Hay
Date
July 9, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.356985] ==================================================================
[   19.357041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.357102] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.357358] 
[   19.357539] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.357719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.357856] Hardware name: linux,dummy-virt (DT)
[   19.358021] Call trace:
[   19.358046]  show_stack+0x20/0x38 (C)
[   19.358101]  dump_stack_lvl+0x8c/0xd0
[   19.358160]  print_report+0x118/0x608
[   19.358207]  kasan_report+0xdc/0x128
[   19.358256]  kasan_check_range+0x100/0x1a8
[   19.358305]  __kasan_check_write+0x20/0x30
[   19.358350]  kasan_atomics_helper+0xff0/0x4858
[   19.358407]  kasan_atomics+0x198/0x2e0
[   19.358623]  kunit_try_run_case+0x170/0x3f0
[   19.358862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.359125]  kthread+0x328/0x630
[   19.359168]  ret_from_fork+0x10/0x20
[   19.359218] 
[   19.359239] Allocated by task 265:
[   19.359268]  kasan_save_stack+0x3c/0x68
[   19.359311]  kasan_save_track+0x20/0x40
[   19.359349]  kasan_save_alloc_info+0x40/0x58
[   19.359391]  __kasan_kmalloc+0xd4/0xd8
[   19.359430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.360271]  kasan_atomics+0xb8/0x2e0
[   19.360454]  kunit_try_run_case+0x170/0x3f0
[   19.360643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.360693]  kthread+0x328/0x630
[   19.360729]  ret_from_fork+0x10/0x20
[   19.360768] 
[   19.360792] The buggy address belongs to the object at fff00000c7692100
[   19.360792]  which belongs to the cache kmalloc-64 of size 64
[   19.360951] The buggy address is located 0 bytes to the right of
[   19.360951]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.361162] 
[   19.361201] The buggy address belongs to the physical page:
[   19.361235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.361383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.361437] page_type: f5(slab)
[   19.361475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.361549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.361592] page dumped because: kasan: bad access detected
[   19.361840] 
[   19.361910] Memory state around the buggy address:
[   19.362026]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.362071]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.362126] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.362164]                                      ^
[   19.362199]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.362241]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.362282] ==================================================================
[   19.426491] ==================================================================
[   19.426554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.427027] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.427181] 
[   19.427218] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.427301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.427328] Hardware name: linux,dummy-virt (DT)
[   19.427361] Call trace:
[   19.427386]  show_stack+0x20/0x38 (C)
[   19.427440]  dump_stack_lvl+0x8c/0xd0
[   19.427492]  print_report+0x118/0x608
[   19.427540]  kasan_report+0xdc/0x128
[   19.427588]  kasan_check_range+0x100/0x1a8
[   19.427636]  __kasan_check_write+0x20/0x30
[   19.427691]  kasan_atomics_helper+0x12d8/0x4858
[   19.427740]  kasan_atomics+0x198/0x2e0
[   19.427787]  kunit_try_run_case+0x170/0x3f0
[   19.427835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427889]  kthread+0x328/0x630
[   19.427931]  ret_from_fork+0x10/0x20
[   19.427979] 
[   19.427999] Allocated by task 265:
[   19.428029]  kasan_save_stack+0x3c/0x68
[   19.428071]  kasan_save_track+0x20/0x40
[   19.428110]  kasan_save_alloc_info+0x40/0x58
[   19.428185]  __kasan_kmalloc+0xd4/0xd8
[   19.428395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.428508]  kasan_atomics+0xb8/0x2e0
[   19.428546]  kunit_try_run_case+0x170/0x3f0
[   19.428588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.428632]  kthread+0x328/0x630
[   19.428667]  ret_from_fork+0x10/0x20
[   19.428720] 
[   19.428742] The buggy address belongs to the object at fff00000c7692100
[   19.428742]  which belongs to the cache kmalloc-64 of size 64
[   19.428809] The buggy address is located 0 bytes to the right of
[   19.428809]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.428892] 
[   19.428916] The buggy address belongs to the physical page:
[   19.428966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.429028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.429077] page_type: f5(slab)
[   19.429128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.429183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.429235] page dumped because: kasan: bad access detected
[   19.429277] 
[   19.429314] Memory state around the buggy address:
[   19.429348]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.429402]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.429455] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.429497]                                      ^
[   19.429536]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.429593]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.429633] ==================================================================
[   19.452390] ==================================================================
[   19.452464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.452513] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.452564] 
[   19.452594] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.452675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.452704] Hardware name: linux,dummy-virt (DT)
[   19.452737] Call trace:
[   19.452793]  show_stack+0x20/0x38 (C)
[   19.452849]  dump_stack_lvl+0x8c/0xd0
[   19.452924]  print_report+0x118/0x608
[   19.453000]  kasan_report+0xdc/0x128
[   19.453085]  kasan_check_range+0x100/0x1a8
[   19.453149]  __kasan_check_write+0x20/0x30
[   19.453195]  kasan_atomics_helper+0x14e4/0x4858
[   19.453250]  kasan_atomics+0x198/0x2e0
[   19.453408]  kunit_try_run_case+0x170/0x3f0
[   19.453461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.453521]  kthread+0x328/0x630
[   19.453565]  ret_from_fork+0x10/0x20
[   19.453630] 
[   19.453669] Allocated by task 265:
[   19.453700]  kasan_save_stack+0x3c/0x68
[   19.453757]  kasan_save_track+0x20/0x40
[   19.453804]  kasan_save_alloc_info+0x40/0x58
[   19.453845]  __kasan_kmalloc+0xd4/0xd8
[   19.453959]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.454036]  kasan_atomics+0xb8/0x2e0
[   19.454151]  kunit_try_run_case+0x170/0x3f0
[   19.454191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.454245]  kthread+0x328/0x630
[   19.454280]  ret_from_fork+0x10/0x20
[   19.454319] 
[   19.454341] The buggy address belongs to the object at fff00000c7692100
[   19.454341]  which belongs to the cache kmalloc-64 of size 64
[   19.454401] The buggy address is located 0 bytes to the right of
[   19.454401]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.454472] 
[   19.454494] The buggy address belongs to the physical page:
[   19.454527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.454589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.454660] page_type: f5(slab)
[   19.454701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.454753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.454796] page dumped because: kasan: bad access detected
[   19.454829] 
[   19.454858] Memory state around the buggy address:
[   19.454892]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.454939]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.454992] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.455033]                                      ^
[   19.455067]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.455110]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.455157] ==================================================================
[   19.504959] ==================================================================
[   19.505229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.505285] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.505336] 
[   19.505372] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.505455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.505484] Hardware name: linux,dummy-virt (DT)
[   19.506874] Call trace:
[   19.507385]  show_stack+0x20/0x38 (C)
[   19.507656]  dump_stack_lvl+0x8c/0xd0
[   19.508148]  print_report+0x118/0x608
[   19.508427]  kasan_report+0xdc/0x128
[   19.508551]  __asan_report_load8_noabort+0x20/0x30
[   19.508611]  kasan_atomics_helper+0x3e20/0x4858
[   19.509469]  kasan_atomics+0x198/0x2e0
[   19.509536]  kunit_try_run_case+0x170/0x3f0
[   19.510577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.510741]  kthread+0x328/0x630
[   19.511454]  ret_from_fork+0x10/0x20
[   19.512007] 
[   19.512159] Allocated by task 265:
[   19.512293]  kasan_save_stack+0x3c/0x68
[   19.512798]  kasan_save_track+0x20/0x40
[   19.513048]  kasan_save_alloc_info+0x40/0x58
[   19.513537]  __kasan_kmalloc+0xd4/0xd8
[   19.514003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.514317]  kasan_atomics+0xb8/0x2e0
[   19.514615]  kunit_try_run_case+0x170/0x3f0
[   19.514672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.514716]  kthread+0x328/0x630
[   19.514751]  ret_from_fork+0x10/0x20
[   19.514790] 
[   19.515718] The buggy address belongs to the object at fff00000c7692100
[   19.515718]  which belongs to the cache kmalloc-64 of size 64
[   19.516320] The buggy address is located 0 bytes to the right of
[   19.516320]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.516389] 
[   19.517039] The buggy address belongs to the physical page:
[   19.517844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.517931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.517985] page_type: f5(slab)
[   19.518029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.518081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.518635] page dumped because: kasan: bad access detected
[   19.518828] 
[   19.518849] Memory state around the buggy address:
[   19.518885]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.518932]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.519041] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.519218]                                      ^
[   19.519254]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.519343]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.519477] ==================================================================
[   19.308667] ==================================================================
[   19.308722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.308772] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.308823] 
[   19.308856] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.308940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.308967] Hardware name: linux,dummy-virt (DT)
[   19.309000] Call trace:
[   19.309561]  show_stack+0x20/0x38 (C)
[   19.309720]  dump_stack_lvl+0x8c/0xd0
[   19.309832]  print_report+0x118/0x608
[   19.309881]  kasan_report+0xdc/0x128
[   19.309927]  kasan_check_range+0x100/0x1a8
[   19.309976]  __kasan_check_read+0x20/0x30
[   19.310021]  kasan_atomics_helper+0xdd4/0x4858
[   19.310078]  kasan_atomics+0x198/0x2e0
[   19.310163]  kunit_try_run_case+0x170/0x3f0
[   19.310218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.310878]  kthread+0x328/0x630
[   19.311062]  ret_from_fork+0x10/0x20
[   19.311125] 
[   19.311187] Allocated by task 265:
[   19.311220]  kasan_save_stack+0x3c/0x68
[   19.311264]  kasan_save_track+0x20/0x40
[   19.311304]  kasan_save_alloc_info+0x40/0x58
[   19.311354]  __kasan_kmalloc+0xd4/0xd8
[   19.311394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.311435]  kasan_atomics+0xb8/0x2e0
[   19.311479]  kunit_try_run_case+0x170/0x3f0
[   19.311602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.311649]  kthread+0x328/0x630
[   19.311741]  ret_from_fork+0x10/0x20
[   19.311778] 
[   19.311799] The buggy address belongs to the object at fff00000c7692100
[   19.311799]  which belongs to the cache kmalloc-64 of size 64
[   19.311861] The buggy address is located 0 bytes to the right of
[   19.311861]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.312613] 
[   19.312640] The buggy address belongs to the physical page:
[   19.312684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.312803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.312853] page_type: f5(slab)
[   19.312893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.313065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.313181] page dumped because: kasan: bad access detected
[   19.313277] 
[   19.313327] Memory state around the buggy address:
[   19.313405]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.313548]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.313643] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.313685]                                      ^
[   19.313782]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.313968]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.314061] ==================================================================
[   19.436516] ==================================================================
[   19.436561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.436607] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.436659] 
[   19.436690] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.436770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.436800] Hardware name: linux,dummy-virt (DT)
[   19.436834] Call trace:
[   19.436856]  show_stack+0x20/0x38 (C)
[   19.436906]  dump_stack_lvl+0x8c/0xd0
[   19.436953]  print_report+0x118/0x608
[   19.437001]  kasan_report+0xdc/0x128
[   19.437047]  __asan_report_load8_noabort+0x20/0x30
[   19.437100]  kasan_atomics_helper+0x3f04/0x4858
[   19.437167]  kasan_atomics+0x198/0x2e0
[   19.437215]  kunit_try_run_case+0x170/0x3f0
[   19.437264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.437319]  kthread+0x328/0x630
[   19.437361]  ret_from_fork+0x10/0x20
[   19.437410] 
[   19.437430] Allocated by task 265:
[   19.437459]  kasan_save_stack+0x3c/0x68
[   19.437501]  kasan_save_track+0x20/0x40
[   19.437543]  kasan_save_alloc_info+0x40/0x58
[   19.437585]  __kasan_kmalloc+0xd4/0xd8
[   19.437623]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.437664]  kasan_atomics+0xb8/0x2e0
[   19.437700]  kunit_try_run_case+0x170/0x3f0
[   19.437741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.437784]  kthread+0x328/0x630
[   19.437819]  ret_from_fork+0x10/0x20
[   19.437855] 
[   19.437876] The buggy address belongs to the object at fff00000c7692100
[   19.437876]  which belongs to the cache kmalloc-64 of size 64
[   19.437935] The buggy address is located 0 bytes to the right of
[   19.437935]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.438001] 
[   19.438023] The buggy address belongs to the physical page:
[   19.438054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.438107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.439858] page_type: f5(slab)
[   19.439901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.439955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.439998] page dumped because: kasan: bad access detected
[   19.440031] 
[   19.440052] Memory state around the buggy address:
[   19.440085]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.440141]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.440186] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.440229]                                      ^
[   19.440265]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440308]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440348] ==================================================================
[   19.470012] ==================================================================
[   19.470109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.470544] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.470605] 
[   19.470642] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.470831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.470918] Hardware name: linux,dummy-virt (DT)
[   19.471019] Call trace:
[   19.471068]  show_stack+0x20/0x38 (C)
[   19.471134]  dump_stack_lvl+0x8c/0xd0
[   19.471239]  print_report+0x118/0x608
[   19.471319]  kasan_report+0xdc/0x128
[   19.471394]  kasan_check_range+0x100/0x1a8
[   19.471492]  __kasan_check_write+0x20/0x30
[   19.471558]  kasan_atomics_helper+0x1644/0x4858
[   19.471691]  kasan_atomics+0x198/0x2e0
[   19.471766]  kunit_try_run_case+0x170/0x3f0
[   19.471816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.471869]  kthread+0x328/0x630
[   19.471961]  ret_from_fork+0x10/0x20
[   19.472221] 
[   19.472295] Allocated by task 265:
[   19.472370]  kasan_save_stack+0x3c/0x68
[   19.472467]  kasan_save_track+0x20/0x40
[   19.472528]  kasan_save_alloc_info+0x40/0x58
[   19.472880]  __kasan_kmalloc+0xd4/0xd8
[   19.473026]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.473198]  kasan_atomics+0xb8/0x2e0
[   19.473400]  kunit_try_run_case+0x170/0x3f0
[   19.473530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.473624]  kthread+0x328/0x630
[   19.473660]  ret_from_fork+0x10/0x20
[   19.473882] 
[   19.474034] The buggy address belongs to the object at fff00000c7692100
[   19.474034]  which belongs to the cache kmalloc-64 of size 64
[   19.474278] The buggy address is located 0 bytes to the right of
[   19.474278]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.474540] 
[   19.474615] The buggy address belongs to the physical page:
[   19.474732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.474823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.474874] page_type: f5(slab)
[   19.475122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.475386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.475573] page dumped because: kasan: bad access detected
[   19.475812] 
[   19.475911] Memory state around the buggy address:
[   19.475947]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.476253]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.476439] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.476781]                                      ^
[   19.476942]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.477018]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.477057] ==================================================================
[   19.321414] ==================================================================
[   19.321504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.321561] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.321611] 
[   19.321643] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.321943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.322073] Hardware name: linux,dummy-virt (DT)
[   19.322437] Call trace:
[   19.322609]  show_stack+0x20/0x38 (C)
[   19.322676]  dump_stack_lvl+0x8c/0xd0
[   19.322853]  print_report+0x118/0x608
[   19.322908]  kasan_report+0xdc/0x128
[   19.322960]  kasan_check_range+0x100/0x1a8
[   19.323218]  __kasan_check_write+0x20/0x30
[   19.323292]  kasan_atomics_helper+0xe44/0x4858
[   19.323342]  kasan_atomics+0x198/0x2e0
[   19.323387]  kunit_try_run_case+0x170/0x3f0
[   19.323436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.323495]  kthread+0x328/0x630
[   19.323714]  ret_from_fork+0x10/0x20
[   19.323765] 
[   19.323785] Allocated by task 265:
[   19.323816]  kasan_save_stack+0x3c/0x68
[   19.323859]  kasan_save_track+0x20/0x40
[   19.323899]  kasan_save_alloc_info+0x40/0x58
[   19.323942]  __kasan_kmalloc+0xd4/0xd8
[   19.324228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.324762]  kasan_atomics+0xb8/0x2e0
[   19.324811]  kunit_try_run_case+0x170/0x3f0
[   19.324974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.325020]  kthread+0x328/0x630
[   19.325074]  ret_from_fork+0x10/0x20
[   19.325884] 
[   19.325921] The buggy address belongs to the object at fff00000c7692100
[   19.325921]  which belongs to the cache kmalloc-64 of size 64
[   19.326203] The buggy address is located 0 bytes to the right of
[   19.326203]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.326456] 
[   19.326642] The buggy address belongs to the physical page:
[   19.326779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.326935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.326985] page_type: f5(slab)
[   19.327025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.327110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.327407] page dumped because: kasan: bad access detected
[   19.327698] 
[   19.327763] Memory state around the buggy address:
[   19.327971]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.328048]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.328097] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.328241]                                      ^
[   19.328314]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.328416]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.328457] ==================================================================
[   19.344160] ==================================================================
[   19.344245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.344588] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.344641] 
[   19.344672] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.344755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.344810] Hardware name: linux,dummy-virt (DT)
[   19.344843] Call trace:
[   19.344866]  show_stack+0x20/0x38 (C)
[   19.345384]  dump_stack_lvl+0x8c/0xd0
[   19.345440]  print_report+0x118/0x608
[   19.345555]  kasan_report+0xdc/0x128
[   19.345670]  kasan_check_range+0x100/0x1a8
[   19.345811]  __kasan_check_write+0x20/0x30
[   19.345857]  kasan_atomics_helper+0xf20/0x4858
[   19.345927]  kasan_atomics+0x198/0x2e0
[   19.346122]  kunit_try_run_case+0x170/0x3f0
[   19.346173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346227]  kthread+0x328/0x630
[   19.346269]  ret_from_fork+0x10/0x20
[   19.346485] 
[   19.346509] Allocated by task 265:
[   19.346541]  kasan_save_stack+0x3c/0x68
[   19.346874]  kasan_save_track+0x20/0x40
[   19.346915]  kasan_save_alloc_info+0x40/0x58
[   19.346956]  __kasan_kmalloc+0xd4/0xd8
[   19.346995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.347037]  kasan_atomics+0xb8/0x2e0
[   19.347075]  kunit_try_run_case+0x170/0x3f0
[   19.347449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.347499]  kthread+0x328/0x630
[   19.347533]  ret_from_fork+0x10/0x20
[   19.347753] 
[   19.347785] The buggy address belongs to the object at fff00000c7692100
[   19.347785]  which belongs to the cache kmalloc-64 of size 64
[   19.347989] The buggy address is located 0 bytes to the right of
[   19.347989]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.348059] 
[   19.348080] The buggy address belongs to the physical page:
[   19.348241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.348298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.348349] page_type: f5(slab)
[   19.348389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.348510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.348553] page dumped because: kasan: bad access detected
[   19.348685] 
[   19.348739] Memory state around the buggy address:
[   19.348779]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.348860]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.348902] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.348942]                                      ^
[   19.348975]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.349250]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.349294] ==================================================================
[   19.521724] ==================================================================
[   19.521909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.521960] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.522058] 
[   19.522094] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.522376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.522404] Hardware name: linux,dummy-virt (DT)
[   19.522438] Call trace:
[   19.522462]  show_stack+0x20/0x38 (C)
[   19.522511]  dump_stack_lvl+0x8c/0xd0
[   19.522562]  print_report+0x118/0x608
[   19.522610]  kasan_report+0xdc/0x128
[   19.522665]  kasan_check_range+0x100/0x1a8
[   19.522906]  __kasan_check_write+0x20/0x30
[   19.523128]  kasan_atomics_helper+0x17ec/0x4858
[   19.523182]  kasan_atomics+0x198/0x2e0
[   19.523574]  kunit_try_run_case+0x170/0x3f0
[   19.524048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.524274]  kthread+0x328/0x630
[   19.524410]  ret_from_fork+0x10/0x20
[   19.524536] 
[   19.524610] Allocated by task 265:
[   19.524710]  kasan_save_stack+0x3c/0x68
[   19.524755]  kasan_save_track+0x20/0x40
[   19.524830]  kasan_save_alloc_info+0x40/0x58
[   19.524874]  __kasan_kmalloc+0xd4/0xd8
[   19.524915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.525174]  kasan_atomics+0xb8/0x2e0
[   19.525279]  kunit_try_run_case+0x170/0x3f0
[   19.525320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525374]  kthread+0x328/0x630
[   19.525411]  ret_from_fork+0x10/0x20
[   19.525695] 
[   19.525801] The buggy address belongs to the object at fff00000c7692100
[   19.525801]  which belongs to the cache kmalloc-64 of size 64
[   19.526031] The buggy address is located 0 bytes to the right of
[   19.526031]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.526126] 
[   19.526151] The buggy address belongs to the physical page:
[   19.526183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.526237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.526290] page_type: f5(slab)
[   19.526591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.526650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.526878] page dumped because: kasan: bad access detected
[   19.527080] 
[   19.527106] Memory state around the buggy address:
[   19.527382]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.527504]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.527550] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.527593]                                      ^
[   19.527629]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.527675]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528083] ==================================================================
[   19.387936] ==================================================================
[   19.388564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.388623] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.388674] 
[   19.388760] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.389903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.390055] Hardware name: linux,dummy-virt (DT)
[   19.390141] Call trace:
[   19.390167]  show_stack+0x20/0x38 (C)
[   19.390221]  dump_stack_lvl+0x8c/0xd0
[   19.390272]  print_report+0x118/0x608
[   19.390322]  kasan_report+0xdc/0x128
[   19.390684]  kasan_check_range+0x100/0x1a8
[   19.390903]  __kasan_check_write+0x20/0x30
[   19.390954]  kasan_atomics_helper+0x1128/0x4858
[   19.391166]  kasan_atomics+0x198/0x2e0
[   19.391540]  kunit_try_run_case+0x170/0x3f0
[   19.391684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.391807]  kthread+0x328/0x630
[   19.391960]  ret_from_fork+0x10/0x20
[   19.392012] 
[   19.392032] Allocated by task 265:
[   19.392073]  kasan_save_stack+0x3c/0x68
[   19.392301]  kasan_save_track+0x20/0x40
[   19.392553]  kasan_save_alloc_info+0x40/0x58
[   19.392606]  __kasan_kmalloc+0xd4/0xd8
[   19.392644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.392825]  kasan_atomics+0xb8/0x2e0
[   19.392864]  kunit_try_run_case+0x170/0x3f0
[   19.393148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393197]  kthread+0x328/0x630
[   19.393231]  ret_from_fork+0x10/0x20
[   19.393354] 
[   19.393463] The buggy address belongs to the object at fff00000c7692100
[   19.393463]  which belongs to the cache kmalloc-64 of size 64
[   19.393644] The buggy address is located 0 bytes to the right of
[   19.393644]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.393903] 
[   19.394134] The buggy address belongs to the physical page:
[   19.394259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.394317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.394378] page_type: f5(slab)
[   19.394419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.394473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.394849] page dumped because: kasan: bad access detected
[   19.394891] 
[   19.394911] Memory state around the buggy address:
[   19.395061]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.395418]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.395510] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.395968]                                      ^
[   19.396021]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.396257]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.396298] ==================================================================
[   19.314872] ==================================================================
[   19.314933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.315193] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.315295] 
[   19.315390] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.315734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.315762] Hardware name: linux,dummy-virt (DT)
[   19.315795] Call trace:
[   19.315818]  show_stack+0x20/0x38 (C)
[   19.315870]  dump_stack_lvl+0x8c/0xd0
[   19.316147]  print_report+0x118/0x608
[   19.316329]  kasan_report+0xdc/0x128
[   19.316383]  __asan_report_load8_noabort+0x20/0x30
[   19.316437]  kasan_atomics_helper+0x3f58/0x4858
[   19.316486]  kasan_atomics+0x198/0x2e0
[   19.316534]  kunit_try_run_case+0x170/0x3f0
[   19.316582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.316638]  kthread+0x328/0x630
[   19.317197]  ret_from_fork+0x10/0x20
[   19.317364] 
[   19.317548] Allocated by task 265:
[   19.317616]  kasan_save_stack+0x3c/0x68
[   19.317734]  kasan_save_track+0x20/0x40
[   19.317814]  kasan_save_alloc_info+0x40/0x58
[   19.317856]  __kasan_kmalloc+0xd4/0xd8
[   19.317952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.318064]  kasan_atomics+0xb8/0x2e0
[   19.318169]  kunit_try_run_case+0x170/0x3f0
[   19.318210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.318255]  kthread+0x328/0x630
[   19.318297]  ret_from_fork+0x10/0x20
[   19.318333] 
[   19.318405] The buggy address belongs to the object at fff00000c7692100
[   19.318405]  which belongs to the cache kmalloc-64 of size 64
[   19.318465] The buggy address is located 0 bytes to the right of
[   19.318465]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.318581] 
[   19.318659] The buggy address belongs to the physical page:
[   19.318709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.318835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.318899] page_type: f5(slab)
[   19.318982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.319128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.319172] page dumped because: kasan: bad access detected
[   19.319203] 
[   19.319223] Memory state around the buggy address:
[   19.319256]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.319299]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.319344] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.319383]                                      ^
[   19.319615]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320043]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320090] ==================================================================
[   19.455263] ==================================================================
[   19.455303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.455722] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.455785] 
[   19.455890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.456004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.456168] Hardware name: linux,dummy-virt (DT)
[   19.456209] Call trace:
[   19.456233]  show_stack+0x20/0x38 (C)
[   19.456286]  dump_stack_lvl+0x8c/0xd0
[   19.456333]  print_report+0x118/0x608
[   19.456382]  kasan_report+0xdc/0x128
[   19.456491]  kasan_check_range+0x100/0x1a8
[   19.456590]  __kasan_check_write+0x20/0x30
[   19.456675]  kasan_atomics_helper+0x154c/0x4858
[   19.456766]  kasan_atomics+0x198/0x2e0
[   19.456904]  kunit_try_run_case+0x170/0x3f0
[   19.456989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457246]  kthread+0x328/0x630
[   19.457365]  ret_from_fork+0x10/0x20
[   19.457556] 
[   19.457666] Allocated by task 265:
[   19.457758]  kasan_save_stack+0x3c/0x68
[   19.457876]  kasan_save_track+0x20/0x40
[   19.457950]  kasan_save_alloc_info+0x40/0x58
[   19.458046]  __kasan_kmalloc+0xd4/0xd8
[   19.458086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.458137]  kasan_atomics+0xb8/0x2e0
[   19.458197]  kunit_try_run_case+0x170/0x3f0
[   19.458235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.458300]  kthread+0x328/0x630
[   19.458335]  ret_from_fork+0x10/0x20
[   19.458373] 
[   19.458395] The buggy address belongs to the object at fff00000c7692100
[   19.458395]  which belongs to the cache kmalloc-64 of size 64
[   19.458540] The buggy address is located 0 bytes to the right of
[   19.458540]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.458685] 
[   19.458859] The buggy address belongs to the physical page:
[   19.458894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.458946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.459044] page_type: f5(slab)
[   19.459171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.459293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.459404] page dumped because: kasan: bad access detected
[   19.459474] 
[   19.459580] Memory state around the buggy address:
[   19.459614]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.459666]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.459825] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.459871]                                      ^
[   19.459905]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459974]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.460079] ==================================================================
[   19.440883] ==================================================================
[   19.440934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.440986] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.441036] 
[   19.441068] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.441192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.441221] Hardware name: linux,dummy-virt (DT)
[   19.441254] Call trace:
[   19.441280]  show_stack+0x20/0x38 (C)
[   19.441331]  dump_stack_lvl+0x8c/0xd0
[   19.441381]  print_report+0x118/0x608
[   19.441427]  kasan_report+0xdc/0x128
[   19.441475]  kasan_check_range+0x100/0x1a8
[   19.441798]  __kasan_check_write+0x20/0x30
[   19.441892]  kasan_atomics_helper+0x1414/0x4858
[   19.441951]  kasan_atomics+0x198/0x2e0
[   19.442003]  kunit_try_run_case+0x170/0x3f0
[   19.442052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442124]  kthread+0x328/0x630
[   19.442169]  ret_from_fork+0x10/0x20
[   19.442226] 
[   19.442256] Allocated by task 265:
[   19.442294]  kasan_save_stack+0x3c/0x68
[   19.442347]  kasan_save_track+0x20/0x40
[   19.442417]  kasan_save_alloc_info+0x40/0x58
[   19.442467]  __kasan_kmalloc+0xd4/0xd8
[   19.442505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.442546]  kasan_atomics+0xb8/0x2e0
[   19.442584]  kunit_try_run_case+0x170/0x3f0
[   19.442625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442675]  kthread+0x328/0x630
[   19.442841]  ret_from_fork+0x10/0x20
[   19.442906] 
[   19.442928] The buggy address belongs to the object at fff00000c7692100
[   19.442928]  which belongs to the cache kmalloc-64 of size 64
[   19.443137] The buggy address is located 0 bytes to the right of
[   19.443137]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.443202] 
[   19.443223] The buggy address belongs to the physical page:
[   19.443257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.443311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443359] page_type: f5(slab)
[   19.443398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443493] page dumped because: kasan: bad access detected
[   19.443526] 
[   19.443547] Memory state around the buggy address:
[   19.443580]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.443948]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444018] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.444060]                                      ^
[   19.444306]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444742]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444895] ==================================================================
[   19.300072] ==================================================================
[   19.300294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.300496] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.300743] 
[   19.300826] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.300988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.301035] Hardware name: linux,dummy-virt (DT)
[   19.301081] Call trace:
[   19.301105]  show_stack+0x20/0x38 (C)
[   19.301172]  dump_stack_lvl+0x8c/0xd0
[   19.301538]  print_report+0x118/0x608
[   19.301845]  kasan_report+0xdc/0x128
[   19.301906]  __asan_report_load4_noabort+0x20/0x30
[   19.301961]  kasan_atomics_helper+0x3e04/0x4858
[   19.302010]  kasan_atomics+0x198/0x2e0
[   19.302059]  kunit_try_run_case+0x170/0x3f0
[   19.302106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.302182]  kthread+0x328/0x630
[   19.302228]  ret_from_fork+0x10/0x20
[   19.302540] 
[   19.302891] Allocated by task 265:
[   19.302932]  kasan_save_stack+0x3c/0x68
[   19.303246]  kasan_save_track+0x20/0x40
[   19.303352]  kasan_save_alloc_info+0x40/0x58
[   19.303395]  __kasan_kmalloc+0xd4/0xd8
[   19.303434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.303476]  kasan_atomics+0xb8/0x2e0
[   19.303514]  kunit_try_run_case+0x170/0x3f0
[   19.303553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.303599]  kthread+0x328/0x630
[   19.303641]  ret_from_fork+0x10/0x20
[   19.303735] 
[   19.303756] The buggy address belongs to the object at fff00000c7692100
[   19.303756]  which belongs to the cache kmalloc-64 of size 64
[   19.303819] The buggy address is located 0 bytes to the right of
[   19.303819]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.303886] 
[   19.303908] The buggy address belongs to the physical page:
[   19.303940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.303996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.304046] page_type: f5(slab)
[   19.304225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.304600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.304645] page dumped because: kasan: bad access detected
[   19.304679] 
[   19.304984] Memory state around the buggy address:
[   19.305267]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305394]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305812] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.306058]                                      ^
[   19.306173]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.306240]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.306281] ==================================================================
[   19.460671] ==================================================================
[   19.460781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.460897] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.460969] 
[   19.461006] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.461087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.461128] Hardware name: linux,dummy-virt (DT)
[   19.461161] Call trace:
[   19.461184]  show_stack+0x20/0x38 (C)
[   19.461234]  dump_stack_lvl+0x8c/0xd0
[   19.461414]  print_report+0x118/0x608
[   19.461467]  kasan_report+0xdc/0x128
[   19.461519]  kasan_check_range+0x100/0x1a8
[   19.461596]  __kasan_check_write+0x20/0x30
[   19.461760]  kasan_atomics_helper+0x15b4/0x4858
[   19.461819]  kasan_atomics+0x198/0x2e0
[   19.461918]  kunit_try_run_case+0x170/0x3f0
[   19.462049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.462106]  kthread+0x328/0x630
[   19.462173]  ret_from_fork+0x10/0x20
[   19.462289] 
[   19.462361] Allocated by task 265:
[   19.462398]  kasan_save_stack+0x3c/0x68
[   19.462466]  kasan_save_track+0x20/0x40
[   19.462507]  kasan_save_alloc_info+0x40/0x58
[   19.462589]  __kasan_kmalloc+0xd4/0xd8
[   19.462635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.462702]  kasan_atomics+0xb8/0x2e0
[   19.462768]  kunit_try_run_case+0x170/0x3f0
[   19.462825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.462871]  kthread+0x328/0x630
[   19.462905]  ret_from_fork+0x10/0x20
[   19.462971] 
[   19.463000] The buggy address belongs to the object at fff00000c7692100
[   19.463000]  which belongs to the cache kmalloc-64 of size 64
[   19.463061] The buggy address is located 0 bytes to the right of
[   19.463061]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.463135] 
[   19.463156] The buggy address belongs to the physical page:
[   19.463313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.463369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.463417] page_type: f5(slab)
[   19.463458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.463512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.463586] page dumped because: kasan: bad access detected
[   19.463620] 
[   19.463788] Memory state around the buggy address:
[   19.464197]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464291]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464337] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.464387]                                      ^
[   19.464430]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.464474]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.464512] ==================================================================
[   19.292993] ==================================================================
[   19.293238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.293372] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.293426] 
[   19.293458] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.293558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.293588] Hardware name: linux,dummy-virt (DT)
[   19.293619] Call trace:
[   19.293644]  show_stack+0x20/0x38 (C)
[   19.293694]  dump_stack_lvl+0x8c/0xd0
[   19.293752]  print_report+0x118/0x608
[   19.293799]  kasan_report+0xdc/0x128
[   19.293847]  kasan_check_range+0x100/0x1a8
[   19.293910]  __kasan_check_write+0x20/0x30
[   19.293959]  kasan_atomics_helper+0xd3c/0x4858
[   19.294007]  kasan_atomics+0x198/0x2e0
[   19.294071]  kunit_try_run_case+0x170/0x3f0
[   19.294131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.294373]  kthread+0x328/0x630
[   19.294871]  ret_from_fork+0x10/0x20
[   19.294938] 
[   19.295002] Allocated by task 265:
[   19.295053]  kasan_save_stack+0x3c/0x68
[   19.295227]  kasan_save_track+0x20/0x40
[   19.295275]  kasan_save_alloc_info+0x40/0x58
[   19.295464]  __kasan_kmalloc+0xd4/0xd8
[   19.295504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.295552]  kasan_atomics+0xb8/0x2e0
[   19.295589]  kunit_try_run_case+0x170/0x3f0
[   19.295629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295713]  kthread+0x328/0x630
[   19.295751]  ret_from_fork+0x10/0x20
[   19.295790] 
[   19.295813] The buggy address belongs to the object at fff00000c7692100
[   19.295813]  which belongs to the cache kmalloc-64 of size 64
[   19.295874] The buggy address is located 0 bytes to the right of
[   19.295874]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.296069] 
[   19.296208] The buggy address belongs to the physical page:
[   19.296553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.296611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.296662] page_type: f5(slab)
[   19.296702] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.296752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.297084] page dumped because: kasan: bad access detected
[   19.297150] 
[   19.297172] Memory state around the buggy address:
