/0x310
[   15.392063]  kunit_try_run_case+0x1a5/0x480
[   15.392303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.392632]  kthread+0x337/0x6f0
[   15.392789]  ret_from_fork+0x116/0x1d0
[   15.393277]  ret_from_fork_asm+0x1a/0x30
[   15.393453] 
[   15.393561] The buggy address belongs to the object at ffff8881039b8c80
[   15.393561]  which belongs to the cache kmalloc-64 of size 64
[   15.394167] The buggy address is located 0 bytes to the right of
[   15.394167]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.394541] 
[   15.394614] The buggy address belongs to the physical page:
[   15.394782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.395014] flags: 0x200000000000000(node=0|zone=2)
[   15.395174] page_type: f5(slab)
[   15.395343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.396053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.396480] page dumped because: kasan: bad access detected
[   15.396777] 
[   15.396908] Memory state around the buggy address:
[   15.397151]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.397590]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.397977] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.398290]                                      ^
[   15.398531]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.399630]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.399951] ==================================================================
[   16.098274] ==================================================================
[   16.098960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.099283] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.100127] 
[   16.100401] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.100576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.100592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.100613] Call Trace:
[   16.100626]  <TASK>
[   16.100641]  dump_stack_lvl+0x73/0xb0
[   16.100681]  print_report+0xd1/0x650
[   16.100706]  ? __virt_addr_valid+0x1db/0x2d0
[   16.100730]  ? kasan_atomics_helper+0x194a/0x5450
[   16.100754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.100779]  ? kasan_atomics_helper+0x194a/0x5450
[   16.100803]  kasan_report+0x141/0x180
[   16.100826]  ? kasan_atomics_helper+0x194a/0x5450
[   16.100854]  kasan_check_range+0x10c/0x1c0
[   16.100878]  __kasan_check_write+0x18/0x20
[   16.100898]  kasan_atomics_helper+0x194a/0x5450
[   16.100922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.100946]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.100972]  ? kasan_atomics+0x152/0x310
[   16.100999]  kasan_atomics+0x1dc/0x310
[   16.101023]  ? __pfx_kasan_atomics+0x10/0x10
[   16.101048]  ? __pfx_read_tsc+0x10/0x10
[   16.101070]  ? ktime_get_ts64+0x86/0x230
[   16.101094]  kunit_try_run_case+0x1a5/0x480
[   16.101118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.101142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.101167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.101192]  ? __kthread_parkme+0x82/0x180
[   16.101213]  ? preempt_count_sub+0x50/0x80
[   16.101238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.101264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.101290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.101316]  kthread+0x337/0x6f0
[   16.101335]  ? trace_preempt_on+0x20/0xc0
[   16.101370]  ? __pfx_kthread+0x10/0x10
[   16.101392]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.101428]  ? calculate_sigpending+0x7b/0xa0
[   16.101453]  ? __pfx_kthread+0x10/0x10
[   16.101476]  ret_from_fork+0x116/0x1d0
[   16.101494]  ? __pfx_kthread+0x10/0x10
[   16.101515]  ret_from_fork_asm+0x1a/0x30
[   16.101547]  </TASK>
[   16.101559] 
[   16.108875] Allocated by task 283:
[   16.109055]  kasan_save_stack+0x45/0x70
[   16.109214]  kasan_save_track+0x18/0x40
[   16.109359]  kasan_save_alloc_info+0x3b/0x50
[   16.109505]  __kasan_kmalloc+0xb7/0xc0
[   16.109688]  __kmalloc_cache_noprof+0x189/0x420
[   16.109906]  kasan_atomics+0x95/0x310
[   16.110193]  kunit_try_run_case+0x1a5/0x480
[   16.110418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.110597]  kthread+0x337/0x6f0
[   16.110717]  ret_from_fork+0x116/0x1d0
[   16.110846]  ret_from_fork_asm+0x1a/0x30
[   16.110982] 
[   16.111069] The buggy address belongs to the object at ffff8881039b8c80
[   16.111069]  which belongs to the cache kmalloc-64 of size 64
[   16.111626] The buggy address is located 0 bytes to the right of
[   16.111626]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.112282] 
[   16.112363] The buggy address belongs to the physical page:
[   16.112532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.113000] flags: 0x200000000000000(node=0|zone=2)
[   16.113228] page_type: f5(slab)
[   16.113403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.113699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.113919] page dumped because: kasan: bad access detected
[   16.114108] 
[   16.114200] Memory state around the buggy address:
[   16.114473]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.114798]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.115140] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.115365]                                      ^
[   16.115742]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.116021]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.116327] ==================================================================
[   16.157633] ==================================================================
[   16.157962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.158669] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.159005] 
[   16.159249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.159316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.159355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.159377] Call Trace:
[   16.159392]  <TASK>
[   16.159421]  dump_stack_lvl+0x73/0xb0
[   16.159609]  print_report+0xd1/0x650
[   16.159634]  ? __virt_addr_valid+0x1db/0x2d0
[   16.159658]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.159682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.159707]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.159729]  kasan_report+0x141/0x180
[   16.159752]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.159780]  kasan_check_range+0x10c/0x1c0
[   16.159805]  __kasan_check_write+0x18/0x20
[   16.159826]  kasan_atomics_helper+0x1b22/0x5450
[   16.159850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.159874]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.159900]  ? kasan_atomics+0x152/0x310
[   16.159927]  kasan_atomics+0x1dc/0x310
[   16.159953]  ? __pfx_kasan_atomics+0x10/0x10
[   16.159979]  ? __pfx_read_tsc+0x10/0x10
[   16.160001]  ? ktime_get_ts64+0x86/0x230
[   16.160026]  kunit_try_run_case+0x1a5/0x480
[   16.160050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.160101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.160126]  ? __kthread_parkme+0x82/0x180
[   16.160147]  ? preempt_count_sub+0x50/0x80
[   16.160177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.160227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.160254]  kthread+0x337/0x6f0
[   16.160274]  ? trace_preempt_on+0x20/0xc0
[   16.160297]  ? __pfx_kthread+0x10/0x10
[   16.160319]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.160353]  ? calculate_sigpending+0x7b/0xa0
[   16.160379]  ? __pfx_kthread+0x10/0x10
[   16.160401]  ret_from_fork+0x116/0x1d0
[   16.160433]  ? __pfx_kthread+0x10/0x10
[   16.160455]  ret_from_fork_asm+0x1a/0x30
[   16.160486]  </TASK>
[   16.160497] 
[   16.170535] Allocated by task 283:
[   16.170897]  kasan_save_stack+0x45/0x70
[   16.171154]  kasan_save_track+0x18/0x40
[   16.171437]  kasan_save_alloc_info+0x3b/0x50
[   16.171851]  __kasan_kmalloc+0xb7/0xc0
[   16.172136]  __kmalloc_cache_noprof+0x189/0x420
[   16.172296]  kasan_atomics+0x95/0x310
[   16.172466]  kunit_try_run_case+0x1a5/0x480
[   16.172884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.173378]  kthread+0x337/0x6f0
[   16.173700]  ret_from_fork+0x116/0x1d0
[   16.174050]  ret_from_fork_asm+0x1a/0x30
[   16.174447] 
[   16.174581] The buggy address belongs to the object at ffff8881039b8c80
[   16.174581]  which belongs to the cache kmalloc-64 of size 64
[   16.174918] The buggy address is located 0 bytes to the right of
[   16.174918]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.175269] 
[   16.175339] The buggy address belongs to the physical page:
[   16.175587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.176060] flags: 0x200000000000000(node=0|zone=2)
[   16.176228] page_type: f5(slab)
[   16.176373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.177016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.177392] page dumped because: kasan: bad access detected
[   16.177949] 
[   16.178036] Memory state around the buggy address:
[   16.178482]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.178816]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.179235] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.179770]                                      ^
[   16.179971]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180364]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180786] ==================================================================
[   16.387264] ==================================================================
[   16.387633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.387988] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.388321] 
[   16.388463] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.388518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.388530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.388550] Call Trace:
[   16.388567]  <TASK>
[   16.388591]  dump_stack_lvl+0x73/0xb0
[   16.388620]  print_report+0xd1/0x650
[   16.388643]  ? __virt_addr_valid+0x1db/0x2d0
[   16.388677]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.388700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.388724]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.388756]  kasan_report+0x141/0x180
[   16.388779]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.388807]  kasan_check_range+0x10c/0x1c0
[   16.388842]  __kasan_check_write+0x18/0x20
[   16.388863]  kasan_atomics_helper+0x20c8/0x5450
[   16.388887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.388910]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.388936]  ? kasan_atomics+0x152/0x310
[   16.388964]  kasan_atomics+0x1dc/0x310
[   16.388987]  ? __pfx_kasan_atomics+0x10/0x10
[   16.389013]  ? __pfx_read_tsc+0x10/0x10
[   16.389035]  ? ktime_get_ts64+0x86/0x230
[   16.389059]  kunit_try_run_case+0x1a5/0x480
[   16.389084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.389108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.389133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.389158]  ? __kthread_parkme+0x82/0x180
[   16.389180]  ? preempt_count_sub+0x50/0x80
[   16.389204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.389230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.389255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.389281]  kthread+0x337/0x6f0
[   16.389301]  ? trace_preempt_on+0x20/0xc0
[   16.389325]  ? __pfx_kthread+0x10/0x10
[   16.389359]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.389390]  ? calculate_sigpending+0x7b/0xa0
[   16.389438]  ? __pfx_kthread+0x10/0x10
[   16.389461]  ret_from_fork+0x116/0x1d0
[   16.389481]  ? __pfx_kthread+0x10/0x10
[   16.389503]  ret_from_fork_asm+0x1a/0x30
[   16.389535]  </TASK>
[   16.389545] 
[   16.397127] Allocated by task 283:
[   16.397300]  kasan_save_stack+0x45/0x70
[   16.397515]  kasan_save_track+0x18/0x40
[   16.397655]  kasan_save_alloc_info+0x3b/0x50
[   16.397806]  __kasan_kmalloc+0xb7/0xc0
[   16.397984]  __kmalloc_cache_noprof+0x189/0x420
[   16.398241]  kasan_atomics+0x95/0x310
[   16.398493]  kunit_try_run_case+0x1a5/0x480
[   16.398711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398965]  kthread+0x337/0x6f0
[   16.399113]  ret_from_fork+0x116/0x1d0
[   16.399247]  ret_from_fork_asm+0x1a/0x30
[   16.399456] 
[   16.399556] The buggy address belongs to the object at ffff8881039b8c80
[   16.399556]  which belongs to the cache kmalloc-64 of size 64
[   16.400074] The buggy address is located 0 bytes to the right of
[   16.400074]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.400636] 
[   16.400710] The buggy address belongs to the physical page:
[   16.400882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.401125] flags: 0x200000000000000(node=0|zone=2)
[   16.401291] page_type: f5(slab)
[   16.401512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.401852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.402201] page dumped because: kasan: bad access detected
[   16.402489] 
[   16.402586] Memory state around the buggy address:
[   16.402835]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.403154]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.403405] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.403620]                                      ^
[   16.403774]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404069]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404408] ==================================================================
[   15.927218] ==================================================================
[   15.927575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.928028] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.928261] 
[   15.928438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.928483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.928509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.928530] Call Trace:
[   15.928543]  <TASK>
[   15.928557]  dump_stack_lvl+0x73/0xb0
[   15.928616]  print_report+0xd1/0x650
[   15.928639]  ? __virt_addr_valid+0x1db/0x2d0
[   15.928674]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.928697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.928721]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.928745]  kasan_report+0x141/0x180
[   15.928767]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.928794]  __asan_report_store8_noabort+0x1b/0x30
[   15.928821]  kasan_atomics_helper+0x50d4/0x5450
[   15.928846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.928870]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.928896]  ? kasan_atomics+0x152/0x310
[   15.928924]  kasan_atomics+0x1dc/0x310
[   15.928947]  ? __pfx_kasan_atomics+0x10/0x10
[   15.928973]  ? __pfx_read_tsc+0x10/0x10
[   15.928995]  ? ktime_get_ts64+0x86/0x230
[   15.929019]  kunit_try_run_case+0x1a5/0x480
[   15.929044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.929100]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.929125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.929178]  ? __kthread_parkme+0x82/0x180
[   15.929201]  ? preempt_count_sub+0x50/0x80
[   15.929225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.929263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.929289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.929315]  kthread+0x337/0x6f0
[   15.929335]  ? trace_preempt_on+0x20/0xc0
[   15.929371]  ? __pfx_kthread+0x10/0x10
[   15.929393]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.929415]  ? calculate_sigpending+0x7b/0xa0
[   15.929440]  ? __pfx_kthread+0x10/0x10
[   15.929462]  ret_from_fork+0x116/0x1d0
[   15.929482]  ? __pfx_kthread+0x10/0x10
[   15.929504]  ret_from_fork_asm+0x1a/0x30
[   15.929535]  </TASK>
[   15.929546] 
[   15.937649] Allocated by task 283:
[   15.937780]  kasan_save_stack+0x45/0x70
[   15.938031]  kasan_save_track+0x18/0x40
[   15.938225]  kasan_save_alloc_info+0x3b/0x50
[   15.938532]  __kasan_kmalloc+0xb7/0xc0
[   15.938684]  __kmalloc_cache_noprof+0x189/0x420
[   15.938844]  kasan_atomics+0x95/0x310
[   15.939018]  kunit_try_run_case+0x1a5/0x480
[   15.939250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939639]  kthread+0x337/0x6f0
[   15.939853]  ret_from_fork+0x116/0x1d0
[   15.940044]  ret_from_fork_asm+0x1a/0x30
[   15.940192] 
[   15.940366] The buggy address belongs to the object at ffff8881039b8c80
[   15.940366]  which belongs to the cache kmalloc-64 of size 64
[   15.940823] The buggy address is located 0 bytes to the right of
[   15.940823]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.941174] 
[   15.941266] The buggy address belongs to the physical page:
[   15.941636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.942001] flags: 0x200000000000000(node=0|zone=2)
[   15.942212] page_type: f5(slab)
[   15.942365] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.942713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.943065] page dumped because: kasan: bad access detected
[   15.943315] 
[   15.943425] Memory state around the buggy address:
[   15.943647]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.943958]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.944171] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.944425]                                      ^
[   15.944683]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945019]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945402] ==================================================================
[   15.185074] ==================================================================
[   15.185335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.186171] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.186930] 
[   15.187158] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.187206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.187219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.187239] Call Trace:
[   15.187254]  <TASK>
[   15.187427]  dump_stack_lvl+0x73/0xb0
[   15.187462]  print_report+0xd1/0x650
[   15.187485]  ? __virt_addr_valid+0x1db/0x2d0
[   15.187509]  ? kasan_atomics_helper+0x3df/0x5450
[   15.187531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.187556]  ? kasan_atomics_helper+0x3df/0x5450
[   15.187579]  kasan_report+0x141/0x180
[   15.187602]  ? kasan_atomics_helper+0x3df/0x5450
[   15.187630]  kasan_check_range+0x10c/0x1c0
[   15.187655]  __kasan_check_read+0x15/0x20
[   15.187675]  kasan_atomics_helper+0x3df/0x5450
[   15.187699]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.187723]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.187750]  ? kasan_atomics+0x152/0x310
[   15.187777]  kasan_atomics+0x1dc/0x310
[   15.187800]  ? __pfx_kasan_atomics+0x10/0x10
[   15.187825]  ? __pfx_read_tsc+0x10/0x10
[   15.187847]  ? ktime_get_ts64+0x86/0x230
[   15.187871]  kunit_try_run_case+0x1a5/0x480
[   15.187897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.187921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.187946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.187972]  ? __kthread_parkme+0x82/0x180
[   15.187993]  ? preempt_count_sub+0x50/0x80
[   15.188018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.188070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.188097]  kthread+0x337/0x6f0
[   15.188117]  ? trace_preempt_on+0x20/0xc0
[   15.188142]  ? __pfx_kthread+0x10/0x10
[   15.188164]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.188191]  ? calculate_sigpending+0x7b/0xa0
[   15.188217]  ? __pfx_kthread+0x10/0x10
[   15.188239]  ret_from_fork+0x116/0x1d0
[   15.188259]  ? __pfx_kthread+0x10/0x10
[   15.188281]  ret_from_fork_asm+0x1a/0x30
[   15.188312]  </TASK>
[   15.188323] 
[   15.200010] Allocated by task 283:
[   15.200333]  kasan_save_stack+0x45/0x70
[   15.200697]  kasan_save_track+0x18/0x40
[   15.200866]  kasan_save_alloc_info+0x3b/0x50
[   15.201087]  __kasan_kmalloc+0xb7/0xc0
[   15.201261]  __kmalloc_cache_noprof+0x189/0x420
[   15.201871]  kasan_atomics+0x95/0x310
[   15.202040]  kunit_try_run_case+0x1a5/0x480
[   15.202394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.202958]  kthread+0x337/0x6f0
[   15.203105]  ret_from_fork+0x116/0x1d0
[   15.203563]  ret_from_fork_asm+0x1a/0x30
[   15.203890] 
[   15.204091] The buggy address belongs to the object at ffff8881039b8c80
[   15.204091]  which belongs to the cache kmalloc-64 of size 64
[   15.205094] The buggy address is located 0 bytes to the right of
[   15.205094]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.205874] 
[   15.205959] The buggy address belongs to the physical page:
[   15.206275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.206845] flags: 0x200000000000000(node=0|zone=2)
[   15.207169] page_type: f5(slab)
[   15.207510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.207927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.208237] page dumped because: kasan: bad access detected
[   15.208787] 
[   15.208884] Memory state around the buggy address:
[   15.209231]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.209712]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.210027] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.210361]                                      ^
[   15.210965]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.211367]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.211862] ==================================================================
[   15.689074] ==================================================================
[   15.689783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.690162] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.690676] 
[   15.690796] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.690836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.690848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.690879] Call Trace:
[   15.690892]  <TASK>
[   15.690906]  dump_stack_lvl+0x73/0xb0
[   15.690935]  print_report+0xd1/0x650
[   15.690968]  ? __virt_addr_valid+0x1db/0x2d0
[   15.690991]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.691013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.691048]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.691072]  kasan_report+0x141/0x180
[   15.691094]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.691130]  __asan_report_load4_noabort+0x18/0x20
[   15.691156]  kasan_atomics_helper+0x4a36/0x5450
[   15.691180]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.691215]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.691242]  ? kasan_atomics+0x152/0x310
[   15.691270]  kasan_atomics+0x1dc/0x310
[   15.691293]  ? __pfx_kasan_atomics+0x10/0x10
[   15.691319]  ? __pfx_read_tsc+0x10/0x10
[   15.691342]  ? ktime_get_ts64+0x86/0x230
[   15.691377]  kunit_try_run_case+0x1a5/0x480
[   15.691402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.691434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.691468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.691494]  ? __kthread_parkme+0x82/0x180
[   15.691516]  ? preempt_count_sub+0x50/0x80
[   15.691551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.691577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.691603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.691630]  kthread+0x337/0x6f0
[   15.691650]  ? trace_preempt_on+0x20/0xc0
[   15.691676]  ? __pfx_kthread+0x10/0x10
[   15.691698]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.691729]  ? calculate_sigpending+0x7b/0xa0
[   15.691755]  ? __pfx_kthread+0x10/0x10
[   15.691777]  ret_from_fork+0x116/0x1d0
[   15.691807]  ? __pfx_kthread+0x10/0x10
[   15.691828]  ret_from_fork_asm+0x1a/0x30
[   15.691860]  </TASK>
[   15.691872] 
[   15.699546] Allocated by task 283:
[   15.699827]  kasan_save_stack+0x45/0x70
[   15.699967]  kasan_save_track+0x18/0x40
[   15.700100]  kasan_save_alloc_info+0x3b/0x50
[   15.700252]  __kasan_kmalloc+0xb7/0xc0
[   15.700414]  __kmalloc_cache_noprof+0x189/0x420
[   15.700643]  kasan_atomics+0x95/0x310
[   15.700863]  kunit_try_run_case+0x1a5/0x480
[   15.701109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701404]  kthread+0x337/0x6f0
[   15.701585]  ret_from_fork+0x116/0x1d0
[   15.701784]  ret_from_fork_asm+0x1a/0x30
[   15.702020] 
[   15.702129] The buggy address belongs to the object at ffff8881039b8c80
[   15.702129]  which belongs to the cache kmalloc-64 of size 64
[   15.702697] The buggy address is located 0 bytes to the right of
[   15.702697]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.703126] 
[   15.703198] The buggy address belongs to the physical page:
[   15.703388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.703771] flags: 0x200000000000000(node=0|zone=2)
[   15.704028] page_type: f5(slab)
[   15.704230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.704564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.704841] page dumped because: kasan: bad access detected
[   15.705120] 
[   15.705214] Memory state around the buggy address:
[   15.705468]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705734]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.706040] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.706334]                                      ^
[   15.706580]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.706794]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707007] ==================================================================
[   15.868563] ==================================================================
[   15.868919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.869278] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.869507] 
[   15.869588] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.869627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.869638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.869675] Call Trace:
[   15.869722]  <TASK>
[   15.869736]  dump_stack_lvl+0x73/0xb0
[   15.869765]  print_report+0xd1/0x650
[   15.869801]  ? __virt_addr_valid+0x1db/0x2d0
[   15.869824]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.869847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.869871]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.869895]  kasan_report+0x141/0x180
[   15.869917]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.869945]  kasan_check_range+0x10c/0x1c0
[   15.869969]  __kasan_check_read+0x15/0x20
[   15.869989]  kasan_atomics_helper+0x13b5/0x5450
[   15.870013]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.870037]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.870063]  ? kasan_atomics+0x152/0x310
[   15.870089]  kasan_atomics+0x1dc/0x310
[   15.870113]  ? __pfx_kasan_atomics+0x10/0x10
[   15.870138]  ? __pfx_read_tsc+0x10/0x10
[   15.870161]  ? ktime_get_ts64+0x86/0x230
[   15.870185]  kunit_try_run_case+0x1a5/0x480
[   15.870210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.870258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.870283]  ? __kthread_parkme+0x82/0x180
[   15.870305]  ? preempt_count_sub+0x50/0x80
[   15.870329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.870390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.870460]  kthread+0x337/0x6f0
[   15.870492]  ? trace_preempt_on+0x20/0xc0
[   15.870527]  ? __pfx_kthread+0x10/0x10
[   15.870549]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.870572]  ? calculate_sigpending+0x7b/0xa0
[   15.870597]  ? __pfx_kthread+0x10/0x10
[   15.870620]  ret_from_fork+0x116/0x1d0
[   15.870639]  ? __pfx_kthread+0x10/0x10
[   15.870660]  ret_from_fork_asm+0x1a/0x30
[   15.870692]  </TASK>
[   15.870703] 
[   15.878589] Allocated by task 283:
[   15.878831]  kasan_save_stack+0x45/0x70
[   15.879072]  kasan_save_track+0x18/0x40
[   15.879322]  kasan_save_alloc_info+0x3b/0x50
[   15.879560]  __kasan_kmalloc+0xb7/0xc0
[   15.879697]  __kmalloc_cache_noprof+0x189/0x420
[   15.879854]  kasan_atomics+0x95/0x310
[   15.879988]  kunit_try_run_case+0x1a5/0x480
[   15.880203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.880567]  kthread+0x337/0x6f0
[   15.880754]  ret_from_fork+0x116/0x1d0
[   15.880944]  ret_from_fork_asm+0x1a/0x30
[   15.881145] 
[   15.881243] The buggy address belongs to the object at ffff8881039b8c80
[   15.881243]  which belongs to the cache kmalloc-64 of size 64
[   15.881834] The buggy address is located 0 bytes to the right of
[   15.881834]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.882315] 
[   15.882399] The buggy address belongs to the physical page:
[   15.882574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.882972] flags: 0x200000000000000(node=0|zone=2)
[   15.883210] page_type: f5(slab)
[   15.883385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.883854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.884216] page dumped because: kasan: bad access detected
[   15.884401] 
[   15.884507] Memory state around the buggy address:
[   15.884767]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.885151]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.885378] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.885646]                                      ^
[   15.885874]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.886195]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.886671] ==================================================================
[   15.906059] ==================================================================
[   15.906553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.906959] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.907209] 
[   15.907320] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.907406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.907418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.907451] Call Trace:
[   15.907466]  <TASK>
[   15.907489]  dump_stack_lvl+0x73/0xb0
[   15.907549]  print_report+0xd1/0x650
[   15.907573]  ? __virt_addr_valid+0x1db/0x2d0
[   15.907609]  ? kasan_atomics_helper+0x1467/0x5450
[   15.907631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.907655]  ? kasan_atomics_helper+0x1467/0x5450
[   15.907678]  kasan_report+0x141/0x180
[   15.907701]  ? kasan_atomics_helper+0x1467/0x5450
[   15.907729]  kasan_check_range+0x10c/0x1c0
[   15.907753]  __kasan_check_write+0x18/0x20
[   15.907773]  kasan_atomics_helper+0x1467/0x5450
[   15.907798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.907853]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.907880]  ? kasan_atomics+0x152/0x310
[   15.907918]  kasan_atomics+0x1dc/0x310
