Hay
Date
July 15, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.284887] ==================================================================
[   18.285000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.285055] Write of size 4 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.285110] 
[   18.285142] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.285241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.285270] Hardware name: linux,dummy-virt (DT)
[   18.285302] Call trace:
[   18.285326]  show_stack+0x20/0x38 (C)
[   18.285376]  dump_stack_lvl+0x8c/0xd0
[   18.285423]  print_report+0x118/0x5d0
[   18.285470]  kasan_report+0xdc/0x128
[   18.285518]  kasan_check_range+0x100/0x1a8
[   18.285900]  __kasan_check_write+0x20/0x30
[   18.286121]  kasan_atomics_helper+0xa6c/0x4858
[   18.286344]  kasan_atomics+0x198/0x2e0
[   18.286408]  kunit_try_run_case+0x170/0x3f0
[   18.286456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.286523]  kthread+0x328/0x630
[   18.286603]  ret_from_fork+0x10/0x20
[   18.286919] 
[   18.287054] Allocated by task 266:
[   18.287411]  kasan_save_stack+0x3c/0x68
[   18.287649]  kasan_save_track+0x20/0x40
[   18.287733]  kasan_save_alloc_info+0x40/0x58
[   18.288367]  __kasan_kmalloc+0xd4/0xd8
[   18.289134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.289355]  kasan_atomics+0xb8/0x2e0
[   18.289419]  kunit_try_run_case+0x170/0x3f0
[   18.289460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.289506]  kthread+0x328/0x630
[   18.290249]  ret_from_fork+0x10/0x20
[   18.290308] 
[   18.290574] The buggy address belongs to the object at fff00000c653a200
[   18.290574]  which belongs to the cache kmalloc-64 of size 64
[   18.290921] The buggy address is located 0 bytes to the right of
[   18.290921]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.291660] 
[   18.292045] The buggy address belongs to the physical page:
[   18.292080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.292615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.292689] page_type: f5(slab)
[   18.292731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.292784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.292828] page dumped because: kasan: bad access detected
[   18.293330] 
[   18.293381] Memory state around the buggy address:
[   18.293509]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293559]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293605] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.294132]                                      ^
[   18.294201]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.294427]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.294490] ==================================================================
[   18.474391] ==================================================================
[   18.474458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.474512] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.474950] 
[   18.474987] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.475073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.475102] Hardware name: linux,dummy-virt (DT)
[   18.475136] Call trace:
[   18.475160]  show_stack+0x20/0x38 (C)
[   18.475223]  dump_stack_lvl+0x8c/0xd0
[   18.475269]  print_report+0x118/0x5d0
[   18.476229]  kasan_report+0xdc/0x128
[   18.476310]  kasan_check_range+0x100/0x1a8
[   18.476409]  __kasan_check_write+0x20/0x30
[   18.476491]  kasan_atomics_helper+0xf88/0x4858
[   18.476540]  kasan_atomics+0x198/0x2e0
[   18.476586]  kunit_try_run_case+0x170/0x3f0
[   18.476632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.476687]  kthread+0x328/0x630
[   18.476731]  ret_from_fork+0x10/0x20
[   18.476778] 
[   18.476799] Allocated by task 266:
[   18.476832]  kasan_save_stack+0x3c/0x68
[   18.476875]  kasan_save_track+0x20/0x40
[   18.477480]  kasan_save_alloc_info+0x40/0x58
[   18.477543]  __kasan_kmalloc+0xd4/0xd8
[   18.478137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.478205]  kasan_atomics+0xb8/0x2e0
[   18.478244]  kunit_try_run_case+0x170/0x3f0
[   18.478285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.478482]  kthread+0x328/0x630
[   18.478604]  ret_from_fork+0x10/0x20
[   18.478905] 
[   18.478934] The buggy address belongs to the object at fff00000c653a200
[   18.478934]  which belongs to the cache kmalloc-64 of size 64
[   18.479126] The buggy address is located 0 bytes to the right of
[   18.479126]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.479794] 
[   18.479818] The buggy address belongs to the physical page:
[   18.479866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.480084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.480338] page_type: f5(slab)
[   18.480384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.481096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.481394] page dumped because: kasan: bad access detected
[   18.481444] 
[   18.481465] Memory state around the buggy address:
[   18.481502]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.481549]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.482135] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.482190]                                      ^
[   18.482235]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.482279]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.482322] ==================================================================
[   18.621464] ==================================================================
[   18.621662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.621722] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.621775] 
[   18.621815] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.621899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.621928] Hardware name: linux,dummy-virt (DT)
[   18.621960] Call trace:
[   18.621983]  show_stack+0x20/0x38 (C)
[   18.622100]  dump_stack_lvl+0x8c/0xd0
[   18.622152]  print_report+0x118/0x5d0
[   18.622220]  kasan_report+0xdc/0x128
[   18.622267]  kasan_check_range+0x100/0x1a8
[   18.622316]  __kasan_check_write+0x20/0x30
[   18.622360]  kasan_atomics_helper+0x16d0/0x4858
[   18.622410]  kasan_atomics+0x198/0x2e0
[   18.622464]  kunit_try_run_case+0x170/0x3f0
[   18.622512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622565]  kthread+0x328/0x630
[   18.622608]  ret_from_fork+0x10/0x20
[   18.622655] 
[   18.622685] Allocated by task 266:
[   18.622716]  kasan_save_stack+0x3c/0x68
[   18.622757]  kasan_save_track+0x20/0x40
[   18.622805]  kasan_save_alloc_info+0x40/0x58
[   18.622846]  __kasan_kmalloc+0xd4/0xd8
[   18.622885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.622929]  kasan_atomics+0xb8/0x2e0
[   18.622976]  kunit_try_run_case+0x170/0x3f0
[   18.623024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.623071]  kthread+0x328/0x630
[   18.623104]  ret_from_fork+0x10/0x20
[   18.623142] 
[   18.623162] The buggy address belongs to the object at fff00000c653a200
[   18.623162]  which belongs to the cache kmalloc-64 of size 64
[   18.623574] The buggy address is located 0 bytes to the right of
[   18.623574]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.623938] 
[   18.623975] The buggy address belongs to the physical page:
[   18.624116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.624188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.624283] page_type: f5(slab)
[   18.624352] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.624426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.624639] page dumped because: kasan: bad access detected
[   18.624676] 
[   18.624756] Memory state around the buggy address:
[   18.624834]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.624884]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.624929] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.624970]                                      ^
[   18.625006]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.625049]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.625089] ==================================================================
[   18.518838] ==================================================================
[   18.518890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.518939] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.518991] 
[   18.519022] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.519610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.519730] Hardware name: linux,dummy-virt (DT)
[   18.519873] Call trace:
[   18.519899]  show_stack+0x20/0x38 (C)
[   18.519964]  dump_stack_lvl+0x8c/0xd0
[   18.520050]  print_report+0x118/0x5d0
[   18.520098]  kasan_report+0xdc/0x128
[   18.520143]  kasan_check_range+0x100/0x1a8
[   18.520203]  __kasan_check_write+0x20/0x30
[   18.520387]  kasan_atomics_helper+0x1190/0x4858
[   18.520671]  kasan_atomics+0x198/0x2e0
[   18.520922]  kunit_try_run_case+0x170/0x3f0
[   18.521050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.521165]  kthread+0x328/0x630
[   18.521230]  ret_from_fork+0x10/0x20
[   18.521291] 
[   18.521378] Allocated by task 266:
[   18.521412]  kasan_save_stack+0x3c/0x68
[   18.521454]  kasan_save_track+0x20/0x40
[   18.521494]  kasan_save_alloc_info+0x40/0x58
[   18.521563]  __kasan_kmalloc+0xd4/0xd8
[   18.521603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.521686]  kasan_atomics+0xb8/0x2e0
[   18.521738]  kunit_try_run_case+0x170/0x3f0
[   18.521779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.521825]  kthread+0x328/0x630
[   18.521859]  ret_from_fork+0x10/0x20
[   18.521959] 
[   18.522053] The buggy address belongs to the object at fff00000c653a200
[   18.522053]  which belongs to the cache kmalloc-64 of size 64
[   18.522222] The buggy address is located 0 bytes to the right of
[   18.522222]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.522291] 
[   18.522313] The buggy address belongs to the physical page:
[   18.522348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.522403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.522516] page_type: f5(slab)
[   18.522558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.522655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.522773] page dumped because: kasan: bad access detected
[   18.522807] 
[   18.522828] Memory state around the buggy address:
[   18.522861]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.522942]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.522989] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.523150]                                      ^
[   18.523223]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.523266]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.523307] ==================================================================
[   18.590291] ==================================================================
[   18.590355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.590596] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.590807] 
[   18.590850] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.590983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.591020] Hardware name: linux,dummy-virt (DT)
[   18.591055] Call trace:
[   18.591084]  show_stack+0x20/0x38 (C)
[   18.591287]  dump_stack_lvl+0x8c/0xd0
[   18.591338]  print_report+0x118/0x5d0
[   18.591557]  kasan_report+0xdc/0x128
[   18.591676]  kasan_check_range+0x100/0x1a8
[   18.591736]  __kasan_check_write+0x20/0x30
[   18.591782]  kasan_atomics_helper+0x15b4/0x4858
[   18.592097]  kasan_atomics+0x198/0x2e0
[   18.592307]  kunit_try_run_case+0x170/0x3f0
[   18.592413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.592802]  kthread+0x328/0x630
[   18.592976]  ret_from_fork+0x10/0x20
[   18.593098] 
[   18.593467] Allocated by task 266:
[   18.593543]  kasan_save_stack+0x3c/0x68
[   18.593689]  kasan_save_track+0x20/0x40
[   18.593855]  kasan_save_alloc_info+0x40/0x58
[   18.593900]  __kasan_kmalloc+0xd4/0xd8
[   18.593939]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.594001]  kasan_atomics+0xb8/0x2e0
[   18.594042]  kunit_try_run_case+0x170/0x3f0
[   18.594350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.594533]  kthread+0x328/0x630
[   18.594773]  ret_from_fork+0x10/0x20
[   18.594939] 
[   18.594966] The buggy address belongs to the object at fff00000c653a200
[   18.594966]  which belongs to the cache kmalloc-64 of size 64
[   18.595460] The buggy address is located 0 bytes to the right of
[   18.595460]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.595843] 
[   18.595986] The buggy address belongs to the physical page:
[   18.596250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.596484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.596730] page_type: f5(slab)
[   18.596779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.597231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.597305] page dumped because: kasan: bad access detected
[   18.597356] 
[   18.597915] Memory state around the buggy address:
[   18.597975]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.598025]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.598072] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.598114]                                      ^
[   18.598149]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.598206]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.598279] ==================================================================
[   18.604933] ==================================================================
[   18.605031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.605279] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.605625] 
[   18.605680] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.606250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.606324] Hardware name: linux,dummy-virt (DT)
[   18.606707] Call trace:
[   18.606777]  show_stack+0x20/0x38 (C)
[   18.606959]  dump_stack_lvl+0x8c/0xd0
[   18.607025]  print_report+0x118/0x5d0
[   18.607090]  kasan_report+0xdc/0x128
[   18.607345]  kasan_check_range+0x100/0x1a8
[   18.607641]  __kasan_check_write+0x20/0x30
[   18.607883]  kasan_atomics_helper+0x1644/0x4858
[   18.608013]  kasan_atomics+0x198/0x2e0
[   18.608214]  kunit_try_run_case+0x170/0x3f0
[   18.608303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.608521]  kthread+0x328/0x630
[   18.608765]  ret_from_fork+0x10/0x20
[   18.608861] 
[   18.609044] Allocated by task 266:
[   18.609277]  kasan_save_stack+0x3c/0x68
[   18.609333]  kasan_save_track+0x20/0x40
[   18.609372]  kasan_save_alloc_info+0x40/0x58
[   18.609415]  __kasan_kmalloc+0xd4/0xd8
[   18.609452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.609493]  kasan_atomics+0xb8/0x2e0
[   18.609530]  kunit_try_run_case+0x170/0x3f0
[   18.609571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.609615]  kthread+0x328/0x630
[   18.609650]  ret_from_fork+0x10/0x20
[   18.609687] 
[   18.609710] The buggy address belongs to the object at fff00000c653a200
[   18.609710]  which belongs to the cache kmalloc-64 of size 64
[   18.609772] The buggy address is located 0 bytes to the right of
[   18.609772]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.609840] 
[   18.609863] The buggy address belongs to the physical page:
[   18.609934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.610170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.610242] page_type: f5(slab)
[   18.610653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.610757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.610828] page dumped because: kasan: bad access detected
[   18.611035] 
[   18.611062] Memory state around the buggy address:
[   18.611139]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.611520]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.611774] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.611912]                                      ^
[   18.611953]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.612044]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.612298] ==================================================================
[   18.484716] ==================================================================
[   18.484780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.484841] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.484893] 
[   18.484925] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.485014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.485044] Hardware name: linux,dummy-virt (DT)
[   18.485077] Call trace:
[   18.485100]  show_stack+0x20/0x38 (C)
[   18.485149]  dump_stack_lvl+0x8c/0xd0
[   18.485208]  print_report+0x118/0x5d0
[   18.486226]  kasan_report+0xdc/0x128
[   18.486299]  kasan_check_range+0x100/0x1a8
[   18.486360]  __kasan_check_write+0x20/0x30
[   18.486408]  kasan_atomics_helper+0xff0/0x4858
[   18.486456]  kasan_atomics+0x198/0x2e0
[   18.486503]  kunit_try_run_case+0x170/0x3f0
[   18.486552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.487369]  kthread+0x328/0x630
[   18.487496]  ret_from_fork+0x10/0x20
[   18.487967] 
[   18.488002] Allocated by task 266:
[   18.488145]  kasan_save_stack+0x3c/0x68
[   18.488202]  kasan_save_track+0x20/0x40
[   18.488241]  kasan_save_alloc_info+0x40/0x58
[   18.488284]  __kasan_kmalloc+0xd4/0xd8
[   18.488325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.488368]  kasan_atomics+0xb8/0x2e0
[   18.488631]  kunit_try_run_case+0x170/0x3f0
[   18.489435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.489587]  kthread+0x328/0x630
[   18.489693]  ret_from_fork+0x10/0x20
[   18.489943] 
[   18.489965] The buggy address belongs to the object at fff00000c653a200
[   18.489965]  which belongs to the cache kmalloc-64 of size 64
[   18.490038] The buggy address is located 0 bytes to the right of
[   18.490038]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.490106] 
[   18.490915] The buggy address belongs to the physical page:
[   18.490961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.491450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.491577] page_type: f5(slab)
[   18.491650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.491704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.491748] page dumped because: kasan: bad access detected
[   18.491784] 
[   18.491804] Memory state around the buggy address:
[   18.493222]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.493279]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.493732] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.493779]                                      ^
[   18.493814]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.494054]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.494100] ==================================================================
[   18.511714] ==================================================================
[   18.511766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.512785] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.512884] 
[   18.513021] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.513135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.513262] Hardware name: linux,dummy-virt (DT)
[   18.513311] Call trace:
[   18.513334]  show_stack+0x20/0x38 (C)
[   18.513450]  dump_stack_lvl+0x8c/0xd0
[   18.513498]  print_report+0x118/0x5d0
[   18.513546]  kasan_report+0xdc/0x128
[   18.513593]  kasan_check_range+0x100/0x1a8
[   18.513642]  __kasan_check_write+0x20/0x30
[   18.513686]  kasan_atomics_helper+0x1128/0x4858
[   18.513736]  kasan_atomics+0x198/0x2e0
[   18.513781]  kunit_try_run_case+0x170/0x3f0
[   18.513829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.513881]  kthread+0x328/0x630
[   18.513931]  ret_from_fork+0x10/0x20
[   18.513978] 
[   18.513998] Allocated by task 266:
[   18.514028]  kasan_save_stack+0x3c/0x68
[   18.514072]  kasan_save_track+0x20/0x40
[   18.514110]  kasan_save_alloc_info+0x40/0x58
[   18.514151]  __kasan_kmalloc+0xd4/0xd8
[   18.514199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.514240]  kasan_atomics+0xb8/0x2e0
[   18.514591]  kunit_try_run_case+0x170/0x3f0
[   18.514638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.517010]  kthread+0x328/0x630
[   18.517058]  ret_from_fork+0x10/0x20
[   18.517110] 
[   18.517132] The buggy address belongs to the object at fff00000c653a200
[   18.517132]  which belongs to the cache kmalloc-64 of size 64
[   18.517652] The buggy address is located 0 bytes to the right of
[   18.517652]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.517828] 