[   19.297207]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.297584]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.297697] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.297765]                                      ^
[   19.297802]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.298135]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.298209] ==================================================================
[   19.329382] ==================================================================
[   19.329435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.329738] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.330124] 
[   19.330174] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.330285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.330565] Hardware name: linux,dummy-virt (DT)
[   19.330599] Call trace:
[   19.330625]  show_stack+0x20/0x38 (C)
[   19.330677]  dump_stack_lvl+0x8c/0xd0
[   19.330737]  print_report+0x118/0x608
[   19.330895]  kasan_report+0xdc/0x128
[   19.330976]  __asan_report_store8_noabort+0x20/0x30
[   19.331026]  kasan_atomics_helper+0x3e5c/0x4858
[   19.331077]  kasan_atomics+0x198/0x2e0
[   19.331135]  kunit_try_run_case+0x170/0x3f0
[   19.331183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.331288]  kthread+0x328/0x630
[   19.331805]  ret_from_fork+0x10/0x20
[   19.332247] 
[   19.332282] Allocated by task 265:
[   19.332314]  kasan_save_stack+0x3c/0x68
[   19.332358]  kasan_save_track+0x20/0x40
[   19.332399]  kasan_save_alloc_info+0x40/0x58
[   19.332440]  __kasan_kmalloc+0xd4/0xd8
[   19.332479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.332771]  kasan_atomics+0xb8/0x2e0
[   19.332816]  kunit_try_run_case+0x170/0x3f0
[   19.332857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.332903]  kthread+0x328/0x630
[   19.332948]  ret_from_fork+0x10/0x20
[   19.332986] 
[   19.333297] The buggy address belongs to the object at fff00000c7692100
[   19.333297]  which belongs to the cache kmalloc-64 of size 64
[   19.333391] The buggy address is located 0 bytes to the right of
[   19.333391]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.333469] 
[   19.333492] The buggy address belongs to the physical page:
[   19.333537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.333590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.333662] page_type: f5(slab)
[   19.333771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.333921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.333965] page dumped because: kasan: bad access detected
[   19.334000] 
[   19.334019] Memory state around the buggy address:
[   19.334101]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.334755]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.334809] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.334852]                                      ^
[   19.334886]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.334931]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.335449] ==================================================================
[   19.336161] ==================================================================
[   19.336213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.336261] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.336313] 
[   19.336345] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.336453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.336482] Hardware name: linux,dummy-virt (DT)
[   19.336514] Call trace:
[   19.336537]  show_stack+0x20/0x38 (C)
[   19.336586]  dump_stack_lvl+0x8c/0xd0
[   19.336634]  print_report+0x118/0x608
[   19.336981]  kasan_report+0xdc/0x128
[   19.337458]  kasan_check_range+0x100/0x1a8
[   19.337790]  __kasan_check_write+0x20/0x30
[   19.337892]  kasan_atomics_helper+0xeb8/0x4858
[   19.338009]  kasan_atomics+0x198/0x2e0
[   19.338063]  kunit_try_run_case+0x170/0x3f0
[   19.338287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.338353]  kthread+0x328/0x630
[   19.338516]  ret_from_fork+0x10/0x20
[   19.338565] 
[   19.338591] Allocated by task 265:
[   19.338670]  kasan_save_stack+0x3c/0x68
[   19.338750]  kasan_save_track+0x20/0x40
[   19.338898]  kasan_save_alloc_info+0x40/0x58
[   19.338945]  __kasan_kmalloc+0xd4/0xd8
[   19.339061]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.339413]  kasan_atomics+0xb8/0x2e0
[   19.339498]  kunit_try_run_case+0x170/0x3f0
[   19.339567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.339786]  kthread+0x328/0x630
[   19.339843]  ret_from_fork+0x10/0x20
[   19.339883] 
[   19.340281] The buggy address belongs to the object at fff00000c7692100
[   19.340281]  which belongs to the cache kmalloc-64 of size 64
[   19.340378] The buggy address is located 0 bytes to the right of
[   19.340378]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.340446] 
[   19.340467] The buggy address belongs to the physical page:
[   19.340500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.340720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.340774] page_type: f5(slab)
[   19.340986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.341340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.341578] page dumped because: kasan: bad access detected
[   19.341652] 
[   19.341674] Memory state around the buggy address:
[   19.341709]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.341753]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.341813] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.341851]                                      ^
[   19.342088]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342238]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342492] ==================================================================
[   19.477526] ==================================================================
[   19.477575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.477624] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.477675] 
[   19.477709] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.477790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.477817] Hardware name: linux,dummy-virt (DT)
[   19.477851] Call trace:
[   19.477875]  show_stack+0x20/0x38 (C)
[   19.477926]  dump_stack_lvl+0x8c/0xd0
[   19.477977]  print_report+0x118/0x608
[   19.478027]  kasan_report+0xdc/0x128
[   19.478075]  __asan_report_load8_noabort+0x20/0x30
[   19.478142]  kasan_atomics_helper+0x3df4/0x4858
[   19.478193]  kasan_atomics+0x198/0x2e0
[   19.478238]  kunit_try_run_case+0x170/0x3f0
[   19.478287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.478341]  kthread+0x328/0x630
[   19.478386]  ret_from_fork+0x10/0x20
[   19.478528] 
[   19.478554] Allocated by task 265:
[   19.478622]  kasan_save_stack+0x3c/0x68
[   19.478666]  kasan_save_track+0x20/0x40
[   19.478967]  kasan_save_alloc_info+0x40/0x58
[   19.479092]  __kasan_kmalloc+0xd4/0xd8
[   19.479158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.479226]  kasan_atomics+0xb8/0x2e0
[   19.479306]  kunit_try_run_case+0x170/0x3f0
[   19.479398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.479451]  kthread+0x328/0x630
[   19.479508]  ret_from_fork+0x10/0x20
[   19.479548] 
[   19.479570] The buggy address belongs to the object at fff00000c7692100
[   19.479570]  which belongs to the cache kmalloc-64 of size 64
[   19.479635] The buggy address is located 0 bytes to the right of
[   19.479635]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.479715] 
[   19.479739] The buggy address belongs to the physical page:
[   19.479771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.479947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.480041] page_type: f5(slab)
[   19.480142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.480260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.480577] page dumped because: kasan: bad access detected
[   19.480705] 
[   19.480782] Memory state around the buggy address:
[   19.480817]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.480863]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.481082] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.481243]                                      ^
[   19.481388]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.481444]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.481493] ==================================================================
[   19.445269] ==================================================================
[   19.445320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.445595] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.445714] 
[   19.445749] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.445830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.445859] Hardware name: linux,dummy-virt (DT)
[   19.446039] Call trace:
[   19.446071]  show_stack+0x20/0x38 (C)
[   19.446173]  dump_stack_lvl+0x8c/0xd0
[   19.446341]  print_report+0x118/0x608
[   19.446447]  kasan_report+0xdc/0x128
[   19.446494]  kasan_check_range+0x100/0x1a8
[   19.446620]  __kasan_check_write+0x20/0x30
[   19.446763]  kasan_atomics_helper+0x147c/0x4858
[   19.446867]  kasan_atomics+0x198/0x2e0
[   19.446972]  kunit_try_run_case+0x170/0x3f0
[   19.447021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.447075]  kthread+0x328/0x630
[   19.447179]  ret_from_fork+0x10/0x20
[   19.447228] 
[   19.447248] Allocated by task 265:
[   19.447279]  kasan_save_stack+0x3c/0x68
[   19.447320]  kasan_save_track+0x20/0x40
[   19.447697]  kasan_save_alloc_info+0x40/0x58
[   19.448391]  __kasan_kmalloc+0xd4/0xd8
[   19.448643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.448873]  kasan_atomics+0xb8/0x2e0
[   19.448967]  kunit_try_run_case+0x170/0x3f0
[   19.449594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449780]  kthread+0x328/0x630
[   19.449823]  ret_from_fork+0x10/0x20
[   19.449862] 
[   19.449895] The buggy address belongs to the object at fff00000c7692100
[   19.449895]  which belongs to the cache kmalloc-64 of size 64
[   19.449960] The buggy address is located 0 bytes to the right of
[   19.449960]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.450108] 
[   19.450140] The buggy address belongs to the physical page:
[   19.450371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.450455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.450506] page_type: f5(slab)
[   19.450549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.450601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.450666] page dumped because: kasan: bad access detected
[   19.450781] 
[   19.451000] Memory state around the buggy address:
[   19.451148]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451223]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451268] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.451309]                                      ^
[   19.451342]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.451404]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.451442] ==================================================================
[   19.350433] ==================================================================
[   19.350692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.350742] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.350792] 
[   19.350823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.350907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.350934] Hardware name: linux,dummy-virt (DT)
[   19.350968] Call trace:
[   19.351030]  show_stack+0x20/0x38 (C)
[   19.351085]  dump_stack_lvl+0x8c/0xd0
[   19.351638]  print_report+0x118/0x608
[   19.351784]  kasan_report+0xdc/0x128
[   19.351831]  kasan_check_range+0x100/0x1a8
[   19.351891]  __kasan_check_write+0x20/0x30
[   19.351939]  kasan_atomics_helper+0xf88/0x4858
[   19.351987]  kasan_atomics+0x198/0x2e0
[   19.352034]  kunit_try_run_case+0x170/0x3f0
[   19.352082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.352454]  kthread+0x328/0x630
[   19.352694]  ret_from_fork+0x10/0x20
[   19.352764] 
[   19.352830] Allocated by task 265:
[   19.352894]  kasan_save_stack+0x3c/0x68
[   19.352939]  kasan_save_track+0x20/0x40
[   19.352987]  kasan_save_alloc_info+0x40/0x58
[   19.353234]  __kasan_kmalloc+0xd4/0xd8
[   19.353307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.353348]  kasan_atomics+0xb8/0x2e0
[   19.353387]  kunit_try_run_case+0x170/0x3f0
[   19.353427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353473]  kthread+0x328/0x630
[   19.353526]  ret_from_fork+0x10/0x20
[   19.353566] 
[   19.353587] The buggy address belongs to the object at fff00000c7692100
[   19.353587]  which belongs to the cache kmalloc-64 of size 64
[   19.354139] The buggy address is located 0 bytes to the right of
[   19.354139]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.354360] 
[   19.354446] The buggy address belongs to the physical page:
[   19.354490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.354596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.354795] page_type: f5(slab)
[   19.354840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.354930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.355003] page dumped because: kasan: bad access detected
[   19.355109] 
[   19.355400] Memory state around the buggy address:
[   19.355605]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.355862]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.355911] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.355951]                                      ^
[   19.355985]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356030]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356071] ==================================================================
[   19.362694] ==================================================================
[   19.362744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.362800] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.363032] 
[   19.366623] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.366990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.367061] Hardware name: linux,dummy-virt (DT)
[   19.367096] Call trace:
[   19.367136]  show_stack+0x20/0x38 (C)
[   19.367191]  dump_stack_lvl+0x8c/0xd0
[   19.367242]  print_report+0x118/0x608
[   19.367291]  kasan_report+0xdc/0x128
[   19.370075]  kasan_check_range+0x100/0x1a8
[   19.371695]  __kasan_check_write+0x20/0x30
[   19.371752]  kasan_atomics_helper+0x1058/0x4858
[   19.371804]  kasan_atomics+0x198/0x2e0
[   19.371852]  kunit_try_run_case+0x170/0x3f0
[   19.371900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.371954]  kthread+0x328/0x630
[   19.371997]  ret_from_fork+0x10/0x20
[   19.372102] 
[   19.372139] Allocated by task 265:
[   19.372172]  kasan_save_stack+0x3c/0x68
[   19.372216]  kasan_save_track+0x20/0x40
[   19.372255]  kasan_save_alloc_info+0x40/0x58
[   19.372298]  __kasan_kmalloc+0xd4/0xd8
[   19.372335]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.372378]  kasan_atomics+0xb8/0x2e0
[   19.372415]  kunit_try_run_case+0x170/0x3f0
[   19.372453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.372501]  kthread+0x328/0x630
[   19.372536]  ret_from_fork+0x10/0x20
[   19.372576] 
[   19.372597] The buggy address belongs to the object at fff00000c7692100
[   19.372597]  which belongs to the cache kmalloc-64 of size 64
[   19.372657] The buggy address is located 0 bytes to the right of
[   19.372657]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.372722] 
[   19.372745] The buggy address belongs to the physical page:
[   19.372778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.372831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.372881] page_type: f5(slab)
[   19.372924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.372976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.373019] page dumped because: kasan: bad access detected
[   19.373053] 
[   19.373075] Memory state around the buggy address:
[   19.373110]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.374211]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.374260] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.374301]                                      ^
[   19.374336]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.374380]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.374421] ==================================================================
[   19.285600] ==================================================================
[   19.285707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.285891] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.286008] 
[   19.286091] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.286235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.286364] Hardware name: linux,dummy-virt (DT)
[   19.286450] Call trace:
[   19.286713]  show_stack+0x20/0x38 (C)
[   19.286936]  dump_stack_lvl+0x8c/0xd0
[   19.287055]  print_report+0x118/0x608
[   19.287123]  kasan_report+0xdc/0x128
[   19.287178]  __asan_report_load4_noabort+0x20/0x30
[   19.287233]  kasan_atomics_helper+0x3dd8/0x4858
[   19.287282]  kasan_atomics+0x198/0x2e0
[   19.287328]  kunit_try_run_case+0x170/0x3f0
[   19.287388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.287444]  kthread+0x328/0x630
[   19.287490]  ret_from_fork+0x10/0x20
[   19.287563] 
[   19.287593] Allocated by task 265:
[   19.287625]  kasan_save_stack+0x3c/0x68
[   19.287676]  kasan_save_track+0x20/0x40
[   19.287739]  kasan_save_alloc_info+0x40/0x58
[   19.287782]  __kasan_kmalloc+0xd4/0xd8
[   19.287819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.287860]  kasan_atomics+0xb8/0x2e0
[   19.288052]  kunit_try_run_case+0x170/0x3f0
[   19.288101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.288158]  kthread+0x328/0x630
[   19.288196]  ret_from_fork+0x10/0x20
[   19.288236] 
[   19.288257] The buggy address belongs to the object at fff00000c7692100
[   19.288257]  which belongs to the cache kmalloc-64 of size 64
[   19.288496] The buggy address is located 0 bytes to the right of
[   19.288496]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.288646] 
[   19.288724] The buggy address belongs to the physical page:
[   19.288820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.289146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.289345] page_type: f5(slab)
[   19.289547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.289886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.289977] page dumped because: kasan: bad access detected
[   19.290324] 
[   19.290378] Memory state around the buggy address:
[   19.290414]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.290497]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.290670] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.290848]                                      ^
[   19.290942]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.291124]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.291268] ==================================================================
[   19.410955] ==================================================================
[   19.411012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.411062] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.411127] 
[   19.411166] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.411251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.411279] Hardware name: linux,dummy-virt (DT)
[   19.411312] Call trace:
[   19.411338]  show_stack+0x20/0x38 (C)
[   19.411389]  dump_stack_lvl+0x8c/0xd0
[   19.411439]  print_report+0x118/0x608
[   19.411486]  kasan_report+0xdc/0x128
[   19.411533]  kasan_check_range+0x100/0x1a8
[   19.412718]  __kasan_check_write+0x20/0x30
[   19.412966]  kasan_atomics_helper+0x11f8/0x4858
[   19.413021]  kasan_atomics+0x198/0x2e0
[   19.413076]  kunit_try_run_case+0x170/0x3f0
[   19.413484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413977]  kthread+0x328/0x630
[   19.414032]  ret_from_fork+0x10/0x20
[   19.414396] 
[   19.414423] Allocated by task 265:
[   19.414457]  kasan_save_stack+0x3c/0x68
[   19.414862]  kasan_save_track+0x20/0x40
[   19.415129]  kasan_save_alloc_info+0x40/0x58
[   19.415510]  __kasan_kmalloc+0xd4/0xd8
[   19.415595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.415639]  kasan_atomics+0xb8/0x2e0
[   19.416171]  kunit_try_run_case+0x170/0x3f0
[   19.416227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.416442]  kthread+0x328/0x630
[   19.416489]  ret_from_fork+0x10/0x20
[   19.416527] 
[   19.416551] The buggy address belongs to the object at fff00000c7692100
[   19.416551]  which belongs to the cache kmalloc-64 of size 64
[   19.417078] The buggy address is located 0 bytes to the right of
[   19.417078]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.417369] 
[   19.417829] The buggy address belongs to the physical page:
[   19.417875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.418525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.418594] page_type: f5(slab)
[   19.418638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.418692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.419558] page dumped because: kasan: bad access detected
[   19.419694] 
[   19.419903] Memory state around the buggy address:
[   19.419958]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420149]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420201] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.420514]                                      ^
[   19.420733]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420784]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420895] ==================================================================
[   19.465107] ==================================================================
[   19.465171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.465543] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.465601] 
[   19.465639] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.465793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.465898] Hardware name: linux,dummy-virt (DT)
[   19.465949] Call trace:
[   19.465990]  show_stack+0x20/0x38 (C)
[   19.466042]  dump_stack_lvl+0x8c/0xd0
[   19.466155]  print_report+0x118/0x608
[   19.466261]  kasan_report+0xdc/0x128
[   19.466310]  __asan_report_load8_noabort+0x20/0x30
[   19.466381]  kasan_atomics_helper+0x3db0/0x4858
[   19.466464]  kasan_atomics+0x198/0x2e0
[   19.466513]  kunit_try_run_case+0x170/0x3f0
[   19.466562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.466617]  kthread+0x328/0x630
[   19.466887]  ret_from_fork+0x10/0x20
[   19.467064] 
[   19.467087] Allocated by task 265:
[   19.467151]  kasan_save_stack+0x3c/0x68
[   19.467212]  kasan_save_track+0x20/0x40
[   19.467261]  kasan_save_alloc_info+0x40/0x58
[   19.467572]  __kasan_kmalloc+0xd4/0xd8
[   19.467697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.467804]  kasan_atomics+0xb8/0x2e0
[   19.468014]  kunit_try_run_case+0x170/0x3f0
[   19.468134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.468178]  kthread+0x328/0x630
[   19.468238]  ret_from_fork+0x10/0x20
[   19.468276] 
[   19.468299] The buggy address belongs to the object at fff00000c7692100
[   19.468299]  which belongs to the cache kmalloc-64 of size 64
[   19.468731] The buggy address is located 0 bytes to the right of
[   19.468731]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.468948] 
[   19.468984] The buggy address belongs to the physical page:
[   19.469034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.469101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.469166] page_type: f5(slab)
[   19.469215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.469279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.469342] page dumped because: kasan: bad access detected
[   19.469382] 
[   19.469413] Memory state around the buggy address:
[   19.469456]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469518]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469563] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.469605]                                      ^
[   19.469641]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.469683]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.469739] ==================================================================
[   19.223062] ==================================================================
[   19.223179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.223234] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.223286] 
[   19.223328] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.223415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.223444] Hardware name: linux,dummy-virt (DT)
[   19.223515] Call trace:
[   19.223684]  show_stack+0x20/0x38 (C)
[   19.223737]  dump_stack_lvl+0x8c/0xd0
[   19.223989]  print_report+0x118/0x608
[   19.224106]  kasan_report+0xdc/0x128
[   19.224237]  kasan_check_range+0x100/0x1a8
[   19.224287]  __kasan_check_write+0x20/0x30
[   19.224355]  kasan_atomics_helper+0x99c/0x4858
[   19.224406]  kasan_atomics+0x198/0x2e0
[   19.224653]  kunit_try_run_case+0x170/0x3f0
[   19.224831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.225085]  kthread+0x328/0x630
[   19.225215]  ret_from_fork+0x10/0x20
[   19.225293] 
[   19.225314] Allocated by task 265:
[   19.225568]  kasan_save_stack+0x3c/0x68
[   19.225665]  kasan_save_track+0x20/0x40
[   19.225787]  kasan_save_alloc_info+0x40/0x58
[   19.225921]  __kasan_kmalloc+0xd4/0xd8
[   19.225974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.226014]  kasan_atomics+0xb8/0x2e0
[   19.226058]  kunit_try_run_case+0x170/0x3f0
[   19.226097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226166]  kthread+0x328/0x630
[   19.226201]  ret_from_fork+0x10/0x20
[   19.226238] 
[   19.226270] The buggy address belongs to the object at fff00000c7692100
[   19.226270]  which belongs to the cache kmalloc-64 of size 64
[   19.226335] The buggy address is located 0 bytes to the right of
[   19.226335]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.226417] 
[   19.226448] The buggy address belongs to the physical page:
[   19.226643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.226786] 
[   19.226947] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.227420] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.228785]  __kasan_check_write+0x20/0x30
[   19.230021] 
[   19.230110] Allocated by task 265:
[   19.230172]  kasan_save_stack+0x3c/0x68
[   19.230462]  kasan_save_track+0x20/0x40
[   19.230614]  kasan_save_alloc_info+0x40/0x58
[   19.230735]  __kasan_kmalloc+0xd4/0xd8
[   19.230916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.230979]  kasan_atomics+0xb8/0x2e0
[   19.231019]  kunit_try_run_case+0x170/0x3f0
[   19.231309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.231408]  kthread+0x328/0x630
[   19.231576]  ret_from_fork+0x10/0x20
[   19.231695] 
[   19.231716] The buggy address belongs to the object at fff00000c7692100
[   19.231716]  which belongs to the cache kmalloc-64 of size 64
[   19.231953] The buggy address is located 0 bytes to the right of
[   19.231953]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.232269] 
[   19.232326] The buggy address belongs to the physical page:
[   19.232472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.232546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.232595] page_type: f5(slab)
[   19.232657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.232925] page dumped because: kasan: bad access detected
[   19.234871] ==================================================================
[   19.377836] ==================================================================
[   19.377945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.378000] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.378049] 
[   19.378088] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.378343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.378765] Hardware name: linux,dummy-virt (DT)
[   19.378799] Call trace:
[   19.379262]  show_stack+0x20/0x38 (C)
[   19.379431]  dump_stack_lvl+0x8c/0xd0
[   19.379485]  print_report+0x118/0x608
[   19.379532]  kasan_report+0xdc/0x128
[   19.379778]  kasan_check_range+0x100/0x1a8
[   19.379858]  __kasan_check_write+0x20/0x30
[   19.379929]  kasan_atomics_helper+0x10c0/0x4858
[   19.379980]  kasan_atomics+0x198/0x2e0
[   19.380412]  kunit_try_run_case+0x170/0x3f0
[   19.380835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.380962]  kthread+0x328/0x630
[   19.381005]  ret_from_fork+0x10/0x20
[   19.381057] 
[   19.381688] Allocated by task 265:
[   19.381801]  kasan_save_stack+0x3c/0x68
[   19.382147]  kasan_save_track+0x20/0x40
[   19.382196]  kasan_save_alloc_info+0x40/0x58
[   19.382240]  __kasan_kmalloc+0xd4/0xd8
[   19.382278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.382328]  kasan_atomics+0xb8/0x2e0
[   19.382815]  kunit_try_run_case+0x170/0x3f0
[   19.382974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.383428]  kthread+0x328/0x630
[   19.383498]  ret_from_fork+0x10/0x20
[   19.383810] 
[   19.383837] The buggy address belongs to the object at fff00000c7692100
[   19.383837]  which belongs to the cache kmalloc-64 of size 64
[   19.383941] The buggy address is located 0 bytes to the right of
[   19.383941]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.384028] 
[   19.384413] The buggy address belongs to the physical page:
[   19.384453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.384509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.384561] page_type: f5(slab)
[   19.384605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.384986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.385050] page dumped because: kasan: bad access detected
[   19.385188] 
[   19.385281] Memory state around the buggy address:
[   19.385473]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.385542]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.385657] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.385698]                                      ^
[   19.386080]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.386183]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.386228] ==================================================================
[   19.208811] ==================================================================
[   19.208855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.209028] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.209220] 
[   19.209255] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.209405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.209454] Hardware name: linux,dummy-virt (DT)
[   19.209488] Call trace:
[   19.209556]  show_stack+0x20/0x38 (C)
[   19.209653]  dump_stack_lvl+0x8c/0xd0
[   19.209740]  print_report+0x118/0x608
[   19.209791]  kasan_report+0xdc/0x128
[   19.209906]  __asan_report_load4_noabort+0x20/0x30
[   19.209989]  kasan_atomics_helper+0x42d8/0x4858
[   19.210039]  kasan_atomics+0x198/0x2e0
[   19.210092]  kunit_try_run_case+0x170/0x3f0
[   19.210433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.210551]  kthread+0x328/0x630
[   19.210677]  ret_from_fork+0x10/0x20
[   19.210755] 
[   19.210802] Allocated by task 265:
[   19.210835]  kasan_save_stack+0x3c/0x68
[   19.210879]  kasan_save_track+0x20/0x40
[   19.210971]  kasan_save_alloc_info+0x40/0x58
[   19.211065]  __kasan_kmalloc+0xd4/0xd8
[   19.211107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.211218]  kasan_atomics+0xb8/0x2e0
[   19.211260]  kunit_try_run_case+0x170/0x3f0
[   19.211306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.211380]  kthread+0x328/0x630
[   19.211700]  ret_from_fork+0x10/0x20
[   19.211861] 
[   19.212203] The buggy address is located 0 bytes to the right of
[   19.212203]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.212660] page_type: f5(slab)
[   19.214331]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.216052] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.216889]  dump_stack_lvl+0x8c/0xd0
[   19.216939]  print_report+0x118/0x608
[   19.217179]  kasan_report+0xdc/0x128
[   19.217284]  kasan_check_range+0x100/0x1a8
[   19.217334]  __kasan_check_write+0x20/0x30
[   19.217603]  kasan_atomics_helper+0x934/0x4858
[   19.217745]  kasan_atomics+0x198/0x2e0
[   19.217887]  kunit_try_run_case+0x170/0x3f0
[   19.218085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.218264]  kthread+0x328/0x630
[   19.218394]  ret_from_fork+0x10/0x20
[   19.218690] 
[   19.218785] Allocated by task 265:
[   19.218821]  kasan_save_stack+0x3c/0x68
[   19.219138]  kasan_save_track+0x20/0x40
[   19.219274]  kasan_save_alloc_info+0x40/0x58
[   19.219421]  __kasan_kmalloc+0xd4/0xd8
[   19.219554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.219617]  kasan_atomics+0xb8/0x2e0
[   19.219695]  kunit_try_run_case+0x170/0x3f0
[   19.220078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.220192]  kthread+0x328/0x630
[   19.220351]  ret_from_fork+0x10/0x20
[   19.220410] 
[   19.220432] The buggy address belongs to the object at fff00000c7692100
[   19.220432]  which belongs to the cache kmalloc-64 of size 64
[   19.220525] The buggy address is located 0 bytes to the right of
[   19.220525]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.220805] 
[   19.220883] The buggy address belongs to the physical page:
[   19.221012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.221086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.221360] page_type: f5(slab)
[   19.221461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.221633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.221789] page dumped because: kasan: bad access detected
[   19.221842] 
[   19.221863] Memory state around the buggy address:
[   19.221929]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.221976]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.222021] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.222062]                                      ^
[   19.222099]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.222165]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.222205] ==================================================================
[   19.422671] ==================================================================
[   19.422727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.422777] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.422828] 
[   19.422865] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.423761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.423971] Hardware name: linux,dummy-virt (DT)
[   19.424007] Call trace:
[   19.424034]  show_stack+0x20/0x38 (C)
[   19.424089]  dump_stack_lvl+0x8c/0xd0
[   19.424156]  print_report+0x118/0x608
[   19.424203]  kasan_report+0xdc/0x128
[   19.424251]  kasan_check_range+0x100/0x1a8
[   19.424299]  __kasan_check_write+0x20/0x30
[   19.424346]  kasan_atomics_helper+0x126c/0x4858
[   19.424394]  kasan_atomics+0x198/0x2e0
[   19.424441]  kunit_try_run_case+0x170/0x3f0
[   19.424490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.424544]  kthread+0x328/0x630
[   19.424586]  ret_from_fork+0x10/0x20
[   19.424635] 
[   19.424656] Allocated by task 265:
[   19.424685]  kasan_save_stack+0x3c/0x68
[   19.424729]  kasan_save_track+0x20/0x40
[   19.424767]  kasan_save_alloc_info+0x40/0x58
[   19.424809]  __kasan_kmalloc+0xd4/0xd8
[   19.424847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.424889]  kasan_atomics+0xb8/0x2e0
[   19.424926]  kunit_try_run_case+0x170/0x3f0
[   19.424966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.425010]  kthread+0x328/0x630
[   19.425045]  ret_from_fork+0x10/0x20
[   19.425082] 
[   19.425104] The buggy address belongs to the object at fff00000c7692100
[   19.425104]  which belongs to the cache kmalloc-64 of size 64
[   19.425172] The buggy address is located 0 bytes to the right of
[   19.425172]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.425238] 
[   19.425261] The buggy address belongs to the physical page:
[   19.425293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.425347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.425395] page_type: f5(slab)
[   19.425434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.425487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.425534] page dumped because: kasan: bad access detected
[   19.425567] 
[   19.425588] Memory state around the buggy address:
[   19.425622]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.425667]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.425711] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.425752]                                      ^
[   19.425787]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.425830]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.425869] ==================================================================
[   19.397135] ==================================================================
[   19.397190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.397239] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.399049] 
[   19.399104] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.400071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.400190] Hardware name: linux,dummy-virt (DT)
[   19.400255] Call trace:
[   19.400281]  show_stack+0x20/0x38 (C)
[   19.400701]  dump_stack_lvl+0x8c/0xd0
[   19.400800]  print_report+0x118/0x608
[   19.401039]  kasan_report+0xdc/0x128
[   19.401089]  kasan_check_range+0x100/0x1a8
[   19.401565]  __kasan_check_write+0x20/0x30
[   19.401690]  kasan_atomics_helper+0x1190/0x4858
[   19.402016]  kasan_atomics+0x198/0x2e0
[   19.402067]  kunit_try_run_case+0x170/0x3f0
[   19.402129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402185]  kthread+0x328/0x630
[   19.402982]  ret_from_fork+0x10/0x20
[   19.403187] 
[   19.403593] Allocated by task 265:
[   19.403663]  kasan_save_stack+0x3c/0x68
[   19.403893]  kasan_save_track+0x20/0x40
[   19.403946]  kasan_save_alloc_info+0x40/0x58
[   19.403988]  __kasan_kmalloc+0xd4/0xd8
[   19.404036]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.404078]  kasan_atomics+0xb8/0x2e0
[   19.404125]  kunit_try_run_case+0x170/0x3f0
[   19.404767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.404828]  kthread+0x328/0x630
[   19.405080]  ret_from_fork+0x10/0x20
[   19.405494] 
[   19.405529] The buggy address belongs to the object at fff00000c7692100
[   19.405529]  which belongs to the cache kmalloc-64 of size 64
[   19.405942] The buggy address is located 0 bytes to the right of
[   19.405942]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.406241] 
[   19.406562] The buggy address belongs to the physical page:
[   19.406666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.406737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.406789] page_type: f5(slab)
[   19.406829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.407675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.407738] page dumped because: kasan: bad access detected
[   19.407806] 
[   19.407827] Memory state around the buggy address:
[   19.408041]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.408176]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.408239] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.408282]                                      ^
[   19.408409]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408596]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408862] ==================================================================
[   19.430129] ==================================================================
[   19.430184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.430833] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.430896] 
[   19.430930] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.431013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.431040] Hardware name: linux,dummy-virt (DT)
[   19.431072] Call trace:
[   19.431097]  show_stack+0x20/0x38 (C)
[   19.431160]  dump_stack_lvl+0x8c/0xd0
[   19.431209]  print_report+0x118/0x608
[   19.431256]  kasan_report+0xdc/0x128
[   19.431481]  kasan_check_range+0x100/0x1a8
[   19.431556]  __kasan_check_write+0x20/0x30
[   19.431621]  kasan_atomics_helper+0x1384/0x4858
[   19.431815]  kasan_atomics+0x198/0x2e0
[   19.432003]  kunit_try_run_case+0x170/0x3f0
[   19.432179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.432419]  kthread+0x328/0x630
[   19.432506]  ret_from_fork+0x10/0x20
[   19.432649] 
[   19.432681] Allocated by task 265:
[   19.432750]  kasan_save_stack+0x3c/0x68
[   19.432814]  kasan_save_track+0x20/0x40
[   19.432853]  kasan_save_alloc_info+0x40/0x58
[   19.433068]  __kasan_kmalloc+0xd4/0xd8
[   19.433109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.433166]  kasan_atomics+0xb8/0x2e0
[   19.433203]  kunit_try_run_case+0x170/0x3f0
[   19.433469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.433561]  kthread+0x328/0x630
[   19.433617]  ret_from_fork+0x10/0x20
[   19.433655] 
[   19.433756] The buggy address belongs to the object at fff00000c7692100
[   19.433756]  which belongs to the cache kmalloc-64 of size 64
[   19.433853] The buggy address is located 0 bytes to the right of
[   19.433853]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.433918] 
[   19.433940] The buggy address belongs to the physical page:
[   19.434050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.434110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.434171] page_type: f5(slab)
[   19.434512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.435961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.436005] page dumped because: kasan: bad access detected
[   19.436039] 
[   19.436061] Memory state around the buggy address:
[   19.436096]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.436153]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.436199] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.436239]                                      ^
[   19.436273]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436317]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436355] ==================================================================
[   19.481900] ==================================================================
[   19.481970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.482036] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.482335] 
[   19.482394] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.482480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.482588] Hardware name: linux,dummy-virt (DT)
[   19.482623] Call trace:
[   19.482739]  show_stack+0x20/0x38 (C)
[   19.482825]  dump_stack_lvl+0x8c/0xd0
[   19.482876]  print_report+0x118/0x608
[   19.482934]  kasan_report+0xdc/0x128
[   19.482981]  kasan_check_range+0x100/0x1a8
[   19.483031]  __kasan_check_write+0x20/0x30
[   19.483076]  kasan_atomics_helper+0x16d0/0x4858
[   19.483135]  kasan_atomics+0x198/0x2e0
[   19.483181]  kunit_try_run_case+0x170/0x3f0
[   19.483231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.483402]  kthread+0x328/0x630
[   19.483479]  ret_from_fork+0x10/0x20
[   19.483589] 
[   19.483656] Allocated by task 265:
[   19.483733]  kasan_save_stack+0x3c/0x68
[   19.483777]  kasan_save_track+0x20/0x40
[   19.483818]  kasan_save_alloc_info+0x40/0x58
[   19.484089]  __kasan_kmalloc+0xd4/0xd8
[   19.484295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.484469]  kasan_atomics+0xb8/0x2e0
[   19.484611]  kunit_try_run_case+0x170/0x3f0
[   19.484704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.484803]  kthread+0x328/0x630
[   19.484856]  ret_from_fork+0x10/0x20
[   19.484895] 
[   19.484916] The buggy address belongs to the object at fff00000c7692100
[   19.484916]  which belongs to the cache kmalloc-64 of size 64
[   19.484978] The buggy address is located 0 bytes to the right of
[   19.484978]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.485377] 
[   19.485559] The buggy address belongs to the physical page:
[   19.485729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.486215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.486278] page_type: f5(slab)
[   19.486319] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.486706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.486757] page dumped because: kasan: bad access detected
[   19.486792] 
[   19.486818] Memory state around the buggy address:
[   19.486862]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486923]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486968] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.487010]                                      ^
[   19.487046]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.487098]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.487147] ==================================================================