[   15.907942]  ? __pfx_kasan_atomics+0x10/0x10
[   15.907994]  ? __pfx_read_tsc+0x10/0x10
[   15.908017]  ? ktime_get_ts64+0x86/0x230
[   15.908064]  kunit_try_run_case+0x1a5/0x480
[   15.908115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.908168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.908204]  ? __kthread_parkme+0x82/0x180
[   15.908227]  ? preempt_count_sub+0x50/0x80
[   15.908252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.908330]  kthread+0x337/0x6f0
[   15.908374]  ? trace_preempt_on+0x20/0xc0
[   15.908398]  ? __pfx_kthread+0x10/0x10
[   15.908432]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.908454]  ? calculate_sigpending+0x7b/0xa0
[   15.908479]  ? __pfx_kthread+0x10/0x10
[   15.908514]  ret_from_fork+0x116/0x1d0
[   15.908533]  ? __pfx_kthread+0x10/0x10
[   15.908554]  ret_from_fork_asm+0x1a/0x30
[   15.908597]  </TASK>
[   15.908608] 
[   15.917693] Allocated by task 283:
[   15.917854]  kasan_save_stack+0x45/0x70
[   15.918332]  kasan_save_track+0x18/0x40
[   15.918709]  kasan_save_alloc_info+0x3b/0x50
[   15.918947]  __kasan_kmalloc+0xb7/0xc0
[   15.919139]  __kmalloc_cache_noprof+0x189/0x420
[   15.919356]  kasan_atomics+0x95/0x310
[   15.919573]  kunit_try_run_case+0x1a5/0x480
[   15.919722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.920198]  kthread+0x337/0x6f0
[   15.920599]  ret_from_fork+0x116/0x1d0
[   15.920746]  ret_from_fork_asm+0x1a/0x30
[   15.920945] 
[   15.921030] The buggy address belongs to the object at ffff8881039b8c80
[   15.921030]  which belongs to the cache kmalloc-64 of size 64
[   15.921510] The buggy address is located 0 bytes to the right of
[   15.921510]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.922162] 
[   15.922286] The buggy address belongs to the physical page:
[   15.922483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.922880] flags: 0x200000000000000(node=0|zone=2)
[   15.923228] page_type: f5(slab)
[   15.923405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.923792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.924129] page dumped because: kasan: bad access detected
[   15.924450] 
[   15.924582] Memory state around the buggy address:
[   15.924868]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.925120]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.925509] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.925873]                                      ^
[   15.926102]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.926502]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.926797] ==================================================================
[   15.809301] ==================================================================
[   15.809779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.810038] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.810375] 
[   15.810536] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.810576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.810588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.810609] Call Trace:
[   15.810623]  <TASK>
[   15.810636]  dump_stack_lvl+0x73/0xb0
[   15.810664]  print_report+0xd1/0x650
[   15.810687]  ? __virt_addr_valid+0x1db/0x2d0
[   15.810711]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.810734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.810759]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.810782]  kasan_report+0x141/0x180
[   15.810804]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.810832]  __asan_report_load4_noabort+0x18/0x20
[   15.810857]  kasan_atomics_helper+0x49e8/0x5450
[   15.810881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.810905]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.810931]  ? kasan_atomics+0x152/0x310
[   15.810958]  kasan_atomics+0x1dc/0x310
[   15.810982]  ? __pfx_kasan_atomics+0x10/0x10
[   15.811007]  ? __pfx_read_tsc+0x10/0x10
[   15.811029]  ? ktime_get_ts64+0x86/0x230
[   15.811053]  kunit_try_run_case+0x1a5/0x480
[   15.811078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.811102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.811127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.811153]  ? __kthread_parkme+0x82/0x180
[   15.811176]  ? preempt_count_sub+0x50/0x80
[   15.811201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.811227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.811253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.811279]  kthread+0x337/0x6f0
[   15.811299]  ? trace_preempt_on+0x20/0xc0
[   15.811322]  ? __pfx_kthread+0x10/0x10
[   15.811356]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.811379]  ? calculate_sigpending+0x7b/0xa0
[   15.811404]  ? __pfx_kthread+0x10/0x10
[   15.811426]  ret_from_fork+0x116/0x1d0
[   15.811446]  ? __pfx_kthread+0x10/0x10
[   15.811468]  ret_from_fork_asm+0x1a/0x30
[   15.811500]  </TASK>
[   15.811511] 
[   15.821173] Allocated by task 283:
[   15.821354]  kasan_save_stack+0x45/0x70
[   15.822072]  kasan_save_track+0x18/0x40
[   15.822595]  kasan_save_alloc_info+0x3b/0x50
[   15.822770]  __kasan_kmalloc+0xb7/0xc0
[   15.822908]  __kmalloc_cache_noprof+0x189/0x420
[   15.823068]  kasan_atomics+0x95/0x310
[   15.823205]  kunit_try_run_case+0x1a5/0x480
[   15.823369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.823634]  kthread+0x337/0x6f0
[   15.823891]  ret_from_fork+0x116/0x1d0
[   15.824084]  ret_from_fork_asm+0x1a/0x30
[   15.824283] 
[   15.824491] The buggy address belongs to the object at ffff8881039b8c80
[   15.824491]  which belongs to the cache kmalloc-64 of size 64
[   15.825030] The buggy address is located 0 bytes to the right of
[   15.825030]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.825651] 
[   15.825816] The buggy address belongs to the physical page:
[   15.826029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.826412] flags: 0x200000000000000(node=0|zone=2)
[   15.826639] page_type: f5(slab)
[   15.826771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.827089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.827492] page dumped because: kasan: bad access detected
[   15.827736] 
[   15.827813] Memory state around the buggy address:
[   15.827963]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.828449]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.828773] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.829043]                                      ^
[   15.829272]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.829697]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.829963] ==================================================================
[   16.315597] ==================================================================
[   16.315954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.316201] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.316526] 
[   16.316641] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.316686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.316699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.316721] Call Trace:
[   16.316737]  <TASK>
[   16.316753]  dump_stack_lvl+0x73/0xb0
[   16.316783]  print_report+0xd1/0x650
[   16.316807]  ? __virt_addr_valid+0x1db/0x2d0
[   16.316830]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.316853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.316877]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.316900]  kasan_report+0x141/0x180
[   16.316923]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.316963]  kasan_check_range+0x10c/0x1c0
[   16.316988]  __kasan_check_write+0x18/0x20
[   16.317010]  kasan_atomics_helper+0x1f43/0x5450
[   16.317045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.317071]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.317097]  ? kasan_atomics+0x152/0x310
[   16.317125]  kasan_atomics+0x1dc/0x310
[   16.317149]  ? __pfx_kasan_atomics+0x10/0x10
[   16.317178]  ? __pfx_read_tsc+0x10/0x10
[   16.317201]  ? ktime_get_ts64+0x86/0x230
[   16.317227]  kunit_try_run_case+0x1a5/0x480
[   16.317252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.317277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.317312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.317337]  ? __kthread_parkme+0x82/0x180
[   16.317374]  ? preempt_count_sub+0x50/0x80
[   16.317419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.317446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.317482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.317508]  kthread+0x337/0x6f0
[   16.317528]  ? trace_preempt_on+0x20/0xc0
[   16.317563]  ? __pfx_kthread+0x10/0x10
[   16.317585]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.317609]  ? calculate_sigpending+0x7b/0xa0
[   16.317633]  ? __pfx_kthread+0x10/0x10
[   16.317655]  ret_from_fork+0x116/0x1d0
[   16.317675]  ? __pfx_kthread+0x10/0x10
[   16.317696]  ret_from_fork_asm+0x1a/0x30
[   16.317727]  </TASK>
[   16.317739] 
[   16.325313] Allocated by task 283:
[   16.325538]  kasan_save_stack+0x45/0x70
[   16.325744]  kasan_save_track+0x18/0x40
[   16.325936]  kasan_save_alloc_info+0x3b/0x50
[   16.326149]  __kasan_kmalloc+0xb7/0xc0
[   16.326312]  __kmalloc_cache_noprof+0x189/0x420
[   16.326513]  kasan_atomics+0x95/0x310
[   16.326705]  kunit_try_run_case+0x1a5/0x480
[   16.326915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.327183]  kthread+0x337/0x6f0
[   16.327308]  ret_from_fork+0x116/0x1d0
[   16.327475]  ret_from_fork_asm+0x1a/0x30
[   16.327618] 
[   16.327738] The buggy address belongs to the object at ffff8881039b8c80
[   16.327738]  which belongs to the cache kmalloc-64 of size 64
[   16.328268] The buggy address is located 0 bytes to the right of
[   16.328268]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.328843] 
[   16.328921] The buggy address belongs to the physical page:
[   16.329178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.329455] flags: 0x200000000000000(node=0|zone=2)
[   16.329673] page_type: f5(slab)
[   16.329859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.330236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.330564] page dumped because: kasan: bad access detected
[   16.330820] 
[   16.330925] Memory state around the buggy address:
[   16.331139]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.331461]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.331776] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.332080]                                      ^
[   16.332271]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.332610]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.332920] ==================================================================
[   15.478235] ==================================================================
[   15.478670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.478962] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.479294] 
[   15.479483] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.479527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.479540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.479562] Call Trace:
[   15.479576]  <TASK>
[   15.479590]  dump_stack_lvl+0x73/0xb0
[   15.479620]  print_report+0xd1/0x650
[   15.479643]  ? __virt_addr_valid+0x1db/0x2d0
[   15.479668]  ? kasan_atomics_helper+0xac7/0x5450
[   15.479690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.479714]  ? kasan_atomics_helper+0xac7/0x5450
[   15.479737]  kasan_report+0x141/0x180
[   15.479760]  ? kasan_atomics_helper+0xac7/0x5450
[   15.479787]  kasan_check_range+0x10c/0x1c0
[   15.479812]  __kasan_check_write+0x18/0x20
[   15.479834]  kasan_atomics_helper+0xac7/0x5450
[   15.479857]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.479881]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.479907]  ? kasan_atomics+0x152/0x310
[   15.479934]  kasan_atomics+0x1dc/0x310
[   15.479958]  ? __pfx_kasan_atomics+0x10/0x10
[   15.479985]  ? __pfx_read_tsc+0x10/0x10
[   15.480007]  ? ktime_get_ts64+0x86/0x230
[   15.480031]  kunit_try_run_case+0x1a5/0x480
[   15.480056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.480105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.480130]  ? __kthread_parkme+0x82/0x180
[   15.480152]  ? preempt_count_sub+0x50/0x80
[   15.480186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.480264]  kthread+0x337/0x6f0
[   15.480284]  ? trace_preempt_on+0x20/0xc0
[   15.480308]  ? __pfx_kthread+0x10/0x10
[   15.480330]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.480425]  ? calculate_sigpending+0x7b/0xa0
[   15.480452]  ? __pfx_kthread+0x10/0x10
[   15.480474]  ret_from_fork+0x116/0x1d0
[   15.480494]  ? __pfx_kthread+0x10/0x10
[   15.480515]  ret_from_fork_asm+0x1a/0x30
[   15.480547]  </TASK>
[   15.480558] 
[   15.488220] Allocated by task 283:
[   15.488444]  kasan_save_stack+0x45/0x70
[   15.488597]  kasan_save_track+0x18/0x40
[   15.488735]  kasan_save_alloc_info+0x3b/0x50
[   15.488948]  __kasan_kmalloc+0xb7/0xc0
[   15.489138]  __kmalloc_cache_noprof+0x189/0x420
[   15.489553]  kasan_atomics+0x95/0x310
[   15.489754]  kunit_try_run_case+0x1a5/0x480
[   15.489963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.490216]  kthread+0x337/0x6f0
[   15.490451]  ret_from_fork+0x116/0x1d0
[   15.490654]  ret_from_fork_asm+0x1a/0x30
[   15.490835] 
[   15.490915] The buggy address belongs to the object at ffff8881039b8c80
[   15.490915]  which belongs to the cache kmalloc-64 of size 64
[   15.491406] The buggy address is located 0 bytes to the right of
[   15.491406]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.491796] 
[   15.491869] The buggy address belongs to the physical page:
[   15.492123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.492572] flags: 0x200000000000000(node=0|zone=2)
[   15.492812] page_type: f5(slab)
[   15.492977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.493320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.493749] page dumped because: kasan: bad access detected
[   15.493971] 
[   15.494062] Memory state around the buggy address:
[   15.494222]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.494806]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.495147] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.495576]                                      ^
[   15.495793]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.496051]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.496447] ==================================================================
[   15.639759] ==================================================================
[   15.641176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.641722] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.642328] 
[   15.642654] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.642699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.642713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.642734] Call Trace:
[   15.642751]  <TASK>
[   15.642767]  dump_stack_lvl+0x73/0xb0
[   15.642797]  print_report+0xd1/0x650
[   15.642821]  ? __virt_addr_valid+0x1db/0x2d0
[   15.642898]  ? kasan_atomics_helper+0xf10/0x5450
[   15.642920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.642959]  ? kasan_atomics_helper+0xf10/0x5450
[   15.642982]  kasan_report+0x141/0x180
[   15.643004]  ? kasan_atomics_helper+0xf10/0x5450
[   15.643032]  kasan_check_range+0x10c/0x1c0
[   15.643057]  __kasan_check_write+0x18/0x20
[   15.643077]  kasan_atomics_helper+0xf10/0x5450
[   15.643101]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.643125]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.643150]  ? kasan_atomics+0x152/0x310
[   15.643179]  kasan_atomics+0x1dc/0x310
[   15.643203]  ? __pfx_kasan_atomics+0x10/0x10
[   15.643228]  ? __pfx_read_tsc+0x10/0x10
[   15.643250]  ? ktime_get_ts64+0x86/0x230
[   15.643275]  kunit_try_run_case+0x1a5/0x480
[   15.643301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.643325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.643410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.643439]  ? __kthread_parkme+0x82/0x180
[   15.643462]  ? preempt_count_sub+0x50/0x80
[   15.643486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.643512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.643539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.643565]  kthread+0x337/0x6f0
[   15.643585]  ? trace_preempt_on+0x20/0xc0
[   15.643609]  ? __pfx_kthread+0x10/0x10
[   15.643631]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.643654]  ? calculate_sigpending+0x7b/0xa0
[   15.643680]  ? __pfx_kthread+0x10/0x10
[   15.643702]  ret_from_fork+0x116/0x1d0
[   15.643721]  ? __pfx_kthread+0x10/0x10
[   15.643743]  ret_from_fork_asm+0x1a/0x30
[   15.643776]  </TASK>
[   15.643787] 
[   15.657569] Allocated by task 283:
[   15.657916]  kasan_save_stack+0x45/0x70
[   15.658298]  kasan_save_track+0x18/0x40
[   15.658858]  kasan_save_alloc_info+0x3b/0x50
[   15.659282]  __kasan_kmalloc+0xb7/0xc0
[   15.659706]  __kmalloc_cache_noprof+0x189/0x420
[   15.660156]  kasan_atomics+0x95/0x310
[   15.660309]  kunit_try_run_case+0x1a5/0x480
[   15.660828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661310]  kthread+0x337/0x6f0
[   15.661696]  ret_from_fork+0x116/0x1d0
[   15.661963]  ret_from_fork_asm+0x1a/0x30
[   15.662302] 
[   15.662433] The buggy address belongs to the object at ffff8881039b8c80
[   15.662433]  which belongs to the cache kmalloc-64 of size 64
[   15.663141] The buggy address is located 0 bytes to the right of
[   15.663141]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.664116] 
[   15.664289] The buggy address belongs to the physical page:
[   15.664902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.665658] flags: 0x200000000000000(node=0|zone=2)
[   15.665830] page_type: f5(slab)
[   15.665957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.666191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.666449] page dumped because: kasan: bad access detected
[   15.666745] 
[   15.666863] Memory state around the buggy address:
[   15.667022]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667341]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667831] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.668148]                                      ^
[   15.668405]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668673]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.669015] ==================================================================
[   16.369270] ==================================================================
[   16.369685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.369943] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.370277] 
[   16.370410] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.370451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.370463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.370483] Call Trace:
[   16.370497]  <TASK>
[   16.370520]  dump_stack_lvl+0x73/0xb0
[   16.370550]  print_report+0xd1/0x650
[   16.370573]  ? __virt_addr_valid+0x1db/0x2d0
[   16.370608]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.370631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.370656]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.370688]  kasan_report+0x141/0x180
[   16.370711]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.370738]  __asan_report_load8_noabort+0x18/0x20
[   16.370775]  kasan_atomics_helper+0x4f98/0x5450
[   16.370799]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.370823]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.370858]  ? kasan_atomics+0x152/0x310
[   16.370886]  kasan_atomics+0x1dc/0x310
[   16.370920]  ? __pfx_kasan_atomics+0x10/0x10
[   16.370946]  ? __pfx_read_tsc+0x10/0x10
[   16.370968]  ? ktime_get_ts64+0x86/0x230
[   16.370993]  kunit_try_run_case+0x1a5/0x480
[   16.371018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371042]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.371067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.371092]  ? __kthread_parkme+0x82/0x180
[   16.371114]  ? preempt_count_sub+0x50/0x80
[   16.371139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.371191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.371217]  kthread+0x337/0x6f0
[   16.371246]  ? trace_preempt_on+0x20/0xc0
[   16.371270]  ? __pfx_kthread+0x10/0x10
[   16.371292]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.371326]  ? calculate_sigpending+0x7b/0xa0
[   16.371360]  ? __pfx_kthread+0x10/0x10
[   16.371382]  ret_from_fork+0x116/0x1d0
[   16.371419]  ? __pfx_kthread+0x10/0x10
[   16.371442]  ret_from_fork_asm+0x1a/0x30
[   16.371473]  </TASK>
[   16.371485] 
[   16.379003] Allocated by task 283:
[   16.379188]  kasan_save_stack+0x45/0x70
[   16.379412]  kasan_save_track+0x18/0x40
[   16.379627]  kasan_save_alloc_info+0x3b/0x50
[   16.379825]  __kasan_kmalloc+0xb7/0xc0
[   16.379998]  __kmalloc_cache_noprof+0x189/0x420
[   16.380156]  kasan_atomics+0x95/0x310
[   16.380296]  kunit_try_run_case+0x1a5/0x480
[   16.380478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.380658]  kthread+0x337/0x6f0
[   16.380779]  ret_from_fork+0x116/0x1d0
[   16.380948]  ret_from_fork_asm+0x1a/0x30
[   16.381174] 
[   16.381283] The buggy address belongs to the object at ffff8881039b8c80
[   16.381283]  which belongs to the cache kmalloc-64 of size 64
[   16.381933] The buggy address is located 0 bytes to the right of
[   16.381933]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.382544] 
[   16.382646] The buggy address belongs to the physical page:
[   16.382897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.383182] flags: 0x200000000000000(node=0|zone=2)
[   16.383353] page_type: f5(slab)
[   16.383498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.383841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.384191] page dumped because: kasan: bad access detected
[   16.384481] 
[   16.384586] Memory state around the buggy address:
[   16.384808]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.385109]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.385445] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.385742]                                      ^
[   16.385972]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.386286]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.386627] ==================================================================
[   16.423227] ==================================================================
[   16.424201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.424978] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.425323] 
[   16.425447] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.425491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.425503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.425524] Call Trace:
[   16.425536]  <TASK>
[   16.425552]  dump_stack_lvl+0x73/0xb0
[   16.425583]  print_report+0xd1/0x650
[   16.425606]  ? __virt_addr_valid+0x1db/0x2d0
[   16.425630]  ? kasan_atomics_helper+0x218a/0x5450
[   16.425652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.425676]  ? kasan_atomics_helper+0x218a/0x5450
[   16.425699]  kasan_report+0x141/0x180
[   16.425722]  ? kasan_atomics_helper+0x218a/0x5450
[   16.425749]  kasan_check_range+0x10c/0x1c0
[   16.425774]  __kasan_check_write+0x18/0x20
[   16.425795]  kasan_atomics_helper+0x218a/0x5450
[   16.425819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.425843]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.425869]  ? kasan_atomics+0x152/0x310
[   16.425897]  kasan_atomics+0x1dc/0x310
[   16.425921]  ? __pfx_kasan_atomics+0x10/0x10
[   16.425947]  ? __pfx_read_tsc+0x10/0x10
[   16.425969]  ? ktime_get_ts64+0x86/0x230
[   16.425994]  kunit_try_run_case+0x1a5/0x480
[   16.426019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.426068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.426094]  ? __kthread_parkme+0x82/0x180
[   16.426116]  ? preempt_count_sub+0x50/0x80
[   16.426140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.426192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.426219]  kthread+0x337/0x6f0
[   16.426238]  ? trace_preempt_on+0x20/0xc0
[   16.426262]  ? __pfx_kthread+0x10/0x10
[   16.426284]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.426307]  ? calculate_sigpending+0x7b/0xa0
[   16.426332]  ? __pfx_kthread+0x10/0x10
[   16.426721]  ret_from_fork+0x116/0x1d0
[   16.426744]  ? __pfx_kthread+0x10/0x10
[   16.426784]  ret_from_fork_asm+0x1a/0x30
[   16.426815]  </TASK>
[   16.426865] 
[   16.438715] Allocated by task 283:
[   16.439127]  kasan_save_stack+0x45/0x70
[   16.439418]  kasan_save_track+0x18/0x40
[   16.439787]  kasan_save_alloc_info+0x3b/0x50
[   16.440006]  __kasan_kmalloc+0xb7/0xc0
[   16.440188]  __kmalloc_cache_noprof+0x189/0x420
[   16.440656]  kasan_atomics+0x95/0x310
[   16.440938]  kunit_try_run_case+0x1a5/0x480
[   16.441383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.441923]  kthread+0x337/0x6f0
[   16.442221]  ret_from_fork+0x116/0x1d0
[   16.442652]  ret_from_fork_asm+0x1a/0x30
[   16.442976] 
[   16.443201] The buggy address belongs to the object at ffff8881039b8c80
[   16.443201]  which belongs to the cache kmalloc-64 of size 64
[   16.444099] The buggy address is located 0 bytes to the right of
[   16.444099]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.444783] 
[   16.444884] The buggy address belongs to the physical page:
[   16.445110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.445742] flags: 0x200000000000000(node=0|zone=2)
[   16.446025] page_type: f5(slab)
[   16.446326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.446927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.447392] page dumped because: kasan: bad access detected
[   16.447632] 
[   16.447721] Memory state around the buggy address:
[   16.447928]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.448219]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.449090] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.449791]                                      ^
[   16.450034]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.450333]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.450614] ==================================================================
[   16.286452] ==================================================================
[   16.286799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.287260] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.287966] 
[   16.288079] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.288119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.288132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.288153] Call Trace:
[   16.288175]  <TASK>
[   16.288189]  dump_stack_lvl+0x73/0xb0
[   16.288221]  print_report+0xd1/0x650
[   16.288244]  ? __virt_addr_valid+0x1db/0x2d0
[   16.288267]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.288290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.288314]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.288337]  kasan_report+0x141/0x180
[   16.288374]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.288402]  kasan_check_range+0x10c/0x1c0
[   16.288427]  __kasan_check_write+0x18/0x20
[   16.288448]  kasan_atomics_helper+0x1eaa/0x5450
[   16.288472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.288496]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.288522]  ? kasan_atomics+0x152/0x310
[   16.288550]  kasan_atomics+0x1dc/0x310
[   16.288574]  ? __pfx_kasan_atomics+0x10/0x10
[   16.288600]  ? __pfx_read_tsc+0x10/0x10
[   16.288623]  ? ktime_get_ts64+0x86/0x230
[   16.288647]  kunit_try_run_case+0x1a5/0x480
[   16.288672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.288697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.288723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.288748]  ? __kthread_parkme+0x82/0x180
[   16.288770]  ? preempt_count_sub+0x50/0x80
[   16.288794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.288821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.288846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.288873]  kthread+0x337/0x6f0
[   16.288892]  ? trace_preempt_on+0x20/0xc0
[   16.288916]  ? __pfx_kthread+0x10/0x10
[   16.288938]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.288960]  ? calculate_sigpending+0x7b/0xa0
[   16.288986]  ? __pfx_kthread+0x10/0x10
[   16.289008]  ret_from_fork+0x116/0x1d0
[   16.289027]  ? __pfx_kthread+0x10/0x10
[   16.289048]  ret_from_fork_asm+0x1a/0x30
[   16.289080]  </TASK>
[   16.289091] 
[   16.302164] Allocated by task 283:
[   16.302545]  kasan_save_stack+0x45/0x70
[   16.303159]  kasan_save_track+0x18/0x40
[   16.303589]  kasan_save_alloc_info+0x3b/0x50
[   16.303806]  __kasan_kmalloc+0xb7/0xc0
[   16.303943]  __kmalloc_cache_noprof+0x189/0x420
[   16.304458]  kasan_atomics+0x95/0x310
[   16.304796]  kunit_try_run_case+0x1a5/0x480
[   16.305455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.305938]  kthread+0x337/0x6f0
[   16.306072]  ret_from_fork+0x116/0x1d0
[   16.306208]  ret_from_fork_asm+0x1a/0x30
[   16.306370] 
[   16.306740] The buggy address belongs to the object at ffff8881039b8c80
[   16.306740]  which belongs to the cache kmalloc-64 of size 64
[   16.307853] The buggy address is located 0 bytes to the right of
[   16.307853]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.308855] 
[   16.308935] The buggy address belongs to the physical page:
[   16.309109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.309365] flags: 0x200000000000000(node=0|zone=2)
[   16.309582] page_type: f5(slab)
[   16.309749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.310058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.310450] page dumped because: kasan: bad access detected
[   16.310661] 
[   16.310732] Memory state around the buggy address:
[   16.311034]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.311713]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.312362] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.313017]                                      ^
[   16.313507]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314143]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314803] ==================================================================
[   15.073177] ==================================================================