[   18.517852] The buggy address belongs to the physical page:
[   18.517886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.517947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.517997] page_type: f5(slab)
[   18.518036] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.518089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.518135] page dumped because: kasan: bad access detected
[   18.518230] 
[   18.518250] Memory state around the buggy address:
[   18.518284]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.518372]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.518421] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.518464]                                      ^
[   18.518501]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.518544]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.518585] ==================================================================
[   18.527962] ==================================================================
[   18.528771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.528832] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.528893] 
[   18.528925] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.529118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.529287] Hardware name: linux,dummy-virt (DT)
[   18.529467] Call trace:
[   18.529532]  show_stack+0x20/0x38 (C)
[   18.529582]  dump_stack_lvl+0x8c/0xd0
[   18.529648]  print_report+0x118/0x5d0
[   18.529790]  kasan_report+0xdc/0x128
[   18.530633]  kasan_check_range+0x100/0x1a8
[   18.531286]  __kasan_check_write+0x20/0x30
[   18.532008]  kasan_atomics_helper+0x126c/0x4858
[   18.532461]  kasan_atomics+0x198/0x2e0
[   18.532560]  kunit_try_run_case+0x170/0x3f0
[   18.533820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.533878]  kthread+0x328/0x630
[   18.533920]  ret_from_fork+0x10/0x20
[   18.534070] 
[   18.534122] Allocated by task 266:
[   18.534199]  kasan_save_stack+0x3c/0x68
[   18.534245]  kasan_save_track+0x20/0x40
[   18.534283]  kasan_save_alloc_info+0x40/0x58
[   18.534326]  __kasan_kmalloc+0xd4/0xd8
[   18.534406]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.534449]  kasan_atomics+0xb8/0x2e0
[   18.534485]  kunit_try_run_case+0x170/0x3f0
[   18.534526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.534570]  kthread+0x328/0x630
[   18.534605]  ret_from_fork+0x10/0x20
[   18.534641] 
[   18.534663] The buggy address belongs to the object at fff00000c653a200
[   18.534663]  which belongs to the cache kmalloc-64 of size 64
[   18.534724] The buggy address is located 0 bytes to the right of
[   18.534724]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.534793] 
[   18.535457] The buggy address belongs to the physical page:
[   18.535632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.535748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.535934] page_type: f5(slab)
[   18.535975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.536082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.536161] page dumped because: kasan: bad access detected
[   18.536264] 
[   18.536622] Memory state around the buggy address:
[   18.536896]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.537096]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.537143] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.537386]                                      ^
[   18.537430]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.537475]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.537691] ==================================================================
[   18.388513] ==================================================================
[   18.388776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.389337] Write of size 4 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.389587] 
[   18.389847] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.389991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.390022] Hardware name: linux,dummy-virt (DT)
[   18.390156] Call trace:
[   18.390385]  show_stack+0x20/0x38 (C)
[   18.390624]  dump_stack_lvl+0x8c/0xd0
[   18.390949]  print_report+0x118/0x5d0
[   18.391339]  kasan_report+0xdc/0x128
[   18.391395]  kasan_check_range+0x100/0x1a8
[   18.391447]  __kasan_check_write+0x20/0x30
[   18.391494]  kasan_atomics_helper+0xd3c/0x4858
[   18.391837]  kasan_atomics+0x198/0x2e0
[   18.391907]  kunit_try_run_case+0x170/0x3f0
[   18.392382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.392493]  kthread+0x328/0x630
[   18.392858]  ret_from_fork+0x10/0x20
[   18.392955] 
[   18.392983] Allocated by task 266:
[   18.393393]  kasan_save_stack+0x3c/0x68
[   18.393448]  kasan_save_track+0x20/0x40
[   18.393534]  kasan_save_alloc_info+0x40/0x58
[   18.393579]  __kasan_kmalloc+0xd4/0xd8
[   18.393618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.393662]  kasan_atomics+0xb8/0x2e0
[   18.393700]  kunit_try_run_case+0x170/0x3f0
[   18.393740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.394304]  kthread+0x328/0x630
[   18.394549]  ret_from_fork+0x10/0x20
[   18.395245] 
[   18.395412] The buggy address belongs to the object at fff00000c653a200
[   18.395412]  which belongs to the cache kmalloc-64 of size 64
[   18.395596] The buggy address is located 0 bytes to the right of
[   18.395596]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.395707] 
[   18.395728] The buggy address belongs to the physical page:
[   18.396173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.396337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.396390] page_type: f5(slab)
[   18.396432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.396491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.396536] page dumped because: kasan: bad access detected
[   18.396569] 
[   18.397821] Memory state around the buggy address:
[   18.397868]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.398034]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.398147] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.398201]                                      ^
[   18.398245]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.398321]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.398364] ==================================================================
[   18.376916] ==================================================================
[   18.376987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.377515] Read of size 4 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.377616] 
[   18.378002] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.378248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.378283] Hardware name: linux,dummy-virt (DT)
[   18.378514] Call trace:
[   18.378685]  show_stack+0x20/0x38 (C)
[   18.378756]  dump_stack_lvl+0x8c/0xd0
[   18.379033]  print_report+0x118/0x5d0
[   18.379082]  kasan_report+0xdc/0x128
[   18.379131]  __asan_report_load4_noabort+0x20/0x30
[   18.379195]  kasan_atomics_helper+0x3dd8/0x4858
[   18.379638]  kasan_atomics+0x198/0x2e0
[   18.379708]  kunit_try_run_case+0x170/0x3f0
[   18.379968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.380473]  kthread+0x328/0x630
[   18.380535]  ret_from_fork+0x10/0x20
[   18.380763] 
[   18.381014] Allocated by task 266:
[   18.381056]  kasan_save_stack+0x3c/0x68
[   18.381327]  kasan_save_track+0x20/0x40
[   18.381647]  kasan_save_alloc_info+0x40/0x58
[   18.381856]  __kasan_kmalloc+0xd4/0xd8
[   18.381898]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.381966]  kasan_atomics+0xb8/0x2e0
[   18.382201]  kunit_try_run_case+0x170/0x3f0
[   18.382644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.382873]  kthread+0x328/0x630
[   18.382910]  ret_from_fork+0x10/0x20
[   18.382949] 
[   18.382970] The buggy address belongs to the object at fff00000c653a200
[   18.382970]  which belongs to the cache kmalloc-64 of size 64
[   18.383033] The buggy address is located 0 bytes to the right of
[   18.383033]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.383102] 
[   18.383125] The buggy address belongs to the physical page:
[   18.383537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.384117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.384353] page_type: f5(slab)
[   18.384396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.385017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.385079] page dumped because: kasan: bad access detected
[   18.385504] 
[   18.385528] Memory state around the buggy address:
[   18.385565]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.385802]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.385854] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.386126]                                      ^
[   18.386405]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.386645]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.386731] ==================================================================
[   18.495121] ==================================================================
[   18.495291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.495345] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.495947] 
[   18.496251] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.496397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.496497] Hardware name: linux,dummy-virt (DT)
[   18.496533] Call trace:
[   18.496556]  show_stack+0x20/0x38 (C)
[   18.496608]  dump_stack_lvl+0x8c/0xd0
[   18.496656]  print_report+0x118/0x5d0
[   18.496704]  kasan_report+0xdc/0x128
[   18.496751]  kasan_check_range+0x100/0x1a8
[   18.497824]  __kasan_check_write+0x20/0x30
[   18.498199]  kasan_atomics_helper+0x1058/0x4858
[   18.498418]  kasan_atomics+0x198/0x2e0
[   18.498489]  kunit_try_run_case+0x170/0x3f0
[   18.498783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.499227]  kthread+0x328/0x630
[   18.499301]  ret_from_fork+0x10/0x20
[   18.499906] 
[   18.500092] Allocated by task 266:
[   18.500449]  kasan_save_stack+0x3c/0x68
[   18.500604]  kasan_save_track+0x20/0x40
[   18.500844]  kasan_save_alloc_info+0x40/0x58
[   18.500888]  __kasan_kmalloc+0xd4/0xd8
[   18.500929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.501021]  kasan_atomics+0xb8/0x2e0
[   18.501075]  kunit_try_run_case+0x170/0x3f0
[   18.501150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.501314]  kthread+0x328/0x630
[   18.501467]  ret_from_fork+0x10/0x20
[   18.501513] 
[   18.501898] The buggy address belongs to the object at fff00000c653a200
[   18.501898]  which belongs to the cache kmalloc-64 of size 64
[   18.502788] The buggy address is located 0 bytes to the right of
[   18.502788]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.503040] 
[   18.503122] The buggy address belongs to the physical page:
[   18.503254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.504016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.504243] page_type: f5(slab)
[   18.504286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.504341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.504385] page dumped because: kasan: bad access detected
[   18.505398] 
[   18.505521] Memory state around the buggy address:
[   18.505819]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.506078]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.506195] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.506239]                                      ^
[   18.506274]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.507171]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.507574] ==================================================================
[   18.448571] ==================================================================
[   18.448707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.448940] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.449336] 
[   18.449380] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.450102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.450145] Hardware name: linux,dummy-virt (DT)
[   18.450406] Call trace:
[   18.450467]  show_stack+0x20/0x38 (C)
[   18.450520]  dump_stack_lvl+0x8c/0xd0
[   18.450998]  print_report+0x118/0x5d0
[   18.451057]  kasan_report+0xdc/0x128
[   18.451105]  kasan_check_range+0x100/0x1a8
[   18.451509]  __kasan_check_write+0x20/0x30
[   18.451564]  kasan_atomics_helper+0xeb8/0x4858
[   18.452267]  kasan_atomics+0x198/0x2e0
[   18.452329]  kunit_try_run_case+0x170/0x3f0
[   18.452509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452869]  kthread+0x328/0x630
[   18.453272]  ret_from_fork+0x10/0x20
[   18.453334] 
[   18.453354] Allocated by task 266:
[   18.453386]  kasan_save_stack+0x3c/0x68
[   18.453430]  kasan_save_track+0x20/0x40
[   18.453468]  kasan_save_alloc_info+0x40/0x58
[   18.453838]  __kasan_kmalloc+0xd4/0xd8
[   18.454664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.455177]  kasan_atomics+0xb8/0x2e0
[   18.455474]  kunit_try_run_case+0x170/0x3f0
[   18.455820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.455887]  kthread+0x328/0x630
[   18.456041]  ret_from_fork+0x10/0x20
[   18.456519] 
[   18.456547] The buggy address belongs to the object at fff00000c653a200
[   18.456547]  which belongs to the cache kmalloc-64 of size 64
[   18.456988] The buggy address is located 0 bytes to the right of
[   18.456988]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.457209] 
[   18.457409] The buggy address belongs to the physical page:
[   18.457451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.457719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.457826] page_type: f5(slab)
[   18.458109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.458177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.458622] page dumped because: kasan: bad access detected
[   18.458796] 
[   18.458963] Memory state around the buggy address:
[   18.459006]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.459089]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.459149] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.459597]                                      ^
[   18.459736]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.459786]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.460271] ==================================================================
[   18.550601] ==================================================================
[   18.550799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.550876] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.550930] 
[   18.550972] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.551340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.551382] Hardware name: linux,dummy-virt (DT)
[   18.551431] Call trace:
[   18.551457]  show_stack+0x20/0x38 (C)
[   18.551517]  dump_stack_lvl+0x8c/0xd0
[   18.551569]  print_report+0x118/0x5d0
[   18.551615]  kasan_report+0xdc/0x128
[   18.551830]  kasan_check_range+0x100/0x1a8
[   18.553197]  __kasan_check_write+0x20/0x30
[   18.553259]  kasan_atomics_helper+0x1384/0x4858
[   18.553752]  kasan_atomics+0x198/0x2e0
[   18.553809]  kunit_try_run_case+0x170/0x3f0
[   18.553989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.554044]  kthread+0x328/0x630
[   18.554085]  ret_from_fork+0x10/0x20
[   18.554134] 
[   18.554155] Allocated by task 266:
[   18.554199]  kasan_save_stack+0x3c/0x68
[   18.554243]  kasan_save_track+0x20/0x40
[   18.554281]  kasan_save_alloc_info+0x40/0x58
[   18.554323]  __kasan_kmalloc+0xd4/0xd8
[   18.554360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.554401]  kasan_atomics+0xb8/0x2e0
[   18.554438]  kunit_try_run_case+0x170/0x3f0
[   18.554480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.554524]  kthread+0x328/0x630
[   18.554559]  ret_from_fork+0x10/0x20
[   18.554596] 
[   18.554618] The buggy address belongs to the object at fff00000c653a200
[   18.554618]  which belongs to the cache kmalloc-64 of size 64
[   18.554679] The buggy address is located 0 bytes to the right of
[   18.554679]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.554747] 
[   18.554768] The buggy address belongs to the physical page:
[   18.554802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.554856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.554906] page_type: f5(slab)
[   18.554945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.554999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.555042] page dumped because: kasan: bad access detected
[   18.555076] 
[   18.555097] Memory state around the buggy address:
[   18.555131]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.555176]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.555328] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.555455]                                      ^
[   18.555555]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.555655]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.555758] ==================================================================
[   18.612816] ==================================================================
[   18.612960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.613063] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.613307] 
[   18.613362] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.613651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.613840] Hardware name: linux,dummy-virt (DT)
[   18.613918] Call trace:
[   18.614028]  show_stack+0x20/0x38 (C)
[   18.614142]  dump_stack_lvl+0x8c/0xd0
[   18.614213]  print_report+0x118/0x5d0
[   18.614261]  kasan_report+0xdc/0x128
[   18.614309]  __asan_report_load8_noabort+0x20/0x30
[   18.614520]  kasan_atomics_helper+0x3df4/0x4858
[   18.614820]  kasan_atomics+0x198/0x2e0
[   18.614997]  kunit_try_run_case+0x170/0x3f0
[   18.615117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.615254]  kthread+0x328/0x630
[   18.615363]  ret_from_fork+0x10/0x20
[   18.615580] 
[   18.615657] Allocated by task 266:
[   18.615699]  kasan_save_stack+0x3c/0x68
[   18.615898]  kasan_save_track+0x20/0x40
[   18.616048]  kasan_save_alloc_info+0x40/0x58
[   18.616357]  __kasan_kmalloc+0xd4/0xd8
[   18.616537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.616725]  kasan_atomics+0xb8/0x2e0
[   18.616895]  kunit_try_run_case+0x170/0x3f0
[   18.616995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.617075]  kthread+0x328/0x630
[   18.617111]  ret_from_fork+0x10/0x20
[   18.617322] 
[   18.617387] The buggy address belongs to the object at fff00000c653a200
[   18.617387]  which belongs to the cache kmalloc-64 of size 64
[   18.617671] The buggy address is located 0 bytes to the right of
[   18.617671]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.617938] 
[   18.618022] The buggy address belongs to the physical page:
[   18.618145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.618321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.618376] page_type: f5(slab)
[   18.618531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.618624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.618784] page dumped because: kasan: bad access detected
[   18.618854] 
[   18.618943] Memory state around the buggy address:
[   18.619211]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.619436]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.619659] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.619891]                                      ^
[   18.620010]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.620110]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.620299] ==================================================================
[   18.556222] ==================================================================
[   18.556274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.556322] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.556374] 
[   18.556404] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.556574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.556606] Hardware name: linux,dummy-virt (DT)
[   18.556640] Call trace:
[   18.556663]  show_stack+0x20/0x38 (C)
[   18.556722]  dump_stack_lvl+0x8c/0xd0
[   18.556807]  print_report+0x118/0x5d0
[   18.556862]  kasan_report+0xdc/0x128
[   18.556936]  __asan_report_load8_noabort+0x20/0x30
[   18.557016]  kasan_atomics_helper+0x3f04/0x4858
[   18.557137]  kasan_atomics+0x198/0x2e0
[   18.557241]  kunit_try_run_case+0x170/0x3f0
[   18.557625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.557747]  kthread+0x328/0x630
[   18.557826]  ret_from_fork+0x10/0x20
[   18.557996] 
[   18.558075] Allocated by task 266:
[   18.558236]  kasan_save_stack+0x3c/0x68
[   18.558324]  kasan_save_track+0x20/0x40
[   18.558417]  kasan_save_alloc_info+0x40/0x58
[   18.558479]  __kasan_kmalloc+0xd4/0xd8
[   18.558517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.558558]  kasan_atomics+0xb8/0x2e0
[   18.558594]  kunit_try_run_case+0x170/0x3f0
[   18.558942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.559038]  kthread+0x328/0x630
[   18.559221]  ret_from_fork+0x10/0x20
[   18.559306] 
[   18.559329] The buggy address belongs to the object at fff00000c653a200
[   18.559329]  which belongs to the cache kmalloc-64 of size 64
[   18.559392] The buggy address is located 0 bytes to the right of
[   18.559392]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.559461] 
[   18.559491] The buggy address belongs to the physical page:
[   18.559524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.559589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.559644] page_type: f5(slab)
[   18.559693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.559749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.559800] page dumped because: kasan: bad access detected
[   18.559839] 
[   18.559860] Memory state around the buggy address:
[   18.559893]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559938]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559983] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.560030]                                      ^
[   18.560070]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.560114]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.560170] ==================================================================
[   18.437238] ==================================================================
[   18.437720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.437809] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.437864] 
[   18.437896] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.438747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.438802] Hardware name: linux,dummy-virt (DT)
[   18.438838] Call trace:
[   18.438868]  show_stack+0x20/0x38 (C)
[   18.439148]  dump_stack_lvl+0x8c/0xd0
[   18.439213]  print_report+0x118/0x5d0
[   18.439262]  kasan_report+0xdc/0x128
[   18.439308]  __asan_report_store8_noabort+0x20/0x30
[   18.439363]  kasan_atomics_helper+0x3e5c/0x4858
[   18.439414]  kasan_atomics+0x198/0x2e0
[   18.439462]  kunit_try_run_case+0x170/0x3f0
[   18.439510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.439565]  kthread+0x328/0x630
[   18.439606]  ret_from_fork+0x10/0x20
[   18.439654] 
[   18.439673] Allocated by task 266:
[   18.439703]  kasan_save_stack+0x3c/0x68
[   18.439745]  kasan_save_track+0x20/0x40
[   18.441337]  kasan_save_alloc_info+0x40/0x58
[   18.441401]  __kasan_kmalloc+0xd4/0xd8
[   18.441509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.441553]  kasan_atomics+0xb8/0x2e0
[   18.441640]  kunit_try_run_case+0x170/0x3f0
[   18.441786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.442054]  kthread+0x328/0x630
[   18.442122]  ret_from_fork+0x10/0x20
[   18.442323] 
[   18.442615] The buggy address belongs to the object at fff00000c653a200
[   18.442615]  which belongs to the cache kmalloc-64 of size 64
[   18.442805] The buggy address is located 0 bytes to the right of
[   18.442805]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.443130] 
[   18.443528] The buggy address belongs to the physical page:
[   18.443648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.444131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.444324] page_type: f5(slab)
[   18.444371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.444716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.445444] page dumped because: kasan: bad access detected
[   18.445500] 
[   18.445521] Memory state around the buggy address:
[   18.445754]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.445978]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.446307] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.446659]                                      ^
[   18.446862]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.447337]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.447412] ==================================================================
[   18.508241] ==================================================================
[   18.508546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.508603] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.508655] 
[   18.509425] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.509546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.509574] Hardware name: linux,dummy-virt (DT)
[   18.509608] Call trace:
[   18.509632]  show_stack+0x20/0x38 (C)
[   18.509686]  dump_stack_lvl+0x8c/0xd0
[   18.509738]  print_report+0x118/0x5d0
[   18.509786]  kasan_report+0xdc/0x128
[   18.509831]  kasan_check_range+0x100/0x1a8
[   18.509881]  __kasan_check_write+0x20/0x30
[   18.509926]  kasan_atomics_helper+0x10c0/0x4858
[   18.509982]  kasan_atomics+0x198/0x2e0
[   18.510026]  kunit_try_run_case+0x170/0x3f0
[   18.510075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.510128]  kthread+0x328/0x630
[   18.510171]  ret_from_fork+0x10/0x20
[   18.510233] 
[   18.510255] Allocated by task 266:
[   18.510284]  kasan_save_stack+0x3c/0x68
[   18.510326]  kasan_save_track+0x20/0x40
[   18.510364]  kasan_save_alloc_info+0x40/0x58
[   18.510404]  __kasan_kmalloc+0xd4/0xd8
[   18.510442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.510482]  kasan_atomics+0xb8/0x2e0
[   18.510520]  kunit_try_run_case+0x170/0x3f0
[   18.510558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.510603]  kthread+0x328/0x630
[   18.510635]  ret_from_fork+0x10/0x20
[   18.510673] 
[   18.510695] The buggy address belongs to the object at fff00000c653a200
[   18.510695]  which belongs to the cache kmalloc-64 of size 64
[   18.510755] The buggy address is located 0 bytes to the right of
[   18.510755]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.510823] 
[   18.510843] The buggy address belongs to the physical page:
[   18.510876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.510931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.510979] page_type: f5(slab)
[   18.511018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.511072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.511116] page dumped because: kasan: bad access detected
[   18.511150] 
[   18.511169] Memory state around the buggy address:
[   18.511244]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.511291]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.511336] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.511378]                                      ^
[   18.511411]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.511456]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.511495] ==================================================================
[   18.411234] ==================================================================
[   18.411702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.411821] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.411875] 
[   18.411907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.411993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.412023] Hardware name: linux,dummy-virt (DT)
[   18.412263] Call trace:
[   18.412298]  show_stack+0x20/0x38 (C)
[   18.412380]  dump_stack_lvl+0x8c/0xd0
[   18.412942]  print_report+0x118/0x5d0
[   18.413296]  kasan_report+0xdc/0x128
[   18.413479]  kasan_check_range+0x100/0x1a8
[   18.413622]  __kasan_check_read+0x20/0x30
[   18.413688]  kasan_atomics_helper+0xdd4/0x4858
[   18.413779]  kasan_atomics+0x198/0x2e0
[   18.414139]  kunit_try_run_case+0x170/0x3f0
[   18.414202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.414597]  kthread+0x328/0x630
[   18.414790]  ret_from_fork+0x10/0x20
[   18.415067] 
[   18.415096] Allocated by task 266:
[   18.415128]  kasan_save_stack+0x3c/0x68
[   18.415172]  kasan_save_track+0x20/0x40
[   18.415225]  kasan_save_alloc_info+0x40/0x58
[   18.415267]  __kasan_kmalloc+0xd4/0xd8
[   18.415692]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.415808]  kasan_atomics+0xb8/0x2e0
[   18.416145]  kunit_try_run_case+0x170/0x3f0
[   18.416634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.417028]  kthread+0x328/0x630
[   18.417131]  ret_from_fork+0x10/0x20
[   18.417370] 
[   18.417401] The buggy address belongs to the object at fff00000c653a200
[   18.417401]  which belongs to the cache kmalloc-64 of size 64
[   18.417465] The buggy address is located 0 bytes to the right of
[   18.417465]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.417535] 
[   18.417555] The buggy address belongs to the physical page:
[   18.417754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.417848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.418410] page_type: f5(slab)
[   18.418486] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.418680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.418891] page dumped because: kasan: bad access detected
[   18.419065] 
[   18.419086] Memory state around the buggy address:
[   18.419306]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.419578]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.419843] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.420335]                                      ^
[   18.420460]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.420673]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.420947] ==================================================================
[   18.430477] ==================================================================
[   18.430532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.430719] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.430783] 
[   18.430837] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.431062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.431152] Hardware name: linux,dummy-virt (DT)
[   18.431194] Call trace:
[   18.431467]  show_stack+0x20/0x38 (C)
[   18.431750]  dump_stack_lvl+0x8c/0xd0
[   18.431944]  print_report+0x118/0x5d0
[   18.433277]  kasan_report+0xdc/0x128
[   18.433327]  kasan_check_range+0x100/0x1a8
[   18.433377]  __kasan_check_write+0x20/0x30
[   18.433423]  kasan_atomics_helper+0xe44/0x4858
[   18.433471]  kasan_atomics+0x198/0x2e0
[   18.433518]  kunit_try_run_case+0x170/0x3f0
[   18.433565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.433631]  kthread+0x328/0x630
[   18.433675]  ret_from_fork+0x10/0x20
[   18.433724] 
[   18.433745] Allocated by task 266:
[   18.433777]  kasan_save_stack+0x3c/0x68
[   18.434220]  kasan_save_track+0x20/0x40
[   18.434277]  kasan_save_alloc_info+0x40/0x58
[   18.434420]  __kasan_kmalloc+0xd4/0xd8
[   18.434470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.434512]  kasan_atomics+0xb8/0x2e0
[   18.434550]  kunit_try_run_case+0x170/0x3f0
[   18.434591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.434636]  kthread+0x328/0x630
[   18.434671]  ret_from_fork+0x10/0x20
[   18.434709] 
[   18.434731] The buggy address belongs to the object at fff00000c653a200
[   18.434731]  which belongs to the cache kmalloc-64 of size 64
[   18.434792] The buggy address is located 0 bytes to the right of
[   18.434792]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.434861] 
[   18.434881] The buggy address belongs to the physical page:
[   18.434916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.434972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.435021] page_type: f5(slab)
[   18.435060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.435114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.435157] page dumped because: kasan: bad access detected
[   18.435203] 
[   18.435224] Memory state around the buggy address:
[   18.435259]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.435303]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.435348] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.435386]                                      ^
[   18.435422]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.435466]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.435507] ==================================================================
[   18.538581] ==================================================================
[   18.538919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.539096] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.539150] 
[   18.539195] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.539279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.539307] Hardware name: linux,dummy-virt (DT)
[   18.539341] Call trace:
[   18.539367]  show_stack+0x20/0x38 (C)
[   18.539990]  dump_stack_lvl+0x8c/0xd0
[   18.540648]  print_report+0x118/0x5d0
[   18.541082]  kasan_report+0xdc/0x128
[   18.541140]  kasan_check_range+0x100/0x1a8
[   18.541200]  __kasan_check_write+0x20/0x30
[   18.541950]  kasan_atomics_helper+0x12d8/0x4858
[   18.542263]  kasan_atomics+0x198/0x2e0
[   18.542320]  kunit_try_run_case+0x170/0x3f0
[   18.542721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.542782]  kthread+0x328/0x630
[   18.543142]  ret_from_fork+0x10/0x20
[   18.543255] 
[   18.543282] Allocated by task 266:
[   18.543315]  kasan_save_stack+0x3c/0x68
[   18.543640]  kasan_save_track+0x20/0x40
[   18.544079]  kasan_save_alloc_info+0x40/0x58
[   18.544174]  __kasan_kmalloc+0xd4/0xd8
[   18.544401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.544447]  kasan_atomics+0xb8/0x2e0
[   18.544908]  kunit_try_run_case+0x170/0x3f0
[   18.545189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.545240]  kthread+0x328/0x630
[   18.545276]  ret_from_fork+0x10/0x20
[   18.545313] 
[   18.545553] The buggy address belongs to the object at fff00000c653a200
[   18.545553]  which belongs to the cache kmalloc-64 of size 64
[   18.546113] The buggy address is located 0 bytes to the right of
[   18.546113]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.546201] 
[   18.546225] The buggy address belongs to the physical page:
[   18.546797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.546942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.546998] page_type: f5(slab)
[   18.547372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.547593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.547645] page dumped because: kasan: bad access detected
[   18.547904] 
[   18.548299] Memory state around the buggy address:
[   18.548507]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.548623]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.548755] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.549342]                                      ^
[   18.549744]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.549836]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.549941] ==================================================================
[   18.461019] ==================================================================
[   18.461075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.461124] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.461176] 
[   18.462208] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.462326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.462411] Hardware name: linux,dummy-virt (DT)
[   18.462486] Call trace:
[   18.462513]  show_stack+0x20/0x38 (C)
[   18.462565]  dump_stack_lvl+0x8c/0xd0
[   18.462710]  print_report+0x118/0x5d0
[   18.462774]  kasan_report+0xdc/0x128
[   18.462822]  kasan_check_range+0x100/0x1a8
[   18.462878]  __kasan_check_write+0x20/0x30
[   18.463426]  kasan_atomics_helper+0xf20/0x4858
[   18.463491]  kasan_atomics+0x198/0x2e0
[   18.463954]  kunit_try_run_case+0x170/0x3f0
[   18.464348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.464420]  kthread+0x328/0x630
[   18.464466]  ret_from_fork+0x10/0x20
[   18.464515] 
[   18.464535] Allocated by task 266:
[   18.464566]  kasan_save_stack+0x3c/0x68
[   18.465422]  kasan_save_track+0x20/0x40
[   18.465484]  kasan_save_alloc_info+0x40/0x58
[   18.465530]  __kasan_kmalloc+0xd4/0xd8
[   18.465606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.465695]  kasan_atomics+0xb8/0x2e0
[   18.465968]  kunit_try_run_case+0x170/0x3f0
[   18.466241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.466538]  kthread+0x328/0x630
[   18.466580]  ret_from_fork+0x10/0x20
[   18.467031] 
[   18.467060] The buggy address belongs to the object at fff00000c653a200
[   18.467060]  which belongs to the cache kmalloc-64 of size 64
[   18.467426] The buggy address is located 0 bytes to the right of
[   18.467426]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.467834] 
[   18.467862] The buggy address belongs to the physical page:
[   18.467897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.468520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.468938] page_type: f5(slab)
[   18.469316] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.469535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.469591] page dumped because: kasan: bad access detected
[   18.469627] 
[   18.470034] Memory state around the buggy address:
[   18.471299]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.471763]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.472032] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.472134]                                      ^
[   18.472172]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.472642]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473116] ==================================================================
[   18.295918] ==================================================================
[   18.296367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   18.296584] Write of size 4 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.299708] Allocated by task 266:
[   18.299740]  kasan_save_stack+0x3c/0x68
[   18.299783]  kasan_save_track+0x20/0x40
[   18.299822]  kasan_save_alloc_info+0x40/0x58
[   18.299864]  __kasan_kmalloc+0xd4/0xd8
[   18.299903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.299945]  kasan_atomics+0xb8/0x2e0
[   18.299983]  kunit_try_run_case+0x170/0x3f0
[   18.300022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.300068]  kthread+0x328/0x630
[   18.300102]  ret_from_fork+0x10/0x20
[   18.300139] 
[   18.300161] The buggy address belongs to the object at fff00000c653a200
[   18.300161]  which belongs to the cache kmalloc-64 of size 64
[   18.300312] 
[   18.300370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.302744]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.305849] 
[   18.307012]  __asan_report_load4_noabort+0x20/0x30
[   18.309237]  kasan_save_track+0x20/0x40
[   18.309953]  kasan_save_alloc_info+0x40/0x58
[   18.310289]  __kasan_kmalloc+0xd4/0xd8
[   18.310620]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.310881]  kasan_atomics+0xb8/0x2e0
[   18.311159]  kunit_try_run_case+0x170/0x3f0
[   18.311476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.311665]  kthread+0x328/0x630
[   18.312004]  ret_from_fork+0x10/0x20
[   18.312047] 
[   18.312705] The buggy address belongs to the object at fff00000c653a200
[   18.312705]  which belongs to the cache kmalloc-64 of size 64
[   18.312796] The buggy address is located 0 bytes to the right of
[   18.312796]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.313266] 
[   18.313293] The buggy address belongs to the physical page:
[   18.313331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.313393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.313448] page_type: f5(slab)
[   18.313492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.313943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.314013] page dumped because: kasan: bad access detected
[   18.314348] 
[   18.314372] Memory state around the buggy address:
[   18.314615]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.314678]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.314984] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.315114]                                      ^
[   18.315214]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.315260]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.315601] ==================================================================
[   18.638809] ==================================================================
[   18.638871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.639149] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.639302] 