[   19.487936] ==================================================================
[   19.487989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.488426] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.488509] 
[   19.488580] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.488866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.488975] Hardware name: linux,dummy-virt (DT)
[   19.489068] Call trace:
[   19.489156]  show_stack+0x20/0x38 (C)
[   19.489262]  dump_stack_lvl+0x8c/0xd0
[   19.489315]  print_report+0x118/0x608
[   19.489371]  kasan_report+0xdc/0x128
[   19.489445]  __asan_report_load8_noabort+0x20/0x30
[   19.489564]  kasan_atomics_helper+0x3e10/0x4858
[   19.489615]  kasan_atomics+0x198/0x2e0
[   19.489687]  kunit_try_run_case+0x170/0x3f0
[   19.489738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490173]  kthread+0x328/0x630
[   19.490248]  ret_from_fork+0x10/0x20
[   19.490405] 
[   19.490451] Allocated by task 265:
[   19.490667]  kasan_save_stack+0x3c/0x68
[   19.490722]  kasan_save_track+0x20/0x40
[   19.490809]  kasan_save_alloc_info+0x40/0x58
[   19.490853]  __kasan_kmalloc+0xd4/0xd8
[   19.490964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.491007]  kasan_atomics+0xb8/0x2e0
[   19.491044]  kunit_try_run_case+0x170/0x3f0
[   19.491090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.491204]  kthread+0x328/0x630
[   19.491239]  ret_from_fork+0x10/0x20
[   19.491276] 
[   19.491332] The buggy address belongs to the object at fff00000c7692100
[   19.491332]  which belongs to the cache kmalloc-64 of size 64
[   19.491395] The buggy address is located 0 bytes to the right of
[   19.491395]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.491738] 
[   19.491811] The buggy address belongs to the physical page:
[   19.491854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.491945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.492273] page_type: f5(slab)
[   19.492368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.492432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.492477] page dumped because: kasan: bad access detected
[   19.492511] 
[   19.492530] Memory state around the buggy address:
[   19.492563]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.492609]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.492654] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.492694]                                      ^
[   19.492730]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.492776]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.492815] ==================================================================
[   19.199531] ==================================================================
[   19.199940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   19.200015] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.200068] 
[   19.200102] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.200203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.200232] Hardware name: linux,dummy-virt (DT)
[   19.200265] Call trace:
[   19.200291]  show_stack+0x20/0x38 (C)
[   19.200572]  dump_stack_lvl+0x8c/0xd0
[   19.200784]  print_report+0x118/0x608
[   19.200846]  kasan_report+0xdc/0x128
[   19.200971]  kasan_check_range+0x100/0x1a8
[   19.201091]  __kasan_check_write+0x20/0x30
[   19.201173]  kasan_atomics_helper+0x7cc/0x4858
[   19.201263]  kasan_atomics+0x198/0x2e0
[   19.201408]  kunit_try_run_case+0x170/0x3f0
[   19.201458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.201752]  kthread+0x328/0x630
[   19.201817]  ret_from_fork+0x10/0x20
[   19.201867] 
[   19.201889] Allocated by task 265:
[   19.202288]  kasan_save_alloc_info+0x40/0x58
[   19.202988] 
[   19.203011] The buggy address belongs to the physical page:
[   19.203204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.203422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.204068] Memory state around the buggy address:
[   19.204226] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.205309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   19.206184]  kunit_try_run_case+0x170/0x3f0
[   19.206497]  kasan_save_track+0x20/0x40
[   19.207004] 
[   19.207027] The buggy address belongs to the physical page:
[   19.207058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.207405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.207458] page_type: f5(slab)
[   19.207497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.207578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.207781] page dumped because: kasan: bad access detected
[   19.207818] 
[   19.207838] Memory state around the buggy address:
[   19.207872]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.207917]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.208084] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.208352]                                      ^
[   19.208388]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.208456]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.208608] ==================================================================
[   19.494072] ==================================================================
[   19.494361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.494424] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.494475] 
[   19.494507] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.494591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.494621] Hardware name: linux,dummy-virt (DT)
[   19.494652] Call trace:
[   19.494690]  show_stack+0x20/0x38 (C)
[   19.494741]  dump_stack_lvl+0x8c/0xd0
[   19.494790]  print_report+0x118/0x608
[   19.494838]  kasan_report+0xdc/0x128
[   19.494885]  kasan_check_range+0x100/0x1a8
[   19.494934]  __kasan_check_write+0x20/0x30
[   19.494987]  kasan_atomics_helper+0x175c/0x4858
[   19.495148]  kasan_atomics+0x198/0x2e0
[   19.495196]  kunit_try_run_case+0x170/0x3f0
[   19.495824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.496276]  kthread+0x328/0x630
[   19.496335]  ret_from_fork+0x10/0x20
[   19.496387] 
[   19.496407] Allocated by task 265:
[   19.496438]  kasan_save_stack+0x3c/0x68
[   19.496483]  kasan_save_track+0x20/0x40
[   19.496522]  kasan_save_alloc_info+0x40/0x58
[   19.496564]  __kasan_kmalloc+0xd4/0xd8
[   19.496601]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.496643]  kasan_atomics+0xb8/0x2e0
[   19.496680]  kunit_try_run_case+0x170/0x3f0
[   19.496722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.496770]  kthread+0x328/0x630
[   19.496804]  ret_from_fork+0x10/0x20
[   19.496841] 
[   19.496876] The buggy address belongs to the object at fff00000c7692100
[   19.496876]  which belongs to the cache kmalloc-64 of size 64
[   19.496937] The buggy address is located 0 bytes to the right of
[   19.496937]  allocated 48-byte region [fff00000c7692100, fff00000c7692130)
[   19.497720] 
[   19.497746] The buggy address belongs to the physical page:
[   19.497789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692
[   19.498313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.498756] page_type: f5(slab)
[   19.498812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.498865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.499379] page dumped because: kasan: bad access detected
[   19.499472] 
[   19.499492] Memory state around the buggy address:
[   19.499562]  fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499609]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499706] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.500068]                                      ^
[   19.500111]  fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500900]  fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500995] ==================================================================

[   15.340379] ==================================================================
[   15.340778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.341220] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.341487] 
[   15.341653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.341696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.341720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.341740] Call Trace:
[   15.341755]  <TASK>
[   15.341771]  dump_stack_lvl+0x73/0xb0
[   15.341800]  print_report+0xd1/0x650
[   15.341857]  ? __virt_addr_valid+0x1db/0x2d0
[   15.341881]  ? kasan_atomics_helper+0x992/0x5450
[   15.341904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.341939]  ? kasan_atomics_helper+0x992/0x5450
[   15.341962]  kasan_report+0x141/0x180
[   15.341985]  ? kasan_atomics_helper+0x992/0x5450
[   15.342012]  kasan_check_range+0x10c/0x1c0
[   15.342037]  __kasan_check_write+0x18/0x20
[   15.342058]  kasan_atomics_helper+0x992/0x5450
[   15.342082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.342171]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.342198]  ? kasan_atomics+0x152/0x310
[   15.342261]  kasan_atomics+0x1dc/0x310
[   15.342308]  ? __pfx_kasan_atomics+0x10/0x10
[   15.342332]  ? trace_hardirqs_on+0x37/0xe0
[   15.342356]  ? __pfx_read_tsc+0x10/0x10
[   15.342377]  ? ktime_get_ts64+0x86/0x230
[   15.342402]  kunit_try_run_case+0x1a5/0x480
[   15.342427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342454]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.342481]  ? __kthread_parkme+0x82/0x180
[   15.342503]  ? preempt_count_sub+0x50/0x80
[   15.342528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.342580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.342607]  kthread+0x337/0x6f0
[   15.342627]  ? trace_preempt_on+0x20/0xc0
[   15.342651]  ? __pfx_kthread+0x10/0x10
[   15.342673]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.342695]  ? calculate_sigpending+0x7b/0xa0
[   15.342730]  ? __pfx_kthread+0x10/0x10
[   15.342752]  ret_from_fork+0x116/0x1d0
[   15.342772]  ? __pfx_kthread+0x10/0x10
[   15.342794]  ret_from_fork_asm+0x1a/0x30
[   15.342827]  </TASK>
[   15.342837] 
[   15.351639] Allocated by task 282:
[   15.351826]  kasan_save_stack+0x45/0x70
[   15.352032]  kasan_save_track+0x18/0x40
[   15.352218]  kasan_save_alloc_info+0x3b/0x50
[   15.352591]  __kasan_kmalloc+0xb7/0xc0
[   15.352741]  __kmalloc_cache_noprof+0x189/0x420
[   15.352990]  kasan_atomics+0x95/0x310
[   15.353424]  kunit_try_run_case+0x1a5/0x480
[   15.353587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.353800]  kthread+0x337/0x6f0
[   15.354010]  ret_from_fork+0x116/0x1d0
[   15.354385]  ret_from_fork_asm+0x1a/0x30
[   15.354649] 
[   15.354757] The buggy address belongs to the object at ffff8881038e3c00
[   15.354757]  which belongs to the cache kmalloc-64 of size 64
[   15.355394] The buggy address is located 0 bytes to the right of
[   15.355394]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.355886] 
[   15.355986] The buggy address belongs to the physical page:
[   15.356465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.356743] flags: 0x200000000000000(node=0|zone=2)
[   15.357029] page_type: f5(slab)
[   15.357198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.357648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.357978] page dumped because: kasan: bad access detected
[   15.358286] 
[   15.358385] Memory state around the buggy address:
[   15.358657]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358985]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359328] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.359793]                                      ^
[   15.360000]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360376]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360649] ==================================================================
[   15.629640] ==================================================================
[   15.630312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.631102] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.631654] 
[   15.632048] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.632097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.632110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.632132] Call Trace:
[   15.632150]  <TASK>
[   15.632168]  dump_stack_lvl+0x73/0xb0
[   15.632200]  print_report+0xd1/0x650
[   15.632223]  ? __virt_addr_valid+0x1db/0x2d0
[   15.632248]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.632272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.632296]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.632325]  kasan_report+0x141/0x180
[   15.632347]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.632375]  __asan_report_load4_noabort+0x18/0x20
[   15.632401]  kasan_atomics_helper+0x4a36/0x5450
[   15.632425]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.632449]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.632476]  ? kasan_atomics+0x152/0x310
[   15.632504]  kasan_atomics+0x1dc/0x310
[   15.632527]  ? __pfx_kasan_atomics+0x10/0x10
[   15.632551]  ? trace_hardirqs_on+0x37/0xe0
[   15.632576]  ? __pfx_read_tsc+0x10/0x10
[   15.632598]  ? ktime_get_ts64+0x86/0x230
[   15.632624]  kunit_try_run_case+0x1a5/0x480
[   15.632650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.632676]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.632717]  ? __kthread_parkme+0x82/0x180
[   15.632748]  ? preempt_count_sub+0x50/0x80
[   15.632774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.632824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.632851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.632878]  kthread+0x337/0x6f0
[   15.632898]  ? trace_preempt_on+0x20/0xc0
[   15.632921]  ? __pfx_kthread+0x10/0x10
[   15.632943]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.632965]  ? calculate_sigpending+0x7b/0xa0
[   15.632990]  ? __pfx_kthread+0x10/0x10
[   15.633013]  ret_from_fork+0x116/0x1d0
[   15.633040]  ? __pfx_kthread+0x10/0x10
[   15.633073]  ret_from_fork_asm+0x1a/0x30
[   15.633106]  </TASK>
[   15.633117] 
[   15.647101] Allocated by task 282:
[   15.647379]  kasan_save_stack+0x45/0x70
[   15.647772]  kasan_save_track+0x18/0x40
[   15.648071]  kasan_save_alloc_info+0x3b/0x50
[   15.648293]  __kasan_kmalloc+0xb7/0xc0
[   15.648479]  __kmalloc_cache_noprof+0x189/0x420
[   15.648637]  kasan_atomics+0x95/0x310
[   15.648783]  kunit_try_run_case+0x1a5/0x480
[   15.648931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.649126]  kthread+0x337/0x6f0
[   15.649248]  ret_from_fork+0x116/0x1d0
[   15.649390]  ret_from_fork_asm+0x1a/0x30
[   15.649584] 
[   15.649687] The buggy address belongs to the object at ffff8881038e3c00
[   15.649687]  which belongs to the cache kmalloc-64 of size 64
[   15.650804] The buggy address is located 0 bytes to the right of
[   15.650804]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.651401] 
[   15.651476] The buggy address belongs to the physical page:
[   15.651650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.652212] flags: 0x200000000000000(node=0|zone=2)
[   15.652714] page_type: f5(slab)
[   15.653074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.654020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.654796] page dumped because: kasan: bad access detected
[   15.655345] 
[   15.655504] Memory state around the buggy address:
[   15.656024]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.656734]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.657182] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.657399]                                      ^
[   15.657553]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.657790]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.658134] ==================================================================
[   15.600110] ==================================================================
[   15.600639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.601042] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.601670] 
[   15.601783] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.601828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.601840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.601868] Call Trace:
[   15.601884]  <TASK>
[   15.601899]  dump_stack_lvl+0x73/0xb0
[   15.601928]  print_report+0xd1/0x650
[   15.601951]  ? __virt_addr_valid+0x1db/0x2d0
[   15.601975]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.601997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.602022]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.602073]  kasan_report+0x141/0x180
[   15.602106]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.602133]  kasan_check_range+0x10c/0x1c0
[   15.602158]  __kasan_check_write+0x18/0x20
[   15.602179]  kasan_atomics_helper+0xfa9/0x5450
[   15.602213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.602238]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.602264]  ? kasan_atomics+0x152/0x310
[   15.602292]  kasan_atomics+0x1dc/0x310
[   15.602315]  ? __pfx_kasan_atomics+0x10/0x10
[   15.602339]  ? trace_hardirqs_on+0x37/0xe0
[   15.602364]  ? __pfx_read_tsc+0x10/0x10
[   15.602385]  ? ktime_get_ts64+0x86/0x230
[   15.602410]  kunit_try_run_case+0x1a5/0x480
[   15.602435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602461]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.602488]  ? __kthread_parkme+0x82/0x180
[   15.602509]  ? preempt_count_sub+0x50/0x80
[   15.602533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.602585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.602611]  kthread+0x337/0x6f0
[   15.602632]  ? trace_preempt_on+0x20/0xc0
[   15.602655]  ? __pfx_kthread+0x10/0x10
[   15.602677]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.602699]  ? calculate_sigpending+0x7b/0xa0
[   15.602735]  ? __pfx_kthread+0x10/0x10
[   15.602758]  ret_from_fork+0x116/0x1d0
[   15.602778]  ? __pfx_kthread+0x10/0x10
[   15.602800]  ret_from_fork_asm+0x1a/0x30
[   15.602832]  </TASK>
[   15.602843] 
[   15.615477] Allocated by task 282:
[   15.615811]  kasan_save_stack+0x45/0x70
[   15.616185]  kasan_save_track+0x18/0x40
[   15.616691]  kasan_save_alloc_info+0x3b/0x50
[   15.616933]  __kasan_kmalloc+0xb7/0xc0
[   15.617200]  __kmalloc_cache_noprof+0x189/0x420
[   15.617635]  kasan_atomics+0x95/0x310
[   15.617991]  kunit_try_run_case+0x1a5/0x480
[   15.618354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.618542]  kthread+0x337/0x6f0
[   15.618665]  ret_from_fork+0x116/0x1d0
[   15.618815]  ret_from_fork_asm+0x1a/0x30
[   15.618958] 
[   15.619088] The buggy address belongs to the object at ffff8881038e3c00
[   15.619088]  which belongs to the cache kmalloc-64 of size 64
[   15.620287] The buggy address is located 0 bytes to the right of
[   15.620287]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.621461] 
[   15.621693] The buggy address belongs to the physical page:
[   15.622267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.623173] flags: 0x200000000000000(node=0|zone=2)
[   15.623606] page_type: f5(slab)
[   15.623921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.624529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.624963] page dumped because: kasan: bad access detected
[   15.625468] 
[   15.625640] Memory state around the buggy address:
[   15.626201]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.626503]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.626735] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.626948]                                      ^
[   15.627437]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.628113]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.628789] ==================================================================
[   15.795105] ==================================================================
[   15.795757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.796169] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.796557] 
[   15.796674] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.796726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.796739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.796760] Call Trace:
[   15.796774]  <TASK>
[   15.796790]  dump_stack_lvl+0x73/0xb0
[   15.796821]  print_report+0xd1/0x650
[   15.796843]  ? __virt_addr_valid+0x1db/0x2d0
[   15.796866]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.796889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.796913]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.796936]  kasan_report+0x141/0x180
[   15.796958]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.796988]  kasan_check_range+0x10c/0x1c0
[   15.797015]  __kasan_check_write+0x18/0x20
[   15.797035]  kasan_atomics_helper+0x12e6/0x5450
[   15.797282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.797307]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.797334]  ? kasan_atomics+0x152/0x310
[   15.797361]  kasan_atomics+0x1dc/0x310
[   15.797385]  ? __pfx_kasan_atomics+0x10/0x10
[   15.797408]  ? trace_hardirqs_on+0x37/0xe0
[   15.797433]  ? __pfx_read_tsc+0x10/0x10
[   15.797454]  ? ktime_get_ts64+0x86/0x230
[   15.797479]  kunit_try_run_case+0x1a5/0x480
[   15.797504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.797530]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.797557]  ? __kthread_parkme+0x82/0x180
[   15.797579]  ? preempt_count_sub+0x50/0x80
[   15.797605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.797631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.797657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.797684]  kthread+0x337/0x6f0
[   15.797715]  ? trace_preempt_on+0x20/0xc0
[   15.797739]  ? __pfx_kthread+0x10/0x10
[   15.797760]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.797783]  ? calculate_sigpending+0x7b/0xa0
[   15.797808]  ? __pfx_kthread+0x10/0x10
[   15.797831]  ret_from_fork+0x116/0x1d0
[   15.797850]  ? __pfx_kthread+0x10/0x10
[   15.797872]  ret_from_fork_asm+0x1a/0x30
[   15.797904]  </TASK>
[   15.797915] 
[   15.808426] Allocated by task 282:
[   15.808592]  kasan_save_stack+0x45/0x70
[   15.808933]  kasan_save_track+0x18/0x40
[   15.809257]  kasan_save_alloc_info+0x3b/0x50
[   15.809557]  __kasan_kmalloc+0xb7/0xc0
[   15.809845]  __kmalloc_cache_noprof+0x189/0x420
[   15.810193]  kasan_atomics+0x95/0x310
[   15.810391]  kunit_try_run_case+0x1a5/0x480
[   15.810590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.810849]  kthread+0x337/0x6f0
[   15.811011]  ret_from_fork+0x116/0x1d0
[   15.811447]  ret_from_fork_asm+0x1a/0x30
[   15.811769] 
[   15.811864] The buggy address belongs to the object at ffff8881038e3c00
[   15.811864]  which belongs to the cache kmalloc-64 of size 64
[   15.812664] The buggy address is located 0 bytes to the right of
[   15.812664]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.813344] 
[   15.813465] The buggy address belongs to the physical page:
[   15.813857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.814300] flags: 0x200000000000000(node=0|zone=2)
[   15.814589] page_type: f5(slab)
[   15.814781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.815289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.815627] page dumped because: kasan: bad access detected
[   15.815883] 
[   15.815971] Memory state around the buggy address:
[   15.816421]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.816824]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.817293] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.817715]                                      ^
[   15.818032]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.818472]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.818794] ==================================================================
[   15.181162] ==================================================================
[   15.181401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.181636] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.181972] 
[   15.182061] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.182105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.182118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.182140] Call Trace:
[   15.182155]  <TASK>
[   15.182170]  dump_stack_lvl+0x73/0xb0
[   15.182199]  print_report+0xd1/0x650
[   15.182221]  ? __virt_addr_valid+0x1db/0x2d0
[   15.182243]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.182265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.182288]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.182309]  kasan_report+0x141/0x180
[   15.182331]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.182357]  __asan_report_store4_noabort+0x1b/0x30
[   15.182383]  kasan_atomics_helper+0x4b3a/0x5450
[   15.182407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.182429]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.182455]  ? kasan_atomics+0x152/0x310
[   15.182482]  kasan_atomics+0x1dc/0x310
[   15.183054]  ? __pfx_kasan_atomics+0x10/0x10
[   15.183095]  ? trace_hardirqs_on+0x37/0xe0
[   15.183121]  ? __pfx_read_tsc+0x10/0x10
[   15.183145]  ? ktime_get_ts64+0x86/0x230
[   15.183169]  kunit_try_run_case+0x1a5/0x480
[   15.183195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183220]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.183247]  ? __kthread_parkme+0x82/0x180
[   15.183269]  ? preempt_count_sub+0x50/0x80
[   15.183294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.183743]  kthread+0x337/0x6f0
[   15.183763]  ? trace_preempt_on+0x20/0xc0
[   15.183799]  ? __pfx_kthread+0x10/0x10
[   15.183821]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.183844]  ? calculate_sigpending+0x7b/0xa0
[   15.183871]  ? __pfx_kthread+0x10/0x10
[   15.183903]  ret_from_fork+0x116/0x1d0
[   15.183924]  ? __pfx_kthread+0x10/0x10
[   15.183947]  ret_from_fork_asm+0x1a/0x30
[   15.183991]  </TASK>
[   15.184002] 
[   15.194917] Allocated by task 282:
[   15.195363]  kasan_save_stack+0x45/0x70
[   15.195777]  kasan_save_track+0x18/0x40
[   15.195953]  kasan_save_alloc_info+0x3b/0x50
[   15.196532]  __kasan_kmalloc+0xb7/0xc0
[   15.196741]  __kmalloc_cache_noprof+0x189/0x420
[   15.196929]  kasan_atomics+0x95/0x310
[   15.197290]  kunit_try_run_case+0x1a5/0x480
[   15.197464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.197732]  kthread+0x337/0x6f0
[   15.197873]  ret_from_fork+0x116/0x1d0
[   15.198136]  ret_from_fork_asm+0x1a/0x30
[   15.198295] 
[   15.198369] The buggy address belongs to the object at ffff8881038e3c00
[   15.198369]  which belongs to the cache kmalloc-64 of size 64
[   15.198894] The buggy address is located 0 bytes to the right of
[   15.198894]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.199516] 
[   15.199637] The buggy address belongs to the physical page:
[   15.199890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.200170] flags: 0x200000000000000(node=0|zone=2)
[   15.200336] page_type: f5(slab)
[   15.200505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.200867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.201174] page dumped because: kasan: bad access detected
[   15.201622] 
[   15.201747] Memory state around the buggy address:
[   15.201971]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.202290]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.202598] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.202932]                                      ^
[   15.203087]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.203487]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.203757] ==================================================================
[   15.658565] ==================================================================
[   15.658905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.659426] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.659685] 
[   15.659812] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.659857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.659870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.659891] Call Trace:
[   15.659906]  <TASK>
[   15.659923]  dump_stack_lvl+0x73/0xb0
[   15.659952]  print_report+0xd1/0x650
[   15.659974]  ? __virt_addr_valid+0x1db/0x2d0
[   15.659998]  ? kasan_atomics_helper+0x1079/0x5450
[   15.660020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.660055]  ? kasan_atomics_helper+0x1079/0x5450
[   15.660079]  kasan_report+0x141/0x180
[   15.660111]  ? kasan_atomics_helper+0x1079/0x5450
[   15.660139]  kasan_check_range+0x10c/0x1c0
[   15.660163]  __kasan_check_write+0x18/0x20
[   15.660184]  kasan_atomics_helper+0x1079/0x5450
[   15.660208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.660232]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.660257]  ? kasan_atomics+0x152/0x310
[   15.660285]  kasan_atomics+0x1dc/0x310
[   15.660309]  ? __pfx_kasan_atomics+0x10/0x10
[   15.660336]  ? trace_hardirqs_on+0x37/0xe0
[   15.660362]  ? __pfx_read_tsc+0x10/0x10
[   15.660384]  ? ktime_get_ts64+0x86/0x230
[   15.660410]  kunit_try_run_case+0x1a5/0x480
[   15.660436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660462]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.660489]  ? __kthread_parkme+0x82/0x180
[   15.660510]  ? preempt_count_sub+0x50/0x80
[   15.660543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.660604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.660630]  kthread+0x337/0x6f0
[   15.660650]  ? trace_preempt_on+0x20/0xc0
[   15.660673]  ? __pfx_kthread+0x10/0x10
[   15.660695]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.660729]  ? calculate_sigpending+0x7b/0xa0
[   15.660755]  ? __pfx_kthread+0x10/0x10
[   15.660778]  ret_from_fork+0x116/0x1d0
[   15.660797]  ? __pfx_kthread+0x10/0x10
[   15.660818]  ret_from_fork_asm+0x1a/0x30
[   15.660852]  </TASK>
[   15.660863] 
[   15.669113] Allocated by task 282:
[   15.669244]  kasan_save_stack+0x45/0x70
[   15.669390]  kasan_save_track+0x18/0x40
[   15.669594]  kasan_save_alloc_info+0x3b/0x50
[   15.669820]  __kasan_kmalloc+0xb7/0xc0
[   15.670020]  __kmalloc_cache_noprof+0x189/0x420
[   15.670242]  kasan_atomics+0x95/0x310
[   15.670442]  kunit_try_run_case+0x1a5/0x480
[   15.670687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.670987]  kthread+0x337/0x6f0
[   15.671295]  ret_from_fork+0x116/0x1d0
[   15.671442]  ret_from_fork_asm+0x1a/0x30
[   15.671681] 
[   15.671762] The buggy address belongs to the object at ffff8881038e3c00
[   15.671762]  which belongs to the cache kmalloc-64 of size 64
[   15.672113] The buggy address is located 0 bytes to the right of
[   15.672113]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.672857] 
[   15.673057] The buggy address belongs to the physical page:
[   15.673380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.673740] flags: 0x200000000000000(node=0|zone=2)
[   15.673902] page_type: f5(slab)
[   15.674023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.674251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.674472] page dumped because: kasan: bad access detected
[   15.674719] 
[   15.674854] Memory state around the buggy address:
[   15.675316]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.675643]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.675905] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.676373]                                      ^
[   15.676614]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.676917]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.677360] ==================================================================
[   14.990700] ==================================================================
[   14.991636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.992163] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   14.992751] 
[   14.992866] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.992912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.992924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.992945] Call Trace:
[   14.992958]  <TASK>
[   14.992974]  dump_stack_lvl+0x73/0xb0
[   14.993005]  print_report+0xd1/0x650
[   14.993186]  ? __virt_addr_valid+0x1db/0x2d0
[   14.993214]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.993237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.993260]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.993282]  kasan_report+0x141/0x180
[   14.993305]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.993331]  __asan_report_load4_noabort+0x18/0x20
[   14.993357]  kasan_atomics_helper+0x4bbc/0x5450
[   14.993379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.993402]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.993428]  ? kasan_atomics+0x152/0x310
[   14.993455]  kasan_atomics+0x1dc/0x310
[   14.993478]  ? __pfx_kasan_atomics+0x10/0x10
[   14.993501]  ? trace_hardirqs_on+0x37/0xe0
[   14.993526]  ? __pfx_read_tsc+0x10/0x10
[   14.993547]  ? ktime_get_ts64+0x86/0x230
[   14.993571]  kunit_try_run_case+0x1a5/0x480
[   14.993595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993621]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.993647]  ? __kthread_parkme+0x82/0x180
[   14.993668]  ? preempt_count_sub+0x50/0x80
[   14.993691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.993756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.993782]  kthread+0x337/0x6f0
[   14.993801]  ? trace_preempt_on+0x20/0xc0
[   14.993824]  ? __pfx_kthread+0x10/0x10
[   14.993844]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.993866]  ? calculate_sigpending+0x7b/0xa0
[   14.993890]  ? __pfx_kthread+0x10/0x10
[   14.993913]  ret_from_fork+0x116/0x1d0
[   14.993932]  ? __pfx_kthread+0x10/0x10
[   14.993953]  ret_from_fork_asm+0x1a/0x30
[   14.993985]  </TASK>
[   14.993995] 
[   15.006206] Allocated by task 282:
[   15.006367]  kasan_save_stack+0x45/0x70
[   15.006567]  kasan_save_track+0x18/0x40
[   15.006960]  kasan_save_alloc_info+0x3b/0x50
[   15.007212]  __kasan_kmalloc+0xb7/0xc0
[   15.007571]  __kmalloc_cache_noprof+0x189/0x420
[   15.007899]  kasan_atomics+0x95/0x310
[   15.008353]  kunit_try_run_case+0x1a5/0x480
[   15.008540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.008932]  kthread+0x337/0x6f0
[   15.009285]  ret_from_fork+0x116/0x1d0
[   15.009553]  ret_from_fork_asm+0x1a/0x30
[   15.009777] 
[   15.009870] The buggy address belongs to the object at ffff8881038e3c00
[   15.009870]  which belongs to the cache kmalloc-64 of size 64
[   15.010776] The buggy address is located 0 bytes to the right of
[   15.010776]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.011587] 
[   15.011695] The buggy address belongs to the physical page:
[   15.012184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.012668] flags: 0x200000000000000(node=0|zone=2)
[   15.012986] page_type: f5(slab)
[   15.013437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.013802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.014423] page dumped because: kasan: bad access detected
[   15.014675] 
[   15.014783] Memory state around the buggy address:
[   15.015030]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.015427]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.015747] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.016437]                                      ^
[   15.016666]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017159]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017527] ==================================================================
[   15.819831] ==================================================================
[   15.820181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.820627] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.821162] 
[   15.821289] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.821333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.821429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.821450] Call Trace:
[   15.821466]  <TASK>
[   15.821480]  dump_stack_lvl+0x73/0xb0
[   15.821512]  print_report+0xd1/0x650
[   15.821535]  ? __virt_addr_valid+0x1db/0x2d0
[   15.821558]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.821581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.821605]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.821628]  kasan_report+0x141/0x180
[   15.821650]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.821678]  __asan_report_load4_noabort+0x18/0x20
[   15.821716]  kasan_atomics_helper+0x49ce/0x5450
[   15.821740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.821764]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.821790]  ? kasan_atomics+0x152/0x310
[   15.821817]  kasan_atomics+0x1dc/0x310
[   15.821841]  ? __pfx_kasan_atomics+0x10/0x10
[   15.821864]  ? trace_hardirqs_on+0x37/0xe0
[   15.821889]  ? __pfx_read_tsc+0x10/0x10
[   15.821911]  ? ktime_get_ts64+0x86/0x230
[   15.821936]  kunit_try_run_case+0x1a5/0x480
[   15.821960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821986]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.822013]  ? __kthread_parkme+0x82/0x180
[   15.822033]  ? preempt_count_sub+0x50/0x80
[   15.822071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.822097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.822148]  kthread+0x337/0x6f0
[   15.822170]  ? trace_preempt_on+0x20/0xc0
[   15.822192]  ? __pfx_kthread+0x10/0x10
[   15.822214]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.822237]  ? calculate_sigpending+0x7b/0xa0
[   15.822262]  ? __pfx_kthread+0x10/0x10
[   15.822284]  ret_from_fork+0x116/0x1d0
[   15.822303]  ? __pfx_kthread+0x10/0x10
[   15.822325]  ret_from_fork_asm+0x1a/0x30
[   15.822359]  </TASK>
[   15.822371] 
[   15.832287] Allocated by task 282:
[   15.832451]  kasan_save_stack+0x45/0x70
[   15.832644]  kasan_save_track+0x18/0x40
[   15.832823]  kasan_save_alloc_info+0x3b/0x50
[   15.833343]  __kasan_kmalloc+0xb7/0xc0
[   15.833533]  __kmalloc_cache_noprof+0x189/0x420
[   15.833724]  kasan_atomics+0x95/0x310
[   15.834060]  kunit_try_run_case+0x1a5/0x480
[   15.834378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.834731]  kthread+0x337/0x6f0
[   15.834862]  ret_from_fork+0x116/0x1d0
[   15.835322]  ret_from_fork_asm+0x1a/0x30
[   15.835667] 
[   15.835767] The buggy address belongs to the object at ffff8881038e3c00
[   15.835767]  which belongs to the cache kmalloc-64 of size 64
[   15.836486] The buggy address is located 0 bytes to the right of
[   15.836486]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.837008] 
[   15.837187] The buggy address belongs to the physical page:
[   15.837566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.837933] flags: 0x200000000000000(node=0|zone=2)
[   15.838310] page_type: f5(slab)
[   15.838584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.838928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.839479] page dumped because: kasan: bad access detected
[   15.839816] 
[   15.839917] Memory state around the buggy address:
[   15.840296]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840640]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840949] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.841461]                                      ^
[   15.841783]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842219]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842616] ==================================================================
[   15.921044] ==================================================================
[   15.921358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.921675] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.921989] 
[   15.922100] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.922141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.922154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.922174] Call Trace:
[   15.922189]  <TASK>
[   15.922204]  dump_stack_lvl+0x73/0xb0
[   15.922233]  print_report+0xd1/0x650
[   15.922255]  ? __virt_addr_valid+0x1db/0x2d0
[   15.922279]  ? kasan_atomics_helper+0x151d/0x5450
[   15.922301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.922326]  ? kasan_atomics_helper+0x151d/0x5450
[   15.922350]  kasan_report+0x141/0x180
[   15.922372]  ? kasan_atomics_helper+0x151d/0x5450
[   15.922400]  kasan_check_range+0x10c/0x1c0
[   15.922425]  __kasan_check_write+0x18/0x20
[   15.922445]  kasan_atomics_helper+0x151d/0x5450
[   15.922470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.922494]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.922520]  ? kasan_atomics+0x152/0x310
[   15.922547]  kasan_atomics+0x1dc/0x310
[   15.922571]  ? __pfx_kasan_atomics+0x10/0x10
[   15.922594]  ? trace_hardirqs_on+0x37/0xe0
[   15.922619]  ? __pfx_read_tsc+0x10/0x10
[   15.922641]  ? ktime_get_ts64+0x86/0x230
[   15.922667]  kunit_try_run_case+0x1a5/0x480
[   15.922692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922729]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.922756]  ? __kthread_parkme+0x82/0x180
[   15.922778]  ? preempt_count_sub+0x50/0x80
[   15.922803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.922856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.922883]  kthread+0x337/0x6f0
[   15.922902]  ? trace_preempt_on+0x20/0xc0
[   15.922926]  ? __pfx_kthread+0x10/0x10
[   15.922948]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.922971]  ? calculate_sigpending+0x7b/0xa0
[   15.922996]  ? __pfx_kthread+0x10/0x10
[   15.923019]  ret_from_fork+0x116/0x1d0
[   15.923057]  ? __pfx_kthread+0x10/0x10
[   15.923078]  ret_from_fork_asm+0x1a/0x30
[   15.923110]  </TASK>
[   15.923121] 
[   15.930243] Allocated by task 282:
[   15.930366]  kasan_save_stack+0x45/0x70
[   15.930506]  kasan_save_track+0x18/0x40
[   15.930637]  kasan_save_alloc_info+0x3b/0x50
[   15.932153]  __kasan_kmalloc+0xb7/0xc0
[   15.932813]  __kmalloc_cache_noprof+0x189/0x420
[   15.933618]  kasan_atomics+0x95/0x310
[   15.934275]  kunit_try_run_case+0x1a5/0x480
[   15.935083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.935751]  kthread+0x337/0x6f0
[   15.936399]  ret_from_fork+0x116/0x1d0
[   15.936923]  ret_from_fork_asm+0x1a/0x30
[   15.937567] 
[   15.938008] The buggy address belongs to the object at ffff8881038e3c00
[   15.938008]  which belongs to the cache kmalloc-64 of size 64
[   15.939285] The buggy address is located 0 bytes to the right of
[   15.939285]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.940545] 
[   15.940631] The buggy address belongs to the physical page:
[   15.940818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.941324] flags: 0x200000000000000(node=0|zone=2)
[   15.942019] page_type: f5(slab)
[   15.942490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.943391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.944283] page dumped because: kasan: bad access detected
[   15.944474] 
[   15.944546] Memory state around the buggy address:
[   15.944713]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.944931]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.945788] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.946618]                                      ^
[   15.947301]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.948148]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.948976] ==================================================================
[   16.056826] ==================================================================
[   16.057176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.057476] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.057805] 
[   16.057889] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.057950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.057962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.057983] Call Trace:
[   16.057996]  <TASK>
[   16.058010]  dump_stack_lvl+0x73/0xb0
[   16.058037]  print_report+0xd1/0x650
[   16.058062]  ? __virt_addr_valid+0x1db/0x2d0
[   16.058084]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.058108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.058132]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.058155]  kasan_report+0x141/0x180
[   16.058178]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.058205]  kasan_check_range+0x10c/0x1c0
[   16.058230]  __kasan_check_write+0x18/0x20
[   16.058251]  kasan_atomics_helper+0x18b1/0x5450
[   16.058274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.058298]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.058324]  ? kasan_atomics+0x152/0x310
[   16.058352]  kasan_atomics+0x1dc/0x310
[   16.058375]  ? __pfx_kasan_atomics+0x10/0x10
[   16.058398]  ? trace_hardirqs_on+0x37/0xe0
[   16.058422]  ? __pfx_read_tsc+0x10/0x10
[   16.058444]  ? ktime_get_ts64+0x86/0x230
[   16.058468]  kunit_try_run_case+0x1a5/0x480
[   16.058493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.058537]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.058563]  ? __kthread_parkme+0x82/0x180
[   16.058585]  ? preempt_count_sub+0x50/0x80