[   15.075013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.076110] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.077011] 
[   15.077319] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.077387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.077495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.077521] Call Trace:
[   15.077534]  <TASK>
[   15.077551]  dump_stack_lvl+0x73/0xb0
[   15.077584]  print_report+0xd1/0x650
[   15.077606]  ? __virt_addr_valid+0x1db/0x2d0
[   15.077630]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.077651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.077674]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.077696]  kasan_report+0x141/0x180
[   15.077718]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.077745]  __asan_report_load4_noabort+0x18/0x20
[   15.077769]  kasan_atomics_helper+0x4bbc/0x5450
[   15.077792]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.077815]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.077840]  ? kasan_atomics+0x152/0x310
[   15.077866]  kasan_atomics+0x1dc/0x310
[   15.077889]  ? __pfx_kasan_atomics+0x10/0x10
[   15.077913]  ? __pfx_read_tsc+0x10/0x10
[   15.077934]  ? ktime_get_ts64+0x86/0x230
[   15.077959]  kunit_try_run_case+0x1a5/0x480
[   15.077983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.078005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.078031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.078055]  ? __kthread_parkme+0x82/0x180
[   15.078076]  ? preempt_count_sub+0x50/0x80
[   15.078100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.078126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.078151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.078178]  kthread+0x337/0x6f0
[   15.078197]  ? trace_preempt_on+0x20/0xc0
[   15.078220]  ? __pfx_kthread+0x10/0x10
[   15.078241]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.078263]  ? calculate_sigpending+0x7b/0xa0
[   15.078287]  ? __pfx_kthread+0x10/0x10
[   15.078309]  ret_from_fork+0x116/0x1d0
[   15.078327]  ? __pfx_kthread+0x10/0x10
[   15.078419]  ret_from_fork_asm+0x1a/0x30
[   15.078514]  </TASK>
[   15.078527] 
[   15.089516] Allocated by task 283:
[   15.089919]  kasan_save_stack+0x45/0x70
[   15.090230]  kasan_save_track+0x18/0x40
[   15.090658]  kasan_save_alloc_info+0x3b/0x50
[   15.090992]  __kasan_kmalloc+0xb7/0xc0
[   15.091252]  __kmalloc_cache_noprof+0x189/0x420
[   15.091674]  kasan_atomics+0x95/0x310
[   15.091865]  kunit_try_run_case+0x1a5/0x480
[   15.092196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.092537]  kthread+0x337/0x6f0
[   15.092702]  ret_from_fork+0x116/0x1d0
[   15.092885]  ret_from_fork_asm+0x1a/0x30
[   15.093090] 
[   15.093177] The buggy address belongs to the object at ffff8881039b8c80
[   15.093177]  which belongs to the cache kmalloc-64 of size 64
[   15.094082] The buggy address is located 0 bytes to the right of
[   15.094082]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.094961] 
[   15.095068] The buggy address belongs to the physical page:
[   15.095499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.095977] flags: 0x200000000000000(node=0|zone=2)
[   15.096307] page_type: f5(slab)
[   15.096723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.097085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.097596] page dumped because: kasan: bad access detected
[   15.097934] 
[   15.098036] Memory state around the buggy address:
[   15.098447]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.098882]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.099271] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.100005]                                      ^
[   15.100242]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.100785]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101097] ==================================================================
[   15.440958] ==================================================================
[   15.441296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.441742] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.442055] 
[   15.442146] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.442188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.442200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.442220] Call Trace:
[   15.442233]  <TASK>
[   15.442246]  dump_stack_lvl+0x73/0xb0
[   15.442275]  print_report+0xd1/0x650
[   15.442298]  ? __virt_addr_valid+0x1db/0x2d0
[   15.442321]  ? kasan_atomics_helper+0x992/0x5450
[   15.442418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.442462]  ? kasan_atomics_helper+0x992/0x5450
[   15.442485]  kasan_report+0x141/0x180
[   15.442508]  ? kasan_atomics_helper+0x992/0x5450
[   15.442536]  kasan_check_range+0x10c/0x1c0
[   15.442561]  __kasan_check_write+0x18/0x20
[   15.442582]  kasan_atomics_helper+0x992/0x5450
[   15.442607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.442631]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.442656]  ? kasan_atomics+0x152/0x310
[   15.442683]  kasan_atomics+0x1dc/0x310
[   15.442706]  ? __pfx_kasan_atomics+0x10/0x10
[   15.442731]  ? __pfx_read_tsc+0x10/0x10
[   15.442753]  ? ktime_get_ts64+0x86/0x230
[   15.442777]  kunit_try_run_case+0x1a5/0x480
[   15.442802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.442852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.442878]  ? __kthread_parkme+0x82/0x180
[   15.442899]  ? preempt_count_sub+0x50/0x80
[   15.442924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.442974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.443001]  kthread+0x337/0x6f0
[   15.443021]  ? trace_preempt_on+0x20/0xc0
[   15.443045]  ? __pfx_kthread+0x10/0x10
[   15.443067]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.443090]  ? calculate_sigpending+0x7b/0xa0
[   15.443115]  ? __pfx_kthread+0x10/0x10
[   15.443137]  ret_from_fork+0x116/0x1d0
[   15.443156]  ? __pfx_kthread+0x10/0x10
[   15.443178]  ret_from_fork_asm+0x1a/0x30
[   15.443209]  </TASK>
[   15.443220] 
[   15.451166] Allocated by task 283:
[   15.451509]  kasan_save_stack+0x45/0x70
[   15.451696]  kasan_save_track+0x18/0x40
[   15.451872]  kasan_save_alloc_info+0x3b/0x50
[   15.452083]  __kasan_kmalloc+0xb7/0xc0
[   15.452278]  __kmalloc_cache_noprof+0x189/0x420
[   15.452519]  kasan_atomics+0x95/0x310
[   15.452680]  kunit_try_run_case+0x1a5/0x480
[   15.452829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453007]  kthread+0x337/0x6f0
[   15.453159]  ret_from_fork+0x116/0x1d0
[   15.453435]  ret_from_fork_asm+0x1a/0x30
[   15.453645] 
[   15.453743] The buggy address belongs to the object at ffff8881039b8c80
[   15.453743]  which belongs to the cache kmalloc-64 of size 64
[   15.454270] The buggy address is located 0 bytes to the right of
[   15.454270]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.454866] 
[   15.454957] The buggy address belongs to the physical page:
[   15.455188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.455546] flags: 0x200000000000000(node=0|zone=2)
[   15.455726] page_type: f5(slab)
[   15.455909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.456224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.456608] page dumped because: kasan: bad access detected
[   15.456853] 
[   15.456943] Memory state around the buggy address:
[   15.457115]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.457566]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.457881] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.458196]                                      ^
[   15.458518]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.458846]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.459135] ==================================================================
[   16.181432] ==================================================================
[   16.181714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.182471] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.182988] 
[   16.183182] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.183230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.183245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.183265] Call Trace:
[   16.183279]  <TASK>
[   16.183295]  dump_stack_lvl+0x73/0xb0
[   16.183327]  print_report+0xd1/0x650
[   16.183364]  ? __virt_addr_valid+0x1db/0x2d0
[   16.183388]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.183411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.183437]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.183461]  kasan_report+0x141/0x180
[   16.183484]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.183512]  kasan_check_range+0x10c/0x1c0
[   16.183536]  __kasan_check_write+0x18/0x20
[   16.183556]  kasan_atomics_helper+0x1c18/0x5450
[   16.183580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.183605]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.183632]  ? kasan_atomics+0x152/0x310
[   16.183660]  kasan_atomics+0x1dc/0x310
[   16.183683]  ? __pfx_kasan_atomics+0x10/0x10
[   16.183709]  ? __pfx_read_tsc+0x10/0x10
[   16.183731]  ? ktime_get_ts64+0x86/0x230
[   16.183755]  kunit_try_run_case+0x1a5/0x480
[   16.183781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.183805]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.183830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.183856]  ? __kthread_parkme+0x82/0x180
[   16.183877]  ? preempt_count_sub+0x50/0x80
[   16.183902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.183928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.183953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.183979]  kthread+0x337/0x6f0
[   16.183999]  ? trace_preempt_on+0x20/0xc0
[   16.184023]  ? __pfx_kthread+0x10/0x10
[   16.184044]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.184067]  ? calculate_sigpending+0x7b/0xa0
[   16.184091]  ? __pfx_kthread+0x10/0x10
[   16.184113]  ret_from_fork+0x116/0x1d0
[   16.184132]  ? __pfx_kthread+0x10/0x10
[   16.184154]  ret_from_fork_asm+0x1a/0x30
[   16.184192]  </TASK>
[   16.184204] 
[   16.192019] Allocated by task 283:
[   16.192210]  kasan_save_stack+0x45/0x70
[   16.192404]  kasan_save_track+0x18/0x40
[   16.192611]  kasan_save_alloc_info+0x3b/0x50
[   16.192856]  __kasan_kmalloc+0xb7/0xc0
[   16.193040]  __kmalloc_cache_noprof+0x189/0x420
[   16.193309]  kasan_atomics+0x95/0x310
[   16.193511]  kunit_try_run_case+0x1a5/0x480
[   16.193729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.193909]  kthread+0x337/0x6f0
[   16.194203]  ret_from_fork+0x116/0x1d0
[   16.194402]  ret_from_fork_asm+0x1a/0x30
[   16.194638] 
[   16.194734] The buggy address belongs to the object at ffff8881039b8c80
[   16.194734]  which belongs to the cache kmalloc-64 of size 64
[   16.195293] The buggy address is located 0 bytes to the right of
[   16.195293]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.195878] 
[   16.195978] The buggy address belongs to the physical page:
[   16.196259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.196611] flags: 0x200000000000000(node=0|zone=2)
[   16.196841] page_type: f5(slab)
[   16.196985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.197254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.197481] page dumped because: kasan: bad access detected
[   16.197648] 
[   16.197717] Memory state around the buggy address:
[   16.198153]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.198572]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.198937] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.199259]                                      ^
[   16.199534]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.199826]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.200115] ==================================================================
[   15.602153] ==================================================================
[   15.602407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.603058] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.603720] 
[   15.603896] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.603938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.603950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.603971] Call Trace:
[   15.603986]  <TASK>
[   15.604001]  dump_stack_lvl+0x73/0xb0
[   15.604031]  print_report+0xd1/0x650
[   15.604066]  ? __virt_addr_valid+0x1db/0x2d0
[   15.604090]  ? kasan_atomics_helper+0xe78/0x5450
[   15.604112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.604157]  ? kasan_atomics_helper+0xe78/0x5450
[   15.604185]  kasan_report+0x141/0x180
[   15.604219]  ? kasan_atomics_helper+0xe78/0x5450
[   15.604247]  kasan_check_range+0x10c/0x1c0
[   15.604272]  __kasan_check_write+0x18/0x20
[   15.604292]  kasan_atomics_helper+0xe78/0x5450
[   15.604316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.604368]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.604414]  ? kasan_atomics+0x152/0x310
[   15.604442]  kasan_atomics+0x1dc/0x310
[   15.604466]  ? __pfx_kasan_atomics+0x10/0x10
[   15.604492]  ? __pfx_read_tsc+0x10/0x10
[   15.604515]  ? ktime_get_ts64+0x86/0x230
[   15.604539]  kunit_try_run_case+0x1a5/0x480
[   15.604565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.604589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.604616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.604642]  ? __kthread_parkme+0x82/0x180
[   15.604664]  ? preempt_count_sub+0x50/0x80
[   15.604688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.604714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.604739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.604766]  kthread+0x337/0x6f0
[   15.604786]  ? trace_preempt_on+0x20/0xc0
[   15.604811]  ? __pfx_kthread+0x10/0x10
[   15.604832]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.604856]  ? calculate_sigpending+0x7b/0xa0
[   15.604880]  ? __pfx_kthread+0x10/0x10
[   15.604903]  ret_from_fork+0x116/0x1d0
[   15.604922]  ? __pfx_kthread+0x10/0x10
[   15.604944]  ret_from_fork_asm+0x1a/0x30
[   15.604975]  </TASK>
[   15.604987] 
[   15.621765] Allocated by task 283:
[   15.622187]  kasan_save_stack+0x45/0x70
[   15.622901]  kasan_save_track+0x18/0x40
[   15.623573]  kasan_save_alloc_info+0x3b/0x50
[   15.624135]  __kasan_kmalloc+0xb7/0xc0
[   15.624922]  __kmalloc_cache_noprof+0x189/0x420
[   15.625123]  kasan_atomics+0x95/0x310
[   15.625264]  kunit_try_run_case+0x1a5/0x480
[   15.625732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.626450]  kthread+0x337/0x6f0
[   15.626889]  ret_from_fork+0x116/0x1d0
[   15.627371]  ret_from_fork_asm+0x1a/0x30
[   15.627721] 
[   15.627803] The buggy address belongs to the object at ffff8881039b8c80
[   15.627803]  which belongs to the cache kmalloc-64 of size 64
[   15.628172] The buggy address is located 0 bytes to the right of
[   15.628172]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.629516] 
[   15.629876] The buggy address belongs to the physical page:
[   15.630478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.631332] flags: 0x200000000000000(node=0|zone=2)
[   15.632039] page_type: f5(slab)
[   15.632505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.633039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.633277] page dumped because: kasan: bad access detected
[   15.634015] 
[   15.634385] Memory state around the buggy address:
[   15.634882]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.635754]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.636298] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.637293]                                      ^
[   15.638027]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.638688]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.639164] ==================================================================
[   15.670171] ==================================================================
[   15.670878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.671216] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.671641] 
[   15.671778] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.671822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.671834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.671855] Call Trace:
[   15.671868]  <TASK>
[   15.671884]  dump_stack_lvl+0x73/0xb0
[   15.671914]  print_report+0xd1/0x650
[   15.671937]  ? __virt_addr_valid+0x1db/0x2d0
[   15.671961]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.671995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.672020]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.672042]  kasan_report+0x141/0x180
[   15.672077]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.672105]  kasan_check_range+0x10c/0x1c0
[   15.672131]  __kasan_check_write+0x18/0x20
[   15.672153]  kasan_atomics_helper+0xfa9/0x5450
[   15.672191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.672215]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.672251]  ? kasan_atomics+0x152/0x310
[   15.672279]  kasan_atomics+0x1dc/0x310
[   15.672302]  ? __pfx_kasan_atomics+0x10/0x10
[   15.672339]  ? __pfx_read_tsc+0x10/0x10
[   15.672371]  ? ktime_get_ts64+0x86/0x230
[   15.672397]  kunit_try_run_case+0x1a5/0x480
[   15.672433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.672457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.672491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.672517]  ? __kthread_parkme+0x82/0x180
[   15.672539]  ? preempt_count_sub+0x50/0x80
[   15.672575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.672601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.672627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.672655]  kthread+0x337/0x6f0
[   15.672675]  ? trace_preempt_on+0x20/0xc0
[   15.672700]  ? __pfx_kthread+0x10/0x10
[   15.672722]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.672745]  ? calculate_sigpending+0x7b/0xa0
[   15.672770]  ? __pfx_kthread+0x10/0x10
[   15.672792]  ret_from_fork+0x116/0x1d0
[   15.672812]  ? __pfx_kthread+0x10/0x10
[   15.672834]  ret_from_fork_asm+0x1a/0x30
[   15.672865]  </TASK>
[   15.672877] 
[   15.680884] Allocated by task 283:
[   15.681014]  kasan_save_stack+0x45/0x70
[   15.681247]  kasan_save_track+0x18/0x40
[   15.681457]  kasan_save_alloc_info+0x3b/0x50
[   15.681669]  __kasan_kmalloc+0xb7/0xc0
[   15.681857]  __kmalloc_cache_noprof+0x189/0x420
[   15.682080]  kasan_atomics+0x95/0x310
[   15.682443]  kunit_try_run_case+0x1a5/0x480
[   15.682599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.682780]  kthread+0x337/0x6f0
[   15.682902]  ret_from_fork+0x116/0x1d0
[   15.683040]  ret_from_fork_asm+0x1a/0x30
[   15.683240] 
[   15.683334] The buggy address belongs to the object at ffff8881039b8c80
[   15.683334]  which belongs to the cache kmalloc-64 of size 64
[   15.683878] The buggy address is located 0 bytes to the right of
[   15.683878]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.684291] 
[   15.684374] The buggy address belongs to the physical page:
[   15.684799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.685182] flags: 0x200000000000000(node=0|zone=2)
[   15.685503] page_type: f5(slab)
[   15.685690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.685956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.686224] page dumped because: kasan: bad access detected
[   15.686536] 
[   15.686633] Memory state around the buggy address:
[   15.686883]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.687192]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.687420] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.687686]                                      ^
[   15.687908]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.688357]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.688668] ==================================================================
[   16.072531] ==================================================================
[   16.073080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.073324] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.074405] 
[   16.074719] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.074766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.074779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.074801] Call Trace:
[   16.074816]  <TASK>
[   16.074841]  dump_stack_lvl+0x73/0xb0
[   16.074873]  print_report+0xd1/0x650
[   16.074897]  ? __virt_addr_valid+0x1db/0x2d0
[   16.074922]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.074945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.074969]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.074992]  kasan_report+0x141/0x180
[   16.075015]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.075042]  kasan_check_range+0x10c/0x1c0
[   16.075067]  __kasan_check_write+0x18/0x20
[   16.075088]  kasan_atomics_helper+0x18b1/0x5450
[   16.075111]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.075135]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.075162]  ? kasan_atomics+0x152/0x310
[   16.075189]  kasan_atomics+0x1dc/0x310
[   16.075212]  ? __pfx_kasan_atomics+0x10/0x10
[   16.075237]  ? __pfx_read_tsc+0x10/0x10
[   16.075259]  ? ktime_get_ts64+0x86/0x230
[   16.075284]  kunit_try_run_case+0x1a5/0x480
[   16.075310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.075335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.075369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.075395]  ? __kthread_parkme+0x82/0x180
[   16.075448]  ? preempt_count_sub+0x50/0x80
[   16.075473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.075499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.075525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.075552]  kthread+0x337/0x6f0
[   16.075572]  ? trace_preempt_on+0x20/0xc0
[   16.075597]  ? __pfx_kthread+0x10/0x10
[   16.075619]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.075641]  ? calculate_sigpending+0x7b/0xa0
[   16.075666]  ? __pfx_kthread+0x10/0x10
[   16.075689]  ret_from_fork+0x116/0x1d0
[   16.075708]  ? __pfx_kthread+0x10/0x10
[   16.075730]  ret_from_fork_asm+0x1a/0x30
[   16.075762]  </TASK>
[   16.075774] 
[   16.089939] Allocated by task 283:
[   16.090075]  kasan_save_stack+0x45/0x70
[   16.090224]  kasan_save_track+0x18/0x40
[   16.090377]  kasan_save_alloc_info+0x3b/0x50
[   16.090557]  __kasan_kmalloc+0xb7/0xc0
[   16.090690]  __kmalloc_cache_noprof+0x189/0x420
[   16.091012]  kasan_atomics+0x95/0x310
[   16.091232]  kunit_try_run_case+0x1a5/0x480
[   16.091391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.091668]  kthread+0x337/0x6f0
[   16.091839]  ret_from_fork+0x116/0x1d0
[   16.092002]  ret_from_fork_asm+0x1a/0x30
[   16.092175] 
[   16.092270] The buggy address belongs to the object at ffff8881039b8c80
[   16.092270]  which belongs to the cache kmalloc-64 of size 64
[   16.092785] The buggy address is located 0 bytes to the right of
[   16.092785]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.093300] 
[   16.093397] The buggy address belongs to the physical page:
[   16.093774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.094023] flags: 0x200000000000000(node=0|zone=2)
[   16.094250] page_type: f5(slab)
[   16.094414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.094732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.094972] page dumped because: kasan: bad access detected
[   16.095221] 
[   16.095313] Memory state around the buggy address:
[   16.095553]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.096028]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.096332] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.096674]                                      ^
[   16.096894]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.097171]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.097444] ==================================================================
[   15.966545] ==================================================================
[   15.966829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.967138] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.967672] 
[   15.967760] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.967801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.967847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.967867] Call Trace:
[   15.967884]  <TASK>
[   15.967899]  dump_stack_lvl+0x73/0xb0
[   15.967969]  print_report+0xd1/0x650
[   15.967993]  ? __virt_addr_valid+0x1db/0x2d0
[   15.968026]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.968050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.968073]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.968097]  kasan_report+0x141/0x180
[   15.968120]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.968147]  kasan_check_range+0x10c/0x1c0
[   15.968175]  __kasan_check_write+0x18/0x20
[   15.968196]  kasan_atomics_helper+0x15b6/0x5450
[   15.968220]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.968244]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.968270]  ? kasan_atomics+0x152/0x310
[   15.968297]  kasan_atomics+0x1dc/0x310
[   15.968321]  ? __pfx_kasan_atomics+0x10/0x10
[   15.968357]  ? __pfx_read_tsc+0x10/0x10
[   15.968379]  ? ktime_get_ts64+0x86/0x230
[   15.968403]  kunit_try_run_case+0x1a5/0x480
[   15.968437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.968461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.968486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.968512]  ? __kthread_parkme+0x82/0x180
[   15.968533]  ? preempt_count_sub+0x50/0x80
[   15.968558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.968583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.968609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.968636]  kthread+0x337/0x6f0
[   15.968656]  ? trace_preempt_on+0x20/0xc0
[   15.968679]  ? __pfx_kthread+0x10/0x10
[   15.968701]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.968724]  ? calculate_sigpending+0x7b/0xa0
[   15.968748]  ? __pfx_kthread+0x10/0x10
[   15.968771]  ret_from_fork+0x116/0x1d0
[   15.968790]  ? __pfx_kthread+0x10/0x10
[   15.968811]  ret_from_fork_asm+0x1a/0x30
[   15.968843]  </TASK>
[   15.968855] 
[   15.977383] Allocated by task 283:
[   15.977562]  kasan_save_stack+0x45/0x70
[   15.977709]  kasan_save_track+0x18/0x40
[   15.977847]  kasan_save_alloc_info+0x3b/0x50
[   15.978045]  __kasan_kmalloc+0xb7/0xc0
[   15.978276]  __kmalloc_cache_noprof+0x189/0x420
[   15.978532]  kasan_atomics+0x95/0x310
[   15.978726]  kunit_try_run_case+0x1a5/0x480
[   15.979020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.979335]  kthread+0x337/0x6f0
[   15.979615]  ret_from_fork+0x116/0x1d0
[   15.979811]  ret_from_fork_asm+0x1a/0x30
[   15.980017] 
[   15.980092] The buggy address belongs to the object at ffff8881039b8c80
[   15.980092]  which belongs to the cache kmalloc-64 of size 64
[   15.980591] The buggy address is located 0 bytes to the right of
[   15.980591]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.981194] 
[   15.981295] The buggy address belongs to the physical page:
[   15.981535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.981949] flags: 0x200000000000000(node=0|zone=2)
[   15.982218] page_type: f5(slab)
[   15.982355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.982588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.982943] page dumped because: kasan: bad access detected
[   15.983243] 
[   15.983337] Memory state around the buggy address:
[   15.983570]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.983912]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.984221] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.984610]                                      ^
[   15.984839]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.985089]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.985492] ==================================================================
[   15.129508] ==================================================================
[   15.129820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.130150] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.131178] 
[   15.131736] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.131782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.131794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.131814] Call Trace:
[   15.131825]  <TASK>
[   15.131840]  dump_stack_lvl+0x73/0xb0
[   15.131871]  print_report+0xd1/0x650
[   15.131893]  ? __virt_addr_valid+0x1db/0x2d0
[   15.131915]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.131937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.131960]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.131983]  kasan_report+0x141/0x180
[   15.132006]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.132032]  __asan_report_load4_noabort+0x18/0x20
[   15.132056]  kasan_atomics_helper+0x4b88/0x5450
[   15.132080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.132102]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.132128]  ? kasan_atomics+0x152/0x310
[   15.132154]  kasan_atomics+0x1dc/0x310
[   15.132183]  ? __pfx_kasan_atomics+0x10/0x10
[   15.132208]  ? __pfx_read_tsc+0x10/0x10
[   15.132229]  ? ktime_get_ts64+0x86/0x230
[   15.132252]  kunit_try_run_case+0x1a5/0x480
[   15.132276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.132323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.132412]  ? __kthread_parkme+0x82/0x180
[   15.132436]  ? preempt_count_sub+0x50/0x80
[   15.132460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.132510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.132536]  kthread+0x337/0x6f0
[   15.132555]  ? trace_preempt_on+0x20/0xc0
[   15.132578]  ? __pfx_kthread+0x10/0x10
[   15.132598]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.132620]  ? calculate_sigpending+0x7b/0xa0
[   15.132644]  ? __pfx_kthread+0x10/0x10
[   15.132666]  ret_from_fork+0x116/0x1d0
[   15.132685]  ? __pfx_kthread+0x10/0x10
[   15.132705]  ret_from_fork_asm+0x1a/0x30
[   15.132736]  </TASK>
[   15.132745] 
[   15.143992] Allocated by task 283:
[   15.144315]  kasan_save_stack+0x45/0x70
[   15.144804]  kasan_save_track+0x18/0x40
[   15.145122]  kasan_save_alloc_info+0x3b/0x50
[   15.145321]  __kasan_kmalloc+0xb7/0xc0
[   15.145759]  __kmalloc_cache_noprof+0x189/0x420
[   15.146105]  kasan_atomics+0x95/0x310
[   15.146446]  kunit_try_run_case+0x1a5/0x480