[   18.639611] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.639800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.639834] Hardware name: linux,dummy-virt (DT)
[   18.639912] Call trace:
[   18.640047]  show_stack+0x20/0x38 (C)
[   18.640154]  dump_stack_lvl+0x8c/0xd0
[   18.640239]  print_report+0x118/0x5d0
[   18.640524]  kasan_report+0xdc/0x128
[   18.640603]  __asan_report_load8_noabort+0x20/0x30
[   18.640656]  kasan_atomics_helper+0x3e20/0x4858
[   18.640832]  kasan_atomics+0x198/0x2e0
[   18.641077]  kunit_try_run_case+0x170/0x3f0
[   18.641256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.641471]  kthread+0x328/0x630
[   18.641593]  ret_from_fork+0x10/0x20
[   18.641759] 
[   18.641782] Allocated by task 266:
[   18.641816]  kasan_save_stack+0x3c/0x68
[   18.641859]  kasan_save_track+0x20/0x40
[   18.641899]  kasan_save_alloc_info+0x40/0x58
[   18.642231]  __kasan_kmalloc+0xd4/0xd8
[   18.642336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.642658]  kasan_atomics+0xb8/0x2e0
[   18.642837]  kunit_try_run_case+0x170/0x3f0
[   18.642894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.643116]  kthread+0x328/0x630
[   18.643561]  ret_from_fork+0x10/0x20
[   18.643679] 
[   18.644013] The buggy address belongs to the object at fff00000c653a200
[   18.644013]  which belongs to the cache kmalloc-64 of size 64
[   18.644111] The buggy address is located 0 bytes to the right of
[   18.644111]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.644304] 
[   18.644396] The buggy address belongs to the physical page:
[   18.644468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.644653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.644736] page_type: f5(slab)
[   18.644810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.644959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.645006] page dumped because: kasan: bad access detected
[   18.645041] 
[   18.645235] Memory state around the buggy address:
[   18.645454]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.645551]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.645615] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.645803]                                      ^
[   18.645889]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.646101]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.646165] ==================================================================
[   18.421430] ==================================================================
[   18.421482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.421534] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.421587] 
[   18.422118] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.422385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.422551] Hardware name: linux,dummy-virt (DT)
[   18.422596] Call trace:
[   18.422619]  show_stack+0x20/0x38 (C)
[   18.422843]  dump_stack_lvl+0x8c/0xd0
[   18.422895]  print_report+0x118/0x5d0
[   18.422943]  kasan_report+0xdc/0x128
[   18.422989]  __asan_report_load8_noabort+0x20/0x30
[   18.423043]  kasan_atomics_helper+0x3f58/0x4858
[   18.423094]  kasan_atomics+0x198/0x2e0
[   18.423140]  kunit_try_run_case+0x170/0x3f0
[   18.423199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.423749]  kthread+0x328/0x630
[   18.423812]  ret_from_fork+0x10/0x20
[   18.423876] 
[   18.424547] Allocated by task 266:
[   18.424589]  kasan_save_stack+0x3c/0x68
[   18.424697]  kasan_save_track+0x20/0x40
[   18.425134]  kasan_save_alloc_info+0x40/0x58
[   18.425334]  __kasan_kmalloc+0xd4/0xd8
[   18.425625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.425671]  kasan_atomics+0xb8/0x2e0
[   18.425810]  kunit_try_run_case+0x170/0x3f0
[   18.425871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.426128]  kthread+0x328/0x630
[   18.426396]  ret_from_fork+0x10/0x20
[   18.426765] 
[   18.426789] The buggy address belongs to the object at fff00000c653a200
[   18.426789]  which belongs to the cache kmalloc-64 of size 64
[   18.426851] The buggy address is located 0 bytes to the right of
[   18.426851]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.426919] 
[   18.426940] The buggy address belongs to the physical page:
[   18.427726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.428111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.428168] page_type: f5(slab)
[   18.428220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.428274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.428325] page dumped because: kasan: bad access detected
[   18.428359] 
[   18.428380] Memory state around the buggy address:
[   18.428414]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.428462]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.428870] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.428931]                                      ^
[   18.429148]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.429391]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.429470] ==================================================================
[   18.567668] ==================================================================
[   18.567862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.568000] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.568074] 
[   18.568147] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.568262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.568307] Hardware name: linux,dummy-virt (DT)
[   18.568341] Call trace:
[   18.568365]  show_stack+0x20/0x38 (C)
[   18.568415]  dump_stack_lvl+0x8c/0xd0
[   18.568466]  print_report+0x118/0x5d0
[   18.568689]  kasan_report+0xdc/0x128
[   18.568774]  kasan_check_range+0x100/0x1a8
[   18.568826]  __kasan_check_write+0x20/0x30
[   18.568892]  kasan_atomics_helper+0x147c/0x4858
[   18.568981]  kasan_atomics+0x198/0x2e0
[   18.569223]  kunit_try_run_case+0x170/0x3f0
[   18.569293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.569386]  kthread+0x328/0x630
[   18.569442]  ret_from_fork+0x10/0x20
[   18.569489] 
[   18.569542] Allocated by task 266:
[   18.569626]  kasan_save_stack+0x3c/0x68
[   18.569697]  kasan_save_track+0x20/0x40
[   18.569737]  kasan_save_alloc_info+0x40/0x58
[   18.570018]  __kasan_kmalloc+0xd4/0xd8
[   18.570083]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.570125]  kasan_atomics+0xb8/0x2e0
[   18.570197]  kunit_try_run_case+0x170/0x3f0
[   18.570238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.570284]  kthread+0x328/0x630
[   18.570317]  ret_from_fork+0x10/0x20
[   18.570365] 
[   18.570396] The buggy address belongs to the object at fff00000c653a200
[   18.570396]  which belongs to the cache kmalloc-64 of size 64
[   18.570652] The buggy address is located 0 bytes to the right of
[   18.570652]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.570730] 
[   18.570752] The buggy address belongs to the physical page:
[   18.570918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.571130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.571282] page_type: f5(slab)
[   18.571325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.571379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.571727] page dumped because: kasan: bad access detected
[   18.571815] 
[   18.572193] Memory state around the buggy address:
[   18.572570]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.572794]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.573041] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.573191]                                      ^
[   18.573230]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.573303]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.573342] ==================================================================
[   18.317536] ==================================================================
[   18.317597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   18.317702] 
[   18.319596] Allocated by task 266:
[   18.320813]  kasan_atomics+0xb8/0x2e0
[   18.321928] 
[   18.323133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.326208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   18.329599]  dump_stack_lvl+0x8c/0xd0
[   18.332499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.333947]  __kasan_kmalloc+0xd4/0xd8
[   18.333989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.334168]  kthread+0x328/0x630
[   18.335396] The buggy address is located 0 bytes to the right of
[   18.335396]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.337908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.339505]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.345393]  kasan_atomics_helper+0xc08/0x4858
[   18.347336]  __kasan_kmalloc+0xd4/0xd8
[   18.347376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.347418]  kasan_atomics+0xb8/0x2e0
[   18.348427] The buggy address is located 0 bytes to the right of
[   18.348427]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.349681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.350809] page dumped because: kasan: bad access detected
[   18.350947]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.351157] ==================================================================
[   18.268923] ==================================================================
[   18.269032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.270461]  __kasan_check_write+0x20/0x30
[   18.270615]  kunit_try_run_case+0x170/0x3f0
[   18.270689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.272954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.277493] ==================================================================
[   18.634729] ==================================================================
[   18.634876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.634932] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.634994] 
[   18.635026] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.635110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.635145] Hardware name: linux,dummy-virt (DT)
[   18.635190] Call trace:
[   18.635214]  show_stack+0x20/0x38 (C)
[   18.635274]  dump_stack_lvl+0x8c/0xd0
[   18.635323]  print_report+0x118/0x5d0
[   18.635371]  kasan_report+0xdc/0x128
[   18.635418]  kasan_check_range+0x100/0x1a8
[   18.635466]  __kasan_check_write+0x20/0x30
[   18.635511]  kasan_atomics_helper+0x175c/0x4858
[   18.635569]  kasan_atomics+0x198/0x2e0
[   18.635615]  kunit_try_run_case+0x170/0x3f0
[   18.635663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.635716]  kthread+0x328/0x630
[   18.635767]  ret_from_fork+0x10/0x20
[   18.635816] 
[   18.635836] Allocated by task 266:
[   18.635865]  kasan_save_stack+0x3c/0x68
[   18.635907]  kasan_save_track+0x20/0x40
[   18.635954]  kasan_save_alloc_info+0x40/0x58
[   18.635997]  __kasan_kmalloc+0xd4/0xd8
[   18.636034]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.636081]  kasan_atomics+0xb8/0x2e0
[   18.636123]  kunit_try_run_case+0x170/0x3f0
[   18.636164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.636220]  kthread+0x328/0x630
[   18.636252]  ret_from_fork+0x10/0x20
[   18.636289] 
[   18.636309] The buggy address belongs to the object at fff00000c653a200
[   18.636309]  which belongs to the cache kmalloc-64 of size 64
[   18.636375] The buggy address is located 0 bytes to the right of
[   18.636375]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.636443] 
[   18.636470] The buggy address belongs to the physical page:
[   18.636502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.636556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.636606] page_type: f5(slab)
[   18.636642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.636696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.636740] page dumped because: kasan: bad access detected
[   18.636775] 
[   18.636794] Memory state around the buggy address:
[   18.636827]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.636872]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.636918] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.636959]                                      ^
[   18.637732]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.637848]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638289] ==================================================================
[   18.561006] ==================================================================
[   18.561136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.561263] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.561316] 
[   18.561361] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.561446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.561473] Hardware name: linux,dummy-virt (DT)
[   18.561506] Call trace:
[   18.561570]  show_stack+0x20/0x38 (C)
[   18.561620]  dump_stack_lvl+0x8c/0xd0
[   18.561804]  print_report+0x118/0x5d0
[   18.561937]  kasan_report+0xdc/0x128
[   18.562026]  kasan_check_range+0x100/0x1a8
[   18.562253]  __kasan_check_write+0x20/0x30
[   18.562462]  kasan_atomics_helper+0x1414/0x4858
[   18.562614]  kasan_atomics+0x198/0x2e0
[   18.562777]  kunit_try_run_case+0x170/0x3f0
[   18.562919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.562976]  kthread+0x328/0x630
[   18.563057]  ret_from_fork+0x10/0x20
[   18.563458] 
[   18.563524] Allocated by task 266:
[   18.563706]  kasan_save_stack+0x3c/0x68
[   18.563879]  kasan_save_track+0x20/0x40
[   18.563989]  kasan_save_alloc_info+0x40/0x58
[   18.564033]  __kasan_kmalloc+0xd4/0xd8
[   18.564132]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.564197]  kasan_atomics+0xb8/0x2e0
[   18.564233]  kunit_try_run_case+0x170/0x3f0
[   18.564342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.564514]  kthread+0x328/0x630
[   18.564598]  ret_from_fork+0x10/0x20
[   18.564712] 
[   18.564789] The buggy address belongs to the object at fff00000c653a200
[   18.564789]  which belongs to the cache kmalloc-64 of size 64
[   18.564853] The buggy address is located 0 bytes to the right of
[   18.564853]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.565023] 
[   18.565156] The buggy address belongs to the physical page:
[   18.565325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.565520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.565614] page_type: f5(slab)
[   18.565985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.566097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.566142] page dumped because: kasan: bad access detected
[   18.566176] 
[   18.566365] Memory state around the buggy address:
[   18.566400]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.566447]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.566631] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.566755]                                      ^
[   18.566913]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.566976]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.567038] ==================================================================
[   18.523672] ==================================================================
[   18.523806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.523863] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.523914] 
[   18.523946] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.524036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.524171] Hardware name: linux,dummy-virt (DT)
[   18.524313] Call trace:
[   18.524438]  show_stack+0x20/0x38 (C)
[   18.524659]  dump_stack_lvl+0x8c/0xd0
[   18.524759]  print_report+0x118/0x5d0
[   18.524811]  kasan_report+0xdc/0x128
[   18.524858]  kasan_check_range+0x100/0x1a8
[   18.524911]  __kasan_check_write+0x20/0x30
[   18.525041]  kasan_atomics_helper+0x11f8/0x4858
[   18.525089]  kasan_atomics+0x198/0x2e0
[   18.525240]  kunit_try_run_case+0x170/0x3f0
[   18.525314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.525369]  kthread+0x328/0x630
[   18.525410]  ret_from_fork+0x10/0x20
[   18.525459] 
[   18.525479] Allocated by task 266:
[   18.525534]  kasan_save_stack+0x3c/0x68
[   18.525578]  kasan_save_track+0x20/0x40
[   18.525725]  kasan_save_alloc_info+0x40/0x58
[   18.525769]  __kasan_kmalloc+0xd4/0xd8
[   18.525807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.525849]  kasan_atomics+0xb8/0x2e0
[   18.525891]  kunit_try_run_case+0x170/0x3f0
[   18.525931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.525985]  kthread+0x328/0x630
[   18.526137]  ret_from_fork+0x10/0x20
[   18.526212] 
[   18.526235] The buggy address belongs to the object at fff00000c653a200
[   18.526235]  which belongs to the cache kmalloc-64 of size 64
[   18.526296] The buggy address is located 0 bytes to the right of
[   18.526296]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.526386] 
[   18.526408] The buggy address belongs to the physical page:
[   18.526477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.526532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.526601] page_type: f5(slab)
[   18.526640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.526694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.526783] page dumped because: kasan: bad access detected
[   18.526906] 
[   18.526927] Memory state around the buggy address:
[   18.527083]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.527130]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.527174] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.527355]                                      ^
[   18.527393]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.527460]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.527548] ==================================================================
[   18.399941] ==================================================================
[   18.399996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.400051] Read of size 4 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.400102] 
[   18.400134] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.400706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.401053] Hardware name: linux,dummy-virt (DT)
[   18.401535] Call trace:
[   18.401561]  show_stack+0x20/0x38 (C)
[   18.401626]  dump_stack_lvl+0x8c/0xd0
[   18.401683]  print_report+0x118/0x5d0
[   18.402177]  kasan_report+0xdc/0x128
[   18.402421]  __asan_report_load4_noabort+0x20/0x30
[   18.402595]  kasan_atomics_helper+0x3e04/0x4858
[   18.402804]  kasan_atomics+0x198/0x2e0
[   18.403110]  kunit_try_run_case+0x170/0x3f0
[   18.403253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.403311]  kthread+0x328/0x630
[   18.404411]  ret_from_fork+0x10/0x20
[   18.404491] 
[   18.404512] Allocated by task 266:
[   18.404925]  kasan_save_stack+0x3c/0x68
[   18.405020]  kasan_save_track+0x20/0x40
[   18.405190]  kasan_save_alloc_info+0x40/0x58
[   18.405235]  __kasan_kmalloc+0xd4/0xd8
[   18.405698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.405767]  kasan_atomics+0xb8/0x2e0
[   18.405833]  kunit_try_run_case+0x170/0x3f0
[   18.406214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.406331]  kthread+0x328/0x630
[   18.406602]  ret_from_fork+0x10/0x20
[   18.406645] 
[   18.406997] The buggy address belongs to the object at fff00000c653a200
[   18.406997]  which belongs to the cache kmalloc-64 of size 64
[   18.407072] The buggy address is located 0 bytes to the right of
[   18.407072]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.407141] 
[   18.407506] The buggy address belongs to the physical page:
[   18.407545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.407926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.408161] page_type: f5(slab)
[   18.408443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.408509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.409006] page dumped because: kasan: bad access detected
[   18.409050] 
[   18.409070] Memory state around the buggy address:
[   18.409103]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.409150]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.409206] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.409612]                                      ^
[   18.409669]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409784]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409906] ==================================================================
[   18.625450] ==================================================================
[   18.625718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.625815] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.626157] 