[   16.058609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.058635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.058661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.058688]  kthread+0x337/0x6f0
[   16.058717]  ? trace_preempt_on+0x20/0xc0
[   16.058740]  ? __pfx_kthread+0x10/0x10
[   16.058762]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.058785]  ? calculate_sigpending+0x7b/0xa0
[   16.058809]  ? __pfx_kthread+0x10/0x10
[   16.058832]  ret_from_fork+0x116/0x1d0
[   16.058852]  ? __pfx_kthread+0x10/0x10
[   16.058873]  ret_from_fork_asm+0x1a/0x30
[   16.058906]  </TASK>
[   16.058917] 
[   16.066478] Allocated by task 282:
[   16.066674]  kasan_save_stack+0x45/0x70
[   16.066879]  kasan_save_track+0x18/0x40
[   16.067088]  kasan_save_alloc_info+0x3b/0x50
[   16.067280]  __kasan_kmalloc+0xb7/0xc0
[   16.067466]  __kmalloc_cache_noprof+0x189/0x420
[   16.067622]  kasan_atomics+0x95/0x310
[   16.067810]  kunit_try_run_case+0x1a5/0x480
[   16.068015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.068265]  kthread+0x337/0x6f0
[   16.068429]  ret_from_fork+0x116/0x1d0
[   16.068579]  ret_from_fork_asm+0x1a/0x30
[   16.068786] 
[   16.068876] The buggy address belongs to the object at ffff8881038e3c00
[   16.068876]  which belongs to the cache kmalloc-64 of size 64
[   16.069225] The buggy address is located 0 bytes to the right of
[   16.069225]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.069906] 
[   16.070026] The buggy address belongs to the physical page:
[   16.070314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.070680] flags: 0x200000000000000(node=0|zone=2)
[   16.070934] page_type: f5(slab)
[   16.071128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.071355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.071574] page dumped because: kasan: bad access detected
[   16.071768] 
[   16.071861] Memory state around the buggy address:
[   16.072085]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.072411]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.072743] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.073150]                                      ^
[   16.073300]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.073629]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.073893] ==================================================================
[   16.293667] ==================================================================
[   16.293978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.294566] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.294905] 
[   16.295097] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.295137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.295149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.295170] Call Trace:
[   16.295185]  <TASK>
[   16.295201]  dump_stack_lvl+0x73/0xb0
[   16.295230]  print_report+0xd1/0x650
[   16.295253]  ? __virt_addr_valid+0x1db/0x2d0
[   16.295276]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.295299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.295324]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.295347]  kasan_report+0x141/0x180
[   16.295370]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.295398]  __asan_report_load8_noabort+0x18/0x20
[   16.295424]  kasan_atomics_helper+0x4f71/0x5450
[   16.295470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.295495]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.295521]  ? kasan_atomics+0x152/0x310
[   16.295549]  kasan_atomics+0x1dc/0x310
[   16.295573]  ? __pfx_kasan_atomics+0x10/0x10
[   16.295596]  ? trace_hardirqs_on+0x37/0xe0
[   16.295621]  ? __pfx_read_tsc+0x10/0x10
[   16.295642]  ? ktime_get_ts64+0x86/0x230
[   16.295667]  kunit_try_run_case+0x1a5/0x480
[   16.295693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.295730]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.295757]  ? __kthread_parkme+0x82/0x180
[   16.295779]  ? preempt_count_sub+0x50/0x80
[   16.295804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.295830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.295856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.295883]  kthread+0x337/0x6f0
[   16.295903]  ? trace_preempt_on+0x20/0xc0
[   16.295926]  ? __pfx_kthread+0x10/0x10
[   16.295948]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.295971]  ? calculate_sigpending+0x7b/0xa0
[   16.295996]  ? __pfx_kthread+0x10/0x10
[   16.296018]  ret_from_fork+0x116/0x1d0
[   16.296038]  ? __pfx_kthread+0x10/0x10
[   16.296069]  ret_from_fork_asm+0x1a/0x30
[   16.296101]  </TASK>
[   16.296112] 
[   16.303388] Allocated by task 282:
[   16.303602]  kasan_save_stack+0x45/0x70
[   16.303812]  kasan_save_track+0x18/0x40
[   16.303951]  kasan_save_alloc_info+0x3b/0x50
[   16.304642]  __kasan_kmalloc+0xb7/0xc0
[   16.305348]  __kmalloc_cache_noprof+0x189/0x420
[   16.305621]  kasan_atomics+0x95/0x310
[   16.305771]  kunit_try_run_case+0x1a5/0x480
[   16.305920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.306558]  kthread+0x337/0x6f0
[   16.306816]  ret_from_fork+0x116/0x1d0
[   16.307142]  ret_from_fork_asm+0x1a/0x30
[   16.307510] 
[   16.307606] The buggy address belongs to the object at ffff8881038e3c00
[   16.307606]  which belongs to the cache kmalloc-64 of size 64
[   16.308346] The buggy address is located 0 bytes to the right of
[   16.308346]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.308866] 
[   16.308959] The buggy address belongs to the physical page:
[   16.309491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.310138] flags: 0x200000000000000(node=0|zone=2)
[   16.310583] page_type: f5(slab)
[   16.310836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.311523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.311872] page dumped because: kasan: bad access detected
[   16.312284] 
[   16.312374] Memory state around the buggy address:
[   16.312820]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.313342]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.313635] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.313941]                                      ^
[   16.314367]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314864]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.315494] ==================================================================
[   16.468839] ==================================================================
[   16.469114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.469504] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.469849] 
[   16.469954] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.469994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.470006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.470027] Call Trace:
[   16.470041]  <TASK>
[   16.470057]  dump_stack_lvl+0x73/0xb0
[   16.470086]  print_report+0xd1/0x650
[   16.470108]  ? __virt_addr_valid+0x1db/0x2d0
[   16.470131]  ? kasan_atomics_helper+0x5115/0x5450
[   16.470154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.470179]  ? kasan_atomics_helper+0x5115/0x5450
[   16.470211]  kasan_report+0x141/0x180
[   16.470235]  ? kasan_atomics_helper+0x5115/0x5450
[   16.470263]  __asan_report_load8_noabort+0x18/0x20
[   16.470289]  kasan_atomics_helper+0x5115/0x5450
[   16.470313]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.470337]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.470364]  ? kasan_atomics+0x152/0x310
[   16.470391]  kasan_atomics+0x1dc/0x310
[   16.470415]  ? __pfx_kasan_atomics+0x10/0x10
[   16.470438]  ? trace_hardirqs_on+0x37/0xe0
[   16.470462]  ? __pfx_read_tsc+0x10/0x10
[   16.470484]  ? ktime_get_ts64+0x86/0x230
[   16.470510]  kunit_try_run_case+0x1a5/0x480
[   16.470535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.470561]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.470587]  ? __kthread_parkme+0x82/0x180
[   16.470609]  ? preempt_count_sub+0x50/0x80
[   16.470634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.470660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.470686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.470723]  kthread+0x337/0x6f0
[   16.470743]  ? trace_preempt_on+0x20/0xc0
[   16.470768]  ? __pfx_kthread+0x10/0x10
[   16.470790]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.470813]  ? calculate_sigpending+0x7b/0xa0
[   16.470838]  ? __pfx_kthread+0x10/0x10
[   16.470860]  ret_from_fork+0x116/0x1d0
[   16.470879]  ? __pfx_kthread+0x10/0x10
[   16.470900]  ret_from_fork_asm+0x1a/0x30
[   16.470933]  </TASK>
[   16.470944] 
[   16.478240] Allocated by task 282:
[   16.478412]  kasan_save_stack+0x45/0x70
[   16.478587]  kasan_save_track+0x18/0x40
[   16.478785]  kasan_save_alloc_info+0x3b/0x50
[   16.478972]  __kasan_kmalloc+0xb7/0xc0
[   16.479207]  __kmalloc_cache_noprof+0x189/0x420
[   16.479405]  kasan_atomics+0x95/0x310
[   16.479595]  kunit_try_run_case+0x1a5/0x480
[   16.479770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.480006]  kthread+0x337/0x6f0
[   16.480247]  ret_from_fork+0x116/0x1d0
[   16.480437]  ret_from_fork_asm+0x1a/0x30
[   16.480599] 
[   16.480693] The buggy address belongs to the object at ffff8881038e3c00
[   16.480693]  which belongs to the cache kmalloc-64 of size 64
[   16.481201] The buggy address is located 0 bytes to the right of
[   16.481201]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.481672] 
[   16.481775] The buggy address belongs to the physical page:
[   16.482007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.482289] flags: 0x200000000000000(node=0|zone=2)
[   16.482520] page_type: f5(slab)
[   16.482640] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.482986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.483359] page dumped because: kasan: bad access detected
[   16.483584] 
[   16.483676] Memory state around the buggy address:
[   16.483844]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.484202]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.484498] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.484723]                                      ^
[   16.484879]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485094]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485307] ==================================================================
[   15.746308] ==================================================================
[   15.746549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.746831] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.748138] 
[   15.748249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.748460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.748498] Call Trace:
[   15.748513]  <TASK>
[   15.748529]  dump_stack_lvl+0x73/0xb0
[   15.748560]  print_report+0xd1/0x650
[   15.748582]  ? __virt_addr_valid+0x1db/0x2d0
[   15.748606]  ? kasan_atomics_helper+0x1217/0x5450
[   15.748628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.748654]  ? kasan_atomics_helper+0x1217/0x5450
[   15.748677]  kasan_report+0x141/0x180
[   15.748700]  ? kasan_atomics_helper+0x1217/0x5450
[   15.748742]  kasan_check_range+0x10c/0x1c0
[   15.748767]  __kasan_check_write+0x18/0x20
[   15.748787]  kasan_atomics_helper+0x1217/0x5450
[   15.748811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.748835]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.748861]  ? kasan_atomics+0x152/0x310
[   15.748890]  kasan_atomics+0x1dc/0x310
[   15.748914]  ? __pfx_kasan_atomics+0x10/0x10
[   15.748939]  ? trace_hardirqs_on+0x37/0xe0
[   15.748964]  ? __pfx_read_tsc+0x10/0x10
[   15.748986]  ? ktime_get_ts64+0x86/0x230
[   15.749010]  kunit_try_run_case+0x1a5/0x480
[   15.749035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749070]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.749097]  ? __kthread_parkme+0x82/0x180
[   15.749118]  ? preempt_count_sub+0x50/0x80
[   15.749144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.749223]  kthread+0x337/0x6f0
[   15.749242]  ? trace_preempt_on+0x20/0xc0
[   15.749265]  ? __pfx_kthread+0x10/0x10
[   15.749288]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.749310]  ? calculate_sigpending+0x7b/0xa0
[   15.749335]  ? __pfx_kthread+0x10/0x10
[   15.749358]  ret_from_fork+0x116/0x1d0
[   15.749378]  ? __pfx_kthread+0x10/0x10
[   15.749399]  ret_from_fork_asm+0x1a/0x30
[   15.749430]  </TASK>
[   15.749443] 
[   15.759440] Allocated by task 282:
[   15.759610]  kasan_save_stack+0x45/0x70
[   15.760346]  kasan_save_track+0x18/0x40
[   15.760513]  kasan_save_alloc_info+0x3b/0x50
[   15.760872]  __kasan_kmalloc+0xb7/0xc0
[   15.761238]  __kmalloc_cache_noprof+0x189/0x420
[   15.761582]  kasan_atomics+0x95/0x310
[   15.761748]  kunit_try_run_case+0x1a5/0x480
[   15.762135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.762459]  kthread+0x337/0x6f0
[   15.762734]  ret_from_fork+0x116/0x1d0
[   15.763066]  ret_from_fork_asm+0x1a/0x30
[   15.763260] 
[   15.763356] The buggy address belongs to the object at ffff8881038e3c00
[   15.763356]  which belongs to the cache kmalloc-64 of size 64
[   15.764176] The buggy address is located 0 bytes to the right of
[   15.764176]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.764909] 
[   15.765012] The buggy address belongs to the physical page:
[   15.765472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.765826] flags: 0x200000000000000(node=0|zone=2)
[   15.766152] page_type: f5(slab)
[   15.766325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.766821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.767290] page dumped because: kasan: bad access detected
[   15.767490] 
[   15.767731] Memory state around the buggy address:
[   15.768012]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.768460]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.768829] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.769238]                                      ^
[   15.769475]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.769793]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.770088] ==================================================================
[   16.257385] ==================================================================
[   16.257883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.258293] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.258581] 
[   16.258712] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.258753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.258766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.258788] Call Trace:
[   16.258803]  <TASK>
[   16.258817]  dump_stack_lvl+0x73/0xb0
[   16.258846]  print_report+0xd1/0x650
[   16.258869]  ? __virt_addr_valid+0x1db/0x2d0
[   16.258892]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.258914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.258939]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.258962]  kasan_report+0x141/0x180
[   16.258985]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.259013]  kasan_check_range+0x10c/0x1c0
[   16.259037]  __kasan_check_write+0x18/0x20
[   16.259058]  kasan_atomics_helper+0x1eaa/0x5450
[   16.259082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.259106]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.259132]  ? kasan_atomics+0x152/0x310
[   16.259160]  kasan_atomics+0x1dc/0x310
[   16.259184]  ? __pfx_kasan_atomics+0x10/0x10
[   16.259208]  ? trace_hardirqs_on+0x37/0xe0
[   16.259233]  ? __pfx_read_tsc+0x10/0x10
[   16.259255]  ? ktime_get_ts64+0x86/0x230
[   16.259279]  kunit_try_run_case+0x1a5/0x480
[   16.259304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259330]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.259356]  ? __kthread_parkme+0x82/0x180
[   16.259378]  ? preempt_count_sub+0x50/0x80
[   16.259403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.259492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.259519]  kthread+0x337/0x6f0
[   16.259539]  ? trace_preempt_on+0x20/0xc0
[   16.259562]  ? __pfx_kthread+0x10/0x10
[   16.259584]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.259606]  ? calculate_sigpending+0x7b/0xa0
[   16.259631]  ? __pfx_kthread+0x10/0x10
[   16.259653]  ret_from_fork+0x116/0x1d0
[   16.259673]  ? __pfx_kthread+0x10/0x10
[   16.259694]  ret_from_fork_asm+0x1a/0x30
[   16.259735]  </TASK>
[   16.259746] 
[   16.267423] Allocated by task 282:
[   16.267617]  kasan_save_stack+0x45/0x70
[   16.267837]  kasan_save_track+0x18/0x40
[   16.267974]  kasan_save_alloc_info+0x3b/0x50
[   16.268123]  __kasan_kmalloc+0xb7/0xc0
[   16.268256]  __kmalloc_cache_noprof+0x189/0x420
[   16.268525]  kasan_atomics+0x95/0x310
[   16.268747]  kunit_try_run_case+0x1a5/0x480
[   16.268960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.269272]  kthread+0x337/0x6f0
[   16.269441]  ret_from_fork+0x116/0x1d0
[   16.269592]  ret_from_fork_asm+0x1a/0x30
[   16.269741] 
[   16.269812] The buggy address belongs to the object at ffff8881038e3c00
[   16.269812]  which belongs to the cache kmalloc-64 of size 64
[   16.270506] The buggy address is located 0 bytes to the right of
[   16.270506]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.271057] 
[   16.271183] The buggy address belongs to the physical page:
[   16.271356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.271593] flags: 0x200000000000000(node=0|zone=2)
[   16.271766] page_type: f5(slab)
[   16.271887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.272455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.272830] page dumped because: kasan: bad access detected
[   16.273100] 
[   16.273195] Memory state around the buggy address:
[   16.273602]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.273881]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.274311] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.274562]                                      ^
[   16.274729]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.274993]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275338] ==================================================================
[   15.382732] ==================================================================
[   15.383126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.383363] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.383731] 
[   15.383844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.383885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.383898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.383918] Call Trace:
[   15.383932]  <TASK>
[   15.383947]  dump_stack_lvl+0x73/0xb0
[   15.383975]  print_report+0xd1/0x650
[   15.383998]  ? __virt_addr_valid+0x1db/0x2d0
[   15.384022]  ? kasan_atomics_helper+0xac7/0x5450
[   15.384064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.384089]  ? kasan_atomics_helper+0xac7/0x5450
[   15.384112]  kasan_report+0x141/0x180
[   15.384135]  ? kasan_atomics_helper+0xac7/0x5450
[   15.384162]  kasan_check_range+0x10c/0x1c0
[   15.384186]  __kasan_check_write+0x18/0x20
[   15.384207]  kasan_atomics_helper+0xac7/0x5450
[   15.384299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.384350]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.384376]  ? kasan_atomics+0x152/0x310
[   15.384404]  kasan_atomics+0x1dc/0x310
[   15.384428]  ? __pfx_kasan_atomics+0x10/0x10
[   15.384453]  ? trace_hardirqs_on+0x37/0xe0
[   15.384477]  ? __pfx_read_tsc+0x10/0x10
[   15.384501]  ? ktime_get_ts64+0x86/0x230
[   15.384526]  kunit_try_run_case+0x1a5/0x480
[   15.384561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.384586]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.384624]  ? __kthread_parkme+0x82/0x180
[   15.384646]  ? preempt_count_sub+0x50/0x80
[   15.384670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.384711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.384738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.384764]  kthread+0x337/0x6f0
[   15.384794]  ? trace_preempt_on+0x20/0xc0
[   15.384818]  ? __pfx_kthread+0x10/0x10
[   15.384840]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.384862]  ? calculate_sigpending+0x7b/0xa0
[   15.384888]  ? __pfx_kthread+0x10/0x10
[   15.384911]  ret_from_fork+0x116/0x1d0
[   15.384930]  ? __pfx_kthread+0x10/0x10
[   15.384951]  ret_from_fork_asm+0x1a/0x30
[   15.384983]  </TASK>
[   15.384994] 
[   15.393797] Allocated by task 282:
[   15.393986]  kasan_save_stack+0x45/0x70
[   15.394354]  kasan_save_track+0x18/0x40
[   15.394568]  kasan_save_alloc_info+0x3b/0x50
[   15.394764]  __kasan_kmalloc+0xb7/0xc0
[   15.394973]  __kmalloc_cache_noprof+0x189/0x420
[   15.395251]  kasan_atomics+0x95/0x310
[   15.395436]  kunit_try_run_case+0x1a5/0x480
[   15.395590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.395784]  kthread+0x337/0x6f0
[   15.395906]  ret_from_fork+0x116/0x1d0
[   15.396137]  ret_from_fork_asm+0x1a/0x30
[   15.396417] 
[   15.396520] The buggy address belongs to the object at ffff8881038e3c00
[   15.396520]  which belongs to the cache kmalloc-64 of size 64
[   15.397142] The buggy address is located 0 bytes to the right of
[   15.397142]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.397566] 
[   15.397640] The buggy address belongs to the physical page:
[   15.397904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.398412] flags: 0x200000000000000(node=0|zone=2)
[   15.398760] page_type: f5(slab)
[   15.398890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.399446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.399836] page dumped because: kasan: bad access detected
[   15.400009] 
[   15.400078] Memory state around the buggy address:
[   15.400348]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.401026]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.401361] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.401636]                                      ^
[   15.401885]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402466]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402782] ==================================================================
[   16.421734] ==================================================================
[   16.422120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.422435] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.422903] 
[   16.423019] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.423092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.423104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.423124] Call Trace:
[   16.423139]  <TASK>
[   16.423154]  dump_stack_lvl+0x73/0xb0
[   16.423204]  print_report+0xd1/0x650
[   16.423228]  ? __virt_addr_valid+0x1db/0x2d0
[   16.423250]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.423272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.423297]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.423319]  kasan_report+0x141/0x180
[   16.423365]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.423394]  __asan_report_load8_noabort+0x18/0x20
[   16.423437]  kasan_atomics_helper+0x4fa5/0x5450
[   16.423461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.423485]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.423512]  ? kasan_atomics+0x152/0x310
[   16.423541]  kasan_atomics+0x1dc/0x310
[   16.423581]  ? __pfx_kasan_atomics+0x10/0x10
[   16.423604]  ? trace_hardirqs_on+0x37/0xe0
[   16.423629]  ? __pfx_read_tsc+0x10/0x10
[   16.423650]  ? ktime_get_ts64+0x86/0x230
[   16.423693]  kunit_try_run_case+0x1a5/0x480
[   16.423729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.423755]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.423782]  ? __kthread_parkme+0x82/0x180
[   16.423804]  ? preempt_count_sub+0x50/0x80
[   16.423846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.423886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.423925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.423965]  kthread+0x337/0x6f0
[   16.423998]  ? trace_preempt_on+0x20/0xc0
[   16.424066]  ? __pfx_kthread+0x10/0x10
[   16.424088]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.424111]  ? calculate_sigpending+0x7b/0xa0
[   16.424135]  ? __pfx_kthread+0x10/0x10
[   16.424158]  ret_from_fork+0x116/0x1d0
[   16.424177]  ? __pfx_kthread+0x10/0x10
[   16.424198]  ret_from_fork_asm+0x1a/0x30
[   16.424230]  </TASK>
[   16.424242] 
[   16.433836] Allocated by task 282:
[   16.434009]  kasan_save_stack+0x45/0x70
[   16.434512]  kasan_save_track+0x18/0x40
[   16.434816]  kasan_save_alloc_info+0x3b/0x50
[   16.435286]  __kasan_kmalloc+0xb7/0xc0
[   16.435481]  __kmalloc_cache_noprof+0x189/0x420
[   16.435687]  kasan_atomics+0x95/0x310
[   16.436139]  kunit_try_run_case+0x1a5/0x480
[   16.436417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.436668]  kthread+0x337/0x6f0
[   16.436838]  ret_from_fork+0x116/0x1d0
[   16.437016]  ret_from_fork_asm+0x1a/0x30
[   16.437389] 
[   16.437592] The buggy address belongs to the object at ffff8881038e3c00
[   16.437592]  which belongs to the cache kmalloc-64 of size 64
[   16.438374] The buggy address is located 0 bytes to the right of
[   16.438374]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.438886] 
[   16.438980] The buggy address belongs to the physical page:
[   16.439732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.440219] flags: 0x200000000000000(node=0|zone=2)
[   16.440558] page_type: f5(slab)
[   16.440937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.441458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.442087] page dumped because: kasan: bad access detected
[   16.442399] 
[   16.442503] Memory state around the buggy address:
[   16.442722]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.443015]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.443600] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.444193]                                      ^
[   16.444546]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.444864]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.445471] ==================================================================
[   15.978476] ==================================================================
[   15.978840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.979667] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.980389] 
[   15.980590] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.980635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.980648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.980669] Call Trace:
[   15.980686]  <TASK>
[   15.980716]  dump_stack_lvl+0x73/0xb0
[   15.980748]  print_report+0xd1/0x650
[   15.980793]  ? __virt_addr_valid+0x1db/0x2d0
[   15.980818]  ? kasan_atomics_helper+0x164f/0x5450
[   15.980840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.980866]  ? kasan_atomics_helper+0x164f/0x5450
[   15.980889]  kasan_report+0x141/0x180
[   15.980912]  ? kasan_atomics_helper+0x164f/0x5450
[   15.980940]  kasan_check_range+0x10c/0x1c0
[   15.980966]  __kasan_check_write+0x18/0x20
[   15.980986]  kasan_atomics_helper+0x164f/0x5450
[   15.981011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.981035]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.981071]  ? kasan_atomics+0x152/0x310
[   15.981099]  kasan_atomics+0x1dc/0x310
[   15.981122]  ? __pfx_kasan_atomics+0x10/0x10
[   15.981146]  ? trace_hardirqs_on+0x37/0xe0
[   15.981170]  ? __pfx_read_tsc+0x10/0x10
[   15.981192]  ? ktime_get_ts64+0x86/0x230
[   15.981218]  kunit_try_run_case+0x1a5/0x480
[   15.981244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.981270]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.981298]  ? __kthread_parkme+0x82/0x180
[   15.981320]  ? preempt_count_sub+0x50/0x80
[   15.981346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.981372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.981398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.981425]  kthread+0x337/0x6f0
[   15.981445]  ? trace_preempt_on+0x20/0xc0
[   15.981469]  ? __pfx_kthread+0x10/0x10
[   15.981490]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.981513]  ? calculate_sigpending+0x7b/0xa0
[   15.981538]  ? __pfx_kthread+0x10/0x10
[   15.981561]  ret_from_fork+0x116/0x1d0
[   15.981580]  ? __pfx_kthread+0x10/0x10
[   15.981601]  ret_from_fork_asm+0x1a/0x30
[   15.981634]  </TASK>
[   15.981646] 
[   15.993594] Allocated by task 282:
[   15.993797]  kasan_save_stack+0x45/0x70
[   15.993996]  kasan_save_track+0x18/0x40
[   15.994460]  kasan_save_alloc_info+0x3b/0x50
[   15.994645]  __kasan_kmalloc+0xb7/0xc0
[   15.995000]  __kmalloc_cache_noprof+0x189/0x420
[   15.995430]  kasan_atomics+0x95/0x310
[   15.995627]  kunit_try_run_case+0x1a5/0x480
[   15.995848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.996374]  kthread+0x337/0x6f0
[   15.996540]  ret_from_fork+0x116/0x1d0
[   15.996721]  ret_from_fork_asm+0x1a/0x30
[   15.996911] 
[   15.997035] The buggy address belongs to the object at ffff8881038e3c00
[   15.997035]  which belongs to the cache kmalloc-64 of size 64
[   15.997550] The buggy address is located 0 bytes to the right of
[   15.997550]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.998022] 
[   15.998114] The buggy address belongs to the physical page:
[   15.998362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.998664] flags: 0x200000000000000(node=0|zone=2)
[   15.998931] page_type: f5(slab)
[   15.999150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.999474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.999795] page dumped because: kasan: bad access detected
[   15.999987] 
[   16.000075] Memory state around the buggy address:
[   16.000292]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.000845]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.001159] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.001481]                                      ^
[   16.001727]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.002048]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.002296] ==================================================================
[   16.021204] ==================================================================
[   16.021549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.021926] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.022573] 
[   16.022684] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.022739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.022751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.022772] Call Trace:
[   16.022785]  <TASK>
[   16.022800]  dump_stack_lvl+0x73/0xb0
[   16.022829]  print_report+0xd1/0x650
[   16.022853]  ? __virt_addr_valid+0x1db/0x2d0
[   16.022876]  ? kasan_atomics_helper+0x177f/0x5450
[   16.022899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.022924]  ? kasan_atomics_helper+0x177f/0x5450
[   16.022948]  kasan_report+0x141/0x180
[   16.022970]  ? kasan_atomics_helper+0x177f/0x5450
[   16.022999]  kasan_check_range+0x10c/0x1c0
[   16.023023]  __kasan_check_write+0x18/0x20
[   16.023077]  kasan_atomics_helper+0x177f/0x5450
[   16.023102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.023126]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.023151]  ? kasan_atomics+0x152/0x310
[   16.023179]  kasan_atomics+0x1dc/0x310
[   16.023202]  ? __pfx_kasan_atomics+0x10/0x10
[   16.023225]  ? trace_hardirqs_on+0x37/0xe0
[   16.023250]  ? __pfx_read_tsc+0x10/0x10
[   16.023307]  ? ktime_get_ts64+0x86/0x230
[   16.023332]  kunit_try_run_case+0x1a5/0x480
[   16.023356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.023383]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.023431]  ? __kthread_parkme+0x82/0x180
[   16.023453]  ? preempt_count_sub+0x50/0x80
[   16.023478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.023504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.023530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.023557]  kthread+0x337/0x6f0
[   16.023596]  ? trace_preempt_on+0x20/0xc0
[   16.023620]  ? __pfx_kthread+0x10/0x10
[   16.023642]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.023665]  ? calculate_sigpending+0x7b/0xa0
[   16.023691]  ? __pfx_kthread+0x10/0x10
[   16.023721]  ret_from_fork+0x116/0x1d0
[   16.023741]  ? __pfx_kthread+0x10/0x10
[   16.023783]  ret_from_fork_asm+0x1a/0x30
[   16.023815]  </TASK>
[   16.023826] 
[   16.031596] Allocated by task 282:
[   16.031734]  kasan_save_stack+0x45/0x70
[   16.032057]  kasan_save_track+0x18/0x40
[   16.032276]  kasan_save_alloc_info+0x3b/0x50
[   16.032495]  __kasan_kmalloc+0xb7/0xc0
[   16.032684]  __kmalloc_cache_noprof+0x189/0x420
[   16.032926]  kasan_atomics+0x95/0x310
[   16.033129]  kunit_try_run_case+0x1a5/0x480
[   16.033336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.033577]  kthread+0x337/0x6f0
[   16.033756]  ret_from_fork+0x116/0x1d0
[   16.033931]  ret_from_fork_asm+0x1a/0x30
[   16.034131] 
[   16.034201] The buggy address belongs to the object at ffff8881038e3c00
[   16.034201]  which belongs to the cache kmalloc-64 of size 64
[   16.034542] The buggy address is located 0 bytes to the right of
[   16.034542]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.035032] 
[   16.035128] The buggy address belongs to the physical page:
[   16.035372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.035709] flags: 0x200000000000000(node=0|zone=2)
[   16.035866] page_type: f5(slab)
[   16.035984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.036206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.036578] page dumped because: kasan: bad access detected
[   16.036861] 
[   16.036976] Memory state around the buggy address:
[   16.037390]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.037734]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.038028] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.038247]                                      ^
[   16.038464]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.038795]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.039089] ==================================================================
[   15.721551] ==================================================================
[   15.722100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.722377] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.722740] 
[   15.722848] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.722911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.722924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.722945] Call Trace:
[   15.722960]  <TASK>
[   15.722975]  dump_stack_lvl+0x73/0xb0
[   15.723005]  print_report+0xd1/0x650
[   15.723027]  ? __virt_addr_valid+0x1db/0x2d0
[   15.723062]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.723107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.723132]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.723155]  kasan_report+0x141/0x180
[   15.723178]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.723207]  __asan_report_load4_noabort+0x18/0x20
[   15.723232]  kasan_atomics_helper+0x4a02/0x5450
[   15.723256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.723297]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.723324]  ? kasan_atomics+0x152/0x310
[   15.723351]  kasan_atomics+0x1dc/0x310
[   15.723375]  ? __pfx_kasan_atomics+0x10/0x10
[   15.723399]  ? trace_hardirqs_on+0x37/0xe0
[   15.723422]  ? __pfx_read_tsc+0x10/0x10
[   15.723444]  ? ktime_get_ts64+0x86/0x230
[   15.723470]  kunit_try_run_case+0x1a5/0x480
[   15.723495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723521]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.723549]  ? __kthread_parkme+0x82/0x180
[   15.723570]  ? preempt_count_sub+0x50/0x80
[   15.723594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.723646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.723673]  kthread+0x337/0x6f0
[   15.723693]  ? trace_preempt_on+0x20/0xc0
[   15.723727]  ? __pfx_kthread+0x10/0x10
[   15.723748]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.723788]  ? calculate_sigpending+0x7b/0xa0
[   15.723813]  ? __pfx_kthread+0x10/0x10
[   15.723836]  ret_from_fork+0x116/0x1d0
[   15.723856]  ? __pfx_kthread+0x10/0x10
[   15.723877]  ret_from_fork_asm+0x1a/0x30
[   15.723909]  </TASK>
[   15.723920] 
[   15.734162] Allocated by task 282:
[   15.734486]  kasan_save_stack+0x45/0x70
[   15.734654]  kasan_save_track+0x18/0x40
[   15.735014]  kasan_save_alloc_info+0x3b/0x50
[   15.735324]  __kasan_kmalloc+0xb7/0xc0
[   15.735491]  __kmalloc_cache_noprof+0x189/0x420
[   15.735728]  kasan_atomics+0x95/0x310
[   15.735900]  kunit_try_run_case+0x1a5/0x480
[   15.736372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.736618]  kthread+0x337/0x6f0
[   15.736925]  ret_from_fork+0x116/0x1d0
[   15.737122]  ret_from_fork_asm+0x1a/0x30
[   15.737443] 
[   15.737544] The buggy address belongs to the object at ffff8881038e3c00
[   15.737544]  which belongs to the cache kmalloc-64 of size 64
[   15.738304] The buggy address is located 0 bytes to the right of
[   15.738304]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.738943] 
[   15.739027] The buggy address belongs to the physical page:
[   15.739519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.739951] flags: 0x200000000000000(node=0|zone=2)
[   15.740275] page_type: f5(slab)
[   15.740412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.740870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.741388] page dumped because: kasan: bad access detected
[   15.741966] 
[   15.742236] Memory state around the buggy address:
[   15.742639]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.742876]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.743335] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.744027]                                      ^
[   15.744539]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.745279]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.745767] ==================================================================
[   16.238975] ==================================================================
[   16.239726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.240226] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.240766] 
[   16.240887] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.240932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.240946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.240968] Call Trace:
[   16.240984]  <TASK>
[   16.241001]  dump_stack_lvl+0x73/0xb0
[   16.241033]  print_report+0xd1/0x650
[   16.241082]  ? __virt_addr_valid+0x1db/0x2d0
[   16.241106]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.241129]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.241154]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.241178]  kasan_report+0x141/0x180
[   16.241201]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.241228]  kasan_check_range+0x10c/0x1c0
[   16.241254]  __kasan_check_write+0x18/0x20
[   16.241275]  kasan_atomics_helper+0x1e12/0x5450
[   16.241299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.241323]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.241349]  ? kasan_atomics+0x152/0x310
[   16.241395]  kasan_atomics+0x1dc/0x310
[   16.241419]  ? __pfx_kasan_atomics+0x10/0x10
[   16.241443]  ? trace_hardirqs_on+0x37/0xe0
[   16.241468]  ? __pfx_read_tsc+0x10/0x10
[   16.241491]  ? ktime_get_ts64+0x86/0x230
[   16.241516]  kunit_try_run_case+0x1a5/0x480
[   16.241542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.241569]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.241595]  ? __kthread_parkme+0x82/0x180
[   16.241617]  ? preempt_count_sub+0x50/0x80
[   16.241642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.241667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.241693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.241732]  kthread+0x337/0x6f0
[   16.241752]  ? trace_preempt_on+0x20/0xc0
[   16.241777]  ? __pfx_kthread+0x10/0x10
[   16.241798]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.241821]  ? calculate_sigpending+0x7b/0xa0
[   16.241846]  ? __pfx_kthread+0x10/0x10
[   16.241869]  ret_from_fork+0x116/0x1d0
[   16.241888]  ? __pfx_kthread+0x10/0x10
[   16.241909]  ret_from_fork_asm+0x1a/0x30
[   16.241941]  </TASK>
[   16.241952] 
[   16.248952] Allocated by task 282:
[   16.249228]  kasan_save_stack+0x45/0x70
[   16.249453]  kasan_save_track+0x18/0x40
[   16.249648]  kasan_save_alloc_info+0x3b/0x50
[   16.249893]  __kasan_kmalloc+0xb7/0xc0
[   16.250082]  __kmalloc_cache_noprof+0x189/0x420
[   16.250293]  kasan_atomics+0x95/0x310
[   16.250480]  kunit_try_run_case+0x1a5/0x480
[   16.250694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.250945]  kthread+0x337/0x6f0
[   16.251127]  ret_from_fork+0x116/0x1d0
[   16.251298]  ret_from_fork_asm+0x1a/0x30
[   16.251436] 
[   16.251507] The buggy address belongs to the object at ffff8881038e3c00
[   16.251507]  which belongs to the cache kmalloc-64 of size 64
[   16.251865] The buggy address is located 0 bytes to the right of
[   16.251865]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.252496] 
[   16.252689] The buggy address belongs to the physical page:
[   16.252953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.253430] flags: 0x200000000000000(node=0|zone=2)
[   16.253654] page_type: f5(slab)
[   16.253837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.254200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.254428] page dumped because: kasan: bad access detected
[   16.254601] 
[   16.254670] Memory state around the buggy address:
[   16.254856]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.255332]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.255672] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.256019]                                      ^
[   16.256276]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256510]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256824] ==================================================================
[   15.261809] ==================================================================
[   15.262223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.262563] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.262901] 
[   15.263015] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.263058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.263071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.263094] Call Trace:
[   15.263109]  <TASK>
[   15.263125]  dump_stack_lvl+0x73/0xb0
[   15.263154]  print_report+0xd1/0x650
[   15.263177]  ? __virt_addr_valid+0x1db/0x2d0
[   15.263201]  ? kasan_atomics_helper+0x72f/0x5450
[   15.263223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.263248]  ? kasan_atomics_helper+0x72f/0x5450
[   15.263271]  kasan_report+0x141/0x180
[   15.263294]  ? kasan_atomics_helper+0x72f/0x5450
[   15.263323]  kasan_check_range+0x10c/0x1c0
[   15.263347]  __kasan_check_write+0x18/0x20
[   15.263367]  kasan_atomics_helper+0x72f/0x5450
[   15.263391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.263415]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.263442]  ? kasan_atomics+0x152/0x310
[   15.263470]  kasan_atomics+0x1dc/0x310
[   15.263494]  ? __pfx_kasan_atomics+0x10/0x10
[   15.263517]  ? trace_hardirqs_on+0x37/0xe0
[   15.263541]  ? __pfx_read_tsc+0x10/0x10
[   15.263562]  ? ktime_get_ts64+0x86/0x230
[   15.263587]  kunit_try_run_case+0x1a5/0x480
[   15.263612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.263638]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.263664]  ? __kthread_parkme+0x82/0x180
[   15.263686]  ? preempt_count_sub+0x50/0x80
[   15.263722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.263748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.263773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.263799]  kthread+0x337/0x6f0
[   15.263820]  ? trace_preempt_on+0x20/0xc0
[   15.263843]  ? __pfx_kthread+0x10/0x10
[   15.263866]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.263888]  ? calculate_sigpending+0x7b/0xa0
[   15.263915]  ? __pfx_kthread+0x10/0x10
[   15.263937]  ret_from_fork+0x116/0x1d0
[   15.263957]  ? __pfx_kthread+0x10/0x10
[   15.263978]  ret_from_fork_asm+0x1a/0x30
[   15.264011]  </TASK>
[   15.264021] 
[   15.271828] Allocated by task 282:
[   15.272010]  kasan_save_stack+0x45/0x70
[   15.272306]  kasan_save_track+0x18/0x40
[   15.272474]  kasan_save_alloc_info+0x3b/0x50
[   15.272625]  __kasan_kmalloc+0xb7/0xc0
[   15.272770]  __kmalloc_cache_noprof+0x189/0x420
[   15.272927]  kasan_atomics+0x95/0x310
[   15.273085]  kunit_try_run_case+0x1a5/0x480
[   15.273292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.273541]  kthread+0x337/0x6f0
[   15.273777]  ret_from_fork+0x116/0x1d0
[   15.274154]  ret_from_fork_asm+0x1a/0x30
[   15.274298] 
[   15.274370] The buggy address belongs to the object at ffff8881038e3c00
[   15.274370]  which belongs to the cache kmalloc-64 of size 64
[   15.275346] The buggy address is located 0 bytes to the right of
[   15.275346]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.275909] 