[   15.146763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.147117]  kthread+0x337/0x6f0
[   15.147438]  ret_from_fork+0x116/0x1d0
[   15.147768]  ret_from_fork_asm+0x1a/0x30
[   15.147971] 
[   15.148084] The buggy address belongs to the object at ffff8881039b8c80
[   15.148084]  which belongs to the cache kmalloc-64 of size 64
[   15.148793] The buggy address is located 0 bytes to the right of
[   15.148793]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.149305] 
[   15.149416] The buggy address belongs to the physical page:
[   15.150009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.150583] flags: 0x200000000000000(node=0|zone=2)
[   15.150919] page_type: f5(slab)
[   15.151055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.151685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.152079] page dumped because: kasan: bad access detected
[   15.152437] 
[   15.152539] Memory state around the buggy address:
[   15.152736]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.153062]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.153387] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.153988]                                      ^
[   15.154313]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154868]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.155232] ==================================================================
[   15.830664] ==================================================================
[   15.831058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.831498] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.831887] 
[   15.832031] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.832073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.832098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.832118] Call Trace:
[   15.832170]  <TASK>
[   15.832185]  dump_stack_lvl+0x73/0xb0
[   15.832228]  print_report+0xd1/0x650
[   15.832251]  ? __virt_addr_valid+0x1db/0x2d0
[   15.832276]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.832300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.832324]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.832355]  kasan_report+0x141/0x180
[   15.832378]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.832426]  kasan_check_range+0x10c/0x1c0
[   15.832450]  __kasan_check_write+0x18/0x20
[   15.832471]  kasan_atomics_helper+0x12e6/0x5450
[   15.832495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.832531]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.832567]  ? kasan_atomics+0x152/0x310
[   15.832595]  kasan_atomics+0x1dc/0x310
[   15.832619]  ? __pfx_kasan_atomics+0x10/0x10
[   15.832644]  ? __pfx_read_tsc+0x10/0x10
[   15.832700]  ? ktime_get_ts64+0x86/0x230
[   15.832725]  kunit_try_run_case+0x1a5/0x480
[   15.832762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832814]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.832839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.832875]  ? __kthread_parkme+0x82/0x180
[   15.832896]  ? preempt_count_sub+0x50/0x80
[   15.832921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.832972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.832998]  kthread+0x337/0x6f0
[   15.833018]  ? trace_preempt_on+0x20/0xc0
[   15.833042]  ? __pfx_kthread+0x10/0x10
[   15.833063]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.833086]  ? calculate_sigpending+0x7b/0xa0
[   15.833112]  ? __pfx_kthread+0x10/0x10
[   15.833134]  ret_from_fork+0x116/0x1d0
[   15.833153]  ? __pfx_kthread+0x10/0x10
[   15.833175]  ret_from_fork_asm+0x1a/0x30
[   15.833206]  </TASK>
[   15.833217] 
[   15.841161] Allocated by task 283:
[   15.841294]  kasan_save_stack+0x45/0x70
[   15.841592]  kasan_save_track+0x18/0x40
[   15.841790]  kasan_save_alloc_info+0x3b/0x50
[   15.842002]  __kasan_kmalloc+0xb7/0xc0
[   15.842176]  __kmalloc_cache_noprof+0x189/0x420
[   15.842401]  kasan_atomics+0x95/0x310
[   15.842607]  kunit_try_run_case+0x1a5/0x480
[   15.842759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.843013]  kthread+0x337/0x6f0
[   15.843232]  ret_from_fork+0x116/0x1d0
[   15.843434]  ret_from_fork_asm+0x1a/0x30
[   15.843618] 
[   15.843691] The buggy address belongs to the object at ffff8881039b8c80
[   15.843691]  which belongs to the cache kmalloc-64 of size 64
[   15.844215] The buggy address is located 0 bytes to the right of
[   15.844215]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.844722] 
[   15.844796] The buggy address belongs to the physical page:
[   15.844983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.845404] flags: 0x200000000000000(node=0|zone=2)
[   15.845643] page_type: f5(slab)
[   15.845870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.846363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.846802] page dumped because: kasan: bad access detected
[   15.847080] 
[   15.847168] Memory state around the buggy address:
[   15.847317]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.847538]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.847926] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.848264]                                      ^
[   15.848504]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848889]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.849294] ==================================================================
[   15.459579] ==================================================================
[   15.459932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.460277] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.460715] 
[   15.460826] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.460866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.460879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.460897] Call Trace:
[   15.460915]  <TASK>
[   15.460931]  dump_stack_lvl+0x73/0xb0
[   15.460961]  print_report+0xd1/0x650
[   15.460983]  ? __virt_addr_valid+0x1db/0x2d0
[   15.461006]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.461028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.461052]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.461075]  kasan_report+0x141/0x180
[   15.461098]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.461125]  kasan_check_range+0x10c/0x1c0
[   15.461149]  __kasan_check_write+0x18/0x20
[   15.461170]  kasan_atomics_helper+0xa2b/0x5450
[   15.461193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.461218]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.461244]  ? kasan_atomics+0x152/0x310
[   15.461271]  kasan_atomics+0x1dc/0x310
[   15.461294]  ? __pfx_kasan_atomics+0x10/0x10
[   15.461320]  ? __pfx_read_tsc+0x10/0x10
[   15.461427]  ? ktime_get_ts64+0x86/0x230
[   15.461456]  kunit_try_run_case+0x1a5/0x480
[   15.461481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.461505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.461530]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.461555]  ? __kthread_parkme+0x82/0x180
[   15.461577]  ? preempt_count_sub+0x50/0x80
[   15.461601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.461628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.461653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.461680]  kthread+0x337/0x6f0
[   15.461700]  ? trace_preempt_on+0x20/0xc0
[   15.461723]  ? __pfx_kthread+0x10/0x10
[   15.461745]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.461768]  ? calculate_sigpending+0x7b/0xa0
[   15.461793]  ? __pfx_kthread+0x10/0x10
[   15.461816]  ret_from_fork+0x116/0x1d0
[   15.461835]  ? __pfx_kthread+0x10/0x10
[   15.461857]  ret_from_fork_asm+0x1a/0x30
[   15.461888]  </TASK>
[   15.461899] 
[   15.469697] Allocated by task 283:
[   15.469881]  kasan_save_stack+0x45/0x70
[   15.470087]  kasan_save_track+0x18/0x40
[   15.470242]  kasan_save_alloc_info+0x3b/0x50
[   15.470618]  __kasan_kmalloc+0xb7/0xc0
[   15.470807]  __kmalloc_cache_noprof+0x189/0x420
[   15.471026]  kasan_atomics+0x95/0x310
[   15.471163]  kunit_try_run_case+0x1a5/0x480
[   15.471482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.471749]  kthread+0x337/0x6f0
[   15.471901]  ret_from_fork+0x116/0x1d0
[   15.472038]  ret_from_fork_asm+0x1a/0x30
[   15.472242] 
[   15.472417] The buggy address belongs to the object at ffff8881039b8c80
[   15.472417]  which belongs to the cache kmalloc-64 of size 64
[   15.472906] The buggy address is located 0 bytes to the right of
[   15.472906]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.473479] 
[   15.473561] The buggy address belongs to the physical page:
[   15.473760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.474049] flags: 0x200000000000000(node=0|zone=2)
[   15.474212] page_type: f5(slab)
[   15.474403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.474776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.475116] page dumped because: kasan: bad access detected
[   15.475628] 
[   15.475732] Memory state around the buggy address:
[   15.475963]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476219]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476542] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.476869]                                      ^
[   15.477094]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.477510]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.477832] ==================================================================
[   15.311316] ==================================================================
[   15.312112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.312494] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.312826] 
[   15.312936] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.312977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.312990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.313058] Call Trace:
[   15.313076]  <TASK>
[   15.313091]  dump_stack_lvl+0x73/0xb0
[   15.313122]  print_report+0xd1/0x650
[   15.313146]  ? __virt_addr_valid+0x1db/0x2d0
[   15.313171]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.313193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.313232]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.313255]  kasan_report+0x141/0x180
[   15.313290]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.313318]  kasan_check_range+0x10c/0x1c0
[   15.313343]  __kasan_check_write+0x18/0x20
[   15.313418]  kasan_atomics_helper+0x5fe/0x5450
[   15.313454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.313479]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.313517]  ? kasan_atomics+0x152/0x310
[   15.313545]  kasan_atomics+0x1dc/0x310
[   15.313569]  ? __pfx_kasan_atomics+0x10/0x10
[   15.313595]  ? __pfx_read_tsc+0x10/0x10
[   15.313627]  ? ktime_get_ts64+0x86/0x230
[   15.313652]  kunit_try_run_case+0x1a5/0x480
[   15.313680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.313717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.313744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.313769]  ? __kthread_parkme+0x82/0x180
[   15.313799]  ? preempt_count_sub+0x50/0x80
[   15.313824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.313849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.313886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.313914]  kthread+0x337/0x6f0
[   15.313934]  ? trace_preempt_on+0x20/0xc0
[   15.313959]  ? __pfx_kthread+0x10/0x10
[   15.313980]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.314012]  ? calculate_sigpending+0x7b/0xa0
[   15.314036]  ? __pfx_kthread+0x10/0x10
[   15.314059]  ret_from_fork+0x116/0x1d0
[   15.314088]  ? __pfx_kthread+0x10/0x10
[   15.314110]  ret_from_fork_asm+0x1a/0x30
[   15.314143]  </TASK>
[   15.314163] 
[   15.325339] Allocated by task 283:
[   15.325574]  kasan_save_stack+0x45/0x70
[   15.325914]  kasan_save_track+0x18/0x40
[   15.326218]  kasan_save_alloc_info+0x3b/0x50
[   15.326734]  __kasan_kmalloc+0xb7/0xc0
[   15.326940]  __kmalloc_cache_noprof+0x189/0x420
[   15.327276]  kasan_atomics+0x95/0x310
[   15.327586]  kunit_try_run_case+0x1a5/0x480
[   15.327898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328242]  kthread+0x337/0x6f0
[   15.328569]  ret_from_fork+0x116/0x1d0
[   15.328750]  ret_from_fork_asm+0x1a/0x30
[   15.328953] 
[   15.329037] The buggy address belongs to the object at ffff8881039b8c80
[   15.329037]  which belongs to the cache kmalloc-64 of size 64
[   15.329900] The buggy address is located 0 bytes to the right of
[   15.329900]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.330616] 
[   15.330943] The buggy address belongs to the physical page:
[   15.331189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.331884] flags: 0x200000000000000(node=0|zone=2)
[   15.332144] page_type: f5(slab)
[   15.332283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.332929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.333305] page dumped because: kasan: bad access detected
[   15.333830] 
[   15.333928] Memory state around the buggy address:
[   15.334090]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334717]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334988] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.335303]                                      ^
[   15.335902]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336129]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336364] ==================================================================
[   15.360467] ==================================================================
[   15.360772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.361057] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.361360] 
[   15.361471] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.361511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.361524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.361544] Call Trace:
[   15.361557]  <TASK>
[   15.361724]  dump_stack_lvl+0x73/0xb0
[   15.361760]  print_report+0xd1/0x650
[   15.361784]  ? __virt_addr_valid+0x1db/0x2d0
[   15.361807]  ? kasan_atomics_helper+0x72f/0x5450
[   15.361830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.361855]  ? kasan_atomics_helper+0x72f/0x5450
[   15.361879]  kasan_report+0x141/0x180
[   15.361902]  ? kasan_atomics_helper+0x72f/0x5450
[   15.361930]  kasan_check_range+0x10c/0x1c0
[   15.361956]  __kasan_check_write+0x18/0x20
[   15.361978]  kasan_atomics_helper+0x72f/0x5450
[   15.362003]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.362028]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.362054]  ? kasan_atomics+0x152/0x310
[   15.362083]  kasan_atomics+0x1dc/0x310
[   15.362107]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362133]  ? __pfx_read_tsc+0x10/0x10
[   15.362156]  ? ktime_get_ts64+0x86/0x230
[   15.362180]  kunit_try_run_case+0x1a5/0x480
[   15.362205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.362255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.362280]  ? __kthread_parkme+0x82/0x180
[   15.362301]  ? preempt_count_sub+0x50/0x80
[   15.362325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.362392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.362417]  kthread+0x337/0x6f0
[   15.362437]  ? trace_preempt_on+0x20/0xc0
[   15.362461]  ? __pfx_kthread+0x10/0x10
[   15.362484]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.362506]  ? calculate_sigpending+0x7b/0xa0
[   15.362532]  ? __pfx_kthread+0x10/0x10
[   15.362553]  ret_from_fork+0x116/0x1d0
[   15.362573]  ? __pfx_kthread+0x10/0x10
[   15.362594]  ret_from_fork_asm+0x1a/0x30
[   15.362636]  </TASK>
[   15.362694] 
[   15.370547] Allocated by task 283:
[   15.370736]  kasan_save_stack+0x45/0x70
[   15.370930]  kasan_save_track+0x18/0x40
[   15.371113]  kasan_save_alloc_info+0x3b/0x50
[   15.371298]  __kasan_kmalloc+0xb7/0xc0
[   15.371448]  __kmalloc_cache_noprof+0x189/0x420
[   15.371609]  kasan_atomics+0x95/0x310
[   15.371806]  kunit_try_run_case+0x1a5/0x480
[   15.372176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.372528]  kthread+0x337/0x6f0
[   15.372793]  ret_from_fork+0x116/0x1d0
[   15.372933]  ret_from_fork_asm+0x1a/0x30
[   15.373073] 
[   15.373170] The buggy address belongs to the object at ffff8881039b8c80
[   15.373170]  which belongs to the cache kmalloc-64 of size 64
[   15.374216] The buggy address is located 0 bytes to the right of
[   15.374216]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.374733] 
[   15.374808] The buggy address belongs to the physical page:
[   15.375054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.375407] flags: 0x200000000000000(node=0|zone=2)
[   15.375571] page_type: f5(slab)
[   15.375697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.375933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.376333] page dumped because: kasan: bad access detected
[   15.376660] 
[   15.376755] Memory state around the buggy address:
[   15.376938]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.377155]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.377471] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.378175]                                      ^
[   15.378529]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.378819]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.379086] ==================================================================
[   15.400404] ==================================================================
[   15.401282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.401929] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.402253] 
[   15.402669] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.402718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.402741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.402763] Call Trace:
[   15.402779]  <TASK>
[   15.402795]  dump_stack_lvl+0x73/0xb0
[   15.402829]  print_report+0xd1/0x650
[   15.402852]  ? __virt_addr_valid+0x1db/0x2d0
[   15.402877]  ? kasan_atomics_helper+0x860/0x5450
[   15.402899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.402924]  ? kasan_atomics_helper+0x860/0x5450
[   15.402947]  kasan_report+0x141/0x180
[   15.402971]  ? kasan_atomics_helper+0x860/0x5450
[   15.402999]  kasan_check_range+0x10c/0x1c0
[   15.403024]  __kasan_check_write+0x18/0x20
[   15.403046]  kasan_atomics_helper+0x860/0x5450
[   15.403070]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.403094]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.403122]  ? kasan_atomics+0x152/0x310
[   15.403149]  kasan_atomics+0x1dc/0x310
[   15.403172]  ? __pfx_kasan_atomics+0x10/0x10
[   15.403198]  ? __pfx_read_tsc+0x10/0x10
[   15.403221]  ? ktime_get_ts64+0x86/0x230
[   15.403245]  kunit_try_run_case+0x1a5/0x480
[   15.403270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.403321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.403627]  ? __kthread_parkme+0x82/0x180
[   15.403660]  ? preempt_count_sub+0x50/0x80
[   15.403687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.403741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.403767]  kthread+0x337/0x6f0
[   15.403787]  ? trace_preempt_on+0x20/0xc0
[   15.403813]  ? __pfx_kthread+0x10/0x10
[   15.403835]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.403858]  ? calculate_sigpending+0x7b/0xa0
[   15.403884]  ? __pfx_kthread+0x10/0x10
[   15.403906]  ret_from_fork+0x116/0x1d0
[   15.403925]  ? __pfx_kthread+0x10/0x10
[   15.403947]  ret_from_fork_asm+0x1a/0x30
[   15.403978]  </TASK>
[   15.403989] 
[   15.412708] Allocated by task 283:
[   15.413113]  kasan_save_stack+0x45/0x70
[   15.413338]  kasan_save_track+0x18/0x40
[   15.413585]  kasan_save_alloc_info+0x3b/0x50
[   15.413821]  __kasan_kmalloc+0xb7/0xc0
[   15.413970]  __kmalloc_cache_noprof+0x189/0x420
[   15.414128]  kasan_atomics+0x95/0x310
[   15.414319]  kunit_try_run_case+0x1a5/0x480
[   15.414600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.414882]  kthread+0x337/0x6f0
[   15.415043]  ret_from_fork+0x116/0x1d0
[   15.415233]  ret_from_fork_asm+0x1a/0x30
[   15.415541] 
[   15.415620] The buggy address belongs to the object at ffff8881039b8c80
[   15.415620]  which belongs to the cache kmalloc-64 of size 64
[   15.416133] The buggy address is located 0 bytes to the right of
[   15.416133]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.416735] 
[   15.416841] The buggy address belongs to the physical page:
[   15.417089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.417481] flags: 0x200000000000000(node=0|zone=2)
[   15.417644] page_type: f5(slab)
[   15.417761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.418069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.418561] page dumped because: kasan: bad access detected
[   15.418843] 
[   15.418957] Memory state around the buggy address:
[   15.419176]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.419612]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.419942] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.420262]                                      ^
[   15.420498]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.420821]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.421035] ==================================================================
[   15.422064] ==================================================================
[   15.422633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.422988] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.423293] 
[   15.423482] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.423527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.423540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.423560] Call Trace:
[   15.423573]  <TASK>
[   15.423587]  dump_stack_lvl+0x73/0xb0
[   15.423617]  print_report+0xd1/0x650
[   15.423640]  ? __virt_addr_valid+0x1db/0x2d0
[   15.423664]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.423686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.423710]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.423732]  kasan_report+0x141/0x180
[   15.423755]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.423783]  kasan_check_range+0x10c/0x1c0
[   15.423807]  __kasan_check_write+0x18/0x20
[   15.423828]  kasan_atomics_helper+0x8f9/0x5450
[   15.423852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.423876]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.423903]  ? kasan_atomics+0x152/0x310
[   15.423930]  kasan_atomics+0x1dc/0x310
[   15.423954]  ? __pfx_kasan_atomics+0x10/0x10
[   15.423980]  ? __pfx_read_tsc+0x10/0x10
[   15.424002]  ? ktime_get_ts64+0x86/0x230
[   15.424027]  kunit_try_run_case+0x1a5/0x480
[   15.424052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.424076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.424101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.424127]  ? __kthread_parkme+0x82/0x180
[   15.424149]  ? preempt_count_sub+0x50/0x80
[   15.424182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.424208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.424234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.424261]  kthread+0x337/0x6f0
[   15.424281]  ? trace_preempt_on+0x20/0xc0
[   15.424305]  ? __pfx_kthread+0x10/0x10
[   15.424327]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.424374]  ? calculate_sigpending+0x7b/0xa0
[   15.424400]  ? __pfx_kthread+0x10/0x10
[   15.424464]  ret_from_fork+0x116/0x1d0
[   15.424486]  ? __pfx_kthread+0x10/0x10
[   15.424508]  ret_from_fork_asm+0x1a/0x30
[   15.424539]  </TASK>
[   15.424551] 
[   15.432519] Allocated by task 283:
[   15.432700]  kasan_save_stack+0x45/0x70
[   15.432849]  kasan_save_track+0x18/0x40
[   15.432987]  kasan_save_alloc_info+0x3b/0x50
[   15.433155]  __kasan_kmalloc+0xb7/0xc0
[   15.433318]  __kmalloc_cache_noprof+0x189/0x420
[   15.433710]  kasan_atomics+0x95/0x310
[   15.433884]  kunit_try_run_case+0x1a5/0x480
[   15.434096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.434318]  kthread+0x337/0x6f0
[   15.434583]  ret_from_fork+0x116/0x1d0
[   15.434753]  ret_from_fork_asm+0x1a/0x30
[   15.434933] 
[   15.435023] The buggy address belongs to the object at ffff8881039b8c80
[   15.435023]  which belongs to the cache kmalloc-64 of size 64
[   15.435503] The buggy address is located 0 bytes to the right of
[   15.435503]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.436007] 
[   15.436103] The buggy address belongs to the physical page:
[   15.436454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.436812] flags: 0x200000000000000(node=0|zone=2)
[   15.437046] page_type: f5(slab)
[   15.437216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.437595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.437937] page dumped because: kasan: bad access detected
[   15.438167] 
[   15.438263] Memory state around the buggy address:
[   15.438677]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.438974]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439262] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.439613]                                      ^
[   15.439775]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440106]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440520] ==================================================================
[   15.557497] ==================================================================
[   15.557737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.558062] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.558562] 
[   15.558680] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.558721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.558733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.558754] Call Trace:
[   15.558767]  <TASK>
[   15.558781]  dump_stack_lvl+0x73/0xb0
[   15.558811]  print_report+0xd1/0x650
[   15.558835]  ? __virt_addr_valid+0x1db/0x2d0
[   15.558858]  ? kasan_atomics_helper+0xd47/0x5450
[   15.558880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.558905]  ? kasan_atomics_helper+0xd47/0x5450
[   15.558929]  kasan_report+0x141/0x180
[   15.558952]  ? kasan_atomics_helper+0xd47/0x5450
[   15.558979]  kasan_check_range+0x10c/0x1c0
[   15.559004]  __kasan_check_write+0x18/0x20
[   15.559025]  kasan_atomics_helper+0xd47/0x5450
[   15.559049]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.559074]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.559101]  ? kasan_atomics+0x152/0x310
[   15.559128]  kasan_atomics+0x1dc/0x310
[   15.559152]  ? __pfx_kasan_atomics+0x10/0x10
[   15.559177]  ? __pfx_read_tsc+0x10/0x10
[   15.559199]  ? ktime_get_ts64+0x86/0x230
[   15.559224]  kunit_try_run_case+0x1a5/0x480
[   15.559249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.559274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.559300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.559325]  ? __kthread_parkme+0x82/0x180
[   15.559362]  ? preempt_count_sub+0x50/0x80
[   15.559387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.559413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.559439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.559466]  kthread+0x337/0x6f0
[   15.559487]  ? trace_preempt_on+0x20/0xc0
[   15.559512]  ? __pfx_kthread+0x10/0x10
[   15.559534]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.559557]  ? calculate_sigpending+0x7b/0xa0
[   15.559583]  ? __pfx_kthread+0x10/0x10
[   15.559606]  ret_from_fork+0x116/0x1d0
[   15.559626]  ? __pfx_kthread+0x10/0x10
[   15.559648]  ret_from_fork_asm+0x1a/0x30
[   15.559745]  </TASK>
[   15.559758] 
[   15.567543] Allocated by task 283:
[   15.567680]  kasan_save_stack+0x45/0x70
[   15.567824]  kasan_save_track+0x18/0x40
[   15.568135]  kasan_save_alloc_info+0x3b/0x50
[   15.568366]  __kasan_kmalloc+0xb7/0xc0
[   15.568651]  __kmalloc_cache_noprof+0x189/0x420
[   15.568886]  kasan_atomics+0x95/0x310
[   15.569060]  kunit_try_run_case+0x1a5/0x480
[   15.569234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.569531]  kthread+0x337/0x6f0
[   15.569711]  ret_from_fork+0x116/0x1d0
[   15.569896]  ret_from_fork_asm+0x1a/0x30
[   15.570054] 
[   15.570149] The buggy address belongs to the object at ffff8881039b8c80
[   15.570149]  which belongs to the cache kmalloc-64 of size 64
[   15.570659] The buggy address is located 0 bytes to the right of
[   15.570659]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.571019] 
[   15.571113] The buggy address belongs to the physical page:
[   15.571384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.571720] flags: 0x200000000000000(node=0|zone=2)
[   15.571879] page_type: f5(slab)
[   15.571999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.572240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.572811] page dumped because: kasan: bad access detected
[   15.573068] 
[   15.573164] Memory state around the buggy address:
[   15.573406]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.573812]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.574065] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.574442]                                      ^
[   15.574677]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.574954]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.575160] ==================================================================
[   15.212550] ==================================================================
[   15.213191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.213716] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.214323] 
[   15.214525] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.214669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.214686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.214706] Call Trace:
[   15.214724]  <TASK>
[   15.214741]  dump_stack_lvl+0x73/0xb0
[   15.214773]  print_report+0xd1/0x650
[   15.214798]  ? __virt_addr_valid+0x1db/0x2d0
[   15.214820]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.214843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.214867]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.214891]  kasan_report+0x141/0x180
[   15.214914]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.214942]  __asan_report_load4_noabort+0x18/0x20
[   15.214968]  kasan_atomics_helper+0x4b54/0x5450
[   15.214991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.215015]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.215042]  ? kasan_atomics+0x152/0x310
[   15.215070]  kasan_atomics+0x1dc/0x310