[   18.626230] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.626506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.626735] Hardware name: linux,dummy-virt (DT)
[   18.626828] Call trace:
[   18.626942]  show_stack+0x20/0x38 (C)
[   18.627154]  dump_stack_lvl+0x8c/0xd0
[   18.627277]  print_report+0x118/0x5d0
[   18.627562]  kasan_report+0xdc/0x128
[   18.627682]  __asan_report_load8_noabort+0x20/0x30
[   18.627850]  kasan_atomics_helper+0x3e10/0x4858
[   18.628139]  kasan_atomics+0x198/0x2e0
[   18.628372]  kunit_try_run_case+0x170/0x3f0
[   18.628540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.628682]  kthread+0x328/0x630
[   18.628944]  ret_from_fork+0x10/0x20
[   18.629146] 
[   18.629289] Allocated by task 266:
[   18.629423]  kasan_save_stack+0x3c/0x68
[   18.629610]  kasan_save_track+0x20/0x40
[   18.629693]  kasan_save_alloc_info+0x40/0x58
[   18.629901]  __kasan_kmalloc+0xd4/0xd8
[   18.629994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.630131]  kasan_atomics+0xb8/0x2e0
[   18.630242]  kunit_try_run_case+0x170/0x3f0
[   18.630293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.630550]  kthread+0x328/0x630
[   18.630651]  ret_from_fork+0x10/0x20
[   18.630832] 
[   18.631110] The buggy address belongs to the object at fff00000c653a200
[   18.631110]  which belongs to the cache kmalloc-64 of size 64
[   18.631279] The buggy address is located 0 bytes to the right of
[   18.631279]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.631574] 
[   18.631699] The buggy address belongs to the physical page:
[   18.631776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.631998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.632239] page_type: f5(slab)
[   18.632306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.632386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.632431] page dumped because: kasan: bad access detected
[   18.632471] 
[   18.632710] Memory state around the buggy address:
[   18.632877]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.633203]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.633352] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.633581]                                      ^
[   18.633626]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.633674]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.633714] ==================================================================
[   18.582790] ==================================================================
[   18.582850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.582903] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.582955] 
[   18.582998] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.583092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.583122] Hardware name: linux,dummy-virt (DT)
[   18.583155] Call trace:
[   18.583189]  show_stack+0x20/0x38 (C)
[   18.583247]  dump_stack_lvl+0x8c/0xd0
[   18.583295]  print_report+0x118/0x5d0
[   18.583343]  kasan_report+0xdc/0x128
[   18.583388]  kasan_check_range+0x100/0x1a8
[   18.583446]  __kasan_check_write+0x20/0x30
[   18.583491]  kasan_atomics_helper+0x154c/0x4858
[   18.583541]  kasan_atomics+0x198/0x2e0
[   18.583587]  kunit_try_run_case+0x170/0x3f0
[   18.583633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.583689]  kthread+0x328/0x630
[   18.583742]  ret_from_fork+0x10/0x20
[   18.583790] 
[   18.583810] Allocated by task 266:
[   18.583849]  kasan_save_stack+0x3c/0x68
[   18.583891]  kasan_save_track+0x20/0x40
[   18.583940]  kasan_save_alloc_info+0x40/0x58
[   18.583981]  __kasan_kmalloc+0xd4/0xd8
[   18.584019]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.584064]  kasan_atomics+0xb8/0x2e0
[   18.584109]  kunit_try_run_case+0x170/0x3f0
[   18.584155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.584210]  kthread+0x328/0x630
[   18.584254]  ret_from_fork+0x10/0x20
[   18.584293] 
[   18.584315] The buggy address belongs to the object at fff00000c653a200
[   18.584315]  which belongs to the cache kmalloc-64 of size 64
[   18.584376] The buggy address is located 0 bytes to the right of
[   18.584376]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.585091] 
[   18.585130] The buggy address belongs to the physical page:
[   18.585166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.585251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.585466] page_type: f5(slab)
[   18.585901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.586077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.586162] page dumped because: kasan: bad access detected
[   18.586769] 
[   18.586971] Memory state around the buggy address:
[   18.587012]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.587464]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.587563] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.587907]                                      ^
[   18.587968]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.588323]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.588386] ==================================================================
[   18.599254] ==================================================================
[   18.599310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.599516] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.599579] 
[   18.599797] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.599895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.600161] Hardware name: linux,dummy-virt (DT)
[   18.600229] Call trace:
[   18.600489]  show_stack+0x20/0x38 (C)
[   18.600562]  dump_stack_lvl+0x8c/0xd0
[   18.600613]  print_report+0x118/0x5d0
[   18.600811]  kasan_report+0xdc/0x128
[   18.600884]  __asan_report_load8_noabort+0x20/0x30
[   18.600941]  kasan_atomics_helper+0x3db0/0x4858
[   18.601324]  kasan_atomics+0x198/0x2e0
[   18.601587]  kunit_try_run_case+0x170/0x3f0
[   18.601935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.602122]  kthread+0x328/0x630
[   18.602391]  ret_from_fork+0x10/0x20
[   18.602451] 
[   18.602483] Allocated by task 266:
[   18.602515]  kasan_save_stack+0x3c/0x68
[   18.602567]  kasan_save_track+0x20/0x40
[   18.602605]  kasan_save_alloc_info+0x40/0x58
[   18.602647]  __kasan_kmalloc+0xd4/0xd8
[   18.602684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.602735]  kasan_atomics+0xb8/0x2e0
[   18.602772]  kunit_try_run_case+0x170/0x3f0
[   18.602828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.602879]  kthread+0x328/0x630
[   18.602929]  ret_from_fork+0x10/0x20
[   18.602977] 
[   18.603000] The buggy address belongs to the object at fff00000c653a200
[   18.603000]  which belongs to the cache kmalloc-64 of size 64
[   18.603062] The buggy address is located 0 bytes to the right of
[   18.603062]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.603130] 
[   18.603162] The buggy address belongs to the physical page:
[   18.603211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.603268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.603317] page_type: f5(slab)
[   18.603357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.603421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.603474] page dumped because: kasan: bad access detected
[   18.603518] 
[   18.603556] Memory state around the buggy address:
[   18.603590]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.603636]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.603682] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.603724]                                      ^
[   18.603758]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.603801]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.603841] ==================================================================
[   18.574455] ==================================================================
[   18.574556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.574639] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.574694] 
[   18.574874] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.574970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.575001] Hardware name: linux,dummy-virt (DT)
[   18.575035] Call trace:
[   18.575059]  show_stack+0x20/0x38 (C)
[   18.575109]  dump_stack_lvl+0x8c/0xd0
[   18.575157]  print_report+0x118/0x5d0
[   18.575220]  kasan_report+0xdc/0x128
[   18.575265]  kasan_check_range+0x100/0x1a8
[   18.575315]  __kasan_check_write+0x20/0x30
[   18.575360]  kasan_atomics_helper+0x14e4/0x4858
[   18.575410]  kasan_atomics+0x198/0x2e0
[   18.575457]  kunit_try_run_case+0x170/0x3f0
[   18.575503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.575557]  kthread+0x328/0x630
[   18.575599]  ret_from_fork+0x10/0x20
[   18.575646] 
[   18.576339] Allocated by task 266:
[   18.576393]  kasan_save_stack+0x3c/0x68
[   18.576757]  kasan_save_track+0x20/0x40
[   18.576821]  kasan_save_alloc_info+0x40/0x58
[   18.576937]  __kasan_kmalloc+0xd4/0xd8
[   18.577025]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.577256]  kasan_atomics+0xb8/0x2e0
[   18.577322]  kunit_try_run_case+0x170/0x3f0
[   18.577368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.577415]  kthread+0x328/0x630
[   18.577448]  ret_from_fork+0x10/0x20
[   18.578037] 
[   18.578078] The buggy address belongs to the object at fff00000c653a200
[   18.578078]  which belongs to the cache kmalloc-64 of size 64
[   18.578237] The buggy address is located 0 bytes to the right of
[   18.578237]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.578597] 
[   18.578664] The buggy address belongs to the physical page:
[   18.578767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.578849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.579253] page_type: f5(slab)
[   18.579393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.579471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.579850] page dumped because: kasan: bad access detected
[   18.579941] 
[   18.579964] Memory state around the buggy address:
[   18.580001]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.580406]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.580616] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.580856]                                      ^
[   18.580894]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.581298]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.581438] ==================================================================
[   18.646994] ==================================================================
[   18.647242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.647405] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266
[   18.647494] 
[   18.647531] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.647618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.647653] Hardware name: linux,dummy-virt (DT)
[   18.647687] Call trace:
[   18.647710]  show_stack+0x20/0x38 (C)
[   18.647950]  dump_stack_lvl+0x8c/0xd0
[   18.648067]  print_report+0x118/0x5d0
[   18.648121]  kasan_report+0xdc/0x128
[   18.648344]  kasan_check_range+0x100/0x1a8
[   18.648414]  __kasan_check_write+0x20/0x30
[   18.648520]  kasan_atomics_helper+0x17ec/0x4858
[   18.648667]  kasan_atomics+0x198/0x2e0
[   18.648720]  kunit_try_run_case+0x170/0x3f0
[   18.648955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.649155]  kthread+0x328/0x630
[   18.649368]  ret_from_fork+0x10/0x20
[   18.649473] 
[   18.649752] Allocated by task 266:
[   18.649874]  kasan_save_stack+0x3c/0x68
[   18.650118]  kasan_save_track+0x20/0x40
[   18.650277]  kasan_save_alloc_info+0x40/0x58
[   18.650425]  __kasan_kmalloc+0xd4/0xd8
[   18.650528]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.650790]  kasan_atomics+0xb8/0x2e0
[   18.650960]  kunit_try_run_case+0x170/0x3f0
[   18.651159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.651282]  kthread+0x328/0x630
[   18.651406]  ret_from_fork+0x10/0x20
[   18.651496] 
[   18.651519] The buggy address belongs to the object at fff00000c653a200
[   18.651519]  which belongs to the cache kmalloc-64 of size 64
[   18.651824] The buggy address is located 0 bytes to the right of
[   18.651824]  allocated 48-byte region [fff00000c653a200, fff00000c653a230)
[   18.651958] 
[   18.652082] The buggy address belongs to the physical page:
[   18.652276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   18.652578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.652758] page_type: f5(slab)
[   18.652854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.653132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.653242] page dumped because: kasan: bad access detected
[   18.653386] 
[   18.653590] Memory state around the buggy address:
[   18.653820]  fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.653907]  fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.654168] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.654323]                                      ^
[   18.654570]  fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.654621]  fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.654679] ==================================================================

[   14.999195] ==================================================================
[   14.999530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.999893] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.000199] 
[   15.000311] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.000354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.000366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.000389] Call Trace:
[   15.000403]  <TASK>
[   15.000419]  dump_stack_lvl+0x73/0xb0
[   15.000495]  print_report+0xd1/0x610
[   15.000520]  ? __virt_addr_valid+0x1db/0x2d0
[   15.000544]  ? kasan_atomics_helper+0x3df/0x5450
[   15.000567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.000592]  ? kasan_atomics_helper+0x3df/0x5450
[   15.000615]  kasan_report+0x141/0x180
[   15.000639]  ? kasan_atomics_helper+0x3df/0x5450
[   15.000666]  kasan_check_range+0x10c/0x1c0
[   15.000691]  __kasan_check_read+0x15/0x20
[   15.000712]  kasan_atomics_helper+0x3df/0x5450
[   15.000736]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.000773]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.000811]  ? kasan_atomics+0x152/0x310
[   15.000840]  kasan_atomics+0x1dc/0x310
[   15.000864]  ? __pfx_kasan_atomics+0x10/0x10
[   15.000890]  ? __pfx_read_tsc+0x10/0x10
[   15.000912]  ? ktime_get_ts64+0x86/0x230
[   15.000938]  kunit_try_run_case+0x1a5/0x480
[   15.000965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.000989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.001015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.001042]  ? __kthread_parkme+0x82/0x180
[   15.001064]  ? preempt_count_sub+0x50/0x80
[   15.001090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.001116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.001144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.001171]  kthread+0x337/0x6f0
[   15.001192]  ? trace_preempt_on+0x20/0xc0
[   15.001217]  ? __pfx_kthread+0x10/0x10
[   15.001240]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.001263]  ? calculate_sigpending+0x7b/0xa0
[   15.001289]  ? __pfx_kthread+0x10/0x10
[   15.001312]  ret_from_fork+0x116/0x1d0
[   15.001368]  ? __pfx_kthread+0x10/0x10
[   15.001391]  ret_from_fork_asm+0x1a/0x30
[   15.001424]  </TASK>
[   15.001436] 
[   15.009591] Allocated by task 282:
[   15.009728]  kasan_save_stack+0x45/0x70
[   15.009892]  kasan_save_track+0x18/0x40
[   15.010030]  kasan_save_alloc_info+0x3b/0x50
[   15.010247]  __kasan_kmalloc+0xb7/0xc0
[   15.010444]  __kmalloc_cache_noprof+0x189/0x420
[   15.010670]  kasan_atomics+0x95/0x310
[   15.010872]  kunit_try_run_case+0x1a5/0x480
[   15.011021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.011257]  kthread+0x337/0x6f0
[   15.011605]  ret_from_fork+0x116/0x1d0
[   15.011817]  ret_from_fork_asm+0x1a/0x30
[   15.012022] 
[   15.012123] The buggy address belongs to the object at ffff8881038e7800
[   15.012123]  which belongs to the cache kmalloc-64 of size 64
[   15.012673] The buggy address is located 0 bytes to the right of
[   15.012673]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.013090] 
[   15.013187] The buggy address belongs to the physical page:
[   15.013484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.013983] flags: 0x200000000000000(node=0|zone=2)
[   15.014226] page_type: f5(slab)
[   15.014526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.014898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.015199] page dumped because: kasan: bad access detected
[   15.015513] 
[   15.015597] Memory state around the buggy address:
[   15.015826]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.016119]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.016982] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.017207]                                      ^
[   15.017432]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.018492]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.018810] ==================================================================
[   16.341968] ==================================================================
[   16.342519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.342969] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.343274] 
[   16.343376] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.343418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.343430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.343452] Call Trace:
[   16.343466]  <TASK>
[   16.343480]  dump_stack_lvl+0x73/0xb0
[   16.343510]  print_report+0xd1/0x610
[   16.343534]  ? __virt_addr_valid+0x1db/0x2d0
[   16.343557]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.343580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.343617]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.343640]  kasan_report+0x141/0x180
[   16.343675]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.343709]  __asan_report_load8_noabort+0x18/0x20
[   16.343736]  kasan_atomics_helper+0x4fa5/0x5450
[   16.343770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.343795]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.343822]  ? kasan_atomics+0x152/0x310
[   16.343849]  kasan_atomics+0x1dc/0x310
[   16.343873]  ? __pfx_kasan_atomics+0x10/0x10
[   16.343899]  ? __pfx_read_tsc+0x10/0x10
[   16.343922]  ? ktime_get_ts64+0x86/0x230
[   16.343949]  kunit_try_run_case+0x1a5/0x480
[   16.343976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.344026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.344052]  ? __kthread_parkme+0x82/0x180
[   16.344074]  ? preempt_count_sub+0x50/0x80
[   16.344099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.344151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.344178]  kthread+0x337/0x6f0
[   16.344198]  ? trace_preempt_on+0x20/0xc0
[   16.344222]  ? __pfx_kthread+0x10/0x10
[   16.344244]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.344267]  ? calculate_sigpending+0x7b/0xa0
[   16.344292]  ? __pfx_kthread+0x10/0x10
[   16.344315]  ret_from_fork+0x116/0x1d0
[   16.344335]  ? __pfx_kthread+0x10/0x10
[   16.344356]  ret_from_fork_asm+0x1a/0x30
[   16.344388]  </TASK>
[   16.344399] 
[   16.352056] Allocated by task 282:
[   16.352253]  kasan_save_stack+0x45/0x70
[   16.352430]  kasan_save_track+0x18/0x40
[   16.352650]  kasan_save_alloc_info+0x3b/0x50
[   16.352861]  __kasan_kmalloc+0xb7/0xc0
[   16.353002]  __kmalloc_cache_noprof+0x189/0x420
[   16.353162]  kasan_atomics+0x95/0x310
[   16.353297]  kunit_try_run_case+0x1a5/0x480
[   16.353444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.353706]  kthread+0x337/0x6f0
[   16.354007]  ret_from_fork+0x116/0x1d0
[   16.354203]  ret_from_fork_asm+0x1a/0x30
[   16.354414] 
[   16.354524] The buggy address belongs to the object at ffff8881038e7800
[   16.354524]  which belongs to the cache kmalloc-64 of size 64
[   16.355084] The buggy address is located 0 bytes to the right of
[   16.355084]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.355610] 
[   16.355684] The buggy address belongs to the physical page:
[   16.355917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.356235] flags: 0x200000000000000(node=0|zone=2)
[   16.356396] page_type: f5(slab)
[   16.356710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.357101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.357427] page dumped because: kasan: bad access detected
[   16.357682] 
[   16.357795] Memory state around the buggy address:
[   16.357951]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.358169]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.358506] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.358840]                                      ^
[   16.359060]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.359276]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.359615] ==================================================================
[   15.523987] ==================================================================
[   15.524304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.525135] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.525644] 
[   15.525730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.525816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.525829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.525861] Call Trace:
[   15.525877]  <TASK>
[   15.525894]  dump_stack_lvl+0x73/0xb0
[   15.525953]  print_report+0xd1/0x610
[   15.525976]  ? __virt_addr_valid+0x1db/0x2d0
[   15.525999]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.526033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.526058]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.526108]  kasan_report+0x141/0x180
[   15.526131]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.526170]  __asan_report_load4_noabort+0x18/0x20
[   15.526197]  kasan_atomics_helper+0x4a36/0x5450
[   15.526248]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.526272]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.526309]  ? kasan_atomics+0x152/0x310
[   15.526355]  kasan_atomics+0x1dc/0x310
[   15.526395]  ? __pfx_kasan_atomics+0x10/0x10
[   15.526420]  ? __pfx_read_tsc+0x10/0x10
[   15.526454]  ? ktime_get_ts64+0x86/0x230
[   15.526480]  kunit_try_run_case+0x1a5/0x480
[   15.526506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.526583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.526609]  ? __kthread_parkme+0x82/0x180
[   15.526641]  ? preempt_count_sub+0x50/0x80
[   15.526667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.526787]  kthread+0x337/0x6f0
[   15.526808]  ? trace_preempt_on+0x20/0xc0
[   15.526833]  ? __pfx_kthread+0x10/0x10
[   15.526882]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.526906]  ? calculate_sigpending+0x7b/0xa0
[   15.526932]  ? __pfx_kthread+0x10/0x10
[   15.526967]  ret_from_fork+0x116/0x1d0
[   15.526987]  ? __pfx_kthread+0x10/0x10
[   15.527009]  ret_from_fork_asm+0x1a/0x30
[   15.527041]  </TASK>
[   15.527052] 
[   15.535306] Allocated by task 282:
[   15.535563]  kasan_save_stack+0x45/0x70
[   15.535778]  kasan_save_track+0x18/0x40
[   15.535970]  kasan_save_alloc_info+0x3b/0x50
[   15.536178]  __kasan_kmalloc+0xb7/0xc0
[   15.536320]  __kmalloc_cache_noprof+0x189/0x420
[   15.536503]  kasan_atomics+0x95/0x310
[   15.536636]  kunit_try_run_case+0x1a5/0x480
[   15.536789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.537047]  kthread+0x337/0x6f0
[   15.537251]  ret_from_fork+0x116/0x1d0
[   15.537575]  ret_from_fork_asm+0x1a/0x30
[   15.537876] 
[   15.538014] The buggy address belongs to the object at ffff8881038e7800
[   15.538014]  which belongs to the cache kmalloc-64 of size 64
[   15.538600] The buggy address is located 0 bytes to the right of
[   15.538600]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.539087] 
[   15.539160] The buggy address belongs to the physical page:
[   15.539392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.539891] flags: 0x200000000000000(node=0|zone=2)
[   15.540185] page_type: f5(slab)
[   15.540355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.540779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.541017] page dumped because: kasan: bad access detected
[   15.541315] 
[   15.541413] Memory state around the buggy address:
[   15.541642]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.541942]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542155] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.542362]                                      ^
[   15.542589]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.542967]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.543286] ==================================================================
[   15.153612] ==================================================================
[   15.154215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.154715] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.155284] 
[   15.155560] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.155608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.155622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.155745] Call Trace:
[   15.155792]  <TASK>
[   15.155809]  dump_stack_lvl+0x73/0xb0
[   15.155842]  print_report+0xd1/0x610
[   15.155866]  ? __virt_addr_valid+0x1db/0x2d0
[   15.155890]  ? kasan_atomics_helper+0x72f/0x5450
[   15.155914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.155939]  ? kasan_atomics_helper+0x72f/0x5450
[   15.155962]  kasan_report+0x141/0x180
[   15.155986]  ? kasan_atomics_helper+0x72f/0x5450
[   15.156015]  kasan_check_range+0x10c/0x1c0
[   15.156040]  __kasan_check_write+0x18/0x20
[   15.156062]  kasan_atomics_helper+0x72f/0x5450
[   15.156086]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.156111]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.156138]  ? kasan_atomics+0x152/0x310
[   15.156165]  kasan_atomics+0x1dc/0x310
[   15.156189]  ? __pfx_kasan_atomics+0x10/0x10
[   15.156215]  ? __pfx_read_tsc+0x10/0x10
[   15.156238]  ? ktime_get_ts64+0x86/0x230
[   15.156263]  kunit_try_run_case+0x1a5/0x480
[   15.156289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.156314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.156401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.156428]  ? __kthread_parkme+0x82/0x180
[   15.156461]  ? preempt_count_sub+0x50/0x80
[   15.156485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.156513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.156539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.156566]  kthread+0x337/0x6f0
[   15.156587]  ? trace_preempt_on+0x20/0xc0
[   15.156612]  ? __pfx_kthread+0x10/0x10
[   15.156634]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.156657]  ? calculate_sigpending+0x7b/0xa0
[   15.156682]  ? __pfx_kthread+0x10/0x10
[   15.156705]  ret_from_fork+0x116/0x1d0
[   15.156725]  ? __pfx_kthread+0x10/0x10
[   15.156747]  ret_from_fork_asm+0x1a/0x30
[   15.156791]  </TASK>
[   15.156801] 
[   15.171038] Allocated by task 282:
[   15.171174]  kasan_save_stack+0x45/0x70
[   15.171469]  kasan_save_track+0x18/0x40
[   15.171939]  kasan_save_alloc_info+0x3b/0x50
[   15.172443]  __kasan_kmalloc+0xb7/0xc0
[   15.172815]  __kmalloc_cache_noprof+0x189/0x420
[   15.173236]  kasan_atomics+0x95/0x310
[   15.173665]  kunit_try_run_case+0x1a5/0x480
[   15.174072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.174612]  kthread+0x337/0x6f0
[   15.174951]  ret_from_fork+0x116/0x1d0
[   15.175305]  ret_from_fork_asm+0x1a/0x30
[   15.175779] 
[   15.175858] The buggy address belongs to the object at ffff8881038e7800
[   15.175858]  which belongs to the cache kmalloc-64 of size 64
[   15.176215] The buggy address is located 0 bytes to the right of
[   15.176215]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.177550] 
[   15.177721] The buggy address belongs to the physical page:
[   15.178235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.179060] flags: 0x200000000000000(node=0|zone=2)
[   15.179630] page_type: f5(slab)
[   15.180057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.180740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.180990] page dumped because: kasan: bad access detected
[   15.181163] 
[   15.181236] Memory state around the buggy address:
[   15.181565]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.182272]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.183070] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.183806]                                      ^
[   15.184239]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.185003]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.185795] ==================================================================
[   15.316193] ==================================================================
[   15.316434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.317708] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.318043] 
[   15.318390] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.318441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.318455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.318477] Call Trace:
[   15.318493]  <TASK>
[   15.318507]  dump_stack_lvl+0x73/0xb0
[   15.318539]  print_report+0xd1/0x610
[   15.318562]  ? __virt_addr_valid+0x1db/0x2d0
[   15.318586]  ? kasan_atomics_helper+0xac7/0x5450
[   15.318609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.318634]  ? kasan_atomics_helper+0xac7/0x5450
[   15.318658]  kasan_report+0x141/0x180
[   15.318681]  ? kasan_atomics_helper+0xac7/0x5450
[   15.318709]  kasan_check_range+0x10c/0x1c0
[   15.318734]  __kasan_check_write+0x18/0x20
[   15.318768]  kasan_atomics_helper+0xac7/0x5450
[   15.318793]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.318817]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.318844]  ? kasan_atomics+0x152/0x310
[   15.318871]  kasan_atomics+0x1dc/0x310
[   15.318895]  ? __pfx_kasan_atomics+0x10/0x10
[   15.318921]  ? __pfx_read_tsc+0x10/0x10
[   15.318943]  ? ktime_get_ts64+0x86/0x230
[   15.318968]  kunit_try_run_case+0x1a5/0x480
[   15.318993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.319018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.319043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.319068]  ? __kthread_parkme+0x82/0x180
[   15.319090]  ? preempt_count_sub+0x50/0x80
[   15.319115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.319141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.319167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.319194]  kthread+0x337/0x6f0
[   15.319214]  ? trace_preempt_on+0x20/0xc0
[   15.319239]  ? __pfx_kthread+0x10/0x10
[   15.319261]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.319285]  ? calculate_sigpending+0x7b/0xa0
[   15.319311]  ? __pfx_kthread+0x10/0x10
[   15.319335]  ret_from_fork+0x116/0x1d0
[   15.319370]  ? __pfx_kthread+0x10/0x10
[   15.319392]  ret_from_fork_asm+0x1a/0x30
[   15.319425]  </TASK>
[   15.319445] 
[   15.334037] Allocated by task 282:
[   15.334174]  kasan_save_stack+0x45/0x70
[   15.334322]  kasan_save_track+0x18/0x40
[   15.334543]  kasan_save_alloc_info+0x3b/0x50
[   15.335577]  __kasan_kmalloc+0xb7/0xc0
[   15.336031]  __kmalloc_cache_noprof+0x189/0x420
[   15.336616]  kasan_atomics+0x95/0x310
[   15.337270]  kunit_try_run_case+0x1a5/0x480
[   15.337927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338769]  kthread+0x337/0x6f0
[   15.339096]  ret_from_fork+0x116/0x1d0
[   15.339429]  ret_from_fork_asm+0x1a/0x30
[   15.339728] 
[   15.339820] The buggy address belongs to the object at ffff8881038e7800
[   15.339820]  which belongs to the cache kmalloc-64 of size 64
[   15.340189] The buggy address is located 0 bytes to the right of
[   15.340189]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.340649] 
[   15.340766] The buggy address belongs to the physical page:
[   15.341060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.341517] flags: 0x200000000000000(node=0|zone=2)
[   15.341827] page_type: f5(slab)
[   15.341987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.342610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.342924] page dumped because: kasan: bad access detected
[   15.343212] 
[   15.343291] Memory state around the buggy address:
[   15.343585]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.344169]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.344633] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.344998]                                      ^
[   15.345218]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.345642]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.345976] ==================================================================
[   15.346508] ==================================================================
[   15.347291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.347612] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.347932] 
[   15.348049] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.348093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.348106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.348128] Call Trace:
[   15.348144]  <TASK>
[   15.348163]  dump_stack_lvl+0x73/0xb0
[   15.348192]  print_report+0xd1/0x610
[   15.348239]  ? __virt_addr_valid+0x1db/0x2d0
[   15.348264]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.348286]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.348311]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.348394]  kasan_report+0x141/0x180
[   15.348420]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.348449]  kasan_check_range+0x10c/0x1c0
[   15.348475]  __kasan_check_write+0x18/0x20
[   15.348497]  kasan_atomics_helper+0xb6a/0x5450
[   15.348523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.348547]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.348573]  ? kasan_atomics+0x152/0x310
[   15.348601]  kasan_atomics+0x1dc/0x310
[   15.348625]  ? __pfx_kasan_atomics+0x10/0x10
[   15.348651]  ? __pfx_read_tsc+0x10/0x10
[   15.348674]  ? ktime_get_ts64+0x86/0x230
[   15.348700]  kunit_try_run_case+0x1a5/0x480
[   15.348725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.348750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.348791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.348816]  ? __kthread_parkme+0x82/0x180
[   15.348876]  ? preempt_count_sub+0x50/0x80
[   15.348901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.348934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.348960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.348987]  kthread+0x337/0x6f0
[   15.349009]  ? trace_preempt_on+0x20/0xc0
[   15.349033]  ? __pfx_kthread+0x10/0x10
[   15.349055]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.349078]  ? calculate_sigpending+0x7b/0xa0
[   15.349104]  ? __pfx_kthread+0x10/0x10
[   15.349127]  ret_from_fork+0x116/0x1d0
[   15.349146]  ? __pfx_kthread+0x10/0x10
[   15.349169]  ret_from_fork_asm+0x1a/0x30
[   15.349200]  </TASK>
[   15.349211] 
[   15.359826] Allocated by task 282:
[   15.360276]  kasan_save_stack+0x45/0x70
[   15.360687]  kasan_save_track+0x18/0x40
[   15.360885]  kasan_save_alloc_info+0x3b/0x50
[   15.361077]  __kasan_kmalloc+0xb7/0xc0
[   15.361251]  __kmalloc_cache_noprof+0x189/0x420
[   15.361969]  kasan_atomics+0x95/0x310
[   15.362319]  kunit_try_run_case+0x1a5/0x480
[   15.362939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363214]  kthread+0x337/0x6f0
[   15.363431]  ret_from_fork+0x116/0x1d0
[   15.363617]  ret_from_fork_asm+0x1a/0x30
[   15.363808] 
[   15.363899] The buggy address belongs to the object at ffff8881038e7800
[   15.363899]  which belongs to the cache kmalloc-64 of size 64
[   15.364826] The buggy address is located 0 bytes to the right of
[   15.364826]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.365806] 
[   15.366059] The buggy address belongs to the physical page:
[   15.366513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.366869] flags: 0x200000000000000(node=0|zone=2)
[   15.367090] page_type: f5(slab)
[   15.367250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.368465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.368884] page dumped because: kasan: bad access detected
[   15.369542] 
[   15.369786] Memory state around the buggy address:
[   15.370158]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.370864]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371305] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.371937]                                      ^
[   15.372155]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.372936]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373640] ==================================================================
[   15.971909] ==================================================================
[   15.972608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.973033] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.973393] 
[   15.973571] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.973617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.973630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.973652] Call Trace:
[   15.973666]  <TASK>
[   15.973680]  dump_stack_lvl+0x73/0xb0
[   15.973908]  print_report+0xd1/0x610
[   15.973934]  ? __virt_addr_valid+0x1db/0x2d0
[   15.973958]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.973981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.974006]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.974030]  kasan_report+0x141/0x180
[   15.974055]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.974084]  kasan_check_range+0x10c/0x1c0
[   15.974110]  __kasan_check_write+0x18/0x20
[   15.974130]  kasan_atomics_helper+0x19e3/0x5450
[   15.974155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.974179]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.974206]  ? kasan_atomics+0x152/0x310
[   15.974234]  kasan_atomics+0x1dc/0x310
[   15.974258]  ? __pfx_kasan_atomics+0x10/0x10
[   15.974283]  ? __pfx_read_tsc+0x10/0x10
[   15.974305]  ? ktime_get_ts64+0x86/0x230
[   15.974330]  kunit_try_run_case+0x1a5/0x480
[   15.974357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.974412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.974451]  ? __kthread_parkme+0x82/0x180
[   15.974473]  ? preempt_count_sub+0x50/0x80
[   15.974499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.974578]  kthread+0x337/0x6f0
[   15.974599]  ? trace_preempt_on+0x20/0xc0
[   15.974622]  ? __pfx_kthread+0x10/0x10
[   15.974645]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.974668]  ? calculate_sigpending+0x7b/0xa0
[   15.974692]  ? __pfx_kthread+0x10/0x10
[   15.974715]  ret_from_fork+0x116/0x1d0
[   15.974734]  ? __pfx_kthread+0x10/0x10
[   15.974767]  ret_from_fork_asm+0x1a/0x30
[   15.974799]  </TASK>
[   15.974810] 
[   15.984311] Allocated by task 282:
[   15.984474]  kasan_save_stack+0x45/0x70
[   15.985081]  kasan_save_track+0x18/0x40
[   15.985244]  kasan_save_alloc_info+0x3b/0x50
[   15.985606]  __kasan_kmalloc+0xb7/0xc0
[   15.985921]  __kmalloc_cache_noprof+0x189/0x420
[   15.986232]  kasan_atomics+0x95/0x310
[   15.986443]  kunit_try_run_case+0x1a5/0x480
[   15.986794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.987114]  kthread+0x337/0x6f0
[   15.987289]  ret_from_fork+0x116/0x1d0
[   15.987522]  ret_from_fork_asm+0x1a/0x30
[   15.987695] 
[   15.987803] The buggy address belongs to the object at ffff8881038e7800
[   15.987803]  which belongs to the cache kmalloc-64 of size 64
[   15.988289] The buggy address is located 0 bytes to the right of
[   15.988289]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.989142] 
[   15.989239] The buggy address belongs to the physical page:
[   15.989723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.990168] flags: 0x200000000000000(node=0|zone=2)
[   15.990520] page_type: f5(slab)
[   15.990848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.991210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.991678] page dumped because: kasan: bad access detected
[   15.992031] 
[   15.992134] Memory state around the buggy address:
[   15.992432]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.993005]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.993367] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.993862]                                      ^
[   15.994152]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994417]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994903] ==================================================================
[   15.484232] ==================================================================
[   15.484645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.484967] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.485319] 
[   15.485427] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.485472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.485503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.485525] Call Trace:
[   15.485551]  <TASK>