[   15.276007] The buggy address belongs to the physical page:
[   15.276297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.276620] flags: 0x200000000000000(node=0|zone=2)
[   15.276835] page_type: f5(slab)
[   15.276958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.277470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.277862] page dumped because: kasan: bad access detected
[   15.278038] 
[   15.278108] Memory state around the buggy address:
[   15.278471]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.278817]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.279082] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.279408]                                      ^
[   15.279572]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.279796]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.280010] ==================================================================
[   15.484430] ==================================================================
[   15.484770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.485224] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.485650] 
[   15.485786] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.485831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.485938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.485961] Call Trace:
[   15.485977]  <TASK>
[   15.485993]  dump_stack_lvl+0x73/0xb0
[   15.486025]  print_report+0xd1/0x650
[   15.486049]  ? __virt_addr_valid+0x1db/0x2d0
[   15.486272]  ? kasan_atomics_helper+0xd47/0x5450
[   15.486314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.486341]  ? kasan_atomics_helper+0xd47/0x5450
[   15.486365]  kasan_report+0x141/0x180
[   15.486388]  ? kasan_atomics_helper+0xd47/0x5450
[   15.486416]  kasan_check_range+0x10c/0x1c0
[   15.486440]  __kasan_check_write+0x18/0x20
[   15.486461]  kasan_atomics_helper+0xd47/0x5450
[   15.486485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.486509]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.486535]  ? kasan_atomics+0x152/0x310
[   15.486564]  kasan_atomics+0x1dc/0x310
[   15.486587]  ? __pfx_kasan_atomics+0x10/0x10
[   15.486611]  ? trace_hardirqs_on+0x37/0xe0
[   15.486636]  ? __pfx_read_tsc+0x10/0x10
[   15.486658]  ? ktime_get_ts64+0x86/0x230
[   15.486683]  kunit_try_run_case+0x1a5/0x480
[   15.486722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.486748]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.486777]  ? __kthread_parkme+0x82/0x180
[   15.486801]  ? preempt_count_sub+0x50/0x80
[   15.486825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.486851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.486877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.486902]  kthread+0x337/0x6f0
[   15.486922]  ? trace_preempt_on+0x20/0xc0
[   15.486946]  ? __pfx_kthread+0x10/0x10
[   15.486968]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.486990]  ? calculate_sigpending+0x7b/0xa0
[   15.487016]  ? __pfx_kthread+0x10/0x10
[   15.487048]  ret_from_fork+0x116/0x1d0
[   15.487068]  ? __pfx_kthread+0x10/0x10
[   15.487091]  ret_from_fork_asm+0x1a/0x30
[   15.487124]  </TASK>
[   15.487135] 
[   15.498090] Allocated by task 282:
[   15.498286]  kasan_save_stack+0x45/0x70
[   15.498802]  kasan_save_track+0x18/0x40
[   15.499268]  kasan_save_alloc_info+0x3b/0x50
[   15.499626]  __kasan_kmalloc+0xb7/0xc0
[   15.499787]  __kmalloc_cache_noprof+0x189/0x420
[   15.500013]  kasan_atomics+0x95/0x310
[   15.500434]  kunit_try_run_case+0x1a5/0x480
[   15.500604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.501222]  kthread+0x337/0x6f0
[   15.501419]  ret_from_fork+0x116/0x1d0
[   15.501606]  ret_from_fork_asm+0x1a/0x30
[   15.501819] 
[   15.501905] The buggy address belongs to the object at ffff8881038e3c00
[   15.501905]  which belongs to the cache kmalloc-64 of size 64
[   15.502962] The buggy address is located 0 bytes to the right of
[   15.502962]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.503878] 
[   15.503990] The buggy address belongs to the physical page:
[   15.504526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.504933] flags: 0x200000000000000(node=0|zone=2)
[   15.505332] page_type: f5(slab)
[   15.505624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.505985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.506614] page dumped because: kasan: bad access detected
[   15.506993] 
[   15.507291] Memory state around the buggy address:
[   15.507510]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.507842]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.508451] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.508818]                                      ^
[   15.509290]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.509605]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.509920] ==================================================================
[   15.533812] ==================================================================
[   15.534851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.535402] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.536265] 
[   15.536568] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.536614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.536628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.536650] Call Trace:
[   15.536766]  <TASK>
[   15.536788]  dump_stack_lvl+0x73/0xb0
[   15.536821]  print_report+0xd1/0x650
[   15.536843]  ? __virt_addr_valid+0x1db/0x2d0
[   15.536867]  ? kasan_atomics_helper+0xe78/0x5450
[   15.536889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.536914]  ? kasan_atomics_helper+0xe78/0x5450
[   15.536938]  kasan_report+0x141/0x180
[   15.536960]  ? kasan_atomics_helper+0xe78/0x5450
[   15.536987]  kasan_check_range+0x10c/0x1c0
[   15.537043]  __kasan_check_write+0x18/0x20
[   15.537064]  kasan_atomics_helper+0xe78/0x5450
[   15.537099]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.537123]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.537150]  ? kasan_atomics+0x152/0x310
[   15.537178]  kasan_atomics+0x1dc/0x310
[   15.537201]  ? __pfx_kasan_atomics+0x10/0x10
[   15.537225]  ? trace_hardirqs_on+0x37/0xe0
[   15.537250]  ? __pfx_read_tsc+0x10/0x10
[   15.537272]  ? ktime_get_ts64+0x86/0x230
[   15.537297]  kunit_try_run_case+0x1a5/0x480
[   15.537322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.537348]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.537374]  ? __kthread_parkme+0x82/0x180
[   15.537395]  ? preempt_count_sub+0x50/0x80
[   15.537419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.537446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.537472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.537499]  kthread+0x337/0x6f0
[   15.537519]  ? trace_preempt_on+0x20/0xc0
[   15.537543]  ? __pfx_kthread+0x10/0x10
[   15.537565]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.537588]  ? calculate_sigpending+0x7b/0xa0
[   15.537614]  ? __pfx_kthread+0x10/0x10
[   15.537636]  ret_from_fork+0x116/0x1d0
[   15.537656]  ? __pfx_kthread+0x10/0x10
[   15.537680]  ret_from_fork_asm+0x1a/0x30
[   15.537725]  </TASK>
[   15.537745] 
[   15.553778] Allocated by task 282:
[   15.554374]  kasan_save_stack+0x45/0x70
[   15.554810]  kasan_save_track+0x18/0x40
[   15.555328]  kasan_save_alloc_info+0x3b/0x50
[   15.555659]  __kasan_kmalloc+0xb7/0xc0
[   15.556126]  __kmalloc_cache_noprof+0x189/0x420
[   15.556298]  kasan_atomics+0x95/0x310
[   15.556811]  kunit_try_run_case+0x1a5/0x480
[   15.557357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.557763]  kthread+0x337/0x6f0
[   15.557894]  ret_from_fork+0x116/0x1d0
[   15.558037]  ret_from_fork_asm+0x1a/0x30
[   15.558732] 
[   15.558908] The buggy address belongs to the object at ffff8881038e3c00
[   15.558908]  which belongs to the cache kmalloc-64 of size 64
[   15.560281] The buggy address is located 0 bytes to the right of
[   15.560281]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.561273] 
[   15.561366] The buggy address belongs to the physical page:
[   15.561930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.562567] flags: 0x200000000000000(node=0|zone=2)
[   15.563116] page_type: f5(slab)
[   15.563260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.563965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.564579] page dumped because: kasan: bad access detected
[   15.565047] 
[   15.565257] Memory state around the buggy address:
[   15.565863]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.566399]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.566812] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.567585]                                      ^
[   15.567993]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568697]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569191] ==================================================================
[   16.092478] ==================================================================
[   16.092983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.093357] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.093725] 
[   16.093838] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.093879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.093892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.093913] Call Trace:
[   16.093926]  <TASK>
[   16.093940]  dump_stack_lvl+0x73/0xb0
[   16.093969]  print_report+0xd1/0x650
[   16.093992]  ? __virt_addr_valid+0x1db/0x2d0
[   16.094015]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.094037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.094072]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.094097]  kasan_report+0x141/0x180
[   16.094120]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.094147]  kasan_check_range+0x10c/0x1c0
[   16.094172]  __kasan_check_write+0x18/0x20
[   16.094193]  kasan_atomics_helper+0x19e3/0x5450
[   16.094217]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.094241]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.094267]  ? kasan_atomics+0x152/0x310
[   16.094294]  kasan_atomics+0x1dc/0x310
[   16.094318]  ? __pfx_kasan_atomics+0x10/0x10
[   16.094342]  ? trace_hardirqs_on+0x37/0xe0
[   16.094366]  ? __pfx_read_tsc+0x10/0x10
[   16.094387]  ? ktime_get_ts64+0x86/0x230
[   16.094411]  kunit_try_run_case+0x1a5/0x480
[   16.094436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094463]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.094489]  ? __kthread_parkme+0x82/0x180
[   16.094511]  ? preempt_count_sub+0x50/0x80
[   16.094536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094612]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.094638]  kthread+0x337/0x6f0
[   16.094658]  ? trace_preempt_on+0x20/0xc0
[   16.094681]  ? __pfx_kthread+0x10/0x10
[   16.094712]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.094736]  ? calculate_sigpending+0x7b/0xa0
[   16.094761]  ? __pfx_kthread+0x10/0x10
[   16.094783]  ret_from_fork+0x116/0x1d0
[   16.094802]  ? __pfx_kthread+0x10/0x10
[   16.094823]  ret_from_fork_asm+0x1a/0x30
[   16.094856]  </TASK>
[   16.094868] 
[   16.102397] Allocated by task 282:
[   16.102518]  kasan_save_stack+0x45/0x70
[   16.102692]  kasan_save_track+0x18/0x40
[   16.102899]  kasan_save_alloc_info+0x3b/0x50
[   16.103133]  __kasan_kmalloc+0xb7/0xc0
[   16.103515]  __kmalloc_cache_noprof+0x189/0x420
[   16.103725]  kasan_atomics+0x95/0x310
[   16.103857]  kunit_try_run_case+0x1a5/0x480
[   16.103999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.104219]  kthread+0x337/0x6f0
[   16.104397]  ret_from_fork+0x116/0x1d0
[   16.104584]  ret_from_fork_asm+0x1a/0x30
[   16.104812] 
[   16.104908] The buggy address belongs to the object at ffff8881038e3c00
[   16.104908]  which belongs to the cache kmalloc-64 of size 64
[   16.105558] The buggy address is located 0 bytes to the right of
[   16.105558]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.105921] 
[   16.105991] The buggy address belongs to the physical page:
[   16.106219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.106589] flags: 0x200000000000000(node=0|zone=2)
[   16.106849] page_type: f5(slab)
[   16.107122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.107342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.107779] page dumped because: kasan: bad access detected
[   16.108027] 
[   16.108125] Memory state around the buggy address:
[   16.108313]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.108529]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.108754] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.109084]                                      ^
[   16.109330]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.109658]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.109996] ==================================================================
[   16.367863] ==================================================================
[   16.368255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.368567] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.368877] 
[   16.368964] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.369006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.369019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.369039] Call Trace:
[   16.369054]  <TASK>
[   16.369071]  dump_stack_lvl+0x73/0xb0
[   16.369099]  print_report+0xd1/0x650
[   16.369123]  ? __virt_addr_valid+0x1db/0x2d0
[   16.369147]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.369170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.369203]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.369226]  kasan_report+0x141/0x180
[   16.369249]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.369277]  kasan_check_range+0x10c/0x1c0
[   16.369302]  __kasan_check_write+0x18/0x20
[   16.369323]  kasan_atomics_helper+0x20c8/0x5450
[   16.369347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.369370]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.369396]  ? kasan_atomics+0x152/0x310
[   16.369424]  kasan_atomics+0x1dc/0x310
[   16.369447]  ? __pfx_kasan_atomics+0x10/0x10
[   16.369471]  ? trace_hardirqs_on+0x37/0xe0
[   16.369495]  ? __pfx_read_tsc+0x10/0x10
[   16.369517]  ? ktime_get_ts64+0x86/0x230
[   16.369542]  kunit_try_run_case+0x1a5/0x480
[   16.369567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.369593]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.369619]  ? __kthread_parkme+0x82/0x180
[   16.369641]  ? preempt_count_sub+0x50/0x80
[   16.369666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.369693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.369731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.369757]  kthread+0x337/0x6f0
[   16.369777]  ? trace_preempt_on+0x20/0xc0
[   16.369801]  ? __pfx_kthread+0x10/0x10
[   16.369824]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.369848]  ? calculate_sigpending+0x7b/0xa0
[   16.369874]  ? __pfx_kthread+0x10/0x10
[   16.369896]  ret_from_fork+0x116/0x1d0
[   16.369916]  ? __pfx_kthread+0x10/0x10
[   16.369937]  ret_from_fork_asm+0x1a/0x30
[   16.369970]  </TASK>
[   16.369981] 
[   16.377461] Allocated by task 282:
[   16.377589]  kasan_save_stack+0x45/0x70
[   16.377743]  kasan_save_track+0x18/0x40
[   16.377935]  kasan_save_alloc_info+0x3b/0x50
[   16.378147]  __kasan_kmalloc+0xb7/0xc0
[   16.378377]  __kmalloc_cache_noprof+0x189/0x420
[   16.378613]  kasan_atomics+0x95/0x310
[   16.378816]  kunit_try_run_case+0x1a5/0x480
[   16.378992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.379277]  kthread+0x337/0x6f0
[   16.379402]  ret_from_fork+0x116/0x1d0
[   16.379593]  ret_from_fork_asm+0x1a/0x30
[   16.379802] 
[   16.379894] The buggy address belongs to the object at ffff8881038e3c00
[   16.379894]  which belongs to the cache kmalloc-64 of size 64
[   16.380245] The buggy address is located 0 bytes to the right of
[   16.380245]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.380723] 
[   16.380820] The buggy address belongs to the physical page:
[   16.381083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.381326] flags: 0x200000000000000(node=0|zone=2)
[   16.381805] page_type: f5(slab)
[   16.381949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.382235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.382461] page dumped because: kasan: bad access detected
[   16.382630] 
[   16.382721] Memory state around the buggy address:
[   16.382947]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.383460]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.383792] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.384215]                                      ^
[   16.384444]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.384728]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.385009] ==================================================================
[   15.361175] ==================================================================
[   15.361448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.361788] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.362335] 
[   15.362476] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.362521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.362535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.362556] Call Trace:
[   15.362572]  <TASK>
[   15.362589]  dump_stack_lvl+0x73/0xb0
[   15.362620]  print_report+0xd1/0x650
[   15.362643]  ? __virt_addr_valid+0x1db/0x2d0
[   15.362666]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.362688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.362724]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.362748]  kasan_report+0x141/0x180
[   15.362770]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.362798]  kasan_check_range+0x10c/0x1c0
[   15.362823]  __kasan_check_write+0x18/0x20
[   15.362844]  kasan_atomics_helper+0xa2b/0x5450
[   15.362893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.362918]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.362944]  ? kasan_atomics+0x152/0x310
[   15.362983]  kasan_atomics+0x1dc/0x310
[   15.363007]  ? __pfx_kasan_atomics+0x10/0x10
[   15.363030]  ? trace_hardirqs_on+0x37/0xe0
[   15.363492]  ? __pfx_read_tsc+0x10/0x10
[   15.363530]  ? ktime_get_ts64+0x86/0x230
[   15.363556]  kunit_try_run_case+0x1a5/0x480
[   15.363582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363610]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.363636]  ? __kthread_parkme+0x82/0x180
[   15.363658]  ? preempt_count_sub+0x50/0x80
[   15.363684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.363771]  kthread+0x337/0x6f0
[   15.363791]  ? trace_preempt_on+0x20/0xc0
[   15.363814]  ? __pfx_kthread+0x10/0x10
[   15.363836]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.363858]  ? calculate_sigpending+0x7b/0xa0
[   15.363883]  ? __pfx_kthread+0x10/0x10
[   15.363906]  ret_from_fork+0x116/0x1d0
[   15.363925]  ? __pfx_kthread+0x10/0x10
[   15.363947]  ret_from_fork_asm+0x1a/0x30
[   15.363980]  </TASK>
[   15.363991] 
[   15.373296] Allocated by task 282:
[   15.373430]  kasan_save_stack+0x45/0x70
[   15.373632]  kasan_save_track+0x18/0x40
[   15.373818]  kasan_save_alloc_info+0x3b/0x50
[   15.374007]  __kasan_kmalloc+0xb7/0xc0
[   15.374374]  __kmalloc_cache_noprof+0x189/0x420
[   15.374676]  kasan_atomics+0x95/0x310
[   15.374872]  kunit_try_run_case+0x1a5/0x480
[   15.375217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.375471]  kthread+0x337/0x6f0
[   15.375699]  ret_from_fork+0x116/0x1d0
[   15.375893]  ret_from_fork_asm+0x1a/0x30
[   15.376157] 
[   15.376297] The buggy address belongs to the object at ffff8881038e3c00
[   15.376297]  which belongs to the cache kmalloc-64 of size 64
[   15.376740] The buggy address is located 0 bytes to the right of
[   15.376740]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.377295] 
[   15.377394] The buggy address belongs to the physical page:
[   15.377650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.378194] flags: 0x200000000000000(node=0|zone=2)
[   15.378464] page_type: f5(slab)
[   15.378626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.379011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.379324] page dumped because: kasan: bad access detected
[   15.379512] 
[   15.379584] Memory state around the buggy address:
[   15.379804]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.380327]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.380695] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.380963]                                      ^
[   15.381446]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381842]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.382146] ==================================================================
[   15.843296] ==================================================================
[   15.843558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.843928] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.844678] 
[   15.844932] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.844979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.844992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.845012] Call Trace:
[   15.845028]  <TASK>
[   15.845055]  dump_stack_lvl+0x73/0xb0
[   15.845086]  print_report+0xd1/0x650
[   15.845108]  ? __virt_addr_valid+0x1db/0x2d0
[   15.845132]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.845155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.845180]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.845203]  kasan_report+0x141/0x180
[   15.845226]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.845254]  kasan_check_range+0x10c/0x1c0
[   15.845279]  __kasan_check_read+0x15/0x20
[   15.845298]  kasan_atomics_helper+0x13b5/0x5450
[   15.845322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.845346]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.845371]  ? kasan_atomics+0x152/0x310
[   15.845399]  kasan_atomics+0x1dc/0x310
[   15.845423]  ? __pfx_kasan_atomics+0x10/0x10
[   15.845446]  ? trace_hardirqs_on+0x37/0xe0
[   15.845470]  ? __pfx_read_tsc+0x10/0x10
[   15.845491]  ? ktime_get_ts64+0x86/0x230
[   15.845516]  kunit_try_run_case+0x1a5/0x480
[   15.845541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845567]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.845593]  ? __kthread_parkme+0x82/0x180
[   15.845614]  ? preempt_count_sub+0x50/0x80
[   15.845639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.845690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.845728]  kthread+0x337/0x6f0
[   15.845747]  ? trace_preempt_on+0x20/0xc0
[   15.845770]  ? __pfx_kthread+0x10/0x10
[   15.845792]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.845814]  ? calculate_sigpending+0x7b/0xa0
[   15.845840]  ? __pfx_kthread+0x10/0x10
[   15.845862]  ret_from_fork+0x116/0x1d0
[   15.845883]  ? __pfx_kthread+0x10/0x10
[   15.845905]  ret_from_fork_asm+0x1a/0x30
[   15.845937]  </TASK>
[   15.845947] 
[   15.856139] Allocated by task 282:
[   15.856310]  kasan_save_stack+0x45/0x70
[   15.856586]  kasan_save_track+0x18/0x40
[   15.856802]  kasan_save_alloc_info+0x3b/0x50
[   15.857003]  __kasan_kmalloc+0xb7/0xc0
[   15.857419]  __kmalloc_cache_noprof+0x189/0x420
[   15.857725]  kasan_atomics+0x95/0x310
[   15.858064]  kunit_try_run_case+0x1a5/0x480
[   15.858272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.858592]  kthread+0x337/0x6f0
[   15.858857]  ret_from_fork+0x116/0x1d0
[   15.859005]  ret_from_fork_asm+0x1a/0x30
[   15.859416] 
[   15.859655] The buggy address belongs to the object at ffff8881038e3c00
[   15.859655]  which belongs to the cache kmalloc-64 of size 64
[   15.860326] The buggy address is located 0 bytes to the right of
[   15.860326]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.860909] 
[   15.861006] The buggy address belongs to the physical page:
[   15.861259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.861602] flags: 0x200000000000000(node=0|zone=2)
[   15.861842] page_type: f5(slab)
[   15.862005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.862662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.863078] page dumped because: kasan: bad access detected
[   15.863405] 
[   15.863505] Memory state around the buggy address:
[   15.863862]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.864338]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.864743] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.865176]                                      ^
[   15.865528]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.865848]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866325] ==================================================================
[   15.299342] ==================================================================
[   15.299628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.299869] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.300369] 
[   15.300483] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.300524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.300536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.300557] Call Trace:
[   15.300570]  <TASK>
[   15.300584]  dump_stack_lvl+0x73/0xb0
[   15.300614]  print_report+0xd1/0x650
[   15.300636]  ? __virt_addr_valid+0x1db/0x2d0
[   15.300660]  ? kasan_atomics_helper+0x860/0x5450
[   15.300682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.300718]  ? kasan_atomics_helper+0x860/0x5450
[   15.300741]  kasan_report+0x141/0x180
[   15.300765]  ? kasan_atomics_helper+0x860/0x5450
[   15.300793]  kasan_check_range+0x10c/0x1c0
[   15.300818]  __kasan_check_write+0x18/0x20
[   15.300838]  kasan_atomics_helper+0x860/0x5450
[   15.300863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.300887]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.300913]  ? kasan_atomics+0x152/0x310
[   15.300941]  kasan_atomics+0x1dc/0x310
[   15.300964]  ? __pfx_kasan_atomics+0x10/0x10
[   15.300989]  ? trace_hardirqs_on+0x37/0xe0
[   15.301013]  ? __pfx_read_tsc+0x10/0x10
[   15.301034]  ? ktime_get_ts64+0x86/0x230
[   15.301059]  kunit_try_run_case+0x1a5/0x480
[   15.301083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.301166]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.301195]  ? __kthread_parkme+0x82/0x180
[   15.301217]  ? preempt_count_sub+0x50/0x80
[   15.301242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.301268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.301294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.301322]  kthread+0x337/0x6f0
[   15.301342]  ? trace_preempt_on+0x20/0xc0
[   15.301366]  ? __pfx_kthread+0x10/0x10
[   15.301387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.301410]  ? calculate_sigpending+0x7b/0xa0
[   15.301435]  ? __pfx_kthread+0x10/0x10
[   15.301458]  ret_from_fork+0x116/0x1d0
[   15.301478]  ? __pfx_kthread+0x10/0x10
[   15.301499]  ret_from_fork_asm+0x1a/0x30
[   15.301531]  </TASK>
[   15.301542] 
[   15.309587] Allocated by task 282:
[   15.309732]  kasan_save_stack+0x45/0x70
[   15.309878]  kasan_save_track+0x18/0x40
[   15.310015]  kasan_save_alloc_info+0x3b/0x50
[   15.310175]  __kasan_kmalloc+0xb7/0xc0
[   15.310363]  __kmalloc_cache_noprof+0x189/0x420
[   15.310587]  kasan_atomics+0x95/0x310
[   15.310786]  kunit_try_run_case+0x1a5/0x480
[   15.311053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.311321]  kthread+0x337/0x6f0
[   15.311491]  ret_from_fork+0x116/0x1d0
[   15.311684]  ret_from_fork_asm+0x1a/0x30
[   15.311901] 
[   15.311996] The buggy address belongs to the object at ffff8881038e3c00
[   15.311996]  which belongs to the cache kmalloc-64 of size 64
[   15.312533] The buggy address is located 0 bytes to the right of
[   15.312533]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.312956] 
[   15.313066] The buggy address belongs to the physical page:
[   15.313325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.313642] flags: 0x200000000000000(node=0|zone=2)
[   15.313855] page_type: f5(slab)
[   15.313998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.314439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.314666] page dumped because: kasan: bad access detected
[   15.314849] 
[   15.314920] Memory state around the buggy address:
[   15.315075]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.315347]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.315754] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.316070]                                      ^
[   15.316289]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316924]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.317973] ==================================================================
[   15.157744] ==================================================================
[   15.158123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.158425] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.158671] 
[   15.158788] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.158829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.158853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.158873] Call Trace:
[   15.158887]  <TASK>
[   15.158901]  dump_stack_lvl+0x73/0xb0
[   15.158941]  print_report+0xd1/0x650
[   15.158964]  ? __virt_addr_valid+0x1db/0x2d0
[   15.158987]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.159009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.159040]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.159079]  kasan_report+0x141/0x180
[   15.159101]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.159129]  kasan_check_range+0x10c/0x1c0
[   15.159154]  __kasan_check_write+0x18/0x20
[   15.159175]  kasan_atomics_helper+0x4a0/0x5450
[   15.159210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.159235]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.159262]  ? kasan_atomics+0x152/0x310
[   15.159289]  kasan_atomics+0x1dc/0x310
[   15.159313]  ? __pfx_kasan_atomics+0x10/0x10
[   15.159337]  ? trace_hardirqs_on+0x37/0xe0
[   15.159361]  ? __pfx_read_tsc+0x10/0x10
[   15.159392]  ? ktime_get_ts64+0x86/0x230
[   15.159416]  kunit_try_run_case+0x1a5/0x480
[   15.159441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159478]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.159504]  ? __kthread_parkme+0x82/0x180
[   15.159526]  ? preempt_count_sub+0x50/0x80
[   15.159550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.159627]  kthread+0x337/0x6f0
[   15.159647]  ? trace_preempt_on+0x20/0xc0
[   15.159671]  ? __pfx_kthread+0x10/0x10
[   15.159693]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.159724]  ? calculate_sigpending+0x7b/0xa0
[   15.159758]  ? __pfx_kthread+0x10/0x10
[   15.159781]  ret_from_fork+0x116/0x1d0
[   15.159800]  ? __pfx_kthread+0x10/0x10
[   15.159832]  ret_from_fork_asm+0x1a/0x30
[   15.159864]  </TASK>
[   15.159875] 
[   15.169012] Allocated by task 282:
[   15.169272]  kasan_save_stack+0x45/0x70
[   15.169484]  kasan_save_track+0x18/0x40
[   15.169687]  kasan_save_alloc_info+0x3b/0x50
[   15.169885]  __kasan_kmalloc+0xb7/0xc0
[   15.170052]  __kmalloc_cache_noprof+0x189/0x420
[   15.170310]  kasan_atomics+0x95/0x310
[   15.170500]  kunit_try_run_case+0x1a5/0x480
[   15.170699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.170942]  kthread+0x337/0x6f0
[   15.171115]  ret_from_fork+0x116/0x1d0
[   15.171459]  ret_from_fork_asm+0x1a/0x30
[   15.171617] 
[   15.171688] The buggy address belongs to the object at ffff8881038e3c00
[   15.171688]  which belongs to the cache kmalloc-64 of size 64
[   15.172796] The buggy address is located 0 bytes to the right of
[   15.172796]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.173827] 
[   15.174073] The buggy address belongs to the physical page:
[   15.174542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.174887] flags: 0x200000000000000(node=0|zone=2)
[   15.175339] page_type: f5(slab)
[   15.175686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.176391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.176718] page dumped because: kasan: bad access detected
[   15.176952] 
[   15.177296] Memory state around the buggy address:
[   15.177596]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.177912]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178495] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.178952]                                      ^
[   15.179361]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179661]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179966] ==================================================================
[   16.039733] ==================================================================
[   16.040085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.040396] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.040659] 
[   16.040779] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.040819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.040832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.040851] Call Trace:
[   16.040866]  <TASK>
[   16.040904]  dump_stack_lvl+0x73/0xb0
[   16.040933]  print_report+0xd1/0x650
[   16.040957]  ? __virt_addr_valid+0x1db/0x2d0
[   16.040979]  ? kasan_atomics_helper+0x1818/0x5450
[   16.041002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.041027]  ? kasan_atomics_helper+0x1818/0x5450
[   16.041063]  kasan_report+0x141/0x180
[   16.041085]  ? kasan_atomics_helper+0x1818/0x5450
[   16.041113]  kasan_check_range+0x10c/0x1c0
[   16.041139]  __kasan_check_write+0x18/0x20
[   16.041160]  kasan_atomics_helper+0x1818/0x5450
[   16.041185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.041208]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.041234]  ? kasan_atomics+0x152/0x310
[   16.041261]  kasan_atomics+0x1dc/0x310
[   16.041285]  ? __pfx_kasan_atomics+0x10/0x10
[   16.041308]  ? trace_hardirqs_on+0x37/0xe0
[   16.041332]  ? __pfx_read_tsc+0x10/0x10
[   16.041353]  ? ktime_get_ts64+0x86/0x230
[   16.041379]  kunit_try_run_case+0x1a5/0x480
[   16.041404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.041430]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.041456]  ? __kthread_parkme+0x82/0x180
[   16.041477]  ? preempt_count_sub+0x50/0x80
[   16.041502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.041527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.041553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.041579]  kthread+0x337/0x6f0
[   16.041599]  ? trace_preempt_on+0x20/0xc0
[   16.041643]  ? __pfx_kthread+0x10/0x10
[   16.041666]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.041689]  ? calculate_sigpending+0x7b/0xa0
[   16.041724]  ? __pfx_kthread+0x10/0x10
[   16.041747]  ret_from_fork+0x116/0x1d0
[   16.041766]  ? __pfx_kthread+0x10/0x10
[   16.041787]  ret_from_fork_asm+0x1a/0x30
[   16.041820]  </TASK>
[   16.041831] 
[   16.049120] Allocated by task 282:
[   16.049307]  kasan_save_stack+0x45/0x70
[   16.049526]  kasan_save_track+0x18/0x40
[   16.049723]  kasan_save_alloc_info+0x3b/0x50
[   16.049890]  __kasan_kmalloc+0xb7/0xc0
[   16.050022]  __kmalloc_cache_noprof+0x189/0x420
[   16.050257]  kasan_atomics+0x95/0x310
[   16.050446]  kunit_try_run_case+0x1a5/0x480
[   16.050622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.050804]  kthread+0x337/0x6f0
[   16.050923]  ret_from_fork+0x116/0x1d0
[   16.051083]  ret_from_fork_asm+0x1a/0x30
[   16.051283] 
[   16.051378] The buggy address belongs to the object at ffff8881038e3c00
[   16.051378]  which belongs to the cache kmalloc-64 of size 64
[   16.051954] The buggy address is located 0 bytes to the right of
[   16.051954]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.052564] 
[   16.052661] The buggy address belongs to the physical page:
[   16.052861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.053095] flags: 0x200000000000000(node=0|zone=2)
[   16.053308] page_type: f5(slab)
[   16.053478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.053854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.054195] page dumped because: kasan: bad access detected
[   16.054448] 
[   16.054519] Memory state around the buggy address:
[   16.054673]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.054924]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.055240] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.055592]                                      ^
[   16.055801]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.056018]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.056347] ==================================================================
[   15.423585] ==================================================================
[   15.423916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.424360] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.424716] 
[   15.424821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.424876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.424889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.424910] Call Trace:
[   15.424925]  <TASK>
[   15.424951]  dump_stack_lvl+0x73/0xb0
[   15.424982]  print_report+0xd1/0x650
[   15.425004]  ? __virt_addr_valid+0x1db/0x2d0
[   15.425027]  ? kasan_atomics_helper+0xc70/0x5450
[   15.425059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.425083]  ? kasan_atomics_helper+0xc70/0x5450
[   15.425106]  kasan_report+0x141/0x180
[   15.425290]  ? kasan_atomics_helper+0xc70/0x5450
[   15.425323]  kasan_check_range+0x10c/0x1c0
[   15.425349]  __kasan_check_write+0x18/0x20
[   15.425370]  kasan_atomics_helper+0xc70/0x5450
[   15.425395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.425420]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.425446]  ? kasan_atomics+0x152/0x310
[   15.425488]  kasan_atomics+0x1dc/0x310
[   15.425512]  ? __pfx_kasan_atomics+0x10/0x10
[   15.425535]  ? trace_hardirqs_on+0x37/0xe0
[   15.425573]  ? __pfx_read_tsc+0x10/0x10
[   15.425595]  ? ktime_get_ts64+0x86/0x230
[   15.425620]  kunit_try_run_case+0x1a5/0x480
[   15.425645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.425672]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.425699]  ? __kthread_parkme+0x82/0x180
[   15.425730]  ? preempt_count_sub+0x50/0x80
[   15.425755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.425780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.425807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.425833]  kthread+0x337/0x6f0
[   15.425852]  ? trace_preempt_on+0x20/0xc0
[   15.425876]  ? __pfx_kthread+0x10/0x10
[   15.425897]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.425921]  ? calculate_sigpending+0x7b/0xa0
[   15.425945]  ? __pfx_kthread+0x10/0x10
[   15.425967]  ret_from_fork+0x116/0x1d0
[   15.425996]  ? __pfx_kthread+0x10/0x10
[   15.426018]  ret_from_fork_asm+0x1a/0x30
[   15.426049]  </TASK>
[   15.426072] 
[   15.439449] Allocated by task 282:
[   15.439638]  kasan_save_stack+0x45/0x70
[   15.439847]  kasan_save_track+0x18/0x40
[   15.440002]  kasan_save_alloc_info+0x3b/0x50
[   15.440504]  __kasan_kmalloc+0xb7/0xc0
[   15.440679]  __kmalloc_cache_noprof+0x189/0x420
[   15.440870]  kasan_atomics+0x95/0x310
[   15.441370]  kunit_try_run_case+0x1a5/0x480
[   15.441578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.441797]  kthread+0x337/0x6f0
[   15.441941]  ret_from_fork+0x116/0x1d0
[   15.442362]  ret_from_fork_asm+0x1a/0x30
[   15.442537] 
[   15.442617] The buggy address belongs to the object at ffff8881038e3c00
[   15.442617]  which belongs to the cache kmalloc-64 of size 64
[   15.443018] The buggy address is located 0 bytes to the right of
[   15.443018]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.443368] 
[   15.443441] The buggy address belongs to the physical page:
[   15.443607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.443850] flags: 0x200000000000000(node=0|zone=2)
[   15.444010] page_type: f5(slab)
[   15.444130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.444798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.445038] page dumped because: kasan: bad access detected
[   15.445244] 
[   15.445360] Memory state around the buggy address:
[   15.446519]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.446844]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.447665] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.448477]                                      ^
[   15.448642]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449202]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449533] ==================================================================
[   16.128202] ==================================================================
[   16.128542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.128914] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.129216] 
[   16.129299] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.129340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.129352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.129373] Call Trace:
[   16.129389]  <TASK>
[   16.129405]  dump_stack_lvl+0x73/0xb0
[   16.129433]  print_report+0xd1/0x650
[   16.129456]  ? __virt_addr_valid+0x1db/0x2d0
[   16.129479]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.129502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.129527]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.129550]  kasan_report+0x141/0x180
[   16.129572]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.129600]  kasan_check_range+0x10c/0x1c0
[   16.129624]  __kasan_check_write+0x18/0x20
[   16.129645]  kasan_atomics_helper+0x1b22/0x5450
[   16.129669]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.129693]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.129756]  ? kasan_atomics+0x152/0x310
[   16.129783]  kasan_atomics+0x1dc/0x310
[   16.129808]  ? __pfx_kasan_atomics+0x10/0x10
[   16.129832]  ? trace_hardirqs_on+0x37/0xe0
[   16.129856]  ? __pfx_read_tsc+0x10/0x10
[   16.129877]  ? ktime_get_ts64+0x86/0x230
[   16.129902]  kunit_try_run_case+0x1a5/0x480
[   16.129927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.129954]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.129981]  ? __kthread_parkme+0x82/0x180
[   16.130002]  ? preempt_count_sub+0x50/0x80
[   16.130027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.130062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.130087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.130114]  kthread+0x337/0x6f0
[   16.130134]  ? trace_preempt_on+0x20/0xc0
[   16.130157]  ? __pfx_kthread+0x10/0x10
[   16.130179]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.130202]  ? calculate_sigpending+0x7b/0xa0
[   16.130227]  ? __pfx_kthread+0x10/0x10
[   16.130249]  ret_from_fork+0x116/0x1d0
[   16.130268]  ? __pfx_kthread+0x10/0x10
[   16.130290]  ret_from_fork_asm+0x1a/0x30
[   16.130354]  </TASK>
[   16.130365] 
[   16.137796] Allocated by task 282:
[   16.137977]  kasan_save_stack+0x45/0x70
[   16.138270]  kasan_save_track+0x18/0x40
[   16.138410]  kasan_save_alloc_info+0x3b/0x50
[   16.138555]  __kasan_kmalloc+0xb7/0xc0
[   16.138755]  __kmalloc_cache_noprof+0x189/0x420
[   16.138973]  kasan_atomics+0x95/0x310
[   16.139156]  kunit_try_run_case+0x1a5/0x480
[   16.139469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.139641]  kthread+0x337/0x6f0
[   16.139780]  ret_from_fork+0x116/0x1d0
[   16.139967]  ret_from_fork_asm+0x1a/0x30
[   16.140275] 
[   16.140376] The buggy address belongs to the object at ffff8881038e3c00
[   16.140376]  which belongs to the cache kmalloc-64 of size 64
[   16.140783] The buggy address is located 0 bytes to the right of
[   16.140783]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.141223] 
[   16.141318] The buggy address belongs to the physical page:
[   16.141563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.141915] flags: 0x200000000000000(node=0|zone=2)
[   16.142172] page_type: f5(slab)
[   16.142329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.142647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.142876] page dumped because: kasan: bad access detected
[   16.143044] 
[   16.143137] Memory state around the buggy address:
[   16.143501]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.144466]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.144691] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.144909]                                      ^
[   16.145057]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.145566]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.145897] ==================================================================
[   16.403309] ==================================================================
[   16.403660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.404060] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.404377] 
[   16.404489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.404530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.404542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.404583] Call Trace:
[   16.404595]  <TASK>
[   16.404610]  dump_stack_lvl+0x73/0xb0
[   16.404638]  print_report+0xd1/0x650
[   16.404661]  ? __virt_addr_valid+0x1db/0x2d0
[   16.404685]  ? kasan_atomics_helper+0x218a/0x5450
[   16.404716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.404740]  ? kasan_atomics_helper+0x218a/0x5450
[   16.404782]  kasan_report+0x141/0x180
[   16.404805]  ? kasan_atomics_helper+0x218a/0x5450
[   16.404833]  kasan_check_range+0x10c/0x1c0
[   16.404858]  __kasan_check_write+0x18/0x20
[   16.404879]  kasan_atomics_helper+0x218a/0x5450
[   16.404903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.404927]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.404971]  ? kasan_atomics+0x152/0x310
[   16.404999]  kasan_atomics+0x1dc/0x310
[   16.405022]  ? __pfx_kasan_atomics+0x10/0x10
[   16.405066]  ? trace_hardirqs_on+0x37/0xe0
[   16.405091]  ? __pfx_read_tsc+0x10/0x10
[   16.405130]  ? ktime_get_ts64+0x86/0x230
[   16.405155]  kunit_try_run_case+0x1a5/0x480
[   16.405180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.405206]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.405232]  ? __kthread_parkme+0x82/0x180
[   16.405253]  ? preempt_count_sub+0x50/0x80
[   16.405278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.405304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.405330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.405356]  kthread+0x337/0x6f0
[   16.405376]  ? trace_preempt_on+0x20/0xc0
[   16.405416]  ? __pfx_kthread+0x10/0x10
[   16.405439]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.405462]  ? calculate_sigpending+0x7b/0xa0
[   16.405488]  ? __pfx_kthread+0x10/0x10
[   16.405510]  ret_from_fork+0x116/0x1d0
[   16.405529]  ? __pfx_kthread+0x10/0x10
[   16.405551]  ret_from_fork_asm+0x1a/0x30
[   16.405598]  </TASK>
[   16.405609] 
[   16.413384] Allocated by task 282:
[   16.413603]  kasan_save_stack+0x45/0x70
[   16.413855]  kasan_save_track+0x18/0x40
[   16.414094]  kasan_save_alloc_info+0x3b/0x50
[   16.414265]  __kasan_kmalloc+0xb7/0xc0
[   16.414398]  __kmalloc_cache_noprof+0x189/0x420
[   16.414599]  kasan_atomics+0x95/0x310
[   16.414798]  kunit_try_run_case+0x1a5/0x480
[   16.415045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.415335]  kthread+0x337/0x6f0
[   16.415508]  ret_from_fork+0x116/0x1d0
[   16.415661]  ret_from_fork_asm+0x1a/0x30
[   16.415811] 
[   16.415884] The buggy address belongs to the object at ffff8881038e3c00
[   16.415884]  which belongs to the cache kmalloc-64 of size 64
[   16.416390] The buggy address is located 0 bytes to the right of
[   16.416390]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.416946] 
[   16.417057] The buggy address belongs to the physical page:
[   16.417271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.417508] flags: 0x200000000000000(node=0|zone=2)
[   16.417691] page_type: f5(slab)
[   16.417867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.418255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.418609] page dumped because: kasan: bad access detected
[   16.418872] 
[   16.418985] Memory state around the buggy address:
[   16.419203]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.419518]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.419835] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.420169]                                      ^
[   16.420400]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.420695]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.421013] ==================================================================
[   16.446458] ==================================================================
[   16.446800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.447361] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.447843] 
[   16.448086] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.448134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.448148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.448168] Call Trace:
[   16.448182]  <TASK>
[   16.448197]  dump_stack_lvl+0x73/0xb0
[   16.448263]  print_report+0xd1/0x650
[   16.448288]  ? __virt_addr_valid+0x1db/0x2d0
[   16.448311]  ? kasan_atomics_helper+0x224c/0x5450
[   16.448338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.448363]  ? kasan_atomics_helper+0x224c/0x5450
[   16.448385]  kasan_report+0x141/0x180
[   16.448409]  ? kasan_atomics_helper+0x224c/0x5450
[   16.448437]  kasan_check_range+0x10c/0x1c0
[   16.448462]  __kasan_check_write+0x18/0x20
[   16.448483]  kasan_atomics_helper+0x224c/0x5450
[   16.448507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.448531]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.448558]  ? kasan_atomics+0x152/0x310
[   16.448586]  kasan_atomics+0x1dc/0x310
[   16.448609]  ? __pfx_kasan_atomics+0x10/0x10
[   16.448633]  ? trace_hardirqs_on+0x37/0xe0
[   16.448657]  ? __pfx_read_tsc+0x10/0x10
[   16.448678]  ? ktime_get_ts64+0x86/0x230
[   16.448714]  kunit_try_run_case+0x1a5/0x480
[   16.448739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.448765]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.448792]  ? __kthread_parkme+0x82/0x180
[   16.448814]  ? preempt_count_sub+0x50/0x80
[   16.448839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.448865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.448891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.448919]  kthread+0x337/0x6f0
[   16.448943]  ? trace_preempt_on+0x20/0xc0
[   16.448967]  ? __pfx_kthread+0x10/0x10
[   16.448989]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.449011]  ? calculate_sigpending+0x7b/0xa0
[   16.449036]  ? __pfx_kthread+0x10/0x10
[   16.449068]  ret_from_fork+0x116/0x1d0
[   16.449088]  ? __pfx_kthread+0x10/0x10
[   16.449109]  ret_from_fork_asm+0x1a/0x30
[   16.449141]  </TASK>
[   16.449154] 
[   16.460844] Allocated by task 282:
[   16.461030]  kasan_save_stack+0x45/0x70
[   16.461374]  kasan_save_track+0x18/0x40
[   16.461551]  kasan_save_alloc_info+0x3b/0x50
[   16.461747]  __kasan_kmalloc+0xb7/0xc0
[   16.461889]  __kmalloc_cache_noprof+0x189/0x420
[   16.462125]  kasan_atomics+0x95/0x310
[   16.462292]  kunit_try_run_case+0x1a5/0x480
[   16.462436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.462684]  kthread+0x337/0x6f0
[   16.462854]  ret_from_fork+0x116/0x1d0
[   16.463015]  ret_from_fork_asm+0x1a/0x30
[   16.463198] 
[   16.463295] The buggy address belongs to the object at ffff8881038e3c00
[   16.463295]  which belongs to the cache kmalloc-64 of size 64
[   16.463812] The buggy address is located 0 bytes to the right of
[   16.463812]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.464323] 
[   16.464410] The buggy address belongs to the physical page:
[   16.464576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.465012] flags: 0x200000000000000(node=0|zone=2)
[   16.465286] page_type: f5(slab)
[   16.465425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.465651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.465984] page dumped because: kasan: bad access detected
[   16.466483] 
[   16.466575] Memory state around the buggy address:
[   16.466761]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.466970]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.467273] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.467625]                                      ^
[   16.467785]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.468051]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.468370] ==================================================================
[   15.696133] ==================================================================
[   15.696410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.696641] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.696878] 
[   15.696962] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.697003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.697015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.697035] Call Trace:
[   15.697049]  <TASK>
[   15.697064]  dump_stack_lvl+0x73/0xb0
[   15.697091]  print_report+0xd1/0x650
[   15.697113]  ? __virt_addr_valid+0x1db/0x2d0
[   15.697135]  ? kasan_atomics_helper+0x1148/0x5450
[   15.697156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.697180]  ? kasan_atomics_helper+0x1148/0x5450
[   15.697201]  kasan_report+0x141/0x180
[   15.697223]  ? kasan_atomics_helper+0x1148/0x5450
[   15.697250]  kasan_check_range+0x10c/0x1c0
[   15.697274]  __kasan_check_write+0x18/0x20
[   15.697293]  kasan_atomics_helper+0x1148/0x5450
[   15.697753]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.697786]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.697821]  ? kasan_atomics+0x152/0x310
[   15.697849]  kasan_atomics+0x1dc/0x310
[   15.697873]  ? __pfx_kasan_atomics+0x10/0x10
[   15.697897]  ? trace_hardirqs_on+0x37/0xe0
[   15.697921]  ? __pfx_read_tsc+0x10/0x10
[   15.697943]  ? ktime_get_ts64+0x86/0x230
[   15.697968]  kunit_try_run_case+0x1a5/0x480
[   15.697993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.698019]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.698057]  ? __kthread_parkme+0x82/0x180
[   15.698080]  ? preempt_count_sub+0x50/0x80
[   15.698105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.698130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.698157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.698182]  kthread+0x337/0x6f0
[   15.698203]  ? trace_preempt_on+0x20/0xc0
[   15.698226]  ? __pfx_kthread+0x10/0x10
[   15.698248]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.698271]  ? calculate_sigpending+0x7b/0xa0
[   15.698296]  ? __pfx_kthread+0x10/0x10
[   15.698319]  ret_from_fork+0x116/0x1d0
[   15.698338]  ? __pfx_kthread+0x10/0x10
[   15.698359]  ret_from_fork_asm+0x1a/0x30
[   15.698391]  </TASK>
[   15.698402] 
[   15.712686] Allocated by task 282:
[   15.712864]  kasan_save_stack+0x45/0x70
[   15.713364]  kasan_save_track+0x18/0x40
[   15.713577]  kasan_save_alloc_info+0x3b/0x50
[   15.713745]  __kasan_kmalloc+0xb7/0xc0
[   15.714061]  __kmalloc_cache_noprof+0x189/0x420
[   15.714286]  kasan_atomics+0x95/0x310
[   15.714512]  kunit_try_run_case+0x1a5/0x480
[   15.714678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.714968]  kthread+0x337/0x6f0
[   15.715109]  ret_from_fork+0x116/0x1d0
[   15.715285]  ret_from_fork_asm+0x1a/0x30
[   15.715495] 
[   15.715593] The buggy address belongs to the object at ffff8881038e3c00
[   15.715593]  which belongs to the cache kmalloc-64 of size 64
[   15.716118] The buggy address is located 0 bytes to the right of
[   15.716118]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.716572] 
[   15.716669] The buggy address belongs to the physical page:
[   15.716957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.717290] flags: 0x200000000000000(node=0|zone=2)
[   15.717766] page_type: f5(slab)
[   15.717942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.718371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.718659] page dumped because: kasan: bad access detected
[   15.718916] 
[   15.719013] Memory state around the buggy address:
[   15.719192]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.719547]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.719978] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.720276]                                      ^
[   15.720499]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720740]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720963] ==================================================================
[   15.677794] ==================================================================
[   15.678209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.678473] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.678694] 
[   15.678818] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.678860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.678872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.678893] Call Trace:
[   15.678907]  <TASK>
[   15.678922]  dump_stack_lvl+0x73/0xb0
[   15.678950]  print_report+0xd1/0x650
[   15.678974]  ? __virt_addr_valid+0x1db/0x2d0
[   15.678996]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.679019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.679044]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.679091]  kasan_report+0x141/0x180
[   15.679123]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.679151]  __asan_report_load4_noabort+0x18/0x20
[   15.679177]  kasan_atomics_helper+0x4a1c/0x5450
[   15.679202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.679225]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.679252]  ? kasan_atomics+0x152/0x310
[   15.679281]  kasan_atomics+0x1dc/0x310
[   15.679304]  ? __pfx_kasan_atomics+0x10/0x10
[   15.679328]  ? trace_hardirqs_on+0x37/0xe0
[   15.679353]  ? __pfx_read_tsc+0x10/0x10
[   15.679375]  ? ktime_get_ts64+0x86/0x230
[   15.679399]  kunit_try_run_case+0x1a5/0x480
[   15.679425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.679451]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.679478]  ? __kthread_parkme+0x82/0x180
[   15.679499]  ? preempt_count_sub+0x50/0x80
[   15.679524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.679550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.679582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.679608]  kthread+0x337/0x6f0
[   15.679629]  ? trace_preempt_on+0x20/0xc0
[   15.679651]  ? __pfx_kthread+0x10/0x10
[   15.679674]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.679696]  ? calculate_sigpending+0x7b/0xa0
[   15.679732]  ? __pfx_kthread+0x10/0x10
[   15.679755]  ret_from_fork+0x116/0x1d0
[   15.679775]  ? __pfx_kthread+0x10/0x10
[   15.679796]  ret_from_fork_asm+0x1a/0x30
[   15.679828]  </TASK>
[   15.679839] 
[   15.687676] Allocated by task 282:
[   15.687813]  kasan_save_stack+0x45/0x70
[   15.687958]  kasan_save_track+0x18/0x40
[   15.688094]  kasan_save_alloc_info+0x3b/0x50
[   15.688244]  __kasan_kmalloc+0xb7/0xc0
[   15.688431]  __kmalloc_cache_noprof+0x189/0x420
[   15.688755]  kasan_atomics+0x95/0x310
[   15.688945]  kunit_try_run_case+0x1a5/0x480
[   15.689382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.689646]  kthread+0x337/0x6f0
[   15.689824]  ret_from_fork+0x116/0x1d0
[   15.690002]  ret_from_fork_asm+0x1a/0x30
[   15.690211] 
[   15.690282] The buggy address belongs to the object at ffff8881038e3c00
[   15.690282]  which belongs to the cache kmalloc-64 of size 64
[   15.690631] The buggy address is located 0 bytes to the right of
[   15.690631]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.691007] 
[   15.691080] The buggy address belongs to the physical page:
[   15.691331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.691694] flags: 0x200000000000000(node=0|zone=2)
[   15.691942] page_type: f5(slab)
[   15.692111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.692466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.692818] page dumped because: kasan: bad access detected
[   15.693076] 
[   15.693171] Memory state around the buggy address:
[   15.693401]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.693772]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.694149] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.694460]                                      ^
[   15.694712]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694928]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.695419] ==================================================================
[   15.223733] ==================================================================
[   15.224036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.224886] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.225238] 
[   15.225360] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.225403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.225416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.225437] Call Trace:
[   15.225451]  <TASK>
[   15.225465]  dump_stack_lvl+0x73/0xb0
[   15.225494]  print_report+0xd1/0x650
[   15.225517]  ? __virt_addr_valid+0x1db/0x2d0
[   15.225540]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.225562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.225587]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.225610]  kasan_report+0x141/0x180
[   15.225633]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.225662]  kasan_check_range+0x10c/0x1c0
[   15.225687]  __kasan_check_write+0x18/0x20
[   15.225719]  kasan_atomics_helper+0x5fe/0x5450
[   15.225742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.225766]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.225792]  ? kasan_atomics+0x152/0x310
[   15.225819]  kasan_atomics+0x1dc/0x310
[   15.225843]  ? __pfx_kasan_atomics+0x10/0x10
[   15.225866]  ? trace_hardirqs_on+0x37/0xe0
[   15.225891]  ? __pfx_read_tsc+0x10/0x10
[   15.225912]  ? ktime_get_ts64+0x86/0x230
[   15.225936]  kunit_try_run_case+0x1a5/0x480
[   15.225962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225988]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.226014]  ? __kthread_parkme+0x82/0x180
[   15.226099]  ? preempt_count_sub+0x50/0x80
[   15.226125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.226151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.226177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.226204]  kthread+0x337/0x6f0
[   15.226223]  ? trace_preempt_on+0x20/0xc0
[   15.226247]  ? __pfx_kthread+0x10/0x10
[   15.226268]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.226291]  ? calculate_sigpending+0x7b/0xa0
[   15.226315]  ? __pfx_kthread+0x10/0x10
[   15.226339]  ret_from_fork+0x116/0x1d0
[   15.226358]  ? __pfx_kthread+0x10/0x10
[   15.226381]  ret_from_fork_asm+0x1a/0x30
[   15.226414]  </TASK>
[   15.226426] 
[   15.234287] Allocated by task 282:
[   15.234468]  kasan_save_stack+0x45/0x70
[   15.234666]  kasan_save_track+0x18/0x40
[   15.234845]  kasan_save_alloc_info+0x3b/0x50
[   15.234995]  __kasan_kmalloc+0xb7/0xc0
[   15.235450]  __kmalloc_cache_noprof+0x189/0x420
[   15.235695]  kasan_atomics+0x95/0x310
[   15.235842]  kunit_try_run_case+0x1a5/0x480
[   15.235990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.236243]  kthread+0x337/0x6f0
[   15.236419]  ret_from_fork+0x116/0x1d0
[   15.236763]  ret_from_fork_asm+0x1a/0x30
[   15.237315] 
[   15.237404] The buggy address belongs to the object at ffff8881038e3c00
[   15.237404]  which belongs to the cache kmalloc-64 of size 64
[   15.237799] The buggy address is located 0 bytes to the right of
[   15.237799]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.238346] 
[   15.238493] The buggy address belongs to the physical page:
[   15.238753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.239142] flags: 0x200000000000000(node=0|zone=2)
[   15.239345] page_type: f5(slab)
[   15.239466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.239721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.240055] page dumped because: kasan: bad access detected
[   15.240328] 
[   15.240416] Memory state around the buggy address:
[   15.240598]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.240890]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.241217] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.241558]                                      ^
[   15.241761]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.241977]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.242567] ==================================================================
[   15.570071] ==================================================================
[   15.570580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.570866] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.571694] 
[   15.571878] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.571921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.571934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.571957] Call Trace:
[   15.571971]  <TASK>
[   15.571986]  dump_stack_lvl+0x73/0xb0
[   15.572016]  print_report+0xd1/0x650
[   15.572052]  ? __virt_addr_valid+0x1db/0x2d0
[   15.572076]  ? kasan_atomics_helper+0xf10/0x5450
[   15.572110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.572146]  ? kasan_atomics_helper+0xf10/0x5450
[   15.572169]  kasan_report+0x141/0x180
[   15.572192]  ? kasan_atomics_helper+0xf10/0x5450
[   15.572219]  kasan_check_range+0x10c/0x1c0
[   15.572244]  __kasan_check_write+0x18/0x20
[   15.572265]  kasan_atomics_helper+0xf10/0x5450
[   15.572288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.572312]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.572345]  ? kasan_atomics+0x152/0x310
[   15.572373]  kasan_atomics+0x1dc/0x310
[   15.572396]  ? __pfx_kasan_atomics+0x10/0x10
[   15.572420]  ? trace_hardirqs_on+0x37/0xe0
[   15.572445]  ? __pfx_read_tsc+0x10/0x10
[   15.572468]  ? ktime_get_ts64+0x86/0x230
[   15.572493]  kunit_try_run_case+0x1a5/0x480
[   15.572518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572544]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.572571]  ? __kthread_parkme+0x82/0x180
[   15.572592]  ? preempt_count_sub+0x50/0x80
[   15.572617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.572668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.572694]  kthread+0x337/0x6f0
[   15.572725]  ? trace_preempt_on+0x20/0xc0
[   15.572748]  ? __pfx_kthread+0x10/0x10
[   15.572771]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.572794]  ? calculate_sigpending+0x7b/0xa0
[   15.572821]  ? __pfx_kthread+0x10/0x10
[   15.572845]  ret_from_fork+0x116/0x1d0
[   15.572865]  ? __pfx_kthread+0x10/0x10
[   15.572887]  ret_from_fork_asm+0x1a/0x30
[   15.572920]  </TASK>
[   15.572932] 
[   15.585685] Allocated by task 282:
[   15.585961]  kasan_save_stack+0x45/0x70
[   15.586338]  kasan_save_track+0x18/0x40
[   15.586757]  kasan_save_alloc_info+0x3b/0x50
[   15.586918]  __kasan_kmalloc+0xb7/0xc0
[   15.587092]  __kmalloc_cache_noprof+0x189/0x420
[   15.587516]  kasan_atomics+0x95/0x310
[   15.587884]  kunit_try_run_case+0x1a5/0x480
[   15.588369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.588919]  kthread+0x337/0x6f0
[   15.589251]  ret_from_fork+0x116/0x1d0
[   15.589606]  ret_from_fork_asm+0x1a/0x30
[   15.589832] 
[   15.589923] The buggy address belongs to the object at ffff8881038e3c00
[   15.589923]  which belongs to the cache kmalloc-64 of size 64
[   15.591020] The buggy address is located 0 bytes to the right of
[   15.591020]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.591905] 
[   15.592065] The buggy address belongs to the physical page:
[   15.592681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.593279] flags: 0x200000000000000(node=0|zone=2)
[   15.593595] page_type: f5(slab)
[   15.593887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.594137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.594976] page dumped because: kasan: bad access detected
[   15.595172] 
[   15.595349] Memory state around the buggy address:
[   15.595846]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.596739]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.597211] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.597807]                                      ^
[   15.598291]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.598876]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599350] ==================================================================
[   16.074492] ==================================================================
[   16.074751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.075092] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.075653] 
[   16.075848] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.075889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.075901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.075921] Call Trace:
[   16.075934]  <TASK>
[   16.075948]  dump_stack_lvl+0x73/0xb0
[   16.075976]  print_report+0xd1/0x650
[   16.076000]  ? __virt_addr_valid+0x1db/0x2d0
[   16.076023]  ? kasan_atomics_helper+0x194a/0x5450
[   16.076045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.076090]  ? kasan_atomics_helper+0x194a/0x5450
[   16.076114]  kasan_report+0x141/0x180
[   16.076137]  ? kasan_atomics_helper+0x194a/0x5450
[   16.076166]  kasan_check_range+0x10c/0x1c0
[   16.076191]  __kasan_check_write+0x18/0x20
[   16.076212]  kasan_atomics_helper+0x194a/0x5450
[   16.076235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.076260]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.076286]  ? kasan_atomics+0x152/0x310
[   16.076330]  kasan_atomics+0x1dc/0x310
[   16.076355]  ? __pfx_kasan_atomics+0x10/0x10
[   16.076379]  ? trace_hardirqs_on+0x37/0xe0
[   16.076403]  ? __pfx_read_tsc+0x10/0x10
[   16.076426]  ? ktime_get_ts64+0x86/0x230
[   16.076449]  kunit_try_run_case+0x1a5/0x480
[   16.076475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.076501]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.076526]  ? __kthread_parkme+0x82/0x180
[   16.076548]  ? preempt_count_sub+0x50/0x80
[   16.076574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.076600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.076626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.076653]  kthread+0x337/0x6f0
[   16.076672]  ? trace_preempt_on+0x20/0xc0
[   16.076695]  ? __pfx_kthread+0x10/0x10
[   16.076728]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.076750]  ? calculate_sigpending+0x7b/0xa0
[   16.076775]  ? __pfx_kthread+0x10/0x10
[   16.076798]  ret_from_fork+0x116/0x1d0
[   16.076817]  ? __pfx_kthread+0x10/0x10
[   16.076839]  ret_from_fork_asm+0x1a/0x30
[   16.076871]  </TASK>
[   16.076882] 
[   16.084198] Allocated by task 282:
[   16.084402]  kasan_save_stack+0x45/0x70
[   16.084621]  kasan_save_track+0x18/0x40
[   16.084829]  kasan_save_alloc_info+0x3b/0x50
[   16.085037]  __kasan_kmalloc+0xb7/0xc0
[   16.085267]  __kmalloc_cache_noprof+0x189/0x420
[   16.085454]  kasan_atomics+0x95/0x310
[   16.085664]  kunit_try_run_case+0x1a5/0x480
[   16.085890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.086163]  kthread+0x337/0x6f0
[   16.086339]  ret_from_fork+0x116/0x1d0
[   16.086514]  ret_from_fork_asm+0x1a/0x30
[   16.086720] 
[   16.086811] The buggy address belongs to the object at ffff8881038e3c00
[   16.086811]  which belongs to the cache kmalloc-64 of size 64
[   16.087282] The buggy address is located 0 bytes to the right of
[   16.087282]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.087795] 
[   16.087895] The buggy address belongs to the physical page:
[   16.088160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.088398] flags: 0x200000000000000(node=0|zone=2)
[   16.088555] page_type: f5(slab)
[   16.088672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.088938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.089286] page dumped because: kasan: bad access detected
[   16.089747] 
[   16.089840] Memory state around the buggy address:
[   16.090061]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.090374]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.090650] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.090867]                                      ^
[   16.091017]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.091224]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.091472] ==================================================================
[   16.213396] ==================================================================
[   16.214094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.214951] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.215423] 
[   16.215647] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.215815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.215834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.215856] Call Trace:
[   16.215873]  <TASK>
[   16.215902]  dump_stack_lvl+0x73/0xb0
[   16.215936]  print_report+0xd1/0x650
[   16.215996]  ? __virt_addr_valid+0x1db/0x2d0
[   16.216021]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.216055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.216080]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.216104]  kasan_report+0x141/0x180
[   16.216127]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.216155]  kasan_check_range+0x10c/0x1c0
[   16.216180]  __kasan_check_write+0x18/0x20
[   16.216201]  kasan_atomics_helper+0x1d7a/0x5450
[   16.216225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.216249]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.216276]  ? kasan_atomics+0x152/0x310
[   16.216303]  kasan_atomics+0x1dc/0x310
[   16.216331]  ? __pfx_kasan_atomics+0x10/0x10
[   16.216355]  ? trace_hardirqs_on+0x37/0xe0
[   16.216380]  ? __pfx_read_tsc+0x10/0x10
[   16.216402]  ? ktime_get_ts64+0x86/0x230
[   16.216427]  kunit_try_run_case+0x1a5/0x480
[   16.216453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216478]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.216506]  ? __kthread_parkme+0x82/0x180
[   16.216527]  ? preempt_count_sub+0x50/0x80
[   16.216553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.216631]  kthread+0x337/0x6f0
[   16.216651]  ? trace_preempt_on+0x20/0xc0
[   16.216675]  ? __pfx_kthread+0x10/0x10
[   16.216696]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.216730]  ? calculate_sigpending+0x7b/0xa0
[   16.216754]  ? __pfx_kthread+0x10/0x10
[   16.216777]  ret_from_fork+0x116/0x1d0
[   16.216796]  ? __pfx_kthread+0x10/0x10
[   16.216818]  ret_from_fork_asm+0x1a/0x30
[   16.216850]  </TASK>
[   16.216862] 
[   16.226504] Allocated by task 282:
[   16.226634]  kasan_save_stack+0x45/0x70
[   16.226789]  kasan_save_track+0x18/0x40
[   16.226923]  kasan_save_alloc_info+0x3b/0x50
[   16.227125]  __kasan_kmalloc+0xb7/0xc0
[   16.227845]  __kmalloc_cache_noprof+0x189/0x420
[   16.228298]  kasan_atomics+0x95/0x310
[   16.228688]  kunit_try_run_case+0x1a5/0x480
[   16.229181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.229688]  kthread+0x337/0x6f0
[   16.230157]  ret_from_fork+0x116/0x1d0
[   16.230408]  ret_from_fork_asm+0x1a/0x30
[   16.230580] 
[   16.230669] The buggy address belongs to the object at ffff8881038e3c00
[   16.230669]  which belongs to the cache kmalloc-64 of size 64
[   16.231315] The buggy address is located 0 bytes to the right of
[   16.231315]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.231766] 
[   16.231856] The buggy address belongs to the physical page:
[   16.232175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.233097] flags: 0x200000000000000(node=0|zone=2)
[   16.233401] page_type: f5(slab)
[   16.233531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.233774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.234015] page dumped because: kasan: bad access detected
[   16.234187] 
[   16.234256] Memory state around the buggy address:
[   16.234408]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.234621]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.235571] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.236466]                                      ^
[   16.236843]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.237525]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.237978] ==================================================================
[   15.129278] ==================================================================
[   15.129647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.130521] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.131117] 
[   15.131324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.131367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.131402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.131424] Call Trace:
[   15.131441]  <TASK>
[   15.131456]  dump_stack_lvl+0x73/0xb0
[   15.131499]  print_report+0xd1/0x650
[   15.131523]  ? __virt_addr_valid+0x1db/0x2d0
[   15.131546]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.131569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.131594]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.131617]  kasan_report+0x141/0x180
[   15.131669]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.131697]  __asan_report_load4_noabort+0x18/0x20
[   15.131739]  kasan_atomics_helper+0x4b54/0x5450
[   15.131763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.131787]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.131813]  ? kasan_atomics+0x152/0x310
[   15.131841]  kasan_atomics+0x1dc/0x310
[   15.131864]  ? __pfx_kasan_atomics+0x10/0x10
[   15.131887]  ? trace_hardirqs_on+0x37/0xe0
[   15.131912]  ? __pfx_read_tsc+0x10/0x10
[   15.131934]  ? ktime_get_ts64+0x86/0x230
[   15.131959]  kunit_try_run_case+0x1a5/0x480
[   15.131985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132017]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.132045]  ? __kthread_parkme+0x82/0x180
[   15.132066]  ? preempt_count_sub+0x50/0x80
[   15.132090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.132142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.132169]  kthread+0x337/0x6f0
[   15.132189]  ? trace_preempt_on+0x20/0xc0
[   15.132212]  ? __pfx_kthread+0x10/0x10
[   15.132234]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.132257]  ? calculate_sigpending+0x7b/0xa0
[   15.132283]  ? __pfx_kthread+0x10/0x10
[   15.132305]  ret_from_fork+0x116/0x1d0
[   15.132331]  ? __pfx_kthread+0x10/0x10
[   15.132352]  ret_from_fork_asm+0x1a/0x30
[   15.132384]  </TASK>
[   15.132395] 
[   15.147084] Allocated by task 282:
[   15.147450]  kasan_save_stack+0x45/0x70
[   15.147841]  kasan_save_track+0x18/0x40
[   15.148261]  kasan_save_alloc_info+0x3b/0x50
[   15.148719]  __kasan_kmalloc+0xb7/0xc0
[   15.148889]  __kmalloc_cache_noprof+0x189/0x420
[   15.149069]  kasan_atomics+0x95/0x310
[   15.149485]  kunit_try_run_case+0x1a5/0x480
[   15.149897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.150558]  kthread+0x337/0x6f0
[   15.150923]  ret_from_fork+0x116/0x1d0
[   15.151261]  ret_from_fork_asm+0x1a/0x30
[   15.151405] 
[   15.151477] The buggy address belongs to the object at ffff8881038e3c00
[   15.151477]  which belongs to the cache kmalloc-64 of size 64
[   15.151848] The buggy address is located 0 bytes to the right of
[   15.151848]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.152476] 
[   15.152549] The buggy address belongs to the physical page:
[   15.152785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.153181] flags: 0x200000000000000(node=0|zone=2)
[   15.153438] page_type: f5(slab)
[   15.153679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.153939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.154557] page dumped because: kasan: bad access detected
[   15.154821] 
[   15.154959] Memory state around the buggy address:
[   15.155186]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.155559]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.155829] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.156153]                                      ^
[   15.156409]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.156772]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.157051] ==================================================================
[   15.018967] ==================================================================
[   15.019428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.019904] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.020582] 
[   15.020714] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.020761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.020797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.020882] Call Trace:
[   15.020896]  <TASK>
[   15.020913]  dump_stack_lvl+0x73/0xb0
[   15.020946]  print_report+0xd1/0x650
[   15.020968]  ? __virt_addr_valid+0x1db/0x2d0
[   15.020993]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.021014]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.021037]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.021227]  kasan_report+0x141/0x180
[   15.021251]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.021279]  __asan_report_store4_noabort+0x1b/0x30
[   15.021305]  kasan_atomics_helper+0x4ba2/0x5450
[   15.021328]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.021351]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.021377]  ? kasan_atomics+0x152/0x310
[   15.021404]  kasan_atomics+0x1dc/0x310
[   15.021426]  ? __pfx_kasan_atomics+0x10/0x10
[   15.021448]  ? trace_hardirqs_on+0x37/0xe0
[   15.021473]  ? __pfx_read_tsc+0x10/0x10
[   15.021496]  ? ktime_get_ts64+0x86/0x230
[   15.021521]  kunit_try_run_case+0x1a5/0x480
[   15.021546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.021571]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.021598]  ? __kthread_parkme+0x82/0x180
[   15.021619]  ? preempt_count_sub+0x50/0x80
[   15.021644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.021668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.021694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.021733]  kthread+0x337/0x6f0
[   15.021752]  ? trace_preempt_on+0x20/0xc0
[   15.021775]  ? __pfx_kthread+0x10/0x10
[   15.021795]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.021817]  ? calculate_sigpending+0x7b/0xa0
[   15.021841]  ? __pfx_kthread+0x10/0x10
[   15.021863]  ret_from_fork+0x116/0x1d0
[   15.021881]  ? __pfx_kthread+0x10/0x10
[   15.021902]  ret_from_fork_asm+0x1a/0x30
[   15.021933]  </TASK>
[   15.021944] 
[   15.033868] Allocated by task 282:
[   15.034414]  kasan_save_stack+0x45/0x70
[   15.034630]  kasan_save_track+0x18/0x40
[   15.034825]  kasan_save_alloc_info+0x3b/0x50
[   15.035169]  __kasan_kmalloc+0xb7/0xc0
[   15.035516]  __kmalloc_cache_noprof+0x189/0x420
[   15.035764]  kasan_atomics+0x95/0x310
[   15.036145]  kunit_try_run_case+0x1a5/0x480
[   15.036326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.036742]  kthread+0x337/0x6f0
[   15.036929]  ret_from_fork+0x116/0x1d0
[   15.037391]  ret_from_fork_asm+0x1a/0x30
[   15.037589] 
[   15.037669] The buggy address belongs to the object at ffff8881038e3c00
[   15.037669]  which belongs to the cache kmalloc-64 of size 64
[   15.038312] The buggy address is located 0 bytes to the right of
[   15.038312]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.039364] 
[   15.039712] The buggy address belongs to the physical page:
[   15.039961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.040483] flags: 0x200000000000000(node=0|zone=2)
[   15.040742] page_type: f5(slab)
[   15.040916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.041552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.041910] page dumped because: kasan: bad access detected
[   15.042616] 
[   15.042730] Memory state around the buggy address:
[   15.042926]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.043503]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.044004] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.044366]                                      ^
[   15.044597]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.044909]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.045498] ==================================================================
[   15.280456] ==================================================================
[   15.281080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.281424] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.281761] 
[   15.281869] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.281910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.281923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.281944] Call Trace:
[   15.281958]  <TASK>
[   15.281974]  dump_stack_lvl+0x73/0xb0
[   15.282003]  print_report+0xd1/0x650
[   15.282086]  ? __virt_addr_valid+0x1db/0x2d0
[   15.282115]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.282137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.282162]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.282186]  kasan_report+0x141/0x180
[   15.282209]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.282236]  kasan_check_range+0x10c/0x1c0
[   15.282262]  __kasan_check_write+0x18/0x20
[   15.282283]  kasan_atomics_helper+0x7c7/0x5450
[   15.282306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.282331]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.282358]  ? kasan_atomics+0x152/0x310
[   15.282386]  kasan_atomics+0x1dc/0x310
[   15.282409]  ? __pfx_kasan_atomics+0x10/0x10
[   15.282433]  ? trace_hardirqs_on+0x37/0xe0
[   15.282457]  ? __pfx_read_tsc+0x10/0x10
[   15.282478]  ? ktime_get_ts64+0x86/0x230
[   15.282502]  kunit_try_run_case+0x1a5/0x480
[   15.282527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.282553]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.282580]  ? __kthread_parkme+0x82/0x180
[   15.282601]  ? preempt_count_sub+0x50/0x80
[   15.282625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.282652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.282677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.282714]  kthread+0x337/0x6f0
[   15.282735]  ? trace_preempt_on+0x20/0xc0
[   15.282757]  ? __pfx_kthread+0x10/0x10
[   15.282780]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.282802]  ? calculate_sigpending+0x7b/0xa0
[   15.282827]  ? __pfx_kthread+0x10/0x10
[   15.282850]  ret_from_fork+0x116/0x1d0
[   15.282869]  ? __pfx_kthread+0x10/0x10
[   15.282891]  ret_from_fork_asm+0x1a/0x30
[   15.282922]  </TASK>
[   15.282934] 
[   15.290594] Allocated by task 282:
[   15.290782]  kasan_save_stack+0x45/0x70
[   15.290961]  kasan_save_track+0x18/0x40
[   15.291201]  kasan_save_alloc_info+0x3b/0x50
[   15.291387]  __kasan_kmalloc+0xb7/0xc0
[   15.291521]  __kmalloc_cache_noprof+0x189/0x420
[   15.291678]  kasan_atomics+0x95/0x310
[   15.291858]  kunit_try_run_case+0x1a5/0x480
[   15.292065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292455]  kthread+0x337/0x6f0
[   15.292779]  ret_from_fork+0x116/0x1d0
[   15.292948]  ret_from_fork_asm+0x1a/0x30
[   15.293191] 
[   15.293282] The buggy address belongs to the object at ffff8881038e3c00
[   15.293282]  which belongs to the cache kmalloc-64 of size 64
[   15.293698] The buggy address is located 0 bytes to the right of
[   15.293698]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.294070] 
[   15.294164] The buggy address belongs to the physical page:
[   15.294422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.295001] flags: 0x200000000000000(node=0|zone=2)
[   15.295391] page_type: f5(slab)
[   15.295513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.295757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.295983] page dumped because: kasan: bad access detected
[   15.296153] 
[   15.296352] Memory state around the buggy address:
[   15.296584]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.296915]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.297234] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.297712]                                      ^
[   15.298012]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.298569]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.298881] ==================================================================
[   15.318652] ==================================================================
[   15.318999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.319446] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.319807] 
[   15.319920] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.319962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.319975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.320006] Call Trace:
[   15.320020]  <TASK>
[   15.320034]  dump_stack_lvl+0x73/0xb0
[   15.320075]  print_report+0xd1/0x650
[   15.320245]  ? __virt_addr_valid+0x1db/0x2d0
[   15.320270]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.320292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.320323]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.320346]  kasan_report+0x141/0x180
[   15.320369]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.320409]  kasan_check_range+0x10c/0x1c0
[   15.320434]  __kasan_check_write+0x18/0x20
[   15.320455]  kasan_atomics_helper+0x8f9/0x5450
[   15.320491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.320515]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.320541]  ? kasan_atomics+0x152/0x310
[   15.320569]  kasan_atomics+0x1dc/0x310
[   15.320593]  ? __pfx_kasan_atomics+0x10/0x10
[   15.320616]  ? trace_hardirqs_on+0x37/0xe0
[   15.320641]  ? __pfx_read_tsc+0x10/0x10
[   15.320663]  ? ktime_get_ts64+0x86/0x230
[   15.320688]  kunit_try_run_case+0x1a5/0x480
[   15.320740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320767]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.320793]  ? __kthread_parkme+0x82/0x180