[   15.215093]  ? __pfx_kasan_atomics+0x10/0x10
[   15.215118]  ? __pfx_read_tsc+0x10/0x10
[   15.215140]  ? ktime_get_ts64+0x86/0x230
[   15.215164]  kunit_try_run_case+0x1a5/0x480
[   15.215189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.215213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.215238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.215263]  ? __kthread_parkme+0x82/0x180
[   15.215285]  ? preempt_count_sub+0x50/0x80
[   15.215309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.215335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.215391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.215461]  kthread+0x337/0x6f0
[   15.215484]  ? trace_preempt_on+0x20/0xc0
[   15.215509]  ? __pfx_kthread+0x10/0x10
[   15.215531]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.215554]  ? calculate_sigpending+0x7b/0xa0
[   15.215580]  ? __pfx_kthread+0x10/0x10
[   15.215602]  ret_from_fork+0x116/0x1d0
[   15.215622]  ? __pfx_kthread+0x10/0x10
[   15.215643]  ret_from_fork_asm+0x1a/0x30
[   15.215674]  </TASK>
[   15.215686] 
[   15.226149] Allocated by task 283:
[   15.226619]  kasan_save_stack+0x45/0x70
[   15.226941]  kasan_save_track+0x18/0x40
[   15.227214]  kasan_save_alloc_info+0x3b/0x50
[   15.227819]  __kasan_kmalloc+0xb7/0xc0
[   15.228019]  __kmalloc_cache_noprof+0x189/0x420
[   15.228213]  kasan_atomics+0x95/0x310
[   15.228861]  kunit_try_run_case+0x1a5/0x480
[   15.229081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.229713]  kthread+0x337/0x6f0
[   15.229898]  ret_from_fork+0x116/0x1d0
[   15.230048]  ret_from_fork_asm+0x1a/0x30
[   15.230464] 
[   15.230683] The buggy address belongs to the object at ffff8881039b8c80
[   15.230683]  which belongs to the cache kmalloc-64 of size 64
[   15.231182] The buggy address is located 0 bytes to the right of
[   15.231182]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.232067] 
[   15.232152] The buggy address belongs to the physical page:
[   15.232778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.233249] flags: 0x200000000000000(node=0|zone=2)
[   15.233680] page_type: f5(slab)
[   15.233820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.234291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.234826] page dumped because: kasan: bad access detected
[   15.235151] 
[   15.235234] Memory state around the buggy address:
[   15.235539]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.236215]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.236711] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.237114]                                      ^
[   15.237371]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238063]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238544] ==================================================================
[   16.451125] ==================================================================
[   16.451541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.451864] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.452195] 
[   16.452306] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.452365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.452378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.452399] Call Trace:
[   16.452425]  <TASK>
[   16.452441]  dump_stack_lvl+0x73/0xb0
[   16.452472]  print_report+0xd1/0x650
[   16.452498]  ? __virt_addr_valid+0x1db/0x2d0
[   16.452522]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.452544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.452579]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.452603]  kasan_report+0x141/0x180
[   16.452636]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.452665]  __asan_report_load8_noabort+0x18/0x20
[   16.452691]  kasan_atomics_helper+0x4fa5/0x5450
[   16.452717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.452749]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.452775]  ? kasan_atomics+0x152/0x310
[   16.452803]  kasan_atomics+0x1dc/0x310
[   16.452837]  ? __pfx_kasan_atomics+0x10/0x10
[   16.452863]  ? __pfx_read_tsc+0x10/0x10
[   16.452885]  ? ktime_get_ts64+0x86/0x230
[   16.452910]  kunit_try_run_case+0x1a5/0x480
[   16.452935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.452959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.452984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.453010]  ? __kthread_parkme+0x82/0x180
[   16.453031]  ? preempt_count_sub+0x50/0x80
[   16.453056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.453082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.453108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.453134]  kthread+0x337/0x6f0
[   16.453154]  ? trace_preempt_on+0x20/0xc0
[   16.453179]  ? __pfx_kthread+0x10/0x10
[   16.453200]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.453223]  ? calculate_sigpending+0x7b/0xa0
[   16.453249]  ? __pfx_kthread+0x10/0x10
[   16.453271]  ret_from_fork+0x116/0x1d0
[   16.453298]  ? __pfx_kthread+0x10/0x10
[   16.453320]  ret_from_fork_asm+0x1a/0x30
[   16.453368]  </TASK>
[   16.453380] 
[   16.461091] Allocated by task 283:
[   16.461289]  kasan_save_stack+0x45/0x70
[   16.461500]  kasan_save_track+0x18/0x40
[   16.461684]  kasan_save_alloc_info+0x3b/0x50
[   16.461901]  __kasan_kmalloc+0xb7/0xc0
[   16.462100]  __kmalloc_cache_noprof+0x189/0x420
[   16.462287]  kasan_atomics+0x95/0x310
[   16.462440]  kunit_try_run_case+0x1a5/0x480
[   16.462676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.462938]  kthread+0x337/0x6f0
[   16.463175]  ret_from_fork+0x116/0x1d0
[   16.463313]  ret_from_fork_asm+0x1a/0x30
[   16.463681] 
[   16.463778] The buggy address belongs to the object at ffff8881039b8c80
[   16.463778]  which belongs to the cache kmalloc-64 of size 64
[   16.464220] The buggy address is located 0 bytes to the right of
[   16.464220]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.464637] 
[   16.464747] The buggy address belongs to the physical page:
[   16.464999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.465397] flags: 0x200000000000000(node=0|zone=2)
[   16.465558] page_type: f5(slab)
[   16.465679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.466045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.466401] page dumped because: kasan: bad access detected
[   16.466681] 
[   16.466798] Memory state around the buggy address:
[   16.467048]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.467329]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.467883] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.468130]                                      ^
[   16.468292]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.468628]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.468941] ==================================================================
[   15.102892] ==================================================================
[   15.103169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.103612] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.104587] 
[   15.104823] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.104868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.104880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.104899] Call Trace:
[   15.104998]  <TASK>
[   15.105017]  dump_stack_lvl+0x73/0xb0
[   15.105050]  print_report+0xd1/0x650
[   15.105073]  ? __virt_addr_valid+0x1db/0x2d0
[   15.105095]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.105117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.105141]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.105163]  kasan_report+0x141/0x180
[   15.105184]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.105210]  __asan_report_store4_noabort+0x1b/0x30
[   15.105236]  kasan_atomics_helper+0x4ba2/0x5450
[   15.105258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.105281]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.105305]  ? kasan_atomics+0x152/0x310
[   15.105332]  kasan_atomics+0x1dc/0x310
[   15.105423]  ? __pfx_kasan_atomics+0x10/0x10
[   15.105449]  ? __pfx_read_tsc+0x10/0x10
[   15.105470]  ? ktime_get_ts64+0x86/0x230
[   15.105494]  kunit_try_run_case+0x1a5/0x480
[   15.105518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.105566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.105590]  ? __kthread_parkme+0x82/0x180
[   15.105611]  ? preempt_count_sub+0x50/0x80
[   15.105634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.105683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.105709]  kthread+0x337/0x6f0
[   15.105727]  ? trace_preempt_on+0x20/0xc0
[   15.105750]  ? __pfx_kthread+0x10/0x10
[   15.105771]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.105793]  ? calculate_sigpending+0x7b/0xa0
[   15.105817]  ? __pfx_kthread+0x10/0x10
[   15.105838]  ret_from_fork+0x116/0x1d0
[   15.105857]  ? __pfx_kthread+0x10/0x10
[   15.105877]  ret_from_fork_asm+0x1a/0x30
[   15.105908]  </TASK>
[   15.105918] 
[   15.117167] Allocated by task 283:
[   15.117361]  kasan_save_stack+0x45/0x70
[   15.117914]  kasan_save_track+0x18/0x40
[   15.118222]  kasan_save_alloc_info+0x3b/0x50
[   15.118678]  __kasan_kmalloc+0xb7/0xc0
[   15.118863]  __kmalloc_cache_noprof+0x189/0x420
[   15.119047]  kasan_atomics+0x95/0x310
[   15.119255]  kunit_try_run_case+0x1a5/0x480
[   15.119992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.120215]  kthread+0x337/0x6f0
[   15.120792]  ret_from_fork+0x116/0x1d0
[   15.120988]  ret_from_fork_asm+0x1a/0x30
[   15.121156] 
[   15.121458] The buggy address belongs to the object at ffff8881039b8c80
[   15.121458]  which belongs to the cache kmalloc-64 of size 64
[   15.122097] The buggy address is located 0 bytes to the right of
[   15.122097]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.122890] 
[   15.122978] The buggy address belongs to the physical page:
[   15.123382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.123938] flags: 0x200000000000000(node=0|zone=2)
[   15.124162] page_type: f5(slab)
[   15.124316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.125067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.125650] page dumped because: kasan: bad access detected
[   15.125996] 
[   15.126241] Memory state around the buggy address:
[   15.126560]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.126991]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.127317] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.127845]                                      ^
[   15.128149]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128650]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128946] ==================================================================
[   15.270815] ==================================================================
[   15.271576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.272315] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.272888] 
[   15.272984] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.273026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.273039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.273061] Call Trace:
[   15.273075]  <TASK>
[   15.273090]  dump_stack_lvl+0x73/0xb0
[   15.273122]  print_report+0xd1/0x650
[   15.273145]  ? __virt_addr_valid+0x1db/0x2d0
[   15.273169]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.273193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.273217]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.273240]  kasan_report+0x141/0x180
[   15.273264]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.273292]  __asan_report_store4_noabort+0x1b/0x30
[   15.273319]  kasan_atomics_helper+0x4b3a/0x5450
[   15.273344]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.273382]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.273407]  ? kasan_atomics+0x152/0x310
[   15.273435]  kasan_atomics+0x1dc/0x310
[   15.273458]  ? __pfx_kasan_atomics+0x10/0x10
[   15.273483]  ? __pfx_read_tsc+0x10/0x10
[   15.273506]  ? ktime_get_ts64+0x86/0x230
[   15.273586]  kunit_try_run_case+0x1a5/0x480
[   15.273614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.273677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.273702]  ? __kthread_parkme+0x82/0x180
[   15.273725]  ? preempt_count_sub+0x50/0x80
[   15.273750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.273801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.273828]  kthread+0x337/0x6f0
[   15.273847]  ? trace_preempt_on+0x20/0xc0
[   15.273872]  ? __pfx_kthread+0x10/0x10
[   15.273893]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.273915]  ? calculate_sigpending+0x7b/0xa0
[   15.273940]  ? __pfx_kthread+0x10/0x10
[   15.273962]  ret_from_fork+0x116/0x1d0
[   15.273982]  ? __pfx_kthread+0x10/0x10
[   15.274003]  ret_from_fork_asm+0x1a/0x30
[   15.274035]  </TASK>
[   15.274046] 
[   15.282675] Allocated by task 283:
[   15.282866]  kasan_save_stack+0x45/0x70
[   15.283071]  kasan_save_track+0x18/0x40
[   15.283258]  kasan_save_alloc_info+0x3b/0x50
[   15.283549]  __kasan_kmalloc+0xb7/0xc0
[   15.283734]  __kmalloc_cache_noprof+0x189/0x420
[   15.283964]  kasan_atomics+0x95/0x310
[   15.284155]  kunit_try_run_case+0x1a5/0x480
[   15.284403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.284724]  kthread+0x337/0x6f0
[   15.284923]  ret_from_fork+0x116/0x1d0
[   15.285080]  ret_from_fork_asm+0x1a/0x30
[   15.285221] 
[   15.285293] The buggy address belongs to the object at ffff8881039b8c80
[   15.285293]  which belongs to the cache kmalloc-64 of size 64
[   15.285697] The buggy address is located 0 bytes to the right of
[   15.285697]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.286860] 
[   15.286954] The buggy address belongs to the physical page:
[   15.287235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.287612] flags: 0x200000000000000(node=0|zone=2)
[   15.287784] page_type: f5(slab)
[   15.287908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.288293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.288758] page dumped because: kasan: bad access detected
[   15.289032] 
[   15.289146] Memory state around the buggy address:
[   15.289432]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.289766]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.290047] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.290369]                                      ^
[   15.290714]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.291023]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.291335] ==================================================================
[   15.726582] ==================================================================
[   15.727085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.727467] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.728000] 
[   15.728100] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.728171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.728184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.728204] Call Trace:
[   15.728229]  <TASK>
[   15.728244]  dump_stack_lvl+0x73/0xb0
[   15.728274]  print_report+0xd1/0x650
[   15.728297]  ? __virt_addr_valid+0x1db/0x2d0
[   15.728320]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.728353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.728378]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.728401]  kasan_report+0x141/0x180
[   15.728434]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.728461]  __asan_report_load4_noabort+0x18/0x20
[   15.728487]  kasan_atomics_helper+0x4a1c/0x5450
[   15.728512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.728536]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.728562]  ? kasan_atomics+0x152/0x310
[   15.728599]  kasan_atomics+0x1dc/0x310
[   15.728622]  ? __pfx_kasan_atomics+0x10/0x10
[   15.728648]  ? __pfx_read_tsc+0x10/0x10
[   15.728680]  ? ktime_get_ts64+0x86/0x230
[   15.728706]  kunit_try_run_case+0x1a5/0x480
[   15.728731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.728755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.728781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.728806]  ? __kthread_parkme+0x82/0x180
[   15.728827]  ? preempt_count_sub+0x50/0x80
[   15.728861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.728887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.728923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.728950]  kthread+0x337/0x6f0
[   15.728969]  ? trace_preempt_on+0x20/0xc0
[   15.729002]  ? __pfx_kthread+0x10/0x10
[   15.729024]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.729047]  ? calculate_sigpending+0x7b/0xa0
[   15.729082]  ? __pfx_kthread+0x10/0x10
[   15.729105]  ret_from_fork+0x116/0x1d0
[   15.729124]  ? __pfx_kthread+0x10/0x10
[   15.729146]  ret_from_fork_asm+0x1a/0x30
[   15.729187]  </TASK>
[   15.729198] 
[   15.737132] Allocated by task 283:
[   15.737271]  kasan_save_stack+0x45/0x70
[   15.737429]  kasan_save_track+0x18/0x40
[   15.737570]  kasan_save_alloc_info+0x3b/0x50
[   15.737723]  __kasan_kmalloc+0xb7/0xc0
[   15.737943]  __kmalloc_cache_noprof+0x189/0x420
[   15.738168]  kasan_atomics+0x95/0x310
[   15.738366]  kunit_try_run_case+0x1a5/0x480
[   15.738575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.739022]  kthread+0x337/0x6f0
[   15.739146]  ret_from_fork+0x116/0x1d0
[   15.739281]  ret_from_fork_asm+0x1a/0x30
[   15.739476] 
[   15.739574] The buggy address belongs to the object at ffff8881039b8c80
[   15.739574]  which belongs to the cache kmalloc-64 of size 64
[   15.740141] The buggy address is located 0 bytes to the right of
[   15.740141]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.740958] 
[   15.741049] The buggy address belongs to the physical page:
[   15.741222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.741679] flags: 0x200000000000000(node=0|zone=2)
[   15.741929] page_type: f5(slab)
[   15.742113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.742508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.742824] page dumped because: kasan: bad access detected
[   15.743077] 
[   15.743164] Memory state around the buggy address:
[   15.743403]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.744231]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.745187] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.745809]                                      ^
[   15.746019]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746309]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.747106] ==================================================================
[   16.333427] ==================================================================
[   16.333738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.334286] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.334690] 
[   16.334787] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.334827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.334839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.334859] Call Trace:
[   16.334884]  <TASK>
[   16.334899]  dump_stack_lvl+0x73/0xb0
[   16.334930]  print_report+0xd1/0x650
[   16.334965]  ? __virt_addr_valid+0x1db/0x2d0
[   16.334989]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.335012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.335036]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.335060]  kasan_report+0x141/0x180
[   16.335083]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.335110]  __asan_report_load8_noabort+0x18/0x20
[   16.335137]  kasan_atomics_helper+0x4f71/0x5450
[   16.335170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.335194]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.335220]  ? kasan_atomics+0x152/0x310
[   16.335258]  kasan_atomics+0x1dc/0x310
[   16.335282]  ? __pfx_kasan_atomics+0x10/0x10
[   16.335307]  ? __pfx_read_tsc+0x10/0x10
[   16.335337]  ? ktime_get_ts64+0x86/0x230
[   16.335372]  kunit_try_run_case+0x1a5/0x480
[   16.335420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.335446]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.335472]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.335497]  ? __kthread_parkme+0x82/0x180
[   16.335519]  ? preempt_count_sub+0x50/0x80
[   16.335553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.335580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.335615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.335643]  kthread+0x337/0x6f0
[   16.335663]  ? trace_preempt_on+0x20/0xc0
[   16.335688]  ? __pfx_kthread+0x10/0x10
[   16.335720]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.335742]  ? calculate_sigpending+0x7b/0xa0
[   16.335777]  ? __pfx_kthread+0x10/0x10
[   16.335802]  ret_from_fork+0x116/0x1d0
[   16.335822]  ? __pfx_kthread+0x10/0x10
[   16.335844]  ret_from_fork_asm+0x1a/0x30
[   16.335876]  </TASK>
[   16.335888] 
[   16.343312] Allocated by task 283:
[   16.343524]  kasan_save_stack+0x45/0x70
[   16.343733]  kasan_save_track+0x18/0x40
[   16.343928]  kasan_save_alloc_info+0x3b/0x50
[   16.344135]  __kasan_kmalloc+0xb7/0xc0
[   16.344332]  __kmalloc_cache_noprof+0x189/0x420
[   16.344585]  kasan_atomics+0x95/0x310
[   16.344745]  kunit_try_run_case+0x1a5/0x480
[   16.344972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.345151]  kthread+0x337/0x6f0
[   16.345273]  ret_from_fork+0x116/0x1d0
[   16.345467]  ret_from_fork_asm+0x1a/0x30
[   16.345689] 
[   16.345786] The buggy address belongs to the object at ffff8881039b8c80
[   16.345786]  which belongs to the cache kmalloc-64 of size 64
[   16.346304] The buggy address is located 0 bytes to the right of
[   16.346304]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.346823] 
[   16.346947] The buggy address belongs to the physical page:
[   16.347179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.347496] flags: 0x200000000000000(node=0|zone=2)
[   16.347662] page_type: f5(slab)
[   16.347784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.348017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.348336] page dumped because: kasan: bad access detected
[   16.348621] 
[   16.348716] Memory state around the buggy address:
[   16.348938]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.349283]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.349694] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.350074]                                      ^
[   16.350334]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.350648]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.350962] ==================================================================
[   15.849811] ==================================================================
[   15.850178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.850481] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.850738] 
[   15.850863] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.850906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.850918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.850939] Call Trace:
[   15.850952]  <TASK>
[   15.850966]  dump_stack_lvl+0x73/0xb0
[   15.851021]  print_report+0xd1/0x650
[   15.851044]  ? __virt_addr_valid+0x1db/0x2d0
[   15.851079]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.851103]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.851128]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.851151]  kasan_report+0x141/0x180
[   15.851174]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.851202]  __asan_report_load4_noabort+0x18/0x20
[   15.851228]  kasan_atomics_helper+0x49ce/0x5450
[   15.851252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.851276]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.851301]  ? kasan_atomics+0x152/0x310
[   15.851328]  kasan_atomics+0x1dc/0x310
[   15.851363]  ? __pfx_kasan_atomics+0x10/0x10
[   15.851419]  ? __pfx_read_tsc+0x10/0x10
[   15.851442]  ? ktime_get_ts64+0x86/0x230
[   15.851467]  kunit_try_run_case+0x1a5/0x480
[   15.851530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.851591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.851616]  ? __kthread_parkme+0x82/0x180
[   15.851638]  ? preempt_count_sub+0x50/0x80
[   15.851663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.851793]  kthread+0x337/0x6f0
[   15.851813]  ? trace_preempt_on+0x20/0xc0
[   15.851865]  ? __pfx_kthread+0x10/0x10
[   15.851898]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.851932]  ? calculate_sigpending+0x7b/0xa0
[   15.851958]  ? __pfx_kthread+0x10/0x10
[   15.851981]  ret_from_fork+0x116/0x1d0
[   15.852000]  ? __pfx_kthread+0x10/0x10
[   15.852022]  ret_from_fork_asm+0x1a/0x30
[   15.852054]  </TASK>
[   15.852065] 
[   15.859827] Allocated by task 283:
[   15.859950]  kasan_save_stack+0x45/0x70
[   15.860089]  kasan_save_track+0x18/0x40
[   15.860224]  kasan_save_alloc_info+0x3b/0x50
[   15.860485]  __kasan_kmalloc+0xb7/0xc0
[   15.860724]  __kmalloc_cache_noprof+0x189/0x420
[   15.861055]  kasan_atomics+0x95/0x310
[   15.861230]  kunit_try_run_case+0x1a5/0x480
[   15.861469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.861727]  kthread+0x337/0x6f0
[   15.861874]  ret_from_fork+0x116/0x1d0
[   15.862043]  ret_from_fork_asm+0x1a/0x30
[   15.862178] 
[   15.862268] The buggy address belongs to the object at ffff8881039b8c80
[   15.862268]  which belongs to the cache kmalloc-64 of size 64
[   15.862938] The buggy address is located 0 bytes to the right of
[   15.862938]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.863586] 
[   15.863666] The buggy address belongs to the physical page:
[   15.863961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.864321] flags: 0x200000000000000(node=0|zone=2)
[   15.864581] page_type: f5(slab)
[   15.864845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.865071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.865382] page dumped because: kasan: bad access detected
[   15.865942] 
[   15.866040] Memory state around the buggy address:
[   15.866191]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.866409]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.866767] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.867130]                                      ^
[   15.867369]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.867644]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.867998] ==================================================================
[   16.051636] ==================================================================
[   16.052001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.052320] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.052769] 
[   16.052883] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.052968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.053006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.053037] Call Trace:
[   16.053110]  <TASK>
[   16.053126]  dump_stack_lvl+0x73/0xb0
[   16.053168]  print_report+0xd1/0x650
[   16.053192]  ? __virt_addr_valid+0x1db/0x2d0
[   16.053214]  ? kasan_atomics_helper+0x1818/0x5450
[   16.053237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.053261]  ? kasan_atomics_helper+0x1818/0x5450
[   16.053284]  kasan_report+0x141/0x180
[   16.053307]  ? kasan_atomics_helper+0x1818/0x5450
[   16.053335]  kasan_check_range+0x10c/0x1c0
[   16.053368]  __kasan_check_write+0x18/0x20
[   16.053389]  kasan_atomics_helper+0x1818/0x5450
[   16.053434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.053457]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.053484]  ? kasan_atomics+0x152/0x310
[   16.053512]  kasan_atomics+0x1dc/0x310
[   16.053534]  ? __pfx_kasan_atomics+0x10/0x10
[   16.053560]  ? __pfx_read_tsc+0x10/0x10
[   16.053582]  ? ktime_get_ts64+0x86/0x230
[   16.053606]  kunit_try_run_case+0x1a5/0x480
[   16.053631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.053681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.053706]  ? __kthread_parkme+0x82/0x180
[   16.053727]  ? preempt_count_sub+0x50/0x80
[   16.053752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.053829]  kthread+0x337/0x6f0
[   16.053849]  ? trace_preempt_on+0x20/0xc0
[   16.053873]  ? __pfx_kthread+0x10/0x10
[   16.053896]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.053919]  ? calculate_sigpending+0x7b/0xa0
[   16.053944]  ? __pfx_kthread+0x10/0x10
[   16.053967]  ret_from_fork+0x116/0x1d0
[   16.053986]  ? __pfx_kthread+0x10/0x10
[   16.054007]  ret_from_fork_asm+0x1a/0x30
[   16.054039]  </TASK>
[   16.054050] 
[   16.062678] Allocated by task 283:
[   16.063100]  kasan_save_stack+0x45/0x70
[   16.063304]  kasan_save_track+0x18/0x40
[   16.063535]  kasan_save_alloc_info+0x3b/0x50
[   16.063691]  __kasan_kmalloc+0xb7/0xc0
[   16.063946]  __kmalloc_cache_noprof+0x189/0x420
[   16.064186]  kasan_atomics+0x95/0x310
[   16.064393]  kunit_try_run_case+0x1a5/0x480
[   16.064676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.064936]  kthread+0x337/0x6f0
[   16.065124]  ret_from_fork+0x116/0x1d0
[   16.065288]  ret_from_fork_asm+0x1a/0x30
[   16.065587] 
[   16.065777] The buggy address belongs to the object at ffff8881039b8c80
[   16.065777]  which belongs to the cache kmalloc-64 of size 64
[   16.066262] The buggy address is located 0 bytes to the right of
[   16.066262]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.066831] 
[   16.066936] The buggy address belongs to the physical page:
[   16.067196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.067580] flags: 0x200000000000000(node=0|zone=2)
[   16.067772] page_type: f5(slab)
[   16.067977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.068431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.068776] page dumped because: kasan: bad access detected
[   16.069030] 
[   16.069124] Memory state around the buggy address:
[   16.069368]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.069690]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.070016] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.070440]                                      ^
[   16.070667]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.071072]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.071436] ==================================================================
[   15.707525] ==================================================================
[   15.707888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.708716] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.709059] 