[   15.485565]  dump_stack_lvl+0x73/0xb0
[   15.485596]  print_report+0xd1/0x610
[   15.485634]  ? __virt_addr_valid+0x1db/0x2d0
[   15.485695]  ? kasan_atomics_helper+0xf10/0x5450
[   15.485718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.485743]  ? kasan_atomics_helper+0xf10/0x5450
[   15.485784]  kasan_report+0x141/0x180
[   15.485807]  ? kasan_atomics_helper+0xf10/0x5450
[   15.485834]  kasan_check_range+0x10c/0x1c0
[   15.485860]  __kasan_check_write+0x18/0x20
[   15.485880]  kasan_atomics_helper+0xf10/0x5450
[   15.485904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.485929]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.485956]  ? kasan_atomics+0x152/0x310
[   15.485984]  kasan_atomics+0x1dc/0x310
[   15.486008]  ? __pfx_kasan_atomics+0x10/0x10
[   15.486034]  ? __pfx_read_tsc+0x10/0x10
[   15.486057]  ? ktime_get_ts64+0x86/0x230
[   15.486082]  kunit_try_run_case+0x1a5/0x480
[   15.486109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.486134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.486159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.486186]  ? __kthread_parkme+0x82/0x180
[   15.486208]  ? preempt_count_sub+0x50/0x80
[   15.486233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.486260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.486286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.486314]  kthread+0x337/0x6f0
[   15.486334]  ? trace_preempt_on+0x20/0xc0
[   15.486358]  ? __pfx_kthread+0x10/0x10
[   15.486387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.486410]  ? calculate_sigpending+0x7b/0xa0
[   15.486436]  ? __pfx_kthread+0x10/0x10
[   15.486469]  ret_from_fork+0x116/0x1d0
[   15.486489]  ? __pfx_kthread+0x10/0x10
[   15.486511]  ret_from_fork_asm+0x1a/0x30
[   15.486543]  </TASK>
[   15.486554] 
[   15.494920] Allocated by task 282:
[   15.495146]  kasan_save_stack+0x45/0x70
[   15.495347]  kasan_save_track+0x18/0x40
[   15.495537]  kasan_save_alloc_info+0x3b/0x50
[   15.495746]  __kasan_kmalloc+0xb7/0xc0
[   15.495941]  __kmalloc_cache_noprof+0x189/0x420
[   15.496117]  kasan_atomics+0x95/0x310
[   15.496306]  kunit_try_run_case+0x1a5/0x480
[   15.496520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.496842]  kthread+0x337/0x6f0
[   15.497081]  ret_from_fork+0x116/0x1d0
[   15.497269]  ret_from_fork_asm+0x1a/0x30
[   15.497477] 
[   15.497573] The buggy address belongs to the object at ffff8881038e7800
[   15.497573]  which belongs to the cache kmalloc-64 of size 64
[   15.498093] The buggy address is located 0 bytes to the right of
[   15.498093]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.498458] 
[   15.498557] The buggy address belongs to the physical page:
[   15.498911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.499398] flags: 0x200000000000000(node=0|zone=2)
[   15.499684] page_type: f5(slab)
[   15.499868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.500112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.500375] page dumped because: kasan: bad access detected
[   15.500882] 
[   15.501009] Memory state around the buggy address:
[   15.501254]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.501614]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.501959] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.502174]                                      ^
[   15.502434]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.502857]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.503202] ==================================================================
[   15.069157] ==================================================================
[   15.069503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.070333] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.070649] 
[   15.070773] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.070817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.070829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.070851] Call Trace:
[   15.070868]  <TASK>
[   15.070883]  dump_stack_lvl+0x73/0xb0
[   15.070914]  print_report+0xd1/0x610
[   15.070937]  ? __virt_addr_valid+0x1db/0x2d0
[   15.070961]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.070984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.071009]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.071033]  kasan_report+0x141/0x180
[   15.071056]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.071084]  __asan_report_store4_noabort+0x1b/0x30
[   15.071112]  kasan_atomics_helper+0x4b3a/0x5450
[   15.071136]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.071161]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.071188]  ? kasan_atomics+0x152/0x310
[   15.071215]  kasan_atomics+0x1dc/0x310
[   15.071240]  ? __pfx_kasan_atomics+0x10/0x10
[   15.071266]  ? __pfx_read_tsc+0x10/0x10
[   15.071288]  ? ktime_get_ts64+0x86/0x230
[   15.071379]  kunit_try_run_case+0x1a5/0x480
[   15.071409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.071459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.071485]  ? __kthread_parkme+0x82/0x180
[   15.071507]  ? preempt_count_sub+0x50/0x80
[   15.071533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.071585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.071612]  kthread+0x337/0x6f0
[   15.071633]  ? trace_preempt_on+0x20/0xc0
[   15.071657]  ? __pfx_kthread+0x10/0x10
[   15.071680]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.071702]  ? calculate_sigpending+0x7b/0xa0
[   15.071728]  ? __pfx_kthread+0x10/0x10
[   15.071751]  ret_from_fork+0x116/0x1d0
[   15.071783]  ? __pfx_kthread+0x10/0x10
[   15.071805]  ret_from_fork_asm+0x1a/0x30
[   15.071837]  </TASK>
[   15.071848] 
[   15.079544] Allocated by task 282:
[   15.079679]  kasan_save_stack+0x45/0x70
[   15.080054]  kasan_save_track+0x18/0x40
[   15.080252]  kasan_save_alloc_info+0x3b/0x50
[   15.080464]  __kasan_kmalloc+0xb7/0xc0
[   15.080795]  __kmalloc_cache_noprof+0x189/0x420
[   15.080970]  kasan_atomics+0x95/0x310
[   15.081164]  kunit_try_run_case+0x1a5/0x480
[   15.081413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081602]  kthread+0x337/0x6f0
[   15.081724]  ret_from_fork+0x116/0x1d0
[   15.081928]  ret_from_fork_asm+0x1a/0x30
[   15.082126] 
[   15.082222] The buggy address belongs to the object at ffff8881038e7800
[   15.082222]  which belongs to the cache kmalloc-64 of size 64
[   15.082857] The buggy address is located 0 bytes to the right of
[   15.082857]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.083619] 
[   15.083727] The buggy address belongs to the physical page:
[   15.083942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.084299] flags: 0x200000000000000(node=0|zone=2)
[   15.084593] page_type: f5(slab)
[   15.084775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.085101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.085453] page dumped because: kasan: bad access detected
[   15.085737] 
[   15.085835] Memory state around the buggy address:
[   15.086016]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.086376]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.086711] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.086953]                                      ^
[   15.087110]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087326]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087640] ==================================================================
[   15.921132] ==================================================================
[   15.921830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.922266] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.922555] 
[   15.922645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.922690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.922703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.922725] Call Trace:
[   15.922741]  <TASK>
[   15.922767]  dump_stack_lvl+0x73/0xb0
[   15.922798]  print_report+0xd1/0x610
[   15.922821]  ? __virt_addr_valid+0x1db/0x2d0
[   15.922912]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.922939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.922964]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.922987]  kasan_report+0x141/0x180
[   15.923011]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.923039]  kasan_check_range+0x10c/0x1c0
[   15.923064]  __kasan_check_write+0x18/0x20
[   15.923085]  kasan_atomics_helper+0x18b1/0x5450
[   15.923110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.923483]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.923516]  ? kasan_atomics+0x152/0x310
[   15.923545]  kasan_atomics+0x1dc/0x310
[   15.923570]  ? __pfx_kasan_atomics+0x10/0x10
[   15.923598]  ? __pfx_read_tsc+0x10/0x10
[   15.923621]  ? ktime_get_ts64+0x86/0x230
[   15.923647]  kunit_try_run_case+0x1a5/0x480
[   15.923673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.923699]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.923726]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.923751]  ? __kthread_parkme+0x82/0x180
[   15.923794]  ? preempt_count_sub+0x50/0x80
[   15.923819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.923845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.923872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.923899]  kthread+0x337/0x6f0
[   15.923920]  ? trace_preempt_on+0x20/0xc0
[   15.923945]  ? __pfx_kthread+0x10/0x10
[   15.923966]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.923990]  ? calculate_sigpending+0x7b/0xa0
[   15.924015]  ? __pfx_kthread+0x10/0x10
[   15.924038]  ret_from_fork+0x116/0x1d0
[   15.924058]  ? __pfx_kthread+0x10/0x10
[   15.924080]  ret_from_fork_asm+0x1a/0x30
[   15.924111]  </TASK>
[   15.924122] 
[   15.934803] Allocated by task 282:
[   15.935006]  kasan_save_stack+0x45/0x70
[   15.935227]  kasan_save_track+0x18/0x40
[   15.936856]  kasan_save_alloc_info+0x3b/0x50
[   15.937078]  __kasan_kmalloc+0xb7/0xc0
[   15.937244]  __kmalloc_cache_noprof+0x189/0x420
[   15.937500]  kasan_atomics+0x95/0x310
[   15.937908]  kunit_try_run_case+0x1a5/0x480
[   15.938101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.938603]  kthread+0x337/0x6f0
[   15.938868]  ret_from_fork+0x116/0x1d0
[   15.939095]  ret_from_fork_asm+0x1a/0x30
[   15.939269] 
[   15.939577] The buggy address belongs to the object at ffff8881038e7800
[   15.939577]  which belongs to the cache kmalloc-64 of size 64
[   15.940115] The buggy address is located 0 bytes to the right of
[   15.940115]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.940923] 
[   15.941029] The buggy address belongs to the physical page:
[   15.941337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.941898] flags: 0x200000000000000(node=0|zone=2)
[   15.942237] page_type: f5(slab)
[   15.942553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.942972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.943302] page dumped because: kasan: bad access detected
[   15.943744] 
[   15.943967] Memory state around the buggy address:
[   15.944270]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.944688]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.945104] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.945520]                                      ^
[   15.945719]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.946057]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.946636] ==================================================================
[   15.439943] ==================================================================
[   15.440688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.441075] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.441490] 
[   15.441583] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.441639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.441653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.441674] Call Trace:
[   15.441702]  <TASK>
[   15.441720]  dump_stack_lvl+0x73/0xb0
[   15.441749]  print_report+0xd1/0x610
[   15.441781]  ? __virt_addr_valid+0x1db/0x2d0
[   15.441806]  ? kasan_atomics_helper+0xde0/0x5450
[   15.441828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.441854]  ? kasan_atomics_helper+0xde0/0x5450
[   15.441877]  kasan_report+0x141/0x180
[   15.441900]  ? kasan_atomics_helper+0xde0/0x5450
[   15.441928]  kasan_check_range+0x10c/0x1c0
[   15.441953]  __kasan_check_write+0x18/0x20
[   15.441974]  kasan_atomics_helper+0xde0/0x5450
[   15.441999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.442023]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.442050]  ? kasan_atomics+0x152/0x310
[   15.442078]  kasan_atomics+0x1dc/0x310
[   15.442102]  ? __pfx_kasan_atomics+0x10/0x10
[   15.442128]  ? __pfx_read_tsc+0x10/0x10
[   15.442150]  ? ktime_get_ts64+0x86/0x230
[   15.442177]  kunit_try_run_case+0x1a5/0x480
[   15.442203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.442254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.442280]  ? __kthread_parkme+0x82/0x180
[   15.442302]  ? preempt_count_sub+0x50/0x80
[   15.442327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.442462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.442490]  kthread+0x337/0x6f0
[   15.442521]  ? trace_preempt_on+0x20/0xc0
[   15.442546]  ? __pfx_kthread+0x10/0x10
[   15.442569]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.442603]  ? calculate_sigpending+0x7b/0xa0
[   15.442629]  ? __pfx_kthread+0x10/0x10
[   15.442651]  ret_from_fork+0x116/0x1d0
[   15.442680]  ? __pfx_kthread+0x10/0x10
[   15.442702]  ret_from_fork_asm+0x1a/0x30
[   15.442734]  </TASK>
[   15.442763] 
[   15.451145] Allocated by task 282:
[   15.451280]  kasan_save_stack+0x45/0x70
[   15.451481]  kasan_save_track+0x18/0x40
[   15.451791]  kasan_save_alloc_info+0x3b/0x50
[   15.452077]  __kasan_kmalloc+0xb7/0xc0
[   15.452226]  __kmalloc_cache_noprof+0x189/0x420
[   15.452600]  kasan_atomics+0x95/0x310
[   15.452775]  kunit_try_run_case+0x1a5/0x480
[   15.453042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453244]  kthread+0x337/0x6f0
[   15.453529]  ret_from_fork+0x116/0x1d0
[   15.453768]  ret_from_fork_asm+0x1a/0x30
[   15.453912] 
[   15.453985] The buggy address belongs to the object at ffff8881038e7800
[   15.453985]  which belongs to the cache kmalloc-64 of size 64
[   15.454338] The buggy address is located 0 bytes to the right of
[   15.454338]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.454898] 
[   15.455032] The buggy address belongs to the physical page:
[   15.455429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.455821] flags: 0x200000000000000(node=0|zone=2)
[   15.455982] page_type: f5(slab)
[   15.456104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.456826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.457384] page dumped because: kasan: bad access detected
[   15.457678] 
[   15.457794] Memory state around the buggy address:
[   15.457955]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.458295]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.458746] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.459071]                                      ^
[   15.459294]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.459681]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.460004] ==================================================================
[   15.685308] ==================================================================
[   15.685699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.686058] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.686416] 
[   15.686523] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.686589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.686603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.686625] Call Trace:
[   15.686642]  <TASK>
[   15.686659]  dump_stack_lvl+0x73/0xb0
[   15.686689]  print_report+0xd1/0x610
[   15.686712]  ? __virt_addr_valid+0x1db/0x2d0
[   15.686765]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.686787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.686812]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.686836]  kasan_report+0x141/0x180
[   15.686859]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.686886]  kasan_check_range+0x10c/0x1c0
[   15.686929]  __kasan_check_write+0x18/0x20
[   15.686950]  kasan_atomics_helper+0x12e6/0x5450
[   15.686975]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.687000]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.687026]  ? kasan_atomics+0x152/0x310
[   15.687054]  kasan_atomics+0x1dc/0x310
[   15.687078]  ? __pfx_kasan_atomics+0x10/0x10
[   15.687103]  ? __pfx_read_tsc+0x10/0x10
[   15.687125]  ? ktime_get_ts64+0x86/0x230
[   15.687167]  kunit_try_run_case+0x1a5/0x480
[   15.687207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.687245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.687284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.687309]  ? __kthread_parkme+0x82/0x180
[   15.687332]  ? preempt_count_sub+0x50/0x80
[   15.687357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.687383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.687408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.687461]  kthread+0x337/0x6f0
[   15.687483]  ? trace_preempt_on+0x20/0xc0
[   15.687506]  ? __pfx_kthread+0x10/0x10
[   15.687529]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.687551]  ? calculate_sigpending+0x7b/0xa0
[   15.687576]  ? __pfx_kthread+0x10/0x10
[   15.687618]  ret_from_fork+0x116/0x1d0
[   15.687652]  ? __pfx_kthread+0x10/0x10
[   15.687674]  ret_from_fork_asm+0x1a/0x30
[   15.687705]  </TASK>
[   15.687716] 
[   15.696278] Allocated by task 282:
[   15.696512]  kasan_save_stack+0x45/0x70
[   15.696745]  kasan_save_track+0x18/0x40
[   15.696953]  kasan_save_alloc_info+0x3b/0x50
[   15.697128]  __kasan_kmalloc+0xb7/0xc0
[   15.697294]  __kmalloc_cache_noprof+0x189/0x420
[   15.697566]  kasan_atomics+0x95/0x310
[   15.697816]  kunit_try_run_case+0x1a5/0x480
[   15.698011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.698275]  kthread+0x337/0x6f0
[   15.698502]  ret_from_fork+0x116/0x1d0
[   15.698740]  ret_from_fork_asm+0x1a/0x30
[   15.698948] 
[   15.699045] The buggy address belongs to the object at ffff8881038e7800
[   15.699045]  which belongs to the cache kmalloc-64 of size 64
[   15.699560] The buggy address is located 0 bytes to the right of
[   15.699560]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.700033] 
[   15.700154] The buggy address belongs to the physical page:
[   15.700410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.700816] flags: 0x200000000000000(node=0|zone=2)
[   15.701051] page_type: f5(slab)
[   15.701236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.701581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.701932] page dumped because: kasan: bad access detected
[   15.702191] 
[   15.702286] Memory state around the buggy address:
[   15.702495]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.702715]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.703063] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.703460]                                      ^
[   15.703701]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.704000]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.704218] ==================================================================
[   15.543858] ==================================================================
[   15.544248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.544661] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.544935] 
[   15.545021] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.545064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.545076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.545098] Call Trace:
[   15.545111]  <TASK>
[   15.545124]  dump_stack_lvl+0x73/0xb0
[   15.545152]  print_report+0xd1/0x610
[   15.545175]  ? __virt_addr_valid+0x1db/0x2d0
[   15.545199]  ? kasan_atomics_helper+0x1079/0x5450
[   15.545221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.545246]  ? kasan_atomics_helper+0x1079/0x5450
[   15.545271]  kasan_report+0x141/0x180
[   15.545294]  ? kasan_atomics_helper+0x1079/0x5450
[   15.545323]  kasan_check_range+0x10c/0x1c0
[   15.545348]  __kasan_check_write+0x18/0x20
[   15.545369]  kasan_atomics_helper+0x1079/0x5450
[   15.545393]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.545418]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.545498]  ? kasan_atomics+0x152/0x310
[   15.545528]  kasan_atomics+0x1dc/0x310