[   15.320816]  ? preempt_count_sub+0x50/0x80
[   15.320840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.320901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.320927]  kthread+0x337/0x6f0
[   15.320958]  ? trace_preempt_on+0x20/0xc0
[   15.320981]  ? __pfx_kthread+0x10/0x10
[   15.321003]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.321025]  ? calculate_sigpending+0x7b/0xa0
[   15.321097]  ? __pfx_kthread+0x10/0x10
[   15.321119]  ret_from_fork+0x116/0x1d0
[   15.321139]  ? __pfx_kthread+0x10/0x10
[   15.321204]  ret_from_fork_asm+0x1a/0x30
[   15.321237]  </TASK>
[   15.321248] 
[   15.329809] Allocated by task 282:
[   15.329942]  kasan_save_stack+0x45/0x70
[   15.330089]  kasan_save_track+0x18/0x40
[   15.330512]  kasan_save_alloc_info+0x3b/0x50
[   15.330970]  __kasan_kmalloc+0xb7/0xc0
[   15.331314]  __kmalloc_cache_noprof+0x189/0x420
[   15.331779]  kasan_atomics+0x95/0x310
[   15.332068]  kunit_try_run_case+0x1a5/0x480
[   15.332575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.332775]  kthread+0x337/0x6f0
[   15.332901]  ret_from_fork+0x116/0x1d0
[   15.333253]  ret_from_fork_asm+0x1a/0x30
[   15.333629] 
[   15.333783] The buggy address belongs to the object at ffff8881038e3c00
[   15.333783]  which belongs to the cache kmalloc-64 of size 64
[   15.334551] The buggy address is located 0 bytes to the right of
[   15.334551]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.335173] 
[   15.335289] The buggy address belongs to the physical page:
[   15.335507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.335758] flags: 0x200000000000000(node=0|zone=2)
[   15.335993] page_type: f5(slab)
[   15.336476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.336838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.337071] page dumped because: kasan: bad access detected
[   15.337307] 
[   15.337509] Memory state around the buggy address:
[   15.337810]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.338138]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.338541] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.338888]                                      ^
[   15.339174]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.339405]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.339741] ==================================================================
[   15.073116] ==================================================================
[   15.073763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.074475] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.074847] 
[   15.075226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.075271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.075283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.075304] Call Trace:
[   15.075317]  <TASK>
[   15.075480]  dump_stack_lvl+0x73/0xb0
[   15.075516]  print_report+0xd1/0x650
[   15.075652]  ? __virt_addr_valid+0x1db/0x2d0
[   15.075677]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.075732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.075758]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.075782]  kasan_report+0x141/0x180
[   15.075805]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.075834]  __asan_report_store4_noabort+0x1b/0x30
[   15.075860]  kasan_atomics_helper+0x4b6e/0x5450
[   15.075885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.075909]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.075935]  ? kasan_atomics+0x152/0x310
[   15.075962]  kasan_atomics+0x1dc/0x310
[   15.075986]  ? __pfx_kasan_atomics+0x10/0x10
[   15.076010]  ? trace_hardirqs_on+0x37/0xe0
[   15.076099]  ? __pfx_read_tsc+0x10/0x10
[   15.076124]  ? ktime_get_ts64+0x86/0x230
[   15.076150]  kunit_try_run_case+0x1a5/0x480
[   15.076176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.076202]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.076230]  ? __kthread_parkme+0x82/0x180
[   15.076251]  ? preempt_count_sub+0x50/0x80
[   15.076277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.076302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.076336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.076363]  kthread+0x337/0x6f0
[   15.076383]  ? trace_preempt_on+0x20/0xc0
[   15.076407]  ? __pfx_kthread+0x10/0x10
[   15.076428]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.076451]  ? calculate_sigpending+0x7b/0xa0
[   15.076476]  ? __pfx_kthread+0x10/0x10
[   15.076499]  ret_from_fork+0x116/0x1d0
[   15.076519]  ? __pfx_kthread+0x10/0x10
[   15.076540]  ret_from_fork_asm+0x1a/0x30
[   15.076573]  </TASK>
[   15.076584] 
[   15.088259] Allocated by task 282:
[   15.088633]  kasan_save_stack+0x45/0x70
[   15.088859]  kasan_save_track+0x18/0x40
[   15.089188]  kasan_save_alloc_info+0x3b/0x50
[   15.089428]  __kasan_kmalloc+0xb7/0xc0
[   15.089771]  __kmalloc_cache_noprof+0x189/0x420
[   15.090083]  kasan_atomics+0x95/0x310
[   15.090439]  kunit_try_run_case+0x1a5/0x480
[   15.090626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090868]  kthread+0x337/0x6f0
[   15.091407]  ret_from_fork+0x116/0x1d0
[   15.091613]  ret_from_fork_asm+0x1a/0x30
[   15.091880] 
[   15.091988] The buggy address belongs to the object at ffff8881038e3c00
[   15.091988]  which belongs to the cache kmalloc-64 of size 64
[   15.092948] The buggy address is located 0 bytes to the right of
[   15.092948]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.093748] 
[   15.094055] The buggy address belongs to the physical page:
[   15.094422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.095013] flags: 0x200000000000000(node=0|zone=2)
[   15.095431] page_type: f5(slab)
[   15.095600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.096024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.096386] page dumped because: kasan: bad access detected
[   15.096633] 
[   15.096735] Memory state around the buggy address:
[   15.096955]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.097662]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.097975] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.098796]                                      ^
[   15.099017]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.099559]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.099990] ==================================================================
[   15.510827] ==================================================================
[   15.511521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.511987] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.512669] 
[   15.513024] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.513153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.513167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.513189] Call Trace:
[   15.513208]  <TASK>
[   15.513225]  dump_stack_lvl+0x73/0xb0
[   15.513258]  print_report+0xd1/0x650
[   15.513281]  ? __virt_addr_valid+0x1db/0x2d0
[   15.513305]  ? kasan_atomics_helper+0xde0/0x5450
[   15.513329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.513354]  ? kasan_atomics_helper+0xde0/0x5450
[   15.513378]  kasan_report+0x141/0x180
[   15.513401]  ? kasan_atomics_helper+0xde0/0x5450
[   15.513429]  kasan_check_range+0x10c/0x1c0
[   15.513455]  __kasan_check_write+0x18/0x20
[   15.513475]  kasan_atomics_helper+0xde0/0x5450
[   15.513499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.513523]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.513550]  ? kasan_atomics+0x152/0x310
[   15.513578]  kasan_atomics+0x1dc/0x310
[   15.513602]  ? __pfx_kasan_atomics+0x10/0x10
[   15.513626]  ? trace_hardirqs_on+0x37/0xe0
[   15.513652]  ? __pfx_read_tsc+0x10/0x10
[   15.513674]  ? ktime_get_ts64+0x86/0x230
[   15.513699]  kunit_try_run_case+0x1a5/0x480
[   15.513742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.513769]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.513797]  ? __kthread_parkme+0x82/0x180
[   15.513819]  ? preempt_count_sub+0x50/0x80
[   15.513844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.513871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.513896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.513923]  kthread+0x337/0x6f0
[   15.513943]  ? trace_preempt_on+0x20/0xc0
[   15.513967]  ? __pfx_kthread+0x10/0x10
[   15.513989]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.514012]  ? calculate_sigpending+0x7b/0xa0
[   15.514177]  ? __pfx_kthread+0x10/0x10
[   15.514202]  ret_from_fork+0x116/0x1d0
[   15.514224]  ? __pfx_kthread+0x10/0x10
[   15.514246]  ret_from_fork_asm+0x1a/0x30
[   15.514278]  </TASK>
[   15.514291] 
[   15.523530] Allocated by task 282:
[   15.523658]  kasan_save_stack+0x45/0x70
[   15.523813]  kasan_save_track+0x18/0x40
[   15.524019]  kasan_save_alloc_info+0x3b/0x50
[   15.524330]  __kasan_kmalloc+0xb7/0xc0
[   15.524521]  __kmalloc_cache_noprof+0x189/0x420
[   15.524791]  kasan_atomics+0x95/0x310
[   15.525074]  kunit_try_run_case+0x1a5/0x480
[   15.525307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.525540]  kthread+0x337/0x6f0
[   15.525725]  ret_from_fork+0x116/0x1d0
[   15.525932]  ret_from_fork_asm+0x1a/0x30
[   15.526266] 
[   15.526376] The buggy address belongs to the object at ffff8881038e3c00
[   15.526376]  which belongs to the cache kmalloc-64 of size 64
[   15.526777] The buggy address is located 0 bytes to the right of
[   15.526777]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.527620] 
[   15.527884] The buggy address belongs to the physical page:
[   15.528202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.528588] flags: 0x200000000000000(node=0|zone=2)
[   15.528853] page_type: f5(slab)
[   15.529023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.529373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.529684] page dumped because: kasan: bad access detected
[   15.529984] 
[   15.530328] Memory state around the buggy address:
[   15.530523]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.530759]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.531089] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.531615]                                      ^
[   15.531887]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532254]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532609] ==================================================================
[   16.002834] ==================================================================
[   16.003476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.003730] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.004055] 
[   16.004190] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.004233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.004246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.004266] Call Trace:
[   16.004281]  <TASK>
[   16.004296]  dump_stack_lvl+0x73/0xb0
[   16.004330]  print_report+0xd1/0x650
[   16.004353]  ? __virt_addr_valid+0x1db/0x2d0
[   16.004388]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.004436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.004461]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.004518]  kasan_report+0x141/0x180
[   16.004541]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.004568]  kasan_check_range+0x10c/0x1c0
[   16.004605]  __kasan_check_write+0x18/0x20
[   16.004626]  kasan_atomics_helper+0x16e7/0x5450
[   16.004650]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.004685]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.004811]  ? kasan_atomics+0x152/0x310
[   16.004840]  kasan_atomics+0x1dc/0x310
[   16.004864]  ? __pfx_kasan_atomics+0x10/0x10
[   16.004889]  ? trace_hardirqs_on+0x37/0xe0
[   16.004914]  ? __pfx_read_tsc+0x10/0x10
[   16.004936]  ? ktime_get_ts64+0x86/0x230
[   16.004961]  kunit_try_run_case+0x1a5/0x480
[   16.004987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.005106]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.005135]  ? __kthread_parkme+0x82/0x180
[   16.005157]  ? preempt_count_sub+0x50/0x80
[   16.005182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.005208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.005235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.005262]  kthread+0x337/0x6f0
[   16.005282]  ? trace_preempt_on+0x20/0xc0
[   16.005305]  ? __pfx_kthread+0x10/0x10
[   16.005327]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.005349]  ? calculate_sigpending+0x7b/0xa0
[   16.005375]  ? __pfx_kthread+0x10/0x10
[   16.005398]  ret_from_fork+0x116/0x1d0
[   16.005417]  ? __pfx_kthread+0x10/0x10
[   16.005439]  ret_from_fork_asm+0x1a/0x30
[   16.005472]  </TASK>
[   16.005483] 
[   16.013087] Allocated by task 282:
[   16.013253]  kasan_save_stack+0x45/0x70
[   16.013433]  kasan_save_track+0x18/0x40
[   16.013570]  kasan_save_alloc_info+0x3b/0x50
[   16.013773]  __kasan_kmalloc+0xb7/0xc0
[   16.013963]  __kmalloc_cache_noprof+0x189/0x420
[   16.014183]  kasan_atomics+0x95/0x310
[   16.014356]  kunit_try_run_case+0x1a5/0x480
[   16.014504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.014959]  kthread+0x337/0x6f0
[   16.015246]  ret_from_fork+0x116/0x1d0
[   16.015387]  ret_from_fork_asm+0x1a/0x30
[   16.015528] 
[   16.015600] The buggy address belongs to the object at ffff8881038e3c00
[   16.015600]  which belongs to the cache kmalloc-64 of size 64
[   16.016028] The buggy address is located 0 bytes to the right of
[   16.016028]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.016801] 
[   16.016885] The buggy address belongs to the physical page:
[   16.017107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.017347] flags: 0x200000000000000(node=0|zone=2)
[   16.017510] page_type: f5(slab)
[   16.017632] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.017909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.018252] page dumped because: kasan: bad access detected
[   16.018508] 
[   16.018622] Memory state around the buggy address:
[   16.019031]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.019364]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.019646] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.019994]                                      ^
[   16.020247]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.020472]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.020685] ==================================================================
[   16.275741] ==================================================================
[   16.276327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.276616] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.276850] 
[   16.276934] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.276976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.276989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.277009] Call Trace:
[   16.277023]  <TASK>
[   16.277038]  dump_stack_lvl+0x73/0xb0
[   16.277066]  print_report+0xd1/0x650
[   16.277089]  ? __virt_addr_valid+0x1db/0x2d0
[   16.277112]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.277134]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.277158]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.277181]  kasan_report+0x141/0x180
[   16.277204]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.277232]  kasan_check_range+0x10c/0x1c0
[   16.277256]  __kasan_check_write+0x18/0x20
[   16.277277]  kasan_atomics_helper+0x1f43/0x5450
[   16.277300]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.277324]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.277350]  ? kasan_atomics+0x152/0x310
[   16.277378]  kasan_atomics+0x1dc/0x310
[   16.277428]  ? __pfx_kasan_atomics+0x10/0x10
[   16.277452]  ? trace_hardirqs_on+0x37/0xe0
[   16.277476]  ? __pfx_read_tsc+0x10/0x10
[   16.277498]  ? ktime_get_ts64+0x86/0x230
[   16.277523]  kunit_try_run_case+0x1a5/0x480
[   16.277548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.277575]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.277601]  ? __kthread_parkme+0x82/0x180
[   16.277623]  ? preempt_count_sub+0x50/0x80
[   16.277647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.277673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.277699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.277735]  kthread+0x337/0x6f0
[   16.277755]  ? trace_preempt_on+0x20/0xc0
[   16.277778]  ? __pfx_kthread+0x10/0x10
[   16.277799]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.277823]  ? calculate_sigpending+0x7b/0xa0
[   16.277848]  ? __pfx_kthread+0x10/0x10
[   16.277870]  ret_from_fork+0x116/0x1d0
[   16.277890]  ? __pfx_kthread+0x10/0x10
[   16.277929]  ret_from_fork_asm+0x1a/0x30
[   16.277960]  </TASK>
[   16.277971] 
[   16.285684] Allocated by task 282:
[   16.285824]  kasan_save_stack+0x45/0x70
[   16.285972]  kasan_save_track+0x18/0x40
[   16.286357]  kasan_save_alloc_info+0x3b/0x50
[   16.286571]  __kasan_kmalloc+0xb7/0xc0
[   16.286771]  __kmalloc_cache_noprof+0x189/0x420
[   16.286994]  kasan_atomics+0x95/0x310
[   16.287214]  kunit_try_run_case+0x1a5/0x480
[   16.287362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.287577]  kthread+0x337/0x6f0
[   16.287756]  ret_from_fork+0x116/0x1d0
[   16.287958]  ret_from_fork_asm+0x1a/0x30
[   16.288283] 
[   16.288372] The buggy address belongs to the object at ffff8881038e3c00
[   16.288372]  which belongs to the cache kmalloc-64 of size 64
[   16.288735] The buggy address is located 0 bytes to the right of
[   16.288735]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.289136] 
[   16.289232] The buggy address belongs to the physical page:
[   16.289486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.289854] flags: 0x200000000000000(node=0|zone=2)
[   16.290018] page_type: f5(slab)
[   16.290137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.290756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.291074] page dumped because: kasan: bad access detected
[   16.291323] 
[   16.291410] Memory state around the buggy address:
[   16.291567]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.291859]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.292151] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.292475]                                      ^
[   16.292728]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.293022]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.293284] ==================================================================
[   15.403444] ==================================================================
[   15.403685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.404031] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.404291] 
[   15.404484] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.404530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.404543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.404563] Call Trace:
[   15.404577]  <TASK>
[   15.404592]  dump_stack_lvl+0x73/0xb0
[   15.404622]  print_report+0xd1/0x650
[   15.404645]  ? __virt_addr_valid+0x1db/0x2d0
[   15.404668]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.404691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.404725]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.404748]  kasan_report+0x141/0x180
[   15.404770]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.404798]  kasan_check_range+0x10c/0x1c0
[   15.404822]  __kasan_check_write+0x18/0x20
[   15.404842]  kasan_atomics_helper+0xb6a/0x5450
[   15.404866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.404890]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.404917]  ? kasan_atomics+0x152/0x310
[   15.404944]  kasan_atomics+0x1dc/0x310
[   15.404968]  ? __pfx_kasan_atomics+0x10/0x10
[   15.404992]  ? trace_hardirqs_on+0x37/0xe0
[   15.405017]  ? __pfx_read_tsc+0x10/0x10
[   15.405100]  ? ktime_get_ts64+0x86/0x230
[   15.405133]  kunit_try_run_case+0x1a5/0x480
[   15.405158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.405184]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.405212]  ? __kthread_parkme+0x82/0x180
[   15.405234]  ? preempt_count_sub+0x50/0x80
[   15.405260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.405287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.405314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.405341]  kthread+0x337/0x6f0
[   15.405361]  ? trace_preempt_on+0x20/0xc0
[   15.405385]  ? __pfx_kthread+0x10/0x10
[   15.405407]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.405430]  ? calculate_sigpending+0x7b/0xa0
[   15.405455]  ? __pfx_kthread+0x10/0x10
[   15.405478]  ret_from_fork+0x116/0x1d0
[   15.405497]  ? __pfx_kthread+0x10/0x10
[   15.405519]  ret_from_fork_asm+0x1a/0x30
[   15.405552]  </TASK>
[   15.405563] 
[   15.413885] Allocated by task 282:
[   15.414063]  kasan_save_stack+0x45/0x70
[   15.414267]  kasan_save_track+0x18/0x40
[   15.414623]  kasan_save_alloc_info+0x3b/0x50
[   15.414804]  __kasan_kmalloc+0xb7/0xc0
[   15.415241]  __kmalloc_cache_noprof+0x189/0x420
[   15.415604]  kasan_atomics+0x95/0x310
[   15.415771]  kunit_try_run_case+0x1a5/0x480
[   15.416013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.416259]  kthread+0x337/0x6f0
[   15.416583]  ret_from_fork+0x116/0x1d0
[   15.416761]  ret_from_fork_asm+0x1a/0x30
[   15.416978] 
[   15.417162] The buggy address belongs to the object at ffff8881038e3c00
[   15.417162]  which belongs to the cache kmalloc-64 of size 64
[   15.417644] The buggy address is located 0 bytes to the right of
[   15.417644]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.418070] 
[   15.418142] The buggy address belongs to the physical page:
[   15.418314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.418612] flags: 0x200000000000000(node=0|zone=2)
[   15.418948] page_type: f5(slab)
[   15.419119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.419466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.419690] page dumped because: kasan: bad access detected
[   15.419870] 
[   15.419940] Memory state around the buggy address:
[   15.420505]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.420863]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.421402] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.422020]                                      ^
[   15.422270]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422488]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422863] ==================================================================
[   15.887330] ==================================================================
[   15.887643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.887960] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.888269] 
[   15.888364] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.888403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.888416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.888436] Call Trace:
[   15.888449]  <TASK>
[   15.888463]  dump_stack_lvl+0x73/0xb0
[   15.888492]  print_report+0xd1/0x650
[   15.888515]  ? __virt_addr_valid+0x1db/0x2d0
[   15.888538]  ? kasan_atomics_helper+0x1467/0x5450
[   15.888561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.888586]  ? kasan_atomics_helper+0x1467/0x5450
[   15.888609]  kasan_report+0x141/0x180
[   15.888632]  ? kasan_atomics_helper+0x1467/0x5450
[   15.888660]  kasan_check_range+0x10c/0x1c0
[   15.888685]  __kasan_check_write+0x18/0x20
[   15.888716]  kasan_atomics_helper+0x1467/0x5450
[   15.888741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.888765]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.888792]  ? kasan_atomics+0x152/0x310
[   15.888819]  kasan_atomics+0x1dc/0x310
[   15.888843]  ? __pfx_kasan_atomics+0x10/0x10
[   15.888869]  ? trace_hardirqs_on+0x37/0xe0
[   15.888893]  ? __pfx_read_tsc+0x10/0x10
[   15.888915]  ? ktime_get_ts64+0x86/0x230
[   15.888940]  kunit_try_run_case+0x1a5/0x480
[   15.888965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.888992]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.889019]  ? __kthread_parkme+0x82/0x180
[   15.889062]  ? preempt_count_sub+0x50/0x80
[   15.889087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.889113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.889139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.889166]  kthread+0x337/0x6f0
[   15.889185]  ? trace_preempt_on+0x20/0xc0
[   15.889209]  ? __pfx_kthread+0x10/0x10
[   15.889230]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.889253]  ? calculate_sigpending+0x7b/0xa0
[   15.889278]  ? __pfx_kthread+0x10/0x10
[   15.889301]  ret_from_fork+0x116/0x1d0
[   15.889320]  ? __pfx_kthread+0x10/0x10
[   15.889342]  ret_from_fork_asm+0x1a/0x30
[   15.889374]  </TASK>
[   15.889384] 
[   15.896440] Allocated by task 282:
[   15.896621]  kasan_save_stack+0x45/0x70
[   15.896831]  kasan_save_track+0x18/0x40
[   15.897015]  kasan_save_alloc_info+0x3b/0x50
[   15.897224]  __kasan_kmalloc+0xb7/0xc0
[   15.897413]  __kmalloc_cache_noprof+0x189/0x420
[   15.897622]  kasan_atomics+0x95/0x310
[   15.897818]  kunit_try_run_case+0x1a5/0x480
[   15.898007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.898249]  kthread+0x337/0x6f0
[   15.898394]  ret_from_fork+0x116/0x1d0
[   15.898551]  ret_from_fork_asm+0x1a/0x30
[   15.898751] 
[   15.898825] The buggy address belongs to the object at ffff8881038e3c00
[   15.898825]  which belongs to the cache kmalloc-64 of size 64
[   15.899211] The buggy address is located 0 bytes to the right of
[   15.899211]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.899773] 
[   15.899869] The buggy address belongs to the physical page:
[   15.900129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.900483] flags: 0x200000000000000(node=0|zone=2)
[   15.900675] page_type: f5(slab)
[   15.900863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.901192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.901465] page dumped because: kasan: bad access detected
[   15.901636] 
[   15.901737] Memory state around the buggy address:
[   15.901967]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.902324]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.902648] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.902883]                                      ^
[   15.903139]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.903435]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.903727] ==================================================================
[   16.110493] ==================================================================
[   16.110887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.111275] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.111552] 
[   16.111638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.111679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.111692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.111723] Call Trace:
[   16.111737]  <TASK>
[   16.111752]  dump_stack_lvl+0x73/0xb0
[   16.111781]  print_report+0xd1/0x650
[   16.111804]  ? __virt_addr_valid+0x1db/0x2d0
[   16.111828]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.111850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.111874]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.111897]  kasan_report+0x141/0x180
[   16.111920]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.111947]  kasan_check_range+0x10c/0x1c0
[   16.111972]  __kasan_check_write+0x18/0x20
[   16.111992]  kasan_atomics_helper+0x1a7f/0x5450
[   16.112016]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.112041]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.112067]  ? kasan_atomics+0x152/0x310
[   16.112095]  kasan_atomics+0x1dc/0x310
[   16.112118]  ? __pfx_kasan_atomics+0x10/0x10
[   16.112165]  ? trace_hardirqs_on+0x37/0xe0
[   16.112189]  ? __pfx_read_tsc+0x10/0x10
[   16.112213]  ? ktime_get_ts64+0x86/0x230
[   16.112238]  kunit_try_run_case+0x1a5/0x480
[   16.112285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112312]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.112342]  ? __kthread_parkme+0x82/0x180
[   16.112363]  ? preempt_count_sub+0x50/0x80
[   16.112388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.112466]  kthread+0x337/0x6f0
[   16.112486]  ? trace_preempt_on+0x20/0xc0
[   16.112509]  ? __pfx_kthread+0x10/0x10
[   16.112531]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.112553]  ? calculate_sigpending+0x7b/0xa0
[   16.112578]  ? __pfx_kthread+0x10/0x10
[   16.112600]  ret_from_fork+0x116/0x1d0
[   16.112620]  ? __pfx_kthread+0x10/0x10
[   16.112641]  ret_from_fork_asm+0x1a/0x30
[   16.112673]  </TASK>
[   16.112684] 
[   16.120401] Allocated by task 282:
[   16.120562]  kasan_save_stack+0x45/0x70
[   16.120754]  kasan_save_track+0x18/0x40
[   16.120943]  kasan_save_alloc_info+0x3b/0x50
[   16.121179]  __kasan_kmalloc+0xb7/0xc0
[   16.121314]  __kmalloc_cache_noprof+0x189/0x420
[   16.121727]  kasan_atomics+0x95/0x310
[   16.121928]  kunit_try_run_case+0x1a5/0x480
[   16.122152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.122362]  kthread+0x337/0x6f0
[   16.122534]  ret_from_fork+0x116/0x1d0
[   16.122731]  ret_from_fork_asm+0x1a/0x30
[   16.122872] 
[   16.122943] The buggy address belongs to the object at ffff8881038e3c00
[   16.122943]  which belongs to the cache kmalloc-64 of size 64
[   16.123293] The buggy address is located 0 bytes to the right of
[   16.123293]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.123820] 
[   16.123942] The buggy address belongs to the physical page:
[   16.124232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.124544] flags: 0x200000000000000(node=0|zone=2)
[   16.124717] page_type: f5(slab)
[   16.124839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.125119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.125455] page dumped because: kasan: bad access detected
[   16.125722] 
[   16.125818] Memory state around the buggy address:
[   16.125999]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.126459]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.126778] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.127003]                                      ^
[   16.127177]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127509]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127810] ==================================================================
[   16.147396] ==================================================================
[   16.147742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.148176] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.148746] 
[   16.148957] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.149005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.149019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.149050] Call Trace:
[   16.149064]  <TASK>
[   16.149079]  dump_stack_lvl+0x73/0xb0
[   16.149111]  print_report+0xd1/0x650
[   16.149134]  ? __virt_addr_valid+0x1db/0x2d0
[   16.149158]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.149181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.149206]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.149230]  kasan_report+0x141/0x180
[   16.149252]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.149281]  kasan_check_range+0x10c/0x1c0
[   16.149305]  __kasan_check_write+0x18/0x20
[   16.149325]  kasan_atomics_helper+0x1c18/0x5450
[   16.149349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.149373]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.149400]  ? kasan_atomics+0x152/0x310
[   16.149427]  kasan_atomics+0x1dc/0x310
[   16.149450]  ? __pfx_kasan_atomics+0x10/0x10
[   16.149473]  ? trace_hardirqs_on+0x37/0xe0
[   16.149497]  ? __pfx_read_tsc+0x10/0x10
[   16.149519]  ? ktime_get_ts64+0x86/0x230
[   16.149544]  kunit_try_run_case+0x1a5/0x480
[   16.149569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.149594]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.149621]  ? __kthread_parkme+0x82/0x180
[   16.149642]  ? preempt_count_sub+0x50/0x80
[   16.149667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.149692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.149728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.149754]  kthread+0x337/0x6f0
[   16.149775]  ? trace_preempt_on+0x20/0xc0
[   16.149798]  ? __pfx_kthread+0x10/0x10
[   16.149819]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.149842]  ? calculate_sigpending+0x7b/0xa0
[   16.149866]  ? __pfx_kthread+0x10/0x10
[   16.149889]  ret_from_fork+0x116/0x1d0
[   16.149908]  ? __pfx_kthread+0x10/0x10
[   16.149929]  ret_from_fork_asm+0x1a/0x30
[   16.149961]  </TASK>
[   16.149972] 
[   16.157438] Allocated by task 282:
[   16.157568]  kasan_save_stack+0x45/0x70
[   16.157723]  kasan_save_track+0x18/0x40
[   16.157916]  kasan_save_alloc_info+0x3b/0x50
[   16.158124]  __kasan_kmalloc+0xb7/0xc0
[   16.158311]  __kmalloc_cache_noprof+0x189/0x420
[   16.158519]  kasan_atomics+0x95/0x310
[   16.158653]  kunit_try_run_case+0x1a5/0x480
[   16.158862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.159194]  kthread+0x337/0x6f0
[   16.159369]  ret_from_fork+0x116/0x1d0
[   16.159520]  ret_from_fork_asm+0x1a/0x30
[   16.159710] 
[   16.159810] The buggy address belongs to the object at ffff8881038e3c00
[   16.159810]  which belongs to the cache kmalloc-64 of size 64
[   16.160260] The buggy address is located 0 bytes to the right of
[   16.160260]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.160764] 
[   16.160861] The buggy address belongs to the physical page:
[   16.161139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.161378] flags: 0x200000000000000(node=0|zone=2)
[   16.161541] page_type: f5(slab)
[   16.161662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.162002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.162332] page dumped because: kasan: bad access detected
[   16.162624] 
[   16.162783] Memory state around the buggy address:
[   16.162974]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.163190]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.163514] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.163843]                                      ^
[   16.164075]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.164406]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.164711] ==================================================================
[   15.451099] ==================================================================
[   15.451336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.451573] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.451819] 
[   15.451990] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.452035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.452048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.452069] Call Trace:
[   15.452086]  <TASK>
[   15.452104]  dump_stack_lvl+0x73/0xb0
[   15.452133]  print_report+0xd1/0x650
[   15.452155]  ? __virt_addr_valid+0x1db/0x2d0
[   15.452177]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.452198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.452221]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.452244]  kasan_report+0x141/0x180
[   15.452266]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.452293]  __asan_report_load4_noabort+0x18/0x20
[   15.452322]  kasan_atomics_helper+0x4a84/0x5450
[   15.452346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.452368]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.452393]  ? kasan_atomics+0x152/0x310
[   15.452419]  kasan_atomics+0x1dc/0x310
[   15.452442]  ? __pfx_kasan_atomics+0x10/0x10
[   15.452816]  ? trace_hardirqs_on+0x37/0xe0
[   15.452844]  ? __pfx_read_tsc+0x10/0x10
[   15.452867]  ? ktime_get_ts64+0x86/0x230
[   15.452892]  kunit_try_run_case+0x1a5/0x480
[   15.452918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.452945]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.452971]  ? __kthread_parkme+0x82/0x180
[   15.452993]  ? preempt_count_sub+0x50/0x80
[   15.453017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.453463]  kthread+0x337/0x6f0
[   15.453582]  ? trace_preempt_on+0x20/0xc0
[   15.453609]  ? __pfx_kthread+0x10/0x10
[   15.453630]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.453654]  ? calculate_sigpending+0x7b/0xa0
[   15.453679]  ? __pfx_kthread+0x10/0x10
[   15.453724]  ret_from_fork+0x116/0x1d0
[   15.453746]  ? __pfx_kthread+0x10/0x10
[   15.453768]  ret_from_fork_asm+0x1a/0x30
[   15.453800]  </TASK>
[   15.453811] 
[   15.468093] Allocated by task 282:
[   15.468532]  kasan_save_stack+0x45/0x70
[   15.468997]  kasan_save_track+0x18/0x40
[   15.469658]  kasan_save_alloc_info+0x3b/0x50
[   15.470235]  __kasan_kmalloc+0xb7/0xc0
[   15.470574]  __kmalloc_cache_noprof+0x189/0x420
[   15.470975]  kasan_atomics+0x95/0x310
[   15.471323]  kunit_try_run_case+0x1a5/0x480
[   15.471960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.472638]  kthread+0x337/0x6f0
[   15.473234]  ret_from_fork+0x116/0x1d0
[   15.473697]  ret_from_fork_asm+0x1a/0x30
[   15.474176] 
[   15.474284] The buggy address belongs to the object at ffff8881038e3c00
[   15.474284]  which belongs to the cache kmalloc-64 of size 64
[   15.475405] The buggy address is located 0 bytes to the right of
[   15.475405]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.475793] 
[   15.475870] The buggy address belongs to the physical page:
[   15.476098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.477137] flags: 0x200000000000000(node=0|zone=2)
[   15.477695] page_type: f5(slab)
[   15.478050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.478931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.479804] page dumped because: kasan: bad access detected
[   15.480405] 
[   15.480678] Memory state around the buggy address:
[   15.481069]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.481792]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.482287] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.482516]                                      ^
[   15.482673]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482966]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.483237] ==================================================================
[   15.100843] ==================================================================
[   15.101589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.101934] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.102343] 
[   15.102867] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.102916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.102931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.102952] Call Trace:
[   15.102971]  <TASK>
[   15.102988]  dump_stack_lvl+0x73/0xb0
[   15.103020]  print_report+0xd1/0x650
[   15.103042]  ? __virt_addr_valid+0x1db/0x2d0
[   15.103274]  ? kasan_atomics_helper+0x3df/0x5450
[   15.103300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.103326]  ? kasan_atomics_helper+0x3df/0x5450
[   15.103348]  kasan_report+0x141/0x180
[   15.103371]  ? kasan_atomics_helper+0x3df/0x5450
[   15.103399]  kasan_check_range+0x10c/0x1c0
[   15.103424]  __kasan_check_read+0x15/0x20
[   15.103444]  kasan_atomics_helper+0x3df/0x5450
[   15.103469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.103493]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.103520]  ? kasan_atomics+0x152/0x310
[   15.103548]  kasan_atomics+0x1dc/0x310
[   15.103571]  ? __pfx_kasan_atomics+0x10/0x10
[   15.103595]  ? trace_hardirqs_on+0x37/0xe0
[   15.103620]  ? __pfx_read_tsc+0x10/0x10
[   15.103642]  ? ktime_get_ts64+0x86/0x230
[   15.103667]  kunit_try_run_case+0x1a5/0x480
[   15.103693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.103734]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.103762]  ? __kthread_parkme+0x82/0x180
[   15.103784]  ? preempt_count_sub+0x50/0x80
[   15.103809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.103836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.103861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.103888]  kthread+0x337/0x6f0
[   15.103908]  ? trace_preempt_on+0x20/0xc0
[   15.103931]  ? __pfx_kthread+0x10/0x10
[   15.103953]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.103975]  ? calculate_sigpending+0x7b/0xa0
[   15.104001]  ? __pfx_kthread+0x10/0x10
[   15.104046]  ret_from_fork+0x116/0x1d0
[   15.104128]  ? __pfx_kthread+0x10/0x10
[   15.104151]  ret_from_fork_asm+0x1a/0x30
[   15.104184]  </TASK>
[   15.104196] 
[   15.116895] Allocated by task 282:
[   15.117151]  kasan_save_stack+0x45/0x70
[   15.117362]  kasan_save_track+0x18/0x40
[   15.117557]  kasan_save_alloc_info+0x3b/0x50
[   15.117782]  __kasan_kmalloc+0xb7/0xc0
[   15.117968]  __kmalloc_cache_noprof+0x189/0x420
[   15.118487]  kasan_atomics+0x95/0x310
[   15.119001]  kunit_try_run_case+0x1a5/0x480
[   15.119168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119350]  kthread+0x337/0x6f0
[   15.119477]  ret_from_fork+0x116/0x1d0
[   15.119614]  ret_from_fork_asm+0x1a/0x30
[   15.119888] 
[   15.119965] The buggy address belongs to the object at ffff8881038e3c00
[   15.119965]  which belongs to the cache kmalloc-64 of size 64
[   15.121176] The buggy address is located 0 bytes to the right of
[   15.121176]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.122199] 
[   15.122278] The buggy address belongs to the physical page:
[   15.122452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.123354] flags: 0x200000000000000(node=0|zone=2)
[   15.123894] page_type: f5(slab)
[   15.124262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.124854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.125668] page dumped because: kasan: bad access detected
[   15.125894] 
[   15.125966] Memory state around the buggy address:
[   15.126507]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.127280]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.127801] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.128026]                                      ^
[   15.128181]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128403]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128617] ==================================================================
[   16.185901] ==================================================================
[   16.186612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.186947] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.187665] 
[   16.188026] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.188080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.188115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.188137] Call Trace:
[   16.188152]  <TASK>
[   16.188202]  dump_stack_lvl+0x73/0xb0
[   16.188234]  print_report+0xd1/0x650
[   16.188257]  ? __virt_addr_valid+0x1db/0x2d0
[   16.188281]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.188305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.188336]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.188360]  kasan_report+0x141/0x180
[   16.188384]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.188413]  kasan_check_range+0x10c/0x1c0
[   16.188438]  __kasan_check_write+0x18/0x20
[   16.188459]  kasan_atomics_helper+0x1ce1/0x5450
[   16.188484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.188508]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.188535]  ? kasan_atomics+0x152/0x310
[   16.188562]  kasan_atomics+0x1dc/0x310
[   16.188586]  ? __pfx_kasan_atomics+0x10/0x10
[   16.188609]  ? trace_hardirqs_on+0x37/0xe0
[   16.188633]  ? __pfx_read_tsc+0x10/0x10
[   16.188655]  ? ktime_get_ts64+0x86/0x230
[   16.188679]  kunit_try_run_case+0x1a5/0x480
[   16.188716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.188743]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.188769]  ? __kthread_parkme+0x82/0x180
[   16.188790]  ? preempt_count_sub+0x50/0x80
[   16.188815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.188841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.188866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.188893]  kthread+0x337/0x6f0
[   16.188913]  ? trace_preempt_on+0x20/0xc0
[   16.188936]  ? __pfx_kthread+0x10/0x10
[   16.188958]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.188981]  ? calculate_sigpending+0x7b/0xa0
[   16.189005]  ? __pfx_kthread+0x10/0x10
[   16.189028]  ret_from_fork+0x116/0x1d0
[   16.189056]  ? __pfx_kthread+0x10/0x10
[   16.189078]  ret_from_fork_asm+0x1a/0x30
[   16.189110]  </TASK>
[   16.189120] 
[   16.199956] Allocated by task 282:
[   16.200573]  kasan_save_stack+0x45/0x70
[   16.200875]  kasan_save_track+0x18/0x40
[   16.201285]  kasan_save_alloc_info+0x3b/0x50
[   16.201621]  __kasan_kmalloc+0xb7/0xc0
[   16.201813]  __kmalloc_cache_noprof+0x189/0x420
[   16.202021]  kasan_atomics+0x95/0x310
[   16.202455]  kunit_try_run_case+0x1a5/0x480
[   16.202789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.203413]  kthread+0x337/0x6f0
[   16.203652]  ret_from_fork+0x116/0x1d0