[   15.709169] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.709223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.709236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.709255] Call Trace:
[   15.709284]  <TASK>
[   15.709301]  dump_stack_lvl+0x73/0xb0
[   15.709330]  print_report+0xd1/0x650
[   15.709363]  ? __virt_addr_valid+0x1db/0x2d0
[   15.709385]  ? kasan_atomics_helper+0x1079/0x5450
[   15.709408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.709433]  ? kasan_atomics_helper+0x1079/0x5450
[   15.709455]  kasan_report+0x141/0x180
[   15.709490]  ? kasan_atomics_helper+0x1079/0x5450
[   15.709517]  kasan_check_range+0x10c/0x1c0
[   15.709542]  __kasan_check_write+0x18/0x20
[   15.709563]  kasan_atomics_helper+0x1079/0x5450
[   15.709597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.709621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.709647]  ? kasan_atomics+0x152/0x310
[   15.709685]  kasan_atomics+0x1dc/0x310
[   15.709709]  ? __pfx_kasan_atomics+0x10/0x10
[   15.709734]  ? __pfx_read_tsc+0x10/0x10
[   15.709756]  ? ktime_get_ts64+0x86/0x230
[   15.709780]  kunit_try_run_case+0x1a5/0x480
[   15.709805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.709854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.709888]  ? __kthread_parkme+0x82/0x180
[   15.709910]  ? preempt_count_sub+0x50/0x80
[   15.709935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.710023]  kthread+0x337/0x6f0
[   15.710042]  ? trace_preempt_on+0x20/0xc0
[   15.710066]  ? __pfx_kthread+0x10/0x10
[   15.710088]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.710111]  ? calculate_sigpending+0x7b/0xa0
[   15.710136]  ? __pfx_kthread+0x10/0x10
[   15.710159]  ret_from_fork+0x116/0x1d0
[   15.710178]  ? __pfx_kthread+0x10/0x10
[   15.710200]  ret_from_fork_asm+0x1a/0x30
[   15.710232]  </TASK>
[   15.710243] 
[   15.718372] Allocated by task 283:
[   15.718584]  kasan_save_stack+0x45/0x70
[   15.718782]  kasan_save_track+0x18/0x40
[   15.718977]  kasan_save_alloc_info+0x3b/0x50
[   15.719133]  __kasan_kmalloc+0xb7/0xc0
[   15.719269]  __kmalloc_cache_noprof+0x189/0x420
[   15.719533]  kasan_atomics+0x95/0x310
[   15.719736]  kunit_try_run_case+0x1a5/0x480
[   15.719946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.720238]  kthread+0x337/0x6f0
[   15.720376]  ret_from_fork+0x116/0x1d0
[   15.720716]  ret_from_fork_asm+0x1a/0x30
[   15.720895] 
[   15.721005] The buggy address belongs to the object at ffff8881039b8c80
[   15.721005]  which belongs to the cache kmalloc-64 of size 64
[   15.721530] The buggy address is located 0 bytes to the right of
[   15.721530]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.721969] 
[   15.722043] The buggy address belongs to the physical page:
[   15.722295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.722674] flags: 0x200000000000000(node=0|zone=2)
[   15.722997] page_type: f5(slab)
[   15.723143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.723387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.723615] page dumped because: kasan: bad access detected
[   15.723806] 
[   15.723898] Memory state around the buggy address:
[   15.724120]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.724464]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.724803] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.725116]                                      ^
[   15.725317]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.725781]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726088] ==================================================================
[   15.986150] ==================================================================
[   15.986594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.986926] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.987223] 
[   15.987322] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.987375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.987388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.987408] Call Trace:
[   15.987471]  <TASK>
[   15.987488]  dump_stack_lvl+0x73/0xb0
[   15.987518]  print_report+0xd1/0x650
[   15.987555]  ? __virt_addr_valid+0x1db/0x2d0
[   15.987579]  ? kasan_atomics_helper+0x164f/0x5450
[   15.987601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.987625]  ? kasan_atomics_helper+0x164f/0x5450
[   15.987648]  kasan_report+0x141/0x180
[   15.987671]  ? kasan_atomics_helper+0x164f/0x5450
[   15.987698]  kasan_check_range+0x10c/0x1c0
[   15.987723]  __kasan_check_write+0x18/0x20
[   15.987743]  kasan_atomics_helper+0x164f/0x5450
[   15.987767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.987791]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.987817]  ? kasan_atomics+0x152/0x310
[   15.987845]  kasan_atomics+0x1dc/0x310
[   15.987868]  ? __pfx_kasan_atomics+0x10/0x10
[   15.987894]  ? __pfx_read_tsc+0x10/0x10
[   15.987915]  ? ktime_get_ts64+0x86/0x230
[   15.987940]  kunit_try_run_case+0x1a5/0x480
[   15.987965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.987990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.988049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.988075]  ? __kthread_parkme+0x82/0x180
[   15.988097]  ? preempt_count_sub+0x50/0x80
[   15.988165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.988191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.988228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.988254]  kthread+0x337/0x6f0
[   15.988275]  ? trace_preempt_on+0x20/0xc0
[   15.988299]  ? __pfx_kthread+0x10/0x10
[   15.988321]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.988352]  ? calculate_sigpending+0x7b/0xa0
[   15.988377]  ? __pfx_kthread+0x10/0x10
[   15.988399]  ret_from_fork+0x116/0x1d0
[   15.988429]  ? __pfx_kthread+0x10/0x10
[   15.988450]  ret_from_fork_asm+0x1a/0x30
[   15.988481]  </TASK>
[   15.988493] 
[   15.996561] Allocated by task 283:
[   15.996713]  kasan_save_stack+0x45/0x70
[   15.996856]  kasan_save_track+0x18/0x40
[   15.997003]  kasan_save_alloc_info+0x3b/0x50
[   15.997267]  __kasan_kmalloc+0xb7/0xc0
[   15.997468]  __kmalloc_cache_noprof+0x189/0x420
[   15.997860]  kasan_atomics+0x95/0x310
[   15.998125]  kunit_try_run_case+0x1a5/0x480
[   15.998290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.998494]  kthread+0x337/0x6f0
[   15.998666]  ret_from_fork+0x116/0x1d0
[   15.998912]  ret_from_fork_asm+0x1a/0x30
[   15.999115] 
[   15.999211] The buggy address belongs to the object at ffff8881039b8c80
[   15.999211]  which belongs to the cache kmalloc-64 of size 64
[   15.999737] The buggy address is located 0 bytes to the right of
[   15.999737]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.000276] 
[   16.000360] The buggy address belongs to the physical page:
[   16.000534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.000809] flags: 0x200000000000000(node=0|zone=2)
[   16.001098] page_type: f5(slab)
[   16.001271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.001625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.001971] page dumped because: kasan: bad access detected
[   16.002237] 
[   16.002378] Memory state around the buggy address:
[   16.002612]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.002962]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.003228] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.003453]                                      ^
[   16.003623]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.003945]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.004322] ==================================================================
[   15.887151] ==================================================================
[   15.887488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.887958] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.888235] 
[   15.888317] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.888368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.888381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.888400] Call Trace:
[   15.888416]  <TASK>
[   15.888431]  dump_stack_lvl+0x73/0xb0
[   15.888459]  print_report+0xd1/0x650
[   15.888482]  ? __virt_addr_valid+0x1db/0x2d0
[   15.888505]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.888526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.888550]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.888573]  kasan_report+0x141/0x180
[   15.888595]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.888623]  __asan_report_load8_noabort+0x18/0x20
[   15.888649]  kasan_atomics_helper+0x4eae/0x5450
[   15.888707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.888732]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.888769]  ? kasan_atomics+0x152/0x310
[   15.888796]  kasan_atomics+0x1dc/0x310
[   15.888820]  ? __pfx_kasan_atomics+0x10/0x10
[   15.888873]  ? __pfx_read_tsc+0x10/0x10
[   15.888894]  ? ktime_get_ts64+0x86/0x230
[   15.888929]  kunit_try_run_case+0x1a5/0x480
[   15.888955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.888978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.889004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.889029]  ? __kthread_parkme+0x82/0x180
[   15.889050]  ? preempt_count_sub+0x50/0x80
[   15.889102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.889139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.889177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.889203]  kthread+0x337/0x6f0
[   15.889224]  ? trace_preempt_on+0x20/0xc0
[   15.889247]  ? __pfx_kthread+0x10/0x10
[   15.889268]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.889291]  ? calculate_sigpending+0x7b/0xa0
[   15.889316]  ? __pfx_kthread+0x10/0x10
[   15.889338]  ret_from_fork+0x116/0x1d0
[   15.889366]  ? __pfx_kthread+0x10/0x10
[   15.889388]  ret_from_fork_asm+0x1a/0x30
[   15.889431]  </TASK>
[   15.889442] 
[   15.897156] Allocated by task 283:
[   15.897359]  kasan_save_stack+0x45/0x70
[   15.897575]  kasan_save_track+0x18/0x40
[   15.897778]  kasan_save_alloc_info+0x3b/0x50
[   15.897936]  __kasan_kmalloc+0xb7/0xc0
[   15.898111]  __kmalloc_cache_noprof+0x189/0x420
[   15.898337]  kasan_atomics+0x95/0x310
[   15.898645]  kunit_try_run_case+0x1a5/0x480
[   15.898903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.899176]  kthread+0x337/0x6f0
[   15.899394]  ret_from_fork+0x116/0x1d0
[   15.899593]  ret_from_fork_asm+0x1a/0x30
[   15.899734] 
[   15.899805] The buggy address belongs to the object at ffff8881039b8c80
[   15.899805]  which belongs to the cache kmalloc-64 of size 64
[   15.900317] The buggy address is located 0 bytes to the right of
[   15.900317]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.901000] 
[   15.901080] The buggy address belongs to the physical page:
[   15.901420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.901756] flags: 0x200000000000000(node=0|zone=2)
[   15.901922] page_type: f5(slab)
[   15.902045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.902382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.902738] page dumped because: kasan: bad access detected
[   15.903031] 
[   15.903169] Memory state around the buggy address:
[   15.903531]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.903835]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.904055] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.904337]                                      ^
[   15.904782]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905117]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905478] ==================================================================
[   15.156051] ==================================================================
[   15.156836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.157279] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.157791] 
[   15.157911] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.158273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.158286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.158307] Call Trace:
[   15.158322]  <TASK>
[   15.158337]  dump_stack_lvl+0x73/0xb0
[   15.158390]  print_report+0xd1/0x650
[   15.158413]  ? __virt_addr_valid+0x1db/0x2d0
[   15.158437]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.158568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.158593]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.158635]  kasan_report+0x141/0x180
[   15.158658]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.158686]  __asan_report_store4_noabort+0x1b/0x30
[   15.158713]  kasan_atomics_helper+0x4b6e/0x5450
[   15.158737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.158761]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.158787]  ? kasan_atomics+0x152/0x310
[   15.158814]  kasan_atomics+0x1dc/0x310
[   15.158837]  ? __pfx_kasan_atomics+0x10/0x10
[   15.158862]  ? __pfx_read_tsc+0x10/0x10
[   15.158884]  ? ktime_get_ts64+0x86/0x230
[   15.158909]  kunit_try_run_case+0x1a5/0x480
[   15.158934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.158958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.158984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.159009]  ? __kthread_parkme+0x82/0x180
[   15.159031]  ? preempt_count_sub+0x50/0x80
[   15.159056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.159135]  kthread+0x337/0x6f0
[   15.159155]  ? trace_preempt_on+0x20/0xc0
[   15.159179]  ? __pfx_kthread+0x10/0x10
[   15.159201]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.159224]  ? calculate_sigpending+0x7b/0xa0
[   15.159249]  ? __pfx_kthread+0x10/0x10
[   15.159271]  ret_from_fork+0x116/0x1d0
[   15.159291]  ? __pfx_kthread+0x10/0x10
[   15.159313]  ret_from_fork_asm+0x1a/0x30
[   15.159356]  </TASK>
[   15.159386] 
[   15.171099] Allocated by task 283:
[   15.171504]  kasan_save_stack+0x45/0x70
[   15.171673]  kasan_save_track+0x18/0x40
[   15.172046]  kasan_save_alloc_info+0x3b/0x50
[   15.172510]  __kasan_kmalloc+0xb7/0xc0
[   15.172718]  __kmalloc_cache_noprof+0x189/0x420
[   15.172921]  kasan_atomics+0x95/0x310
[   15.173097]  kunit_try_run_case+0x1a5/0x480
[   15.173291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.174340]  kthread+0x337/0x6f0
[   15.175008]  ret_from_fork+0x116/0x1d0
[   15.175184]  ret_from_fork_asm+0x1a/0x30
[   15.175375] 
[   15.176026] The buggy address belongs to the object at ffff8881039b8c80
[   15.176026]  which belongs to the cache kmalloc-64 of size 64
[   15.177316] The buggy address is located 0 bytes to the right of
[   15.177316]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.178132] 
[   15.178327] The buggy address belongs to the physical page:
[   15.178742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.179155] flags: 0x200000000000000(node=0|zone=2)
[   15.179389] page_type: f5(slab)
[   15.179920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.180243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.180926] page dumped because: kasan: bad access detected
[   15.181301] 
[   15.181581] Memory state around the buggy address:
[   15.181854]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.182174]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.182706] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.183101]                                      ^
[   15.183539]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183989]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184579] ==================================================================
[   15.748692] ==================================================================
[   15.749010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.749327] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.750027] 
[   15.750287] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.750361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.750375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.750395] Call Trace:
[   15.750411]  <TASK>
[   15.750434]  dump_stack_lvl+0x73/0xb0
[   15.750467]  print_report+0xd1/0x650
[   15.750490]  ? __virt_addr_valid+0x1db/0x2d0
[   15.750515]  ? kasan_atomics_helper+0x1148/0x5450
[   15.750539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.750563]  ? kasan_atomics_helper+0x1148/0x5450
[   15.750587]  kasan_report+0x141/0x180
[   15.750611]  ? kasan_atomics_helper+0x1148/0x5450
[   15.750639]  kasan_check_range+0x10c/0x1c0
[   15.750663]  __kasan_check_write+0x18/0x20
[   15.750684]  kasan_atomics_helper+0x1148/0x5450
[   15.750708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.750732]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.750758]  ? kasan_atomics+0x152/0x310
[   15.750787]  kasan_atomics+0x1dc/0x310
[   15.750810]  ? __pfx_kasan_atomics+0x10/0x10
[   15.750836]  ? __pfx_read_tsc+0x10/0x10
[   15.750858]  ? ktime_get_ts64+0x86/0x230
[   15.750883]  kunit_try_run_case+0x1a5/0x480
[   15.750908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.750932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.750957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.750982]  ? __kthread_parkme+0x82/0x180
[   15.751004]  ? preempt_count_sub+0x50/0x80
[   15.751029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.751055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.751081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.751107]  kthread+0x337/0x6f0
[   15.751128]  ? trace_preempt_on+0x20/0xc0
[   15.751151]  ? __pfx_kthread+0x10/0x10
[   15.751173]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.751196]  ? calculate_sigpending+0x7b/0xa0
[   15.751221]  ? __pfx_kthread+0x10/0x10
[   15.751243]  ret_from_fork+0x116/0x1d0
[   15.751262]  ? __pfx_kthread+0x10/0x10
[   15.751284]  ret_from_fork_asm+0x1a/0x30
[   15.751315]  </TASK>
[   15.751326] 
[   15.759899] Allocated by task 283:
[   15.760081]  kasan_save_stack+0x45/0x70
[   15.760238]  kasan_save_track+0x18/0x40
[   15.760389]  kasan_save_alloc_info+0x3b/0x50
[   15.760641]  __kasan_kmalloc+0xb7/0xc0
[   15.760833]  __kmalloc_cache_noprof+0x189/0x420
[   15.761233]  kasan_atomics+0x95/0x310
[   15.761380]  kunit_try_run_case+0x1a5/0x480
[   15.761528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.761787]  kthread+0x337/0x6f0
[   15.761961]  ret_from_fork+0x116/0x1d0
[   15.762178]  ret_from_fork_asm+0x1a/0x30
[   15.762422] 
[   15.762521] The buggy address belongs to the object at ffff8881039b8c80
[   15.762521]  which belongs to the cache kmalloc-64 of size 64
[   15.763029] The buggy address is located 0 bytes to the right of
[   15.763029]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.763456] 
[   15.763531] The buggy address belongs to the physical page:
[   15.763757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.764137] flags: 0x200000000000000(node=0|zone=2)
[   15.764330] page_type: f5(slab)
[   15.764462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.764843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.765195] page dumped because: kasan: bad access detected
[   15.765529] 
[   15.765625] Memory state around the buggy address:
[   15.765850]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.766154]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.766490] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.766779]                                      ^
[   15.766939]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.767250]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.767791] ==================================================================
[   16.225246] ==================================================================
[   16.226132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.226548] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.227129] 
[   16.227246] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.227290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.227303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.227323] Call Trace:
[   16.227339]  <TASK>
[   16.227365]  dump_stack_lvl+0x73/0xb0
[   16.227397]  print_report+0xd1/0x650
[   16.227614]  ? __virt_addr_valid+0x1db/0x2d0
[   16.227640]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.227665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.227690]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.227713]  kasan_report+0x141/0x180
[   16.227776]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.227805]  kasan_check_range+0x10c/0x1c0
[   16.227830]  __kasan_check_write+0x18/0x20
[   16.227851]  kasan_atomics_helper+0x1ce1/0x5450
[   16.227875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.227899]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.227926]  ? kasan_atomics+0x152/0x310
[   16.227953]  kasan_atomics+0x1dc/0x310
[   16.227977]  ? __pfx_kasan_atomics+0x10/0x10
[   16.228003]  ? __pfx_read_tsc+0x10/0x10
[   16.228025]  ? ktime_get_ts64+0x86/0x230
[   16.228050]  kunit_try_run_case+0x1a5/0x480
[   16.228075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.228099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.228125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.228150]  ? __kthread_parkme+0x82/0x180
[   16.228176]  ? preempt_count_sub+0x50/0x80
[   16.228200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.228227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.228252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.228278]  kthread+0x337/0x6f0
[   16.228298]  ? trace_preempt_on+0x20/0xc0
[   16.228322]  ? __pfx_kthread+0x10/0x10
[   16.228355]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.228379]  ? calculate_sigpending+0x7b/0xa0
[   16.228403]  ? __pfx_kthread+0x10/0x10
[   16.228427]  ret_from_fork+0x116/0x1d0
[   16.228446]  ? __pfx_kthread+0x10/0x10
[   16.228468]  ret_from_fork_asm+0x1a/0x30
[   16.228499]  </TASK>
[   16.228510] 
[   16.239638] Allocated by task 283:
[   16.239828]  kasan_save_stack+0x45/0x70
[   16.240021]  kasan_save_track+0x18/0x40
[   16.240165]  kasan_save_alloc_info+0x3b/0x50
[   16.240376]  __kasan_kmalloc+0xb7/0xc0
[   16.240596]  __kmalloc_cache_noprof+0x189/0x420
[   16.240847]  kasan_atomics+0x95/0x310
[   16.241030]  kunit_try_run_case+0x1a5/0x480
[   16.241221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.241525]  kthread+0x337/0x6f0
[   16.241709]  ret_from_fork+0x116/0x1d0
[   16.241878]  ret_from_fork_asm+0x1a/0x30
[   16.242085] 
[   16.242207] The buggy address belongs to the object at ffff8881039b8c80
[   16.242207]  which belongs to the cache kmalloc-64 of size 64
[   16.242788] The buggy address is located 0 bytes to the right of
[   16.242788]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.243310] 
[   16.243417] The buggy address belongs to the physical page:
[   16.243636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.243979] flags: 0x200000000000000(node=0|zone=2)
[   16.244247] page_type: f5(slab)
[   16.244421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.244723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.245048] page dumped because: kasan: bad access detected
[   16.245264] 
[   16.245387] Memory state around the buggy address:
[   16.245675]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.245973]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.246270] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.246610]                                      ^
[   16.246879]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.247196]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.247480] ==================================================================
[   15.515616] ==================================================================
[   15.515965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.516309] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.516682] 
[   15.516798] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.516839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.516852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.516871] Call Trace:
[   15.516885]  <TASK>
[   15.516900]  dump_stack_lvl+0x73/0xb0
[   15.516930]  print_report+0xd1/0x650
[   15.516953]  ? __virt_addr_valid+0x1db/0x2d0
[   15.516977]  ? kasan_atomics_helper+0xc70/0x5450
[   15.516999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.517024]  ? kasan_atomics_helper+0xc70/0x5450
[   15.517047]  kasan_report+0x141/0x180
[   15.517070]  ? kasan_atomics_helper+0xc70/0x5450
[   15.517097]  kasan_check_range+0x10c/0x1c0
[   15.519159]  __kasan_check_write+0x18/0x20
[   15.519206]  kasan_atomics_helper+0xc70/0x5450
[   15.519235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.519260]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.519288]  ? kasan_atomics+0x152/0x310
[   15.519317]  kasan_atomics+0x1dc/0x310
[   15.519381]  ? __pfx_kasan_atomics+0x10/0x10
[   15.519425]  ? __pfx_read_tsc+0x10/0x10
[   15.519448]  ? ktime_get_ts64+0x86/0x230
[   15.519472]  kunit_try_run_case+0x1a5/0x480
[   15.519497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.519522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.519548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.519573]  ? __kthread_parkme+0x82/0x180
[   15.519596]  ? preempt_count_sub+0x50/0x80
[   15.519621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.519646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.519671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.519697]  kthread+0x337/0x6f0
[   15.519717]  ? trace_preempt_on+0x20/0xc0
[   15.519742]  ? __pfx_kthread+0x10/0x10
[   15.519764]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.519786]  ? calculate_sigpending+0x7b/0xa0
[   15.519811]  ? __pfx_kthread+0x10/0x10
[   15.519833]  ret_from_fork+0x116/0x1d0
[   15.519852]  ? __pfx_kthread+0x10/0x10
[   15.519873]  ret_from_fork_asm+0x1a/0x30
[   15.519918]  </TASK>
[   15.519930] 
[   15.529972] Allocated by task 283:
[   15.530163]  kasan_save_stack+0x45/0x70
[   15.530400]  kasan_save_track+0x18/0x40
[   15.530644]  kasan_save_alloc_info+0x3b/0x50
[   15.531062]  __kasan_kmalloc+0xb7/0xc0
[   15.531207]  __kmalloc_cache_noprof+0x189/0x420
[   15.531391]  kasan_atomics+0x95/0x310
[   15.531541]  kunit_try_run_case+0x1a5/0x480
[   15.531746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.531999]  kthread+0x337/0x6f0
[   15.532229]  ret_from_fork+0x116/0x1d0
[   15.532434]  ret_from_fork_asm+0x1a/0x30
[   15.532793] 
[   15.532895] The buggy address belongs to the object at ffff8881039b8c80
[   15.532895]  which belongs to the cache kmalloc-64 of size 64
[   15.533305] The buggy address is located 0 bytes to the right of
[   15.533305]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.534118] 
[   15.534220] The buggy address belongs to the physical page:
[   15.534533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.534813] flags: 0x200000000000000(node=0|zone=2)
[   15.534978] page_type: f5(slab)
[   15.535101] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.535623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.536438] page dumped because: kasan: bad access detected
[   15.536696] 
[   15.536768] Memory state around the buggy address:
[   15.536926]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.537146]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.537659] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.537986]                                      ^
[   15.538215]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.538592]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.538890] ==================================================================
[   15.239167] ==================================================================
[   15.239794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.240131] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.240810] 
[   15.240932] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.240975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.240989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.241011] Call Trace:
[   15.241027]  <TASK>
[   15.241042]  dump_stack_lvl+0x73/0xb0
[   15.241073]  print_report+0xd1/0x650
[   15.241097]  ? __virt_addr_valid+0x1db/0x2d0
[   15.241120]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.241142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.241167]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.241190]  kasan_report+0x141/0x180
[   15.241213]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.241241]  kasan_check_range+0x10c/0x1c0
[   15.241266]  __kasan_check_write+0x18/0x20
[   15.241287]  kasan_atomics_helper+0x4a0/0x5450
[   15.241310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.241334]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.241646]  ? kasan_atomics+0x152/0x310
[   15.241678]  kasan_atomics+0x1dc/0x310
[   15.241704]  ? __pfx_kasan_atomics+0x10/0x10
[   15.241730]  ? __pfx_read_tsc+0x10/0x10
[   15.241753]  ? ktime_get_ts64+0x86/0x230
[   15.241778]  kunit_try_run_case+0x1a5/0x480
[   15.241802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.241853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.241879]  ? __kthread_parkme+0x82/0x180
[   15.241901]  ? preempt_count_sub+0x50/0x80
[   15.241927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.241978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.242006]  kthread+0x337/0x6f0
[   15.242026]  ? trace_preempt_on+0x20/0xc0
[   15.242050]  ? __pfx_kthread+0x10/0x10
[   15.242072]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.242094]  ? calculate_sigpending+0x7b/0xa0
[   15.242119]  ? __pfx_kthread+0x10/0x10
[   15.242141]  ret_from_fork+0x116/0x1d0
[   15.242160]  ? __pfx_kthread+0x10/0x10
[   15.242182]  ret_from_fork_asm+0x1a/0x30
[   15.242214]  </TASK>
[   15.242225] 
[   15.253337] Allocated by task 283:
[   15.253819]  kasan_save_stack+0x45/0x70
[   15.254031]  kasan_save_track+0x18/0x40
[   15.254214]  kasan_save_alloc_info+0x3b/0x50
[   15.254861]  __kasan_kmalloc+0xb7/0xc0
[   15.255185]  __kmalloc_cache_noprof+0x189/0x420
[   15.255968]  kasan_atomics+0x95/0x310
[   15.256367]  kunit_try_run_case+0x1a5/0x480
[   15.257883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.258242]  kthread+0x337/0x6f0
[   15.258394]  ret_from_fork+0x116/0x1d0
[   15.258535]  ret_from_fork_asm+0x1a/0x30
[   15.258678] 
[   15.258754] The buggy address belongs to the object at ffff8881039b8c80
[   15.258754]  which belongs to the cache kmalloc-64 of size 64