[   16.203950]  ret_from_fork_asm+0x1a/0x30
[   16.204465] 
[   16.204584] The buggy address belongs to the object at ffff8881038e3c00
[   16.204584]  which belongs to the cache kmalloc-64 of size 64
[   16.205558] The buggy address is located 0 bytes to the right of
[   16.205558]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.206206] 
[   16.206301] The buggy address belongs to the physical page:
[   16.206513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.206838] flags: 0x200000000000000(node=0|zone=2)
[   16.207345] page_type: f5(slab)
[   16.207610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.208333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.208674] page dumped because: kasan: bad access detected
[   16.208922] 
[   16.209013] Memory state around the buggy address:
[   16.209647]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.210150]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.210582] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.210877]                                      ^
[   16.211335]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.211644]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.211948] ==================================================================
[   16.342769] ==================================================================
[   16.343584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.343918] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.344578] 
[   16.344679] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.344937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.344954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.344976] Call Trace:
[   16.344992]  <TASK>
[   16.345008]  dump_stack_lvl+0x73/0xb0
[   16.345090]  print_report+0xd1/0x650
[   16.345116]  ? __virt_addr_valid+0x1db/0x2d0
[   16.345140]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.345163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.345188]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.345212]  kasan_report+0x141/0x180
[   16.345234]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.345262]  __asan_report_load8_noabort+0x18/0x20
[   16.345288]  kasan_atomics_helper+0x4f98/0x5450
[   16.345312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.345336]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.345362]  ? kasan_atomics+0x152/0x310
[   16.345390]  kasan_atomics+0x1dc/0x310
[   16.345414]  ? __pfx_kasan_atomics+0x10/0x10
[   16.345438]  ? trace_hardirqs_on+0x37/0xe0
[   16.345463]  ? __pfx_read_tsc+0x10/0x10
[   16.345485]  ? ktime_get_ts64+0x86/0x230
[   16.345509]  kunit_try_run_case+0x1a5/0x480
[   16.345534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345560]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.345587]  ? __kthread_parkme+0x82/0x180
[   16.345608]  ? preempt_count_sub+0x50/0x80
[   16.345633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.345684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.345723]  kthread+0x337/0x6f0
[   16.345744]  ? trace_preempt_on+0x20/0xc0
[   16.345769]  ? __pfx_kthread+0x10/0x10
[   16.345791]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.345814]  ? calculate_sigpending+0x7b/0xa0
[   16.345839]  ? __pfx_kthread+0x10/0x10
[   16.345862]  ret_from_fork+0x116/0x1d0
[   16.345882]  ? __pfx_kthread+0x10/0x10
[   16.345904]  ret_from_fork_asm+0x1a/0x30
[   16.345937]  </TASK>
[   16.345947] 
[   16.356916] Allocated by task 282:
[   16.357231]  kasan_save_stack+0x45/0x70
[   16.357602]  kasan_save_track+0x18/0x40
[   16.357803]  kasan_save_alloc_info+0x3b/0x50
[   16.358002]  __kasan_kmalloc+0xb7/0xc0
[   16.358531]  __kmalloc_cache_noprof+0x189/0x420
[   16.358790]  kasan_atomics+0x95/0x310
[   16.359104]  kunit_try_run_case+0x1a5/0x480
[   16.359479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.359901]  kthread+0x337/0x6f0
[   16.360261]  ret_from_fork+0x116/0x1d0
[   16.360443]  ret_from_fork_asm+0x1a/0x30
[   16.360627] 
[   16.360726] The buggy address belongs to the object at ffff8881038e3c00
[   16.360726]  which belongs to the cache kmalloc-64 of size 64
[   16.361727] The buggy address is located 0 bytes to the right of
[   16.361727]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.362529] 
[   16.362763] The buggy address belongs to the physical page:
[   16.363378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.363846] flags: 0x200000000000000(node=0|zone=2)
[   16.364217] page_type: f5(slab)
[   16.364392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.364717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.364949] page dumped because: kasan: bad access detected
[   16.365226] 
[   16.365326] Memory state around the buggy address:
[   16.365522]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.365826]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.366152] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.366381]                                      ^
[   16.366606]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.366859]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.367302] ==================================================================
[   15.771069] ==================================================================
[   15.771556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.771995] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.772398] 
[   15.772694] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.772753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.772766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.772873] Call Trace:
[   15.772894]  <TASK>
[   15.772910]  dump_stack_lvl+0x73/0xb0
[   15.772942]  print_report+0xd1/0x650
[   15.772965]  ? __virt_addr_valid+0x1db/0x2d0
[   15.772989]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.773013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.773047]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.773071]  kasan_report+0x141/0x180
[   15.773094]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.773121]  __asan_report_load4_noabort+0x18/0x20
[   15.773147]  kasan_atomics_helper+0x49e8/0x5450
[   15.773173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.773197]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.773223]  ? kasan_atomics+0x152/0x310
[   15.773251]  kasan_atomics+0x1dc/0x310
[   15.773274]  ? __pfx_kasan_atomics+0x10/0x10
[   15.773298]  ? trace_hardirqs_on+0x37/0xe0
[   15.773322]  ? __pfx_read_tsc+0x10/0x10
[   15.773344]  ? ktime_get_ts64+0x86/0x230
[   15.773368]  kunit_try_run_case+0x1a5/0x480
[   15.773393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.773420]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.773446]  ? __kthread_parkme+0x82/0x180
[   15.773468]  ? preempt_count_sub+0x50/0x80
[   15.773493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.773518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.773543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.773570]  kthread+0x337/0x6f0
[   15.773591]  ? trace_preempt_on+0x20/0xc0
[   15.773614]  ? __pfx_kthread+0x10/0x10
[   15.773636]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.773659]  ? calculate_sigpending+0x7b/0xa0
[   15.773685]  ? __pfx_kthread+0x10/0x10
[   15.773720]  ret_from_fork+0x116/0x1d0
[   15.773739]  ? __pfx_kthread+0x10/0x10
[   15.773761]  ret_from_fork_asm+0x1a/0x30
[   15.773795]  </TASK>
[   15.773805] 
[   15.783897] Allocated by task 282:
[   15.784214]  kasan_save_stack+0x45/0x70
[   15.784425]  kasan_save_track+0x18/0x40
[   15.784695]  kasan_save_alloc_info+0x3b/0x50
[   15.785060]  __kasan_kmalloc+0xb7/0xc0
[   15.785246]  __kmalloc_cache_noprof+0x189/0x420
[   15.785550]  kasan_atomics+0x95/0x310
[   15.785832]  kunit_try_run_case+0x1a5/0x480
[   15.786007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.786553]  kthread+0x337/0x6f0
[   15.786733]  ret_from_fork+0x116/0x1d0
[   15.787010]  ret_from_fork_asm+0x1a/0x30
[   15.787249] 
[   15.787504] The buggy address belongs to the object at ffff8881038e3c00
[   15.787504]  which belongs to the cache kmalloc-64 of size 64
[   15.788093] The buggy address is located 0 bytes to the right of
[   15.788093]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.788823] 
[   15.788907] The buggy address belongs to the physical page:
[   15.789239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.789582] flags: 0x200000000000000(node=0|zone=2)
[   15.789814] page_type: f5(slab)
[   15.789974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.790726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.791150] page dumped because: kasan: bad access detected
[   15.791413] 
[   15.791604] Memory state around the buggy address:
[   15.791961]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792423]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792793] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.793246]                                      ^
[   15.793474]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793965]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.794379] ==================================================================
[   16.316118] ==================================================================
[   16.316945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.317405] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.317717] 
[   16.317825] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.317869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.317882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.317904] Call Trace:
[   16.317919]  <TASK>
[   16.317934]  dump_stack_lvl+0x73/0xb0
[   16.317965]  print_report+0xd1/0x650
[   16.317989]  ? __virt_addr_valid+0x1db/0x2d0
[   16.318014]  ? kasan_atomics_helper+0x2006/0x5450
[   16.318318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.318358]  ? kasan_atomics_helper+0x2006/0x5450
[   16.318383]  kasan_report+0x141/0x180
[   16.318408]  ? kasan_atomics_helper+0x2006/0x5450
[   16.318436]  kasan_check_range+0x10c/0x1c0
[   16.318501]  __kasan_check_write+0x18/0x20
[   16.318525]  kasan_atomics_helper+0x2006/0x5450
[   16.318549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.318573]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.318600]  ? kasan_atomics+0x152/0x310
[   16.318628]  kasan_atomics+0x1dc/0x310
[   16.318652]  ? __pfx_kasan_atomics+0x10/0x10
[   16.318676]  ? trace_hardirqs_on+0x37/0xe0
[   16.318711]  ? __pfx_read_tsc+0x10/0x10
[   16.318734]  ? ktime_get_ts64+0x86/0x230
[   16.318758]  kunit_try_run_case+0x1a5/0x480
[   16.318784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.318810]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.318837]  ? __kthread_parkme+0x82/0x180
[   16.318859]  ? preempt_count_sub+0x50/0x80
[   16.318883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.318909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.318935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.318962]  kthread+0x337/0x6f0
[   16.318982]  ? trace_preempt_on+0x20/0xc0
[   16.319005]  ? __pfx_kthread+0x10/0x10
[   16.319027]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.319064]  ? calculate_sigpending+0x7b/0xa0
[   16.319089]  ? __pfx_kthread+0x10/0x10
[   16.319112]  ret_from_fork+0x116/0x1d0
[   16.319132]  ? __pfx_kthread+0x10/0x10
[   16.319153]  ret_from_fork_asm+0x1a/0x30
[   16.319187]  </TASK>
[   16.319198] 
[   16.330621] Allocated by task 282:
[   16.330808]  kasan_save_stack+0x45/0x70
[   16.331001]  kasan_save_track+0x18/0x40
[   16.331354]  kasan_save_alloc_info+0x3b/0x50
[   16.331682]  __kasan_kmalloc+0xb7/0xc0
[   16.331856]  __kmalloc_cache_noprof+0x189/0x420
[   16.332275]  kasan_atomics+0x95/0x310
[   16.332513]  kunit_try_run_case+0x1a5/0x480
[   16.332833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.333260]  kthread+0x337/0x6f0
[   16.333438]  ret_from_fork+0x116/0x1d0
[   16.333619]  ret_from_fork_asm+0x1a/0x30
[   16.333813] 
[   16.333904] The buggy address belongs to the object at ffff8881038e3c00
[   16.333904]  which belongs to the cache kmalloc-64 of size 64
[   16.334889] The buggy address is located 0 bytes to the right of
[   16.334889]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.335743] 
[   16.335969] The buggy address belongs to the physical page:
[   16.336438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.336902] flags: 0x200000000000000(node=0|zone=2)
[   16.337367] page_type: f5(slab)
[   16.337595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.338160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.338492] page dumped because: kasan: bad access detected
[   16.338735] 
[   16.338824] Memory state around the buggy address:
[   16.339030]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.339744]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.340244] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.340742]                                      ^
[   16.340969]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341537]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.342160] ==================================================================
[   15.242948] ==================================================================
[   15.243621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.243959] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.244343] 
[   15.244453] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.244494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.244507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.244527] Call Trace:
[   15.244540]  <TASK>
[   15.244554]  dump_stack_lvl+0x73/0xb0
[   15.244584]  print_report+0xd1/0x650
[   15.244607]  ? __virt_addr_valid+0x1db/0x2d0
[   15.244630]  ? kasan_atomics_helper+0x697/0x5450
[   15.244653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.244677]  ? kasan_atomics_helper+0x697/0x5450
[   15.244700]  kasan_report+0x141/0x180
[   15.244736]  ? kasan_atomics_helper+0x697/0x5450
[   15.244764]  kasan_check_range+0x10c/0x1c0
[   15.244790]  __kasan_check_write+0x18/0x20
[   15.244811]  kasan_atomics_helper+0x697/0x5450
[   15.244834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.244859]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.244885]  ? kasan_atomics+0x152/0x310
[   15.244913]  kasan_atomics+0x1dc/0x310
[   15.244936]  ? __pfx_kasan_atomics+0x10/0x10
[   15.244960]  ? trace_hardirqs_on+0x37/0xe0
[   15.244984]  ? __pfx_read_tsc+0x10/0x10
[   15.245006]  ? ktime_get_ts64+0x86/0x230
[   15.245083]  kunit_try_run_case+0x1a5/0x480
[   15.245111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.245136]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.245163]  ? __kthread_parkme+0x82/0x180
[   15.245184]  ? preempt_count_sub+0x50/0x80
[   15.245209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.245235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.245260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.245287]  kthread+0x337/0x6f0
[   15.245306]  ? trace_preempt_on+0x20/0xc0
[   15.245330]  ? __pfx_kthread+0x10/0x10
[   15.245351]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.245375]  ? calculate_sigpending+0x7b/0xa0
[   15.245400]  ? __pfx_kthread+0x10/0x10
[   15.245424]  ret_from_fork+0x116/0x1d0
[   15.245443]  ? __pfx_kthread+0x10/0x10
[   15.245464]  ret_from_fork_asm+0x1a/0x30
[   15.245496]  </TASK>
[   15.245507] 
[   15.253628] Allocated by task 282:
[   15.253847]  kasan_save_stack+0x45/0x70
[   15.254095]  kasan_save_track+0x18/0x40
[   15.254294]  kasan_save_alloc_info+0x3b/0x50
[   15.254503]  __kasan_kmalloc+0xb7/0xc0
[   15.254638]  __kmalloc_cache_noprof+0x189/0x420
[   15.254807]  kasan_atomics+0x95/0x310
[   15.254984]  kunit_try_run_case+0x1a5/0x480
[   15.255221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.255454]  kthread+0x337/0x6f0
[   15.255612]  ret_from_fork+0x116/0x1d0
[   15.255781]  ret_from_fork_asm+0x1a/0x30
[   15.255968] 
[   15.256072] The buggy address belongs to the object at ffff8881038e3c00
[   15.256072]  which belongs to the cache kmalloc-64 of size 64
[   15.256540] The buggy address is located 0 bytes to the right of
[   15.256540]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.257018] 
[   15.257333] The buggy address belongs to the physical page:
[   15.257556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.257889] flags: 0x200000000000000(node=0|zone=2)
[   15.258202] page_type: f5(slab)
[   15.258346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.258657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.258953] page dumped because: kasan: bad access detected
[   15.259181] 
[   15.259334] Memory state around the buggy address:
[   15.259564]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.259793]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.260011] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.260328]                                      ^
[   15.260553]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260946]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.261384] ==================================================================
[   15.204269] ==================================================================
[   15.204622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.204932] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.205268] 
[   15.205382] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.205424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.205437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.205459] Call Trace:
[   15.205475]  <TASK>
[   15.205489]  dump_stack_lvl+0x73/0xb0
[   15.205519]  print_report+0xd1/0x650
[   15.205543]  ? __virt_addr_valid+0x1db/0x2d0
[   15.205567]  ? kasan_atomics_helper+0x565/0x5450
[   15.205591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.205615]  ? kasan_atomics_helper+0x565/0x5450
[   15.205638]  kasan_report+0x141/0x180
[   15.205661]  ? kasan_atomics_helper+0x565/0x5450
[   15.205689]  kasan_check_range+0x10c/0x1c0
[   15.205725]  __kasan_check_write+0x18/0x20
[   15.205747]  kasan_atomics_helper+0x565/0x5450
[   15.205770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.205794]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.205820]  ? kasan_atomics+0x152/0x310
[   15.205847]  kasan_atomics+0x1dc/0x310
[   15.205871]  ? __pfx_kasan_atomics+0x10/0x10
[   15.205894]  ? trace_hardirqs_on+0x37/0xe0
[   15.205919]  ? __pfx_read_tsc+0x10/0x10
[   15.205941]  ? ktime_get_ts64+0x86/0x230
[   15.205967]  kunit_try_run_case+0x1a5/0x480
[   15.205992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.206018]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.206190]  ? __kthread_parkme+0x82/0x180
[   15.206220]  ? preempt_count_sub+0x50/0x80
[   15.206248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.206274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.206301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.206327]  kthread+0x337/0x6f0
[   15.206347]  ? trace_preempt_on+0x20/0xc0
[   15.206370]  ? __pfx_kthread+0x10/0x10
[   15.206392]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.206415]  ? calculate_sigpending+0x7b/0xa0
[   15.206440]  ? __pfx_kthread+0x10/0x10
[   15.206463]  ret_from_fork+0x116/0x1d0
[   15.206482]  ? __pfx_kthread+0x10/0x10
[   15.206504]  ret_from_fork_asm+0x1a/0x30
[   15.206536]  </TASK>
[   15.206548] 
[   15.214866] Allocated by task 282:
[   15.215173]  kasan_save_stack+0x45/0x70
[   15.215403]  kasan_save_track+0x18/0x40
[   15.215576]  kasan_save_alloc_info+0x3b/0x50
[   15.215776]  __kasan_kmalloc+0xb7/0xc0
[   15.215913]  __kmalloc_cache_noprof+0x189/0x420
[   15.216173]  kasan_atomics+0x95/0x310
[   15.216396]  kunit_try_run_case+0x1a5/0x480
[   15.216583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.216770]  kthread+0x337/0x6f0
[   15.216940]  ret_from_fork+0x116/0x1d0
[   15.217254]  ret_from_fork_asm+0x1a/0x30
[   15.217456] 
[   15.217555] The buggy address belongs to the object at ffff8881038e3c00
[   15.217555]  which belongs to the cache kmalloc-64 of size 64
[   15.218082] The buggy address is located 0 bytes to the right of
[   15.218082]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.218587] 
[   15.218668] The buggy address belongs to the physical page:
[   15.218883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.219261] flags: 0x200000000000000(node=0|zone=2)
[   15.219423] page_type: f5(slab)
[   15.219544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.220086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.220435] page dumped because: kasan: bad access detected
[   15.220685] 
[   15.220775] Memory state around the buggy address:
[   15.220934]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.221416]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.221757] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.221997]                                      ^
[   15.222312]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222638]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222954] ==================================================================
[   15.046381] ==================================================================
[   15.046932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.047425] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.047866] 
[   15.048282] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.048336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.048349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.048370] Call Trace:
[   15.048386]  <TASK>
[   15.048402]  dump_stack_lvl+0x73/0xb0
[   15.048431]  print_report+0xd1/0x650
[   15.048454]  ? __virt_addr_valid+0x1db/0x2d0
[   15.048476]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.048497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.048522]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.048545]  kasan_report+0x141/0x180
[   15.048567]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.048594]  __asan_report_load4_noabort+0x18/0x20
[   15.048620]  kasan_atomics_helper+0x4b88/0x5450
[   15.048643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.048666]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.048692]  ? kasan_atomics+0x152/0x310
[   15.048730]  kasan_atomics+0x1dc/0x310
[   15.048752]  ? __pfx_kasan_atomics+0x10/0x10
[   15.048776]  ? trace_hardirqs_on+0x37/0xe0
[   15.048799]  ? __pfx_read_tsc+0x10/0x10
[   15.048821]  ? ktime_get_ts64+0x86/0x230
[   15.048845]  kunit_try_run_case+0x1a5/0x480
[   15.048870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.048895]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.048923]  ? __kthread_parkme+0x82/0x180
[   15.048945]  ? preempt_count_sub+0x50/0x80
[   15.048969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.048994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.049122]  kthread+0x337/0x6f0
[   15.049142]  ? trace_preempt_on+0x20/0xc0
[   15.049165]  ? __pfx_kthread+0x10/0x10
[   15.049185]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.049207]  ? calculate_sigpending+0x7b/0xa0
[   15.049232]  ? __pfx_kthread+0x10/0x10
[   15.049253]  ret_from_fork+0x116/0x1d0
[   15.049272]  ? __pfx_kthread+0x10/0x10
[   15.049293]  ret_from_fork_asm+0x1a/0x30
[   15.049324]  </TASK>
[   15.049333] 
[   15.060909] Allocated by task 282:
[   15.061475]  kasan_save_stack+0x45/0x70
[   15.061679]  kasan_save_track+0x18/0x40
[   15.061950]  kasan_save_alloc_info+0x3b/0x50
[   15.062349]  __kasan_kmalloc+0xb7/0xc0
[   15.062529]  __kmalloc_cache_noprof+0x189/0x420
[   15.062936]  kasan_atomics+0x95/0x310
[   15.063179]  kunit_try_run_case+0x1a5/0x480
[   15.063566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063856]  kthread+0x337/0x6f0
[   15.064192]  ret_from_fork+0x116/0x1d0
[   15.064504]  ret_from_fork_asm+0x1a/0x30
[   15.064806] 
[   15.064932] The buggy address belongs to the object at ffff8881038e3c00
[   15.064932]  which belongs to the cache kmalloc-64 of size 64
[   15.065552] The buggy address is located 0 bytes to the right of
[   15.065552]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.066066] 
[   15.066361] The buggy address belongs to the physical page:
[   15.066877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.067376] flags: 0x200000000000000(node=0|zone=2)
[   15.067604] page_type: f5(slab)
[   15.067984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.068390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.068882] page dumped because: kasan: bad access detected
[   15.069207] 
[   15.069326] Memory state around the buggy address:
[   15.069692]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.070040]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.070745] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.071171]                                      ^
[   15.071379]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.071880]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.072442] ==================================================================
[   16.165228] ==================================================================
[   16.165547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.166263] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.166575] 
[   16.166681] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.166734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.166747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.166767] Call Trace:
[   16.166781]  <TASK>
[   16.166797]  dump_stack_lvl+0x73/0xb0
[   16.166827]  print_report+0xd1/0x650
[   16.166851]  ? __virt_addr_valid+0x1db/0x2d0
[   16.166874]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.166896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.166921]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.166944]  kasan_report+0x141/0x180
[   16.166967]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.166994]  __asan_report_load8_noabort+0x18/0x20
[   16.167022]  kasan_atomics_helper+0x4f30/0x5450
[   16.167045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.167082]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.167109]  ? kasan_atomics+0x152/0x310
[   16.167137]  kasan_atomics+0x1dc/0x310
[   16.167160]  ? __pfx_kasan_atomics+0x10/0x10
[   16.167183]  ? trace_hardirqs_on+0x37/0xe0
[   16.167208]  ? __pfx_read_tsc+0x10/0x10
[   16.167229]  ? ktime_get_ts64+0x86/0x230
[   16.167254]  kunit_try_run_case+0x1a5/0x480
[   16.167278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.167304]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.167331]  ? __kthread_parkme+0x82/0x180
[   16.167352]  ? preempt_count_sub+0x50/0x80
[   16.167377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.167402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.167428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.167455]  kthread+0x337/0x6f0
[   16.167475]  ? trace_preempt_on+0x20/0xc0
[   16.167497]  ? __pfx_kthread+0x10/0x10
[   16.167519]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.167542]  ? calculate_sigpending+0x7b/0xa0
[   16.167567]  ? __pfx_kthread+0x10/0x10
[   16.167590]  ret_from_fork+0x116/0x1d0
[   16.167609]  ? __pfx_kthread+0x10/0x10
[   16.167631]  ret_from_fork_asm+0x1a/0x30
[   16.167662]  </TASK>
[   16.167673] 
[   16.175043] Allocated by task 282:
[   16.175213]  kasan_save_stack+0x45/0x70
[   16.175393]  kasan_save_track+0x18/0x40
[   16.175559]  kasan_save_alloc_info+0x3b/0x50
[   16.175772]  __kasan_kmalloc+0xb7/0xc0
[   16.175949]  __kmalloc_cache_noprof+0x189/0x420
[   16.176165]  kasan_atomics+0x95/0x310
[   16.176300]  kunit_try_run_case+0x1a5/0x480
[   16.176453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.176627]  kthread+0x337/0x6f0
[   16.176759]  ret_from_fork+0x116/0x1d0
[   16.176891]  ret_from_fork_asm+0x1a/0x30
[   16.177080] 
[   16.177173] The buggy address belongs to the object at ffff8881038e3c00
[   16.177173]  which belongs to the cache kmalloc-64 of size 64
[   16.177693] The buggy address is located 0 bytes to the right of
[   16.177693]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.178501] 
[   16.178581] The buggy address belongs to the physical page:
[   16.178780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.179030] flags: 0x200000000000000(node=0|zone=2)
[   16.179193] page_type: f5(slab)
[   16.179313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.180351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.180813] page dumped because: kasan: bad access detected
[   16.181465] 
[   16.181574] Memory state around the buggy address:
[   16.182154]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.182608]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.183136] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.183436]                                      ^
[   16.183650]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.184473]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.184941] ==================================================================
[   16.385421] ==================================================================
[   16.385731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.386073] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   16.386358] 
[   16.386442] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.386482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.386495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.386516] Call Trace:
[   16.386529]  <TASK>
[   16.386544]  dump_stack_lvl+0x73/0xb0
[   16.386571]  print_report+0xd1/0x650
[   16.386594]  ? __virt_addr_valid+0x1db/0x2d0
[   16.386618]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.386640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.386665]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.386688]  kasan_report+0x141/0x180
[   16.386722]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.386750]  __asan_report_load8_noabort+0x18/0x20
[   16.386783]  kasan_atomics_helper+0x4fb2/0x5450
[   16.386808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.386831]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.386858]  ? kasan_atomics+0x152/0x310
[   16.386887]  kasan_atomics+0x1dc/0x310
[   16.386910]  ? __pfx_kasan_atomics+0x10/0x10
[   16.386933]  ? trace_hardirqs_on+0x37/0xe0
[   16.386958]  ? __pfx_read_tsc+0x10/0x10
[   16.386980]  ? ktime_get_ts64+0x86/0x230
[   16.387005]  kunit_try_run_case+0x1a5/0x480
[   16.387030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.387056]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.387092]  ? __kthread_parkme+0x82/0x180
[   16.387114]  ? preempt_count_sub+0x50/0x80
[   16.387139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.387164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.387190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.387217]  kthread+0x337/0x6f0
[   16.387237]  ? trace_preempt_on+0x20/0xc0
[   16.387260]  ? __pfx_kthread+0x10/0x10
[   16.387281]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.387304]  ? calculate_sigpending+0x7b/0xa0
[   16.387329]  ? __pfx_kthread+0x10/0x10
[   16.387351]  ret_from_fork+0x116/0x1d0
[   16.387371]  ? __pfx_kthread+0x10/0x10
[   16.387392]  ret_from_fork_asm+0x1a/0x30
[   16.387425]  </TASK>
[   16.387437] 
[   16.394816] Allocated by task 282:
[   16.394992]  kasan_save_stack+0x45/0x70
[   16.395252]  kasan_save_track+0x18/0x40
[   16.395398]  kasan_save_alloc_info+0x3b/0x50
[   16.395548]  __kasan_kmalloc+0xb7/0xc0
[   16.395680]  __kmalloc_cache_noprof+0x189/0x420
[   16.395844]  kasan_atomics+0x95/0x310
[   16.395977]  kunit_try_run_case+0x1a5/0x480
[   16.396122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.396296]  kthread+0x337/0x6f0
[   16.396467]  ret_from_fork+0x116/0x1d0
[   16.396654]  ret_from_fork_asm+0x1a/0x30
[   16.396868] 
[   16.396961] The buggy address belongs to the object at ffff8881038e3c00
[   16.396961]  which belongs to the cache kmalloc-64 of size 64
[   16.397479] The buggy address is located 0 bytes to the right of
[   16.397479]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   16.398385] 
[   16.398495] The buggy address belongs to the physical page:
[   16.398672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   16.398930] flags: 0x200000000000000(node=0|zone=2)
[   16.399676] page_type: f5(slab)
[   16.399829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.400089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.400340] page dumped because: kasan: bad access detected
[   16.400583] 
[   16.400677] Memory state around the buggy address:
[   16.400915]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.401288]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.401586] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.401913]                                      ^
[   16.402169]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.402405]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.402758] ==================================================================
[   15.904265] ==================================================================
[   15.904583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.904914] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.905229] 
[   15.905317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.905359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.905372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.905393] Call Trace:
[   15.905409]  <TASK>
[   15.905424]  dump_stack_lvl+0x73/0xb0
[   15.905453]  print_report+0xd1/0x650
[   15.905475]  ? __virt_addr_valid+0x1db/0x2d0
[   15.905498]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.905522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.905546]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.905569]  kasan_report+0x141/0x180
[   15.905592]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.905620]  __asan_report_store8_noabort+0x1b/0x30
[   15.905646]  kasan_atomics_helper+0x50d4/0x5450
[   15.905670]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.905694]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.905732]  ? kasan_atomics+0x152/0x310
[   15.905759]  kasan_atomics+0x1dc/0x310
[   15.905783]  ? __pfx_kasan_atomics+0x10/0x10
[   15.905807]  ? trace_hardirqs_on+0x37/0xe0
[   15.905833]  ? __pfx_read_tsc+0x10/0x10
[   15.905855]  ? ktime_get_ts64+0x86/0x230
[   15.905880]  kunit_try_run_case+0x1a5/0x480
[   15.905906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.905932]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.905958]  ? __kthread_parkme+0x82/0x180
[   15.905979]  ? preempt_count_sub+0x50/0x80
[   15.906004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.906050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.906077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.906104]  kthread+0x337/0x6f0
[   15.906124]  ? trace_preempt_on+0x20/0xc0
[   15.906148]  ? __pfx_kthread+0x10/0x10
[   15.906169]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.906192]  ? calculate_sigpending+0x7b/0xa0
[   15.906217]  ? __pfx_kthread+0x10/0x10
[   15.906241]  ret_from_fork+0x116/0x1d0
[   15.906261]  ? __pfx_kthread+0x10/0x10
[   15.906282]  ret_from_fork_asm+0x1a/0x30
[   15.906316]  </TASK>
[   15.906327] 
[   15.913459] Allocated by task 282:
[   15.913587]  kasan_save_stack+0x45/0x70
[   15.913745]  kasan_save_track+0x18/0x40
[   15.913939]  kasan_save_alloc_info+0x3b/0x50
[   15.914173]  __kasan_kmalloc+0xb7/0xc0
[   15.914359]  __kmalloc_cache_noprof+0x189/0x420
[   15.914580]  kasan_atomics+0x95/0x310
[   15.914727]  kunit_try_run_case+0x1a5/0x480
[   15.914874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.915157]  kthread+0x337/0x6f0
[   15.915336]  ret_from_fork+0x116/0x1d0
[   15.915522]  ret_from_fork_asm+0x1a/0x30
[   15.915689] 
[   15.915772] The buggy address belongs to the object at ffff8881038e3c00
[   15.915772]  which belongs to the cache kmalloc-64 of size 64
[   15.916268] The buggy address is located 0 bytes to the right of
[   15.916268]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.916763] 
[   15.916847] The buggy address belongs to the physical page:
[   15.917085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.917386] flags: 0x200000000000000(node=0|zone=2)
[   15.917623] page_type: f5(slab)
[   15.917766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.918002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.918245] page dumped because: kasan: bad access detected
[   15.918418] 
[   15.918488] Memory state around the buggy address:
[   15.918642]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.918957]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.919298] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.919615]                                      ^
[   15.919847]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920188]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920520] ==================================================================
[   15.866918] ==================================================================
[   15.868078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.868733] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.869321] 
[   15.869427] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.869471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.869484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.869505] Call Trace:
[   15.869519]  <TASK>
[   15.869536]  dump_stack_lvl+0x73/0xb0
[   15.869566]  print_report+0xd1/0x650
[   15.869590]  ? __virt_addr_valid+0x1db/0x2d0
[   15.869613]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.869636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.869661]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.869683]  kasan_report+0x141/0x180
[   15.869720]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.869750]  __asan_report_load8_noabort+0x18/0x20
[   15.869777]  kasan_atomics_helper+0x4eae/0x5450
[   15.869801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.869826]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.869851]  ? kasan_atomics+0x152/0x310
[   15.869880]  kasan_atomics+0x1dc/0x310
[   15.869903]  ? __pfx_kasan_atomics+0x10/0x10
[   15.869926]  ? trace_hardirqs_on+0x37/0xe0
[   15.869950]  ? __pfx_read_tsc+0x10/0x10
[   15.869973]  ? ktime_get_ts64+0x86/0x230
[   15.869998]  kunit_try_run_case+0x1a5/0x480
[   15.870023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870055]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.870082]  ? __kthread_parkme+0x82/0x180
[   15.870103]  ? preempt_count_sub+0x50/0x80
[   15.870128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.870179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.870239]  kthread+0x337/0x6f0
[   15.870259]  ? trace_preempt_on+0x20/0xc0
[   15.870283]  ? __pfx_kthread+0x10/0x10
[   15.870305]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.870327]  ? calculate_sigpending+0x7b/0xa0
[   15.870353]  ? __pfx_kthread+0x10/0x10
[   15.870376]  ret_from_fork+0x116/0x1d0
[   15.870395]  ? __pfx_kthread+0x10/0x10
[   15.870416]  ret_from_fork_asm+0x1a/0x30
[   15.870449]  </TASK>
[   15.870461] 
[   15.879646] Allocated by task 282:
[   15.879793]  kasan_save_stack+0x45/0x70
[   15.879941]  kasan_save_track+0x18/0x40
[   15.880102]  kasan_save_alloc_info+0x3b/0x50
[   15.880320]  __kasan_kmalloc+0xb7/0xc0
[   15.880506]  __kmalloc_cache_noprof+0x189/0x420
[   15.880734]  kasan_atomics+0x95/0x310
[   15.880917]  kunit_try_run_case+0x1a5/0x480
[   15.881147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.881357]  kthread+0x337/0x6f0
[   15.881524]  ret_from_fork+0x116/0x1d0
[   15.881674]  ret_from_fork_asm+0x1a/0x30
[   15.881866] 
[   15.881937] The buggy address belongs to the object at ffff8881038e3c00
[   15.881937]  which belongs to the cache kmalloc-64 of size 64
[   15.882473] The buggy address is located 0 bytes to the right of
[   15.882473]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.882959] 
[   15.883072] The buggy address belongs to the physical page:
[   15.883286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.883608] flags: 0x200000000000000(node=0|zone=2)
[   15.883779] page_type: f5(slab)
[   15.883901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.884264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.884600] page dumped because: kasan: bad access detected
[   15.884837] 
[   15.884907] Memory state around the buggy address:
[   15.885101]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.885423]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.885753] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.886046]                                      ^
[   15.886231]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.886523]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.886802] ==================================================================
[   15.950006] ==================================================================
[   15.950253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.950493] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282
[   15.950733] 
[   15.950821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.950864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.950878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.950899] Call Trace:
[   15.950915]  <TASK>
[   15.950933]  dump_stack_lvl+0x73/0xb0
[   15.950963]  print_report+0xd1/0x650
[   15.950986]  ? __virt_addr_valid+0x1db/0x2d0
[   15.951010]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.951033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.951402]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.951428]  kasan_report+0x141/0x180
[   15.951475]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.951915]  kasan_check_range+0x10c/0x1c0
[   15.951956]  __kasan_check_write+0x18/0x20
[   15.951993]  kasan_atomics_helper+0x15b6/0x5450
[   15.952018]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.952043]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.952081]  ? kasan_atomics+0x152/0x310
[   15.952110]  kasan_atomics+0x1dc/0x310
[   15.952134]  ? __pfx_kasan_atomics+0x10/0x10
[   15.952158]  ? trace_hardirqs_on+0x37/0xe0
[   15.952182]  ? __pfx_read_tsc+0x10/0x10
[   15.952205]  ? ktime_get_ts64+0x86/0x230
[   15.952229]  kunit_try_run_case+0x1a5/0x480
[   15.952254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.952280]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.952308]  ? __kthread_parkme+0x82/0x180
[   15.952333]  ? preempt_count_sub+0x50/0x80
[   15.952358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.952385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.952410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.952437]  kthread+0x337/0x6f0
[   15.952456]  ? trace_preempt_on+0x20/0xc0
[   15.952480]  ? __pfx_kthread+0x10/0x10
[   15.952502]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.952525]  ? calculate_sigpending+0x7b/0xa0
[   15.952550]  ? __pfx_kthread+0x10/0x10
[   15.952572]  ret_from_fork+0x116/0x1d0
[   15.952591]  ? __pfx_kthread+0x10/0x10
[   15.952613]  ret_from_fork_asm+0x1a/0x30
[   15.952646]  </TASK>
[   15.952657] 
[   15.965438] Allocated by task 282:
[   15.965800]  kasan_save_stack+0x45/0x70
[   15.966147]  kasan_save_track+0x18/0x40
[   15.966522]  kasan_save_alloc_info+0x3b/0x50
[   15.966940]  __kasan_kmalloc+0xb7/0xc0
[   15.967340]  __kmalloc_cache_noprof+0x189/0x420
[   15.967741]  kasan_atomics+0x95/0x310
[   15.968063]  kunit_try_run_case+0x1a5/0x480
[   15.969420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.970524]  kthread+0x337/0x6f0
[   15.970828]  ret_from_fork+0x116/0x1d0
[   15.971338]  ret_from_fork_asm+0x1a/0x30
[   15.971503] 
[   15.971580] The buggy address belongs to the object at ffff8881038e3c00
[   15.971580]  which belongs to the cache kmalloc-64 of size 64
[   15.972245] The buggy address is located 0 bytes to the right of
[   15.972245]  allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30)
[   15.972629] 
[   15.973107] The buggy address belongs to the physical page:
[   15.973378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   15.973747] flags: 0x200000000000000(node=0|zone=2)
[   15.973948] page_type: f5(slab)
[   15.974189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.974536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.974880] page dumped because: kasan: bad access detected
[   15.975209] 
[   15.975310] Memory state around the buggy address:
[   15.975531]  ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.975813]  ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.976096] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.976417]                                      ^
[   15.976667]  ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.976952]  ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.977198] ==================================================================