[   15.259110] The buggy address is located 0 bytes to the right of
[   15.259110]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.260242] 
[   15.260366] The buggy address belongs to the physical page:
[   15.262064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.262740] flags: 0x200000000000000(node=0|zone=2)
[   15.263193] page_type: f5(slab)
[   15.263830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.264076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.264316] page dumped because: kasan: bad access detected
[   15.265233] 
[   15.265564] Memory state around the buggy address:
[   15.266211]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.267143]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.267932] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.268155]                                      ^
[   15.268319]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269100]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269861] ==================================================================
[   15.539297] ==================================================================
[   15.539662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.540024] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.540260] 
[   15.540361] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.540403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.540417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.540437] Call Trace:
[   15.540454]  <TASK>
[   15.540470]  dump_stack_lvl+0x73/0xb0
[   15.540562]  print_report+0xd1/0x650
[   15.540590]  ? __virt_addr_valid+0x1db/0x2d0
[   15.540613]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.540636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.540661]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.540685]  kasan_report+0x141/0x180
[   15.540708]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.540736]  __asan_report_load4_noabort+0x18/0x20
[   15.540763]  kasan_atomics_helper+0x4a84/0x5450
[   15.540787]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.540811]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.540837]  ? kasan_atomics+0x152/0x310
[   15.540865]  kasan_atomics+0x1dc/0x310
[   15.540888]  ? __pfx_kasan_atomics+0x10/0x10
[   15.540914]  ? __pfx_read_tsc+0x10/0x10
[   15.540936]  ? ktime_get_ts64+0x86/0x230
[   15.540961]  kunit_try_run_case+0x1a5/0x480
[   15.540986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.541010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.541035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.541061]  ? __kthread_parkme+0x82/0x180
[   15.541083]  ? preempt_count_sub+0x50/0x80
[   15.541107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.541133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.541159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.541185]  kthread+0x337/0x6f0
[   15.541205]  ? trace_preempt_on+0x20/0xc0
[   15.541228]  ? __pfx_kthread+0x10/0x10
[   15.541250]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.541273]  ? calculate_sigpending+0x7b/0xa0
[   15.541299]  ? __pfx_kthread+0x10/0x10
[   15.541321]  ret_from_fork+0x116/0x1d0
[   15.541340]  ? __pfx_kthread+0x10/0x10
[   15.541412]  ret_from_fork_asm+0x1a/0x30
[   15.541454]  </TASK>
[   15.541465] 
[   15.549089] Allocated by task 283:
[   15.549249]  kasan_save_stack+0x45/0x70
[   15.549473]  kasan_save_track+0x18/0x40
[   15.549649]  kasan_save_alloc_info+0x3b/0x50
[   15.549837]  __kasan_kmalloc+0xb7/0xc0
[   15.549972]  __kmalloc_cache_noprof+0x189/0x420
[   15.550128]  kasan_atomics+0x95/0x310
[   15.550323]  kunit_try_run_case+0x1a5/0x480
[   15.550541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.550841]  kthread+0x337/0x6f0
[   15.551025]  ret_from_fork+0x116/0x1d0
[   15.551214]  ret_from_fork_asm+0x1a/0x30
[   15.551371] 
[   15.551488] The buggy address belongs to the object at ffff8881039b8c80
[   15.551488]  which belongs to the cache kmalloc-64 of size 64
[   15.552064] The buggy address is located 0 bytes to the right of
[   15.552064]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.553052] 
[   15.553193] The buggy address belongs to the physical page:
[   15.553477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.553815] flags: 0x200000000000000(node=0|zone=2)
[   15.554025] page_type: f5(slab)
[   15.554185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.554539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.554770] page dumped because: kasan: bad access detected
[   15.554968] 
[   15.555064] Memory state around the buggy address:
[   15.555294]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.555731]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.556009] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.556280]                                      ^
[   15.556448]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.556791]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.557115] ==================================================================
[   15.946224] ==================================================================
[   15.946800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.947761] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.948116] 
[   15.948264] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.948318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.948330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.948360] Call Trace:
[   15.948374]  <TASK>
[   15.948388]  dump_stack_lvl+0x73/0xb0
[   15.948419]  print_report+0xd1/0x650
[   15.948443]  ? __virt_addr_valid+0x1db/0x2d0
[   15.948466]  ? kasan_atomics_helper+0x151d/0x5450
[   15.948500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.948524]  ? kasan_atomics_helper+0x151d/0x5450
[   15.948548]  kasan_report+0x141/0x180
[   15.948571]  ? kasan_atomics_helper+0x151d/0x5450
[   15.948599]  kasan_check_range+0x10c/0x1c0
[   15.948658]  __kasan_check_write+0x18/0x20
[   15.948679]  kasan_atomics_helper+0x151d/0x5450
[   15.948742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.948767]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.948793]  ? kasan_atomics+0x152/0x310
[   15.948831]  kasan_atomics+0x1dc/0x310
[   15.948855]  ? __pfx_kasan_atomics+0x10/0x10
[   15.948881]  ? __pfx_read_tsc+0x10/0x10
[   15.948904]  ? ktime_get_ts64+0x86/0x230
[   15.948928]  kunit_try_run_case+0x1a5/0x480
[   15.948953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.949002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.949028]  ? __kthread_parkme+0x82/0x180
[   15.949049]  ? preempt_count_sub+0x50/0x80
[   15.949075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.949101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.949127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.949155]  kthread+0x337/0x6f0
[   15.949177]  ? trace_preempt_on+0x20/0xc0
[   15.949201]  ? __pfx_kthread+0x10/0x10
[   15.949223]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.949246]  ? calculate_sigpending+0x7b/0xa0
[   15.949272]  ? __pfx_kthread+0x10/0x10
[   15.949295]  ret_from_fork+0x116/0x1d0
[   15.949315]  ? __pfx_kthread+0x10/0x10
[   15.949337]  ret_from_fork_asm+0x1a/0x30
[   15.949379]  </TASK>
[   15.949391] 
[   15.957420] Allocated by task 283:
[   15.957645]  kasan_save_stack+0x45/0x70
[   15.957856]  kasan_save_track+0x18/0x40
[   15.958092]  kasan_save_alloc_info+0x3b/0x50
[   15.958308]  __kasan_kmalloc+0xb7/0xc0
[   15.958680]  __kmalloc_cache_noprof+0x189/0x420
[   15.958945]  kasan_atomics+0x95/0x310
[   15.959155]  kunit_try_run_case+0x1a5/0x480
[   15.959397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.959708]  kthread+0x337/0x6f0
[   15.959900]  ret_from_fork+0x116/0x1d0
[   15.960086]  ret_from_fork_asm+0x1a/0x30
[   15.960228] 
[   15.960299] The buggy address belongs to the object at ffff8881039b8c80
[   15.960299]  which belongs to the cache kmalloc-64 of size 64
[   15.961152] The buggy address is located 0 bytes to the right of
[   15.961152]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.961940] 
[   15.962050] The buggy address belongs to the physical page:
[   15.962247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.962491] flags: 0x200000000000000(node=0|zone=2)
[   15.962722] page_type: f5(slab)
[   15.962908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.963314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.963675] page dumped because: kasan: bad access detected
[   15.964018] 
[   15.964113] Memory state around the buggy address:
[   15.964369]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.964732]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.964976] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.965182]                                      ^
[   15.965427]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.965747]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.966059] ==================================================================
[   16.026302] ==================================================================
[   16.026719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.027175] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.027686] 
[   16.027798] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.027838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.027850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.027870] Call Trace:
[   16.027882]  <TASK>
[   16.027897]  dump_stack_lvl+0x73/0xb0
[   16.027927]  print_report+0xd1/0x650
[   16.027950]  ? __virt_addr_valid+0x1db/0x2d0
[   16.028014]  ? kasan_atomics_helper+0x177f/0x5450
[   16.028062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.028138]  ? kasan_atomics_helper+0x177f/0x5450
[   16.028165]  kasan_report+0x141/0x180
[   16.028201]  ? kasan_atomics_helper+0x177f/0x5450
[   16.028229]  kasan_check_range+0x10c/0x1c0
[   16.028253]  __kasan_check_write+0x18/0x20
[   16.028273]  kasan_atomics_helper+0x177f/0x5450
[   16.028297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.028371]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.028398]  ? kasan_atomics+0x152/0x310
[   16.028465]  kasan_atomics+0x1dc/0x310
[   16.028490]  ? __pfx_kasan_atomics+0x10/0x10
[   16.028526]  ? __pfx_read_tsc+0x10/0x10
[   16.028556]  ? ktime_get_ts64+0x86/0x230
[   16.028581]  kunit_try_run_case+0x1a5/0x480
[   16.028605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.028629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.028654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.028680]  ? __kthread_parkme+0x82/0x180
[   16.028701]  ? preempt_count_sub+0x50/0x80
[   16.028726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.028752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.028777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.028804]  kthread+0x337/0x6f0
[   16.028823]  ? trace_preempt_on+0x20/0xc0
[   16.028848]  ? __pfx_kthread+0x10/0x10
[   16.028870]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.028892]  ? calculate_sigpending+0x7b/0xa0
[   16.028917]  ? __pfx_kthread+0x10/0x10
[   16.028940]  ret_from_fork+0x116/0x1d0
[   16.028959]  ? __pfx_kthread+0x10/0x10
[   16.028980]  ret_from_fork_asm+0x1a/0x30
[   16.029012]  </TASK>
[   16.029023] 
[   16.040744] Allocated by task 283:
[   16.040935]  kasan_save_stack+0x45/0x70
[   16.041092]  kasan_save_track+0x18/0x40
[   16.041234]  kasan_save_alloc_info+0x3b/0x50
[   16.041460]  __kasan_kmalloc+0xb7/0xc0
[   16.041989]  __kmalloc_cache_noprof+0x189/0x420
[   16.042980]  kasan_atomics+0x95/0x310
[   16.043209]  kunit_try_run_case+0x1a5/0x480
[   16.043871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.044159]  kthread+0x337/0x6f0
[   16.044336]  ret_from_fork+0x116/0x1d0
[   16.044549]  ret_from_fork_asm+0x1a/0x30
[   16.044695] 
[   16.044770] The buggy address belongs to the object at ffff8881039b8c80
[   16.044770]  which belongs to the cache kmalloc-64 of size 64
[   16.045179] The buggy address is located 0 bytes to the right of
[   16.045179]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.045763] 
[   16.045908] The buggy address belongs to the physical page:
[   16.046212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.046667] flags: 0x200000000000000(node=0|zone=2)
[   16.047013] page_type: f5(slab)
[   16.047238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.047637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.047916] page dumped because: kasan: bad access detected
[   16.048174] 
[   16.048268] Memory state around the buggy address:
[   16.048592]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.048816]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049122] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.049605]                                      ^
[   16.049897]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.050221]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.050639] ==================================================================
[   15.791578] ==================================================================
[   15.791916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.792184] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.792687] 
[   15.792800] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.792840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.792853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.792873] Call Trace:
[   15.792890]  <TASK>
[   15.792907]  dump_stack_lvl+0x73/0xb0
[   15.792936]  print_report+0xd1/0x650
[   15.792960]  ? __virt_addr_valid+0x1db/0x2d0
[   15.792983]  ? kasan_atomics_helper+0x1217/0x5450
[   15.793006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.793030]  ? kasan_atomics_helper+0x1217/0x5450
[   15.793053]  kasan_report+0x141/0x180
[   15.793076]  ? kasan_atomics_helper+0x1217/0x5450
[   15.793104]  kasan_check_range+0x10c/0x1c0
[   15.793128]  __kasan_check_write+0x18/0x20
[   15.793149]  kasan_atomics_helper+0x1217/0x5450
[   15.793173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.793198]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.793224]  ? kasan_atomics+0x152/0x310
[   15.793251]  kasan_atomics+0x1dc/0x310
[   15.793274]  ? __pfx_kasan_atomics+0x10/0x10
[   15.793299]  ? __pfx_read_tsc+0x10/0x10
[   15.793320]  ? ktime_get_ts64+0x86/0x230
[   15.793360]  kunit_try_run_case+0x1a5/0x480
[   15.793385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.793420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.793444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.793470]  ? __kthread_parkme+0x82/0x180
[   15.793492]  ? preempt_count_sub+0x50/0x80
[   15.793516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.793541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.793567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.793593]  kthread+0x337/0x6f0
[   15.793613]  ? trace_preempt_on+0x20/0xc0
[   15.793637]  ? __pfx_kthread+0x10/0x10
[   15.793658]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.793681]  ? calculate_sigpending+0x7b/0xa0
[   15.793706]  ? __pfx_kthread+0x10/0x10
[   15.793728]  ret_from_fork+0x116/0x1d0
[   15.793747]  ? __pfx_kthread+0x10/0x10
[   15.793769]  ret_from_fork_asm+0x1a/0x30
[   15.793800]  </TASK>
[   15.793811] 
[   15.801165] Allocated by task 283:
[   15.801306]  kasan_save_stack+0x45/0x70
[   15.801634]  kasan_save_track+0x18/0x40
[   15.801831]  kasan_save_alloc_info+0x3b/0x50
[   15.802046]  __kasan_kmalloc+0xb7/0xc0
[   15.802239]  __kmalloc_cache_noprof+0x189/0x420
[   15.802472]  kasan_atomics+0x95/0x310
[   15.802639]  kunit_try_run_case+0x1a5/0x480
[   15.802839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.803067]  kthread+0x337/0x6f0
[   15.803222]  ret_from_fork+0x116/0x1d0
[   15.803372]  ret_from_fork_asm+0x1a/0x30
[   15.803519] 
[   15.803591] The buggy address belongs to the object at ffff8881039b8c80
[   15.803591]  which belongs to the cache kmalloc-64 of size 64
[   15.803946] The buggy address is located 0 bytes to the right of
[   15.803946]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.804889] 
[   15.804967] The buggy address belongs to the physical page:
[   15.805138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.805388] flags: 0x200000000000000(node=0|zone=2)
[   15.805634] page_type: f5(slab)
[   15.805804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.806146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.806523] page dumped because: kasan: bad access detected
[   15.806695] 
[   15.806765] Memory state around the buggy address:
[   15.806920]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.807242]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.807649] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.807971]                                      ^
[   15.808188]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.808529]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.808821] ==================================================================
[   16.134573] ==================================================================
[   16.134918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.135264] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.135741] 
[   16.135868] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.135909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.135933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.135953] Call Trace:
[   16.135969]  <TASK>
[   16.135984]  dump_stack_lvl+0x73/0xb0
[   16.136013]  print_report+0xd1/0x650
[   16.136036]  ? __virt_addr_valid+0x1db/0x2d0
[   16.136058]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.136080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.136104]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.136127]  kasan_report+0x141/0x180
[   16.136150]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.136182]  kasan_check_range+0x10c/0x1c0
[   16.136206]  __kasan_check_write+0x18/0x20
[   16.136227]  kasan_atomics_helper+0x1a7f/0x5450
[   16.136250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.136294]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.136320]  ? kasan_atomics+0x152/0x310
[   16.136357]  kasan_atomics+0x1dc/0x310
[   16.136380]  ? __pfx_kasan_atomics+0x10/0x10
[   16.136407]  ? __pfx_read_tsc+0x10/0x10
[   16.136428]  ? ktime_get_ts64+0x86/0x230
[   16.136455]  kunit_try_run_case+0x1a5/0x480
[   16.136480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.136503]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.136529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.136554]  ? __kthread_parkme+0x82/0x180
[   16.136575]  ? preempt_count_sub+0x50/0x80
[   16.136599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.136625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.136669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.136696]  kthread+0x337/0x6f0
[   16.136716]  ? trace_preempt_on+0x20/0xc0
[   16.136739]  ? __pfx_kthread+0x10/0x10
[   16.136761]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.136783]  ? calculate_sigpending+0x7b/0xa0
[   16.136809]  ? __pfx_kthread+0x10/0x10
[   16.136833]  ret_from_fork+0x116/0x1d0
[   16.136853]  ? __pfx_kthread+0x10/0x10
[   16.136874]  ret_from_fork_asm+0x1a/0x30
[   16.136906]  </TASK>
[   16.136916] 
[   16.146378] Allocated by task 283:
[   16.146708]  kasan_save_stack+0x45/0x70
[   16.147000]  kasan_save_track+0x18/0x40
[   16.147279]  kasan_save_alloc_info+0x3b/0x50
[   16.147591]  __kasan_kmalloc+0xb7/0xc0
[   16.147955]  __kmalloc_cache_noprof+0x189/0x420
[   16.148280]  kasan_atomics+0x95/0x310
[   16.148589]  kunit_try_run_case+0x1a5/0x480
[   16.148903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.149144]  kthread+0x337/0x6f0
[   16.149321]  ret_from_fork+0x116/0x1d0
[   16.149564]  ret_from_fork_asm+0x1a/0x30
[   16.149721] 
[   16.149797] The buggy address belongs to the object at ffff8881039b8c80
[   16.149797]  which belongs to the cache kmalloc-64 of size 64
[   16.150365] The buggy address is located 0 bytes to the right of
[   16.150365]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.151051] 
[   16.151473] The buggy address belongs to the physical page:
[   16.151689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.152199] flags: 0x200000000000000(node=0|zone=2)
[   16.152514] page_type: f5(slab)
[   16.152810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.153181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.153738] page dumped because: kasan: bad access detected
[   16.154014] 
[   16.154243] Memory state around the buggy address:
[   16.154608]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155024]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155519] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.155827]                                      ^
[   16.156055]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156373]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156937] ==================================================================
[   15.768294] ==================================================================
[   15.768949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.769274] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.769638] 
[   15.769762] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.769816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.769829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.769850] Call Trace:
[   15.769863]  <TASK>
[   15.769877]  dump_stack_lvl+0x73/0xb0
[   15.769918]  print_report+0xd1/0x650
[   15.769941]  ? __virt_addr_valid+0x1db/0x2d0
[   15.769964]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.769998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.770022]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.770045]  kasan_report+0x141/0x180
[   15.770069]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.770097]  __asan_report_load4_noabort+0x18/0x20
[   15.770122]  kasan_atomics_helper+0x4a02/0x5450
[   15.770147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.770171]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.770196]  ? kasan_atomics+0x152/0x310
[   15.770224]  kasan_atomics+0x1dc/0x310
[   15.770248]  ? __pfx_kasan_atomics+0x10/0x10
[   15.770273]  ? __pfx_read_tsc+0x10/0x10
[   15.770295]  ? ktime_get_ts64+0x86/0x230
[   15.770320]  kunit_try_run_case+0x1a5/0x480
[   15.770353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.770404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.770441]  ? __kthread_parkme+0x82/0x180
[   15.770471]  ? preempt_count_sub+0x50/0x80
[   15.770496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.770558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.770585]  kthread+0x337/0x6f0
[   15.770604]  ? trace_preempt_on+0x20/0xc0
[   15.770629]  ? __pfx_kthread+0x10/0x10
[   15.770650]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.770673]  ? calculate_sigpending+0x7b/0xa0
[   15.770699]  ? __pfx_kthread+0x10/0x10
[   15.770721]  ret_from_fork+0x116/0x1d0
[   15.770741]  ? __pfx_kthread+0x10/0x10
[   15.770763]  ret_from_fork_asm+0x1a/0x30
[   15.770803]  </TASK>
[   15.770814] 
[   15.780667] Allocated by task 283:
[   15.781690]  kasan_save_stack+0x45/0x70
[   15.781866]  kasan_save_track+0x18/0x40
[   15.782009]  kasan_save_alloc_info+0x3b/0x50
[   15.782162]  __kasan_kmalloc+0xb7/0xc0
[   15.782296]  __kmalloc_cache_noprof+0x189/0x420
[   15.782471]  kasan_atomics+0x95/0x310
[   15.782608]  kunit_try_run_case+0x1a5/0x480
[   15.782756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.782936]  kthread+0x337/0x6f0
[   15.783058]  ret_from_fork+0x116/0x1d0
[   15.783192]  ret_from_fork_asm+0x1a/0x30
[   15.783332] 
[   15.784919] The buggy address belongs to the object at ffff8881039b8c80
[   15.784919]  which belongs to the cache kmalloc-64 of size 64
[   15.785817] The buggy address is located 0 bytes to the right of
[   15.785817]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.786293] 
[   15.786405] The buggy address belongs to the physical page:
[   15.786797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.787432] flags: 0x200000000000000(node=0|zone=2)
[   15.787617] page_type: f5(slab)
[   15.787788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.788078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.788376] page dumped because: kasan: bad access detected
[   15.788603] 
[   15.788696] Memory state around the buggy address:
[   15.788854]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.789302]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.789734] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.790011]                                      ^
[   15.790216]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.790599]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.790894] ==================================================================
[   16.469568] ==================================================================
[   16.470188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.470599] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.470904] 
[   16.470989] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.471029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.471051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.471071] Call Trace:
[   16.471086]  <TASK>
[   16.471101]  dump_stack_lvl+0x73/0xb0
[   16.471142]  print_report+0xd1/0x650
[   16.471166]  ? __virt_addr_valid+0x1db/0x2d0
[   16.471188]  ? kasan_atomics_helper+0x224c/0x5450
[   16.471210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.471245]  ? kasan_atomics_helper+0x224c/0x5450
[   16.471267]  kasan_report+0x141/0x180
[   16.471290]  ? kasan_atomics_helper+0x224c/0x5450
[   16.471328]  kasan_check_range+0x10c/0x1c0
[   16.471362]  __kasan_check_write+0x18/0x20
[   16.471383]  kasan_atomics_helper+0x224c/0x5450
[   16.471418]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.471442]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.471478]  ? kasan_atomics+0x152/0x310
[   16.471505]  kasan_atomics+0x1dc/0x310
[   16.471539]  ? __pfx_kasan_atomics+0x10/0x10
[   16.471564]  ? __pfx_read_tsc+0x10/0x10
[   16.471586]  ? ktime_get_ts64+0x86/0x230
[   16.471610]  kunit_try_run_case+0x1a5/0x480
[   16.471644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.471668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.471693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.471728]  ? __kthread_parkme+0x82/0x180
[   16.471750]  ? preempt_count_sub+0x50/0x80
[   16.471774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.471800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.471826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.471853]  kthread+0x337/0x6f0
[   16.471873]  ? trace_preempt_on+0x20/0xc0
[   16.471897]  ? __pfx_kthread+0x10/0x10
[   16.471919]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.471951]  ? calculate_sigpending+0x7b/0xa0
[   16.471976]  ? __pfx_kthread+0x10/0x10
[   16.471998]  ret_from_fork+0x116/0x1d0
[   16.472028]  ? __pfx_kthread+0x10/0x10
[   16.472049]  ret_from_fork_asm+0x1a/0x30
[   16.472082]  </TASK>
[   16.472093] 
[   16.479929] Allocated by task 283:
[   16.480098]  kasan_save_stack+0x45/0x70
[   16.480310]  kasan_save_track+0x18/0x40
[   16.480523]  kasan_save_alloc_info+0x3b/0x50
[   16.480716]  __kasan_kmalloc+0xb7/0xc0
[   16.480915]  __kmalloc_cache_noprof+0x189/0x420
[   16.481138]  kasan_atomics+0x95/0x310
[   16.481328]  kunit_try_run_case+0x1a5/0x480
[   16.481571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.481788]  kthread+0x337/0x6f0
[   16.481911]  ret_from_fork+0x116/0x1d0
[   16.482078]  ret_from_fork_asm+0x1a/0x30
[   16.482276] 
[   16.482383] The buggy address belongs to the object at ffff8881039b8c80
[   16.482383]  which belongs to the cache kmalloc-64 of size 64
[   16.482854] The buggy address is located 0 bytes to the right of
[   16.482854]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.483426] 
[   16.483514] The buggy address belongs to the physical page:
[   16.483688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.483926] flags: 0x200000000000000(node=0|zone=2)
[   16.484088] page_type: f5(slab)
[   16.484214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.484614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.485017] page dumped because: kasan: bad access detected
[   16.485319] 
[   16.485430] Memory state around the buggy address:
[   16.485815]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.486215]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.486527] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.486879]                                      ^
[   16.487162]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.487567]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.487916] ==================================================================
[   16.351557] ==================================================================
[   16.351862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.352100] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.352516] 
[   16.352642] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.352695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.352707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.352727] Call Trace:
[   16.352741]  <TASK>
[   16.352756]  dump_stack_lvl+0x73/0xb0
[   16.352785]  print_report+0xd1/0x650
[   16.352808]  ? __virt_addr_valid+0x1db/0x2d0
[   16.352831]  ? kasan_atomics_helper+0x2006/0x5450
[   16.352853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.352878]  ? kasan_atomics_helper+0x2006/0x5450
[   16.352901]  kasan_report+0x141/0x180
[   16.352924]  ? kasan_atomics_helper+0x2006/0x5450
[   16.352952]  kasan_check_range+0x10c/0x1c0
[   16.352977]  __kasan_check_write+0x18/0x20
[   16.352997]  kasan_atomics_helper+0x2006/0x5450
[   16.353032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.353056]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.353083]  ? kasan_atomics+0x152/0x310
[   16.353121]  kasan_atomics+0x1dc/0x310
[   16.353144]  ? __pfx_kasan_atomics+0x10/0x10
[   16.353170]  ? __pfx_read_tsc+0x10/0x10
[   16.353192]  ? ktime_get_ts64+0x86/0x230
[   16.353217]  kunit_try_run_case+0x1a5/0x480
[   16.353241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.353265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.353290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.353315]  ? __kthread_parkme+0x82/0x180
[   16.353338]  ? preempt_count_sub+0x50/0x80
[   16.353372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.353416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.353443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.353470]  kthread+0x337/0x6f0
[   16.353490]  ? trace_preempt_on+0x20/0xc0
[   16.353515]  ? __pfx_kthread+0x10/0x10
[   16.353536]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.353559]  ? calculate_sigpending+0x7b/0xa0
[   16.353584]  ? __pfx_kthread+0x10/0x10
[   16.353607]  ret_from_fork+0x116/0x1d0
[   16.353626]  ? __pfx_kthread+0x10/0x10
[   16.353648]  ret_from_fork_asm+0x1a/0x30
[   16.353689]  </TASK>
[   16.353700] 
[   16.361364] Allocated by task 283:
[   16.361556]  kasan_save_stack+0x45/0x70
[   16.361760]  kasan_save_track+0x18/0x40
[   16.361956]  kasan_save_alloc_info+0x3b/0x50
[   16.362167]  __kasan_kmalloc+0xb7/0xc0
[   16.362329]  __kmalloc_cache_noprof+0x189/0x420
[   16.362578]  kasan_atomics+0x95/0x310
[   16.362776]  kunit_try_run_case+0x1a5/0x480
[   16.362981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363226]  kthread+0x337/0x6f0
[   16.363430]  ret_from_fork+0x116/0x1d0
[   16.363602]  ret_from_fork_asm+0x1a/0x30
[   16.363824] 
[   16.363919] The buggy address belongs to the object at ffff8881039b8c80
[   16.363919]  which belongs to the cache kmalloc-64 of size 64
[   16.364382] The buggy address is located 0 bytes to the right of
[   16.364382]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.364766] 
[   16.364839] The buggy address belongs to the physical page:
[   16.365011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.365411] flags: 0x200000000000000(node=0|zone=2)
[   16.365649] page_type: f5(slab)
[   16.365816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.366189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.366566] page dumped because: kasan: bad access detected
[   16.366840] 
[   16.366935] Memory state around the buggy address:
[   16.367188]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.367501]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.367720] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.367933]                                      ^
[   16.368087]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.368386]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.368756] ==================================================================
[   16.116958] ==================================================================
[   16.117282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.117641] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.117898] 
[   16.118007] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.118047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.118059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.118080] Call Trace:
[   16.118093]  <TASK>
[   16.118106]  dump_stack_lvl+0x73/0xb0
[   16.118135]  print_report+0xd1/0x650
[   16.118159]  ? __virt_addr_valid+0x1db/0x2d0
[   16.118181]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.118203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.118228]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.118251]  kasan_report+0x141/0x180
[   16.118273]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.118301]  kasan_check_range+0x10c/0x1c0
[   16.118325]  __kasan_check_write+0x18/0x20
[   16.118361]  kasan_atomics_helper+0x19e3/0x5450
[   16.118386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.118409]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.118450]  ? kasan_atomics+0x152/0x310
[   16.118477]  kasan_atomics+0x1dc/0x310
[   16.118501]  ? __pfx_kasan_atomics+0x10/0x10
[   16.118526]  ? __pfx_read_tsc+0x10/0x10
[   16.118548]  ? ktime_get_ts64+0x86/0x230
[   16.118573]  kunit_try_run_case+0x1a5/0x480
[   16.118597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.118642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.118669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.118693]  ? __kthread_parkme+0x82/0x180
[   16.118715]  ? preempt_count_sub+0x50/0x80
[   16.118740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.118765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.118790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.118817]  kthread+0x337/0x6f0
[   16.118836]  ? trace_preempt_on+0x20/0xc0
[   16.118875]  ? __pfx_kthread+0x10/0x10
[   16.118896]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.118919]  ? calculate_sigpending+0x7b/0xa0
[   16.118956]  ? __pfx_kthread+0x10/0x10
[   16.118979]  ret_from_fork+0x116/0x1d0
[   16.118998]  ? __pfx_kthread+0x10/0x10
[   16.119019]  ret_from_fork_asm+0x1a/0x30
[   16.119050]  </TASK>
[   16.119061] 
[   16.126666] Allocated by task 283:
[   16.126876]  kasan_save_stack+0x45/0x70
[   16.127084]  kasan_save_track+0x18/0x40
[   16.127282]  kasan_save_alloc_info+0x3b/0x50
[   16.127541]  __kasan_kmalloc+0xb7/0xc0
[   16.127706]  __kmalloc_cache_noprof+0x189/0x420
[   16.127932]  kasan_atomics+0x95/0x310
[   16.128101]  kunit_try_run_case+0x1a5/0x480
[   16.128249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.128543]  kthread+0x337/0x6f0
[   16.128713]  ret_from_fork+0x116/0x1d0
[   16.128897]  ret_from_fork_asm+0x1a/0x30
[   16.129093] 
[   16.129168] The buggy address belongs to the object at ffff8881039b8c80
[   16.129168]  which belongs to the cache kmalloc-64 of size 64
[   16.129518] The buggy address is located 0 bytes to the right of
[   16.129518]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.130317] 
[   16.130477] The buggy address belongs to the physical page:
[   16.130713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.130973] flags: 0x200000000000000(node=0|zone=2)
[   16.131129] page_type: f5(slab)
[   16.131246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.131554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.131891] page dumped because: kasan: bad access detected
[   16.132145] 
[   16.132244] Memory state around the buggy address:
[   16.132556]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.132765]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.133106] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.133404]                                      ^
[   16.133623]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.133831]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.134038] ==================================================================
[   15.291992] ==================================================================
[   15.292328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.292719] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.293041] 
[   15.293148] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.293189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.293201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.293230] Call Trace:
[   15.293248]  <TASK>
[   15.293265]  dump_stack_lvl+0x73/0xb0
[   15.293305]  print_report+0xd1/0x650
[   15.293328]  ? __virt_addr_valid+0x1db/0x2d0
[   15.293404]  ? kasan_atomics_helper+0x565/0x5450
[   15.293430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.293455]  ? kasan_atomics_helper+0x565/0x5450
[   15.293479]  kasan_report+0x141/0x180
[   15.293502]  ? kasan_atomics_helper+0x565/0x5450
[   15.293529]  kasan_check_range+0x10c/0x1c0
[   15.293554]  __kasan_check_write+0x18/0x20
[   15.293576]  kasan_atomics_helper+0x565/0x5450
[   15.293600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.293624]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.293651]  ? kasan_atomics+0x152/0x310
[   15.293678]  kasan_atomics+0x1dc/0x310
[   15.293702]  ? __pfx_kasan_atomics+0x10/0x10
[   15.293728]  ? __pfx_read_tsc+0x10/0x10
[   15.293749]  ? ktime_get_ts64+0x86/0x230
[   15.293774]  kunit_try_run_case+0x1a5/0x480
[   15.293799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.293861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.293886]  ? __kthread_parkme+0x82/0x180
[   15.293919]  ? preempt_count_sub+0x50/0x80
[   15.293944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.293996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.294022]  kthread+0x337/0x6f0
[   15.294042]  ? trace_preempt_on+0x20/0xc0
[   15.294066]  ? __pfx_kthread+0x10/0x10
[   15.294087]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.294111]  ? calculate_sigpending+0x7b/0xa0
[   15.294135]  ? __pfx_kthread+0x10/0x10
[   15.294158]  ret_from_fork+0x116/0x1d0
[   15.294177]  ? __pfx_kthread+0x10/0x10
[   15.294198]  ret_from_fork_asm+0x1a/0x30
[   15.294230]  </TASK>
[   15.294240] 
[   15.302673] Allocated by task 283:
[   15.302854]  kasan_save_stack+0x45/0x70
[   15.303035]  kasan_save_track+0x18/0x40
[   15.303221]  kasan_save_alloc_info+0x3b/0x50
[   15.303557]  __kasan_kmalloc+0xb7/0xc0
[   15.303757]  __kmalloc_cache_noprof+0x189/0x420
[   15.303918]  kasan_atomics+0x95/0x310
[   15.304053]  kunit_try_run_case+0x1a5/0x480
[   15.304287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.304551]  kthread+0x337/0x6f0
[   15.304739]  ret_from_fork+0x116/0x1d0
[   15.305099]  ret_from_fork_asm+0x1a/0x30
[   15.305238] 
[   15.305308] The buggy address belongs to the object at ffff8881039b8c80
[   15.305308]  which belongs to the cache kmalloc-64 of size 64
[   15.305666] The buggy address is located 0 bytes to the right of
[   15.305666]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.306193] 
[   15.306288] The buggy address belongs to the physical page:
[   15.306549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.306866] flags: 0x200000000000000(node=0|zone=2)
[   15.307030] page_type: f5(slab)
[   15.307152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.307409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.308035] page dumped because: kasan: bad access detected
[   15.308300] 
[   15.308460] Memory state around the buggy address:
[   15.308949]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.309213]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.309442] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.309869]                                      ^
[   15.310404]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310676]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310898] ==================================================================
[   16.267120] ==================================================================
[   16.267587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.267918] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.268275] 
[   16.268400] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.268453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.268466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.268487] Call Trace:
[   16.268501]  <TASK>
[   16.268515]  dump_stack_lvl+0x73/0xb0
[   16.268545]  print_report+0xd1/0x650
[   16.268568]  ? __virt_addr_valid+0x1db/0x2d0
[   16.268591]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.268613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.268638]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.268661]  kasan_report+0x141/0x180
[   16.268684]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.268712]  kasan_check_range+0x10c/0x1c0
[   16.268737]  __kasan_check_write+0x18/0x20
[   16.268758]  kasan_atomics_helper+0x1e12/0x5450
[   16.268783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.268807]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.268834]  ? kasan_atomics+0x152/0x310
[   16.268861]  kasan_atomics+0x1dc/0x310
[   16.268885]  ? __pfx_kasan_atomics+0x10/0x10
[   16.268935]  ? __pfx_read_tsc+0x10/0x10
[   16.268957]  ? ktime_get_ts64+0x86/0x230
[   16.268997]  kunit_try_run_case+0x1a5/0x480
[   16.269022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.269060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.269099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.269138]  ? __kthread_parkme+0x82/0x180
[   16.269174]  ? preempt_count_sub+0x50/0x80
[   16.269213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.269264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.269304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.269331]  kthread+0x337/0x6f0
[   16.269362]  ? trace_preempt_on+0x20/0xc0
[   16.269387]  ? __pfx_kthread+0x10/0x10
[   16.269419]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.269442]  ? calculate_sigpending+0x7b/0xa0
[   16.269466]  ? __pfx_kthread+0x10/0x10
[   16.269490]  ret_from_fork+0x116/0x1d0
[   16.269509]  ? __pfx_kthread+0x10/0x10
[   16.269530]  ret_from_fork_asm+0x1a/0x30
[   16.269562]  </TASK>
[   16.269572] 
[   16.277628] Allocated by task 283:
[   16.277800]  kasan_save_stack+0x45/0x70
[   16.277975]  kasan_save_track+0x18/0x40
[   16.278144]  kasan_save_alloc_info+0x3b/0x50
[   16.278366]  __kasan_kmalloc+0xb7/0xc0
[   16.278635]  __kmalloc_cache_noprof+0x189/0x420
[   16.278824]  kasan_atomics+0x95/0x310
[   16.279016]  kunit_try_run_case+0x1a5/0x480
[   16.279249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.279501]  kthread+0x337/0x6f0
[   16.279701]  ret_from_fork+0x116/0x1d0
[   16.279901]  ret_from_fork_asm+0x1a/0x30
[   16.280097] 
[   16.280193] The buggy address belongs to the object at ffff8881039b8c80
[   16.280193]  which belongs to the cache kmalloc-64 of size 64
[   16.280581] The buggy address is located 0 bytes to the right of
[   16.280581]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.281234] 
[   16.281360] The buggy address belongs to the physical page:
[   16.281656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.282111] flags: 0x200000000000000(node=0|zone=2)
[   16.282365] page_type: f5(slab)
[   16.282557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.282895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.283225] page dumped because: kasan: bad access detected
[   16.283641] 
[   16.283712] Memory state around the buggy address:
[   16.283866]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.284079]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.284296] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.284921]                                      ^
[   16.285175]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.285598]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.285926] ==================================================================
[   16.404954] ==================================================================
[   16.405211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.405537] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.406231] 
[   16.406386] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.406428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.406440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.406461] Call Trace:
[   16.406477]  <TASK>
[   16.406492]  dump_stack_lvl+0x73/0xb0
[   16.406522]  print_report+0xd1/0x650
[   16.406545]  ? __virt_addr_valid+0x1db/0x2d0
[   16.406570]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.406593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.406618]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.406640]  kasan_report+0x141/0x180
[   16.406663]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.406691]  __asan_report_load8_noabort+0x18/0x20
[   16.406717]  kasan_atomics_helper+0x4fb2/0x5450
[   16.406768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.406792]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.406839]  ? kasan_atomics+0x152/0x310
[   16.406867]  kasan_atomics+0x1dc/0x310
[   16.406890]  ? __pfx_kasan_atomics+0x10/0x10
[   16.406926]  ? __pfx_read_tsc+0x10/0x10
[   16.406948]  ? ktime_get_ts64+0x86/0x230
[   16.406974]  kunit_try_run_case+0x1a5/0x480
[   16.406999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.407023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.407049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.407074]  ? __kthread_parkme+0x82/0x180
[   16.407097]  ? preempt_count_sub+0x50/0x80
[   16.407122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.407148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.407173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.407200]  kthread+0x337/0x6f0
[   16.407219]  ? trace_preempt_on+0x20/0xc0
[   16.407244]  ? __pfx_kthread+0x10/0x10
[   16.407266]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.407297]  ? calculate_sigpending+0x7b/0xa0
[   16.407322]  ? __pfx_kthread+0x10/0x10
[   16.407360]  ret_from_fork+0x116/0x1d0
[   16.407380]  ? __pfx_kthread+0x10/0x10
[   16.407419]  ret_from_fork_asm+0x1a/0x30
[   16.407451]  </TASK>
[   16.407464] 
[   16.415211] Allocated by task 283:
[   16.415338]  kasan_save_stack+0x45/0x70
[   16.415517]  kasan_save_track+0x18/0x40
[   16.415673]  kasan_save_alloc_info+0x3b/0x50
[   16.415897]  __kasan_kmalloc+0xb7/0xc0
[   16.416122]  __kmalloc_cache_noprof+0x189/0x420
[   16.416384]  kasan_atomics+0x95/0x310
[   16.416616]  kunit_try_run_case+0x1a5/0x480
[   16.416828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.417111]  kthread+0x337/0x6f0
[   16.417280]  ret_from_fork+0x116/0x1d0
[   16.417501]  ret_from_fork_asm+0x1a/0x30
[   16.417657] 
[   16.417729] The buggy address belongs to the object at ffff8881039b8c80
[   16.417729]  which belongs to the cache kmalloc-64 of size 64
[   16.418275] The buggy address is located 0 bytes to the right of
[   16.418275]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.418754] 
[   16.418852] The buggy address belongs to the physical page:
[   16.419098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.419468] flags: 0x200000000000000(node=0|zone=2)
[   16.419698] page_type: f5(slab)
[   16.419873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.420204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.420585] page dumped because: kasan: bad access detected
[   16.420824] 
[   16.420922] Memory state around the buggy address:
[   16.421123]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.421350]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.421594] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.421840]                                      ^
[   16.422064]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422426]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422743] ==================================================================
[   16.005024] ==================================================================
[   16.006105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.006701] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   16.007064] 
[   16.007249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.007305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.007318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.007339] Call Trace:
[   16.007363]  <TASK>
[   16.007378]  dump_stack_lvl+0x73/0xb0
[   16.007409]  print_report+0xd1/0x650
[   16.007432]  ? __virt_addr_valid+0x1db/0x2d0
[   16.007456]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.007525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.007550]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.007585]  kasan_report+0x141/0x180
[   16.007608]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.007636]  kasan_check_range+0x10c/0x1c0
[   16.007660]  __kasan_check_write+0x18/0x20
[   16.007684]  kasan_atomics_helper+0x16e7/0x5450
[   16.007710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.007735]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.007761]  ? kasan_atomics+0x152/0x310
[   16.007789]  kasan_atomics+0x1dc/0x310
[   16.007811]  ? __pfx_kasan_atomics+0x10/0x10
[   16.007837]  ? __pfx_read_tsc+0x10/0x10
[   16.007859]  ? ktime_get_ts64+0x86/0x230
[   16.007883]  kunit_try_run_case+0x1a5/0x480
[   16.007909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.007934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.007959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.007985]  ? __kthread_parkme+0x82/0x180
[   16.008007]  ? preempt_count_sub+0x50/0x80
[   16.008031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.008057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.008083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.008110]  kthread+0x337/0x6f0
[   16.008129]  ? trace_preempt_on+0x20/0xc0
[   16.008153]  ? __pfx_kthread+0x10/0x10
[   16.008183]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.008205]  ? calculate_sigpending+0x7b/0xa0
[   16.008230]  ? __pfx_kthread+0x10/0x10
[   16.008253]  ret_from_fork+0x116/0x1d0
[   16.008272]  ? __pfx_kthread+0x10/0x10
[   16.008293]  ret_from_fork_asm+0x1a/0x30
[   16.008326]  </TASK>
[   16.008337] 
[   16.016747] Allocated by task 283:
[   16.017044]  kasan_save_stack+0x45/0x70
[   16.017478]  kasan_save_track+0x18/0x40
[   16.017679]  kasan_save_alloc_info+0x3b/0x50
[   16.017894]  __kasan_kmalloc+0xb7/0xc0
[   16.018084]  __kmalloc_cache_noprof+0x189/0x420
[   16.018394]  kasan_atomics+0x95/0x310
[   16.018602]  kunit_try_run_case+0x1a5/0x480
[   16.018896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.019224]  kthread+0x337/0x6f0
[   16.019408]  ret_from_fork+0x116/0x1d0
[   16.019718]  ret_from_fork_asm+0x1a/0x30
[   16.019922] 
[   16.020019] The buggy address belongs to the object at ffff8881039b8c80
[   16.020019]  which belongs to the cache kmalloc-64 of size 64
[   16.020693] The buggy address is located 0 bytes to the right of
[   16.020693]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   16.021171] 
[   16.021391] The buggy address belongs to the physical page:
[   16.021663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   16.022008] flags: 0x200000000000000(node=0|zone=2)
[   16.022201] page_type: f5(slab)
[   16.022470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.022824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.023102] page dumped because: kasan: bad access detected
[   16.023363] 
[   16.023568] Memory state around the buggy address:
[   16.023824]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.024088]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.024430] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.024724]                                      ^
[   16.024942]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.025267]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.025622] ==================================================================
[   15.337145] ==================================================================
[   15.337779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.338119] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.338600] 
[   15.338784] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.338830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.338843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.338863] Call Trace:
[   15.338877]  <TASK>
[   15.338893]  dump_stack_lvl+0x73/0xb0
[   15.339066]  print_report+0xd1/0x650
[   15.339090]  ? __virt_addr_valid+0x1db/0x2d0
[   15.339114]  ? kasan_atomics_helper+0x697/0x5450
[   15.339137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.339161]  ? kasan_atomics_helper+0x697/0x5450
[   15.339184]  kasan_report+0x141/0x180
[   15.339207]  ? kasan_atomics_helper+0x697/0x5450
[   15.339235]  kasan_check_range+0x10c/0x1c0
[   15.339260]  __kasan_check_write+0x18/0x20
[   15.339281]  kasan_atomics_helper+0x697/0x5450
[   15.339305]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.339330]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.339421]  ? kasan_atomics+0x152/0x310
[   15.339452]  kasan_atomics+0x1dc/0x310
[   15.339475]  ? __pfx_kasan_atomics+0x10/0x10
[   15.339501]  ? __pfx_read_tsc+0x10/0x10
[   15.339523]  ? ktime_get_ts64+0x86/0x230
[   15.339548]  kunit_try_run_case+0x1a5/0x480
[   15.339573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.339623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.339647]  ? __kthread_parkme+0x82/0x180
[   15.339670]  ? preempt_count_sub+0x50/0x80
[   15.339694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.339745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.339771]  kthread+0x337/0x6f0
[   15.339791]  ? trace_preempt_on+0x20/0xc0
[   15.339815]  ? __pfx_kthread+0x10/0x10
[   15.339836]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.339859]  ? calculate_sigpending+0x7b/0xa0
[   15.339884]  ? __pfx_kthread+0x10/0x10
[   15.339907]  ret_from_fork+0x116/0x1d0
[   15.339927]  ? __pfx_kthread+0x10/0x10
[   15.339948]  ret_from_fork_asm+0x1a/0x30
[   15.339980]  </TASK>
[   15.339991] 
[   15.350279] Allocated by task 283:
[   15.350791]  kasan_save_stack+0x45/0x70
[   15.350981]  kasan_save_track+0x18/0x40
[   15.351171]  kasan_save_alloc_info+0x3b/0x50
[   15.351377]  __kasan_kmalloc+0xb7/0xc0
[   15.351817]  __kmalloc_cache_noprof+0x189/0x420
[   15.352017]  kasan_atomics+0x95/0x310
[   15.352211]  kunit_try_run_case+0x1a5/0x480
[   15.352449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.353131]  kthread+0x337/0x6f0
[   15.353300]  ret_from_fork+0x116/0x1d0
[   15.353600]  ret_from_fork_asm+0x1a/0x30
[   15.353789] 
[   15.353886] The buggy address belongs to the object at ffff8881039b8c80
[   15.353886]  which belongs to the cache kmalloc-64 of size 64
[   15.354417] The buggy address is located 0 bytes to the right of
[   15.354417]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.355256] 
[   15.355370] The buggy address belongs to the physical page:
[   15.355621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.356275] flags: 0x200000000000000(node=0|zone=2)
[   15.356658] page_type: f5(slab)
[   15.356822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.357142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.357486] page dumped because: kasan: bad access detected
[   15.357769] 
[   15.357873] Memory state around the buggy address:
[   15.358042]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358377]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358746] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.359018]                                      ^
[   15.359203]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359585]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359962] ==================================================================
[   15.496895] ==================================================================
[   15.497172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.497593] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283
[   15.497895] 
[   15.497979] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.498020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.498032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.498052] Call Trace:
[   15.498066]  <TASK>
[   15.498079]  dump_stack_lvl+0x73/0xb0
[   15.498109]  print_report+0xd1/0x650
[   15.498131]  ? __virt_addr_valid+0x1db/0x2d0
[   15.498156]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.498178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.498203]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.498227]  kasan_report+0x141/0x180
[   15.498251]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.498277]  kasan_check_range+0x10c/0x1c0
[   15.498302]  __kasan_check_write+0x18/0x20
[   15.498323]  kasan_atomics_helper+0xb6a/0x5450
[   15.498423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.498456]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.498483]  ? kasan_atomics+0x152/0x310
[   15.498510]  kasan_atomics+0x1dc/0x310
[   15.498533]  ? __pfx_kasan_atomics+0x10/0x10
[   15.498559]  ? __pfx_read_tsc+0x10/0x10
[   15.498581]  ? ktime_get_ts64+0x86/0x230
[   15.498605]  kunit_try_run_case+0x1a5/0x480
[   15.498629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.498653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.498678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.498704]  ? __kthread_parkme+0x82/0x180
[   15.498725]  ? preempt_count_sub+0x50/0x80
[   15.498749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.498775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.498801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.498826]  kthread+0x337/0x6f0
[   15.498847]  ? trace_preempt_on+0x20/0xc0
[   15.498871]  ? __pfx_kthread+0x10/0x10
[   15.498892]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.498915]  ? calculate_sigpending+0x7b/0xa0
[   15.498941]  ? __pfx_kthread+0x10/0x10
[   15.498962]  ret_from_fork+0x116/0x1d0
[   15.498982]  ? __pfx_kthread+0x10/0x10
[   15.499003]  ret_from_fork_asm+0x1a/0x30
[   15.499034]  </TASK>
[   15.499045] 
[   15.506961] Allocated by task 283:
[   15.507104]  kasan_save_stack+0x45/0x70
[   15.507311]  kasan_save_track+0x18/0x40
[   15.507537]  kasan_save_alloc_info+0x3b/0x50
[   15.507696]  __kasan_kmalloc+0xb7/0xc0
[   15.507885]  __kmalloc_cache_noprof+0x189/0x420
[   15.508114]  kasan_atomics+0x95/0x310
[   15.508311]  kunit_try_run_case+0x1a5/0x480
[   15.508700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.508918]  kthread+0x337/0x6f0
[   15.509092]  ret_from_fork+0x116/0x1d0
[   15.509290]  ret_from_fork_asm+0x1a/0x30
[   15.509579] 
[   15.509659] The buggy address belongs to the object at ffff8881039b8c80
[   15.509659]  which belongs to the cache kmalloc-64 of size 64
[   15.510137] The buggy address is located 0 bytes to the right of
[   15.510137]  allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0)
[   15.510747] 
[   15.510834] The buggy address belongs to the physical page:
[   15.511065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.511461] flags: 0x200000000000000(node=0|zone=2)
[   15.511682] page_type: f5(slab)
[   15.511830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.512140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.512485] page dumped because: kasan: bad access detected
[   15.512662] 
[   15.512734] Memory state around the buggy address:
[   15.512889]  ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.513217]  ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.513732] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.514057]                                      ^
[   15.514280]  ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.514707]  ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.514982] ==================================================================