[   15.545578]  ? __pfx_kasan_atomics+0x10/0x10
[   15.545628]  ? __pfx_read_tsc+0x10/0x10
[   15.545650]  ? ktime_get_ts64+0x86/0x230
[   15.545676]  kunit_try_run_case+0x1a5/0x480
[   15.545712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.545736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.545770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.545796]  ? __kthread_parkme+0x82/0x180
[   15.545817]  ? preempt_count_sub+0x50/0x80
[   15.545842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.545869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.545921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.545949]  kthread+0x337/0x6f0
[   15.545970]  ? trace_preempt_on+0x20/0xc0
[   15.546004]  ? __pfx_kthread+0x10/0x10
[   15.546026]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.546051]  ? calculate_sigpending+0x7b/0xa0
[   15.546077]  ? __pfx_kthread+0x10/0x10
[   15.546127]  ret_from_fork+0x116/0x1d0
[   15.546147]  ? __pfx_kthread+0x10/0x10
[   15.546169]  ret_from_fork_asm+0x1a/0x30
[   15.546212]  </TASK>
[   15.546223] 
[   15.554671] Allocated by task 282:
[   15.554860]  kasan_save_stack+0x45/0x70
[   15.555058]  kasan_save_track+0x18/0x40
[   15.555219]  kasan_save_alloc_info+0x3b/0x50
[   15.555366]  __kasan_kmalloc+0xb7/0xc0
[   15.555584]  __kmalloc_cache_noprof+0x189/0x420
[   15.555857]  kasan_atomics+0x95/0x310
[   15.556049]  kunit_try_run_case+0x1a5/0x480
[   15.556291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.556606]  kthread+0x337/0x6f0
[   15.556805]  ret_from_fork+0x116/0x1d0
[   15.556995]  ret_from_fork_asm+0x1a/0x30
[   15.557219] 
[   15.557317] The buggy address belongs to the object at ffff8881038e7800
[   15.557317]  which belongs to the cache kmalloc-64 of size 64
[   15.557794] The buggy address is located 0 bytes to the right of
[   15.557794]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.558221] 
[   15.558357] The buggy address belongs to the physical page:
[   15.558630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.558984] flags: 0x200000000000000(node=0|zone=2)
[   15.559145] page_type: f5(slab)
[   15.559263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.559571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.559956] page dumped because: kasan: bad access detected
[   15.560241] 
[   15.560350] Memory state around the buggy address:
[   15.560621]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.560982]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.561297] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.561686]                                      ^
[   15.562626]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.563192]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.563576] ==================================================================
[   15.395307] ==================================================================
[   15.395903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.396247] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.396606] 
[   15.396695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.396738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.396751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.396783] Call Trace:
[   15.396797]  <TASK>
[   15.396812]  dump_stack_lvl+0x73/0xb0
[   15.396852]  print_report+0xd1/0x610
[   15.396875]  ? __virt_addr_valid+0x1db/0x2d0
[   15.396911]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.396934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.396960]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.396995]  kasan_report+0x141/0x180
[   15.397018]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.397046]  __asan_report_load4_noabort+0x18/0x20
[   15.397074]  kasan_atomics_helper+0x4a84/0x5450
[   15.397098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.397122]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.397149]  ? kasan_atomics+0x152/0x310
[   15.397177]  kasan_atomics+0x1dc/0x310
[   15.397201]  ? __pfx_kasan_atomics+0x10/0x10
[   15.397227]  ? __pfx_read_tsc+0x10/0x10
[   15.397250]  ? ktime_get_ts64+0x86/0x230
[   15.397275]  kunit_try_run_case+0x1a5/0x480
[   15.397300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.397395]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.397436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.397462]  ? __kthread_parkme+0x82/0x180
[   15.397483]  ? preempt_count_sub+0x50/0x80
[   15.397509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.397535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.397562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.397589]  kthread+0x337/0x6f0
[   15.397609]  ? trace_preempt_on+0x20/0xc0
[   15.397633]  ? __pfx_kthread+0x10/0x10
[   15.397654]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.397677]  ? calculate_sigpending+0x7b/0xa0
[   15.397703]  ? __pfx_kthread+0x10/0x10
[   15.397726]  ret_from_fork+0x116/0x1d0
[   15.397746]  ? __pfx_kthread+0x10/0x10
[   15.397777]  ret_from_fork_asm+0x1a/0x30
[   15.397809]  </TASK>
[   15.397819] 
[   15.409797] Allocated by task 282:
[   15.409935]  kasan_save_stack+0x45/0x70
[   15.410081]  kasan_save_track+0x18/0x40
[   15.410219]  kasan_save_alloc_info+0x3b/0x50
[   15.410491]  __kasan_kmalloc+0xb7/0xc0
[   15.410635]  __kmalloc_cache_noprof+0x189/0x420
[   15.410894]  kasan_atomics+0x95/0x310
[   15.411108]  kunit_try_run_case+0x1a5/0x480
[   15.411307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.411479]  kthread+0x337/0x6f0
[   15.411595]  ret_from_fork+0x116/0x1d0
[   15.412559]  ret_from_fork_asm+0x1a/0x30
[   15.412710] 
[   15.412805] The buggy address belongs to the object at ffff8881038e7800
[   15.412805]  which belongs to the cache kmalloc-64 of size 64
[   15.413155] The buggy address is located 0 bytes to the right of
[   15.413155]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.414046] 
[   15.414147] The buggy address belongs to the physical page:
[   15.414581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.414970] flags: 0x200000000000000(node=0|zone=2)
[   15.415185] page_type: f5(slab)
[   15.415413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.415752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.416107] page dumped because: kasan: bad access detected
[   15.416462] 
[   15.416543] Memory state around the buggy address:
[   15.416699]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.417116]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.417648] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.417948]                                      ^
[   15.418105]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418553]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418920] ==================================================================
[   15.207700] ==================================================================
[   15.208101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.208365] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.208944] 
[   15.209061] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.209106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.209119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.209162] Call Trace:
[   15.209177]  <TASK>
[   15.209190]  dump_stack_lvl+0x73/0xb0
[   15.209220]  print_report+0xd1/0x610
[   15.209242]  ? __virt_addr_valid+0x1db/0x2d0
[   15.209267]  ? kasan_atomics_helper+0x860/0x5450
[   15.209290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.209315]  ? kasan_atomics_helper+0x860/0x5450
[   15.209339]  kasan_report+0x141/0x180
[   15.209363]  ? kasan_atomics_helper+0x860/0x5450
[   15.209391]  kasan_check_range+0x10c/0x1c0
[   15.209417]  __kasan_check_write+0x18/0x20
[   15.209439]  kasan_atomics_helper+0x860/0x5450
[   15.209464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.209488]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.209516]  ? kasan_atomics+0x152/0x310
[   15.209544]  kasan_atomics+0x1dc/0x310
[   15.209568]  ? __pfx_kasan_atomics+0x10/0x10
[   15.209595]  ? __pfx_read_tsc+0x10/0x10
[   15.209617]  ? ktime_get_ts64+0x86/0x230
[   15.209642]  kunit_try_run_case+0x1a5/0x480
[   15.209668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.209845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.209890]  ? __kthread_parkme+0x82/0x180
[   15.209914]  ? preempt_count_sub+0x50/0x80
[   15.209939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.209993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.210021]  kthread+0x337/0x6f0
[   15.210041]  ? trace_preempt_on+0x20/0xc0
[   15.210066]  ? __pfx_kthread+0x10/0x10
[   15.210089]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.210113]  ? calculate_sigpending+0x7b/0xa0
[   15.210140]  ? __pfx_kthread+0x10/0x10
[   15.210162]  ret_from_fork+0x116/0x1d0
[   15.210182]  ? __pfx_kthread+0x10/0x10
[   15.210204]  ret_from_fork_asm+0x1a/0x30
[   15.210236]  </TASK>
[   15.210246] 
[   15.220103] Allocated by task 282:
[   15.220571]  kasan_save_stack+0x45/0x70
[   15.221036]  kasan_save_track+0x18/0x40
[   15.221392]  kasan_save_alloc_info+0x3b/0x50
[   15.221644]  __kasan_kmalloc+0xb7/0xc0
[   15.221855]  __kmalloc_cache_noprof+0x189/0x420
[   15.222127]  kasan_atomics+0x95/0x310
[   15.222386]  kunit_try_run_case+0x1a5/0x480
[   15.222724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.223047]  kthread+0x337/0x6f0
[   15.223182]  ret_from_fork+0x116/0x1d0
[   15.223466]  ret_from_fork_asm+0x1a/0x30
[   15.223736] 
[   15.223850] The buggy address belongs to the object at ffff8881038e7800
[   15.223850]  which belongs to the cache kmalloc-64 of size 64
[   15.224290] The buggy address is located 0 bytes to the right of
[   15.224290]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.225030] 
[   15.225115] The buggy address belongs to the physical page:
[   15.225668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.226126] flags: 0x200000000000000(node=0|zone=2)
[   15.226466] page_type: f5(slab)
[   15.226698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.227075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.227550] page dumped because: kasan: bad access detected
[   15.227889] 
[   15.228088] Memory state around the buggy address:
[   15.228303]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.228775]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.229070] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.229552]                                      ^
[   15.229840]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.230146]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.230641] ==================================================================
[   15.374293] ==================================================================
[   15.375129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.375653] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.376191] 
[   15.376489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.376544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.376558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.376580] Call Trace:
[   15.376597]  <TASK>
[   15.376612]  dump_stack_lvl+0x73/0xb0
[   15.376643]  print_report+0xd1/0x610
[   15.376666]  ? __virt_addr_valid+0x1db/0x2d0
[   15.376692]  ? kasan_atomics_helper+0xc70/0x5450
[   15.376716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.376741]  ? kasan_atomics_helper+0xc70/0x5450
[   15.376774]  kasan_report+0x141/0x180
[   15.376798]  ? kasan_atomics_helper+0xc70/0x5450
[   15.376826]  kasan_check_range+0x10c/0x1c0
[   15.376851]  __kasan_check_write+0x18/0x20
[   15.376872]  kasan_atomics_helper+0xc70/0x5450
[   15.376897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.376933]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.376960]  ? kasan_atomics+0x152/0x310
[   15.377000]  kasan_atomics+0x1dc/0x310
[   15.377024]  ? __pfx_kasan_atomics+0x10/0x10
[   15.377049]  ? __pfx_read_tsc+0x10/0x10
[   15.377071]  ? ktime_get_ts64+0x86/0x230
[   15.377097]  kunit_try_run_case+0x1a5/0x480
[   15.377123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.377148]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.377174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.377199]  ? __kthread_parkme+0x82/0x180
[   15.377222]  ? preempt_count_sub+0x50/0x80
[   15.377248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.377275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.377303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.377379]  kthread+0x337/0x6f0
[   15.377402]  ? trace_preempt_on+0x20/0xc0
[   15.377428]  ? __pfx_kthread+0x10/0x10
[   15.377457]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.377481]  ? calculate_sigpending+0x7b/0xa0
[   15.377506]  ? __pfx_kthread+0x10/0x10
[   15.377529]  ret_from_fork+0x116/0x1d0
[   15.377548]  ? __pfx_kthread+0x10/0x10
[   15.377570]  ret_from_fork_asm+0x1a/0x30
[   15.377602]  </TASK>
[   15.377613] 
[   15.386150] Allocated by task 282:
[   15.386489]  kasan_save_stack+0x45/0x70
[   15.386673]  kasan_save_track+0x18/0x40
[   15.386824]  kasan_save_alloc_info+0x3b/0x50
[   15.387039]  __kasan_kmalloc+0xb7/0xc0
[   15.387226]  __kmalloc_cache_noprof+0x189/0x420
[   15.387449]  kasan_atomics+0x95/0x310
[   15.387583]  kunit_try_run_case+0x1a5/0x480
[   15.387945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.388233]  kthread+0x337/0x6f0
[   15.388492]  ret_from_fork+0x116/0x1d0
[   15.388648]  ret_from_fork_asm+0x1a/0x30
[   15.388815] 
[   15.388921] The buggy address belongs to the object at ffff8881038e7800
[   15.388921]  which belongs to the cache kmalloc-64 of size 64
[   15.389460] The buggy address is located 0 bytes to the right of
[   15.389460]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.390197] 
[   15.390319] The buggy address belongs to the physical page:
[   15.390666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.390938] flags: 0x200000000000000(node=0|zone=2)
[   15.391174] page_type: f5(slab)
[   15.391381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.391915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.392251] page dumped because: kasan: bad access detected
[   15.392574] 
[   15.392675] Memory state around the buggy address:
[   15.392905]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.393222]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.393667] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.393963]                                      ^
[   15.394121]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.394402]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.394965] ==================================================================
[   16.042249] ==================================================================
[   16.042569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.043649] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.043969] 
[   16.044207] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.044254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.044267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.044289] Call Trace:
[   16.044305]  <TASK>
[   16.044321]  dump_stack_lvl+0x73/0xb0
[   16.044352]  print_report+0xd1/0x610
[   16.044455]  ? __virt_addr_valid+0x1db/0x2d0
[   16.044488]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.044512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.044539]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.044563]  kasan_report+0x141/0x180
[   16.044587]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.044615]  kasan_check_range+0x10c/0x1c0
[   16.044640]  __kasan_check_write+0x18/0x20
[   16.044662]  kasan_atomics_helper+0x1c18/0x5450
[   16.044686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.044711]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.044738]  ? kasan_atomics+0x152/0x310
[   16.044779]  kasan_atomics+0x1dc/0x310
[   16.044803]  ? __pfx_kasan_atomics+0x10/0x10
[   16.044829]  ? __pfx_read_tsc+0x10/0x10
[   16.044851]  ? ktime_get_ts64+0x86/0x230
[   16.044876]  kunit_try_run_case+0x1a5/0x480
[   16.044902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.044926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.044953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.044979]  ? __kthread_parkme+0x82/0x180
[   16.045001]  ? preempt_count_sub+0x50/0x80
[   16.045027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.045053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.045080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.045107]  kthread+0x337/0x6f0
[   16.045127]  ? trace_preempt_on+0x20/0xc0
[   16.045152]  ? __pfx_kthread+0x10/0x10
[   16.045174]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.045198]  ? calculate_sigpending+0x7b/0xa0
[   16.045224]  ? __pfx_kthread+0x10/0x10
[   16.045246]  ret_from_fork+0x116/0x1d0
[   16.045266]  ? __pfx_kthread+0x10/0x10
[   16.045288]  ret_from_fork_asm+0x1a/0x30
[   16.045320]  </TASK>
[   16.045331] 
[   16.055206] Allocated by task 282:
[   16.055376]  kasan_save_stack+0x45/0x70
[   16.055777]  kasan_save_track+0x18/0x40
[   16.055965]  kasan_save_alloc_info+0x3b/0x50
[   16.056246]  __kasan_kmalloc+0xb7/0xc0
[   16.056395]  __kmalloc_cache_noprof+0x189/0x420
[   16.056821]  kasan_atomics+0x95/0x310
[   16.056976]  kunit_try_run_case+0x1a5/0x480
[   16.057193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.057430]  kthread+0x337/0x6f0
[   16.057810]  ret_from_fork+0x116/0x1d0
[   16.058001]  ret_from_fork_asm+0x1a/0x30
[   16.058303] 
[   16.058410] The buggy address belongs to the object at ffff8881038e7800
[   16.058410]  which belongs to the cache kmalloc-64 of size 64
[   16.059036] The buggy address is located 0 bytes to the right of
[   16.059036]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.059731] 
[   16.059821] The buggy address belongs to the physical page:
[   16.060206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.060670] flags: 0x200000000000000(node=0|zone=2)
[   16.060896] page_type: f5(slab)
[   16.061173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.061623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.061961] page dumped because: kasan: bad access detected
[   16.062198] 
[   16.062278] Memory state around the buggy address:
[   16.062705]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.063021]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.063374] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.063860]                                      ^
[   16.064032]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064452]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064901] ==================================================================
[   15.659792] ==================================================================
[   15.660139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.660545] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.660909] 
[   15.661018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.661061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.661074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.661095] Call Trace:
[   15.661109]  <TASK>
[   15.661124]  dump_stack_lvl+0x73/0xb0
[   15.661153]  print_report+0xd1/0x610
[   15.661177]  ? __virt_addr_valid+0x1db/0x2d0
[   15.661210]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.661234]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.661259]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.661283]  kasan_report+0x141/0x180
[   15.661306]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.661334]  __asan_report_load4_noabort+0x18/0x20
[   15.661361]  kasan_atomics_helper+0x49e8/0x5450
[   15.661385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.661409]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.661458]  ? kasan_atomics+0x152/0x310
[   15.661487]  kasan_atomics+0x1dc/0x310
[   15.661511]  ? __pfx_kasan_atomics+0x10/0x10
[   15.661537]  ? __pfx_read_tsc+0x10/0x10
[   15.661559]  ? ktime_get_ts64+0x86/0x230
[   15.661584]  kunit_try_run_case+0x1a5/0x480
[   15.661609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.661634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.661659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.661685]  ? __kthread_parkme+0x82/0x180
[   15.661707]  ? preempt_count_sub+0x50/0x80
[   15.661732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.661768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.661829]  kthread+0x337/0x6f0
[   15.661849]  ? trace_preempt_on+0x20/0xc0
[   15.661874]  ? __pfx_kthread+0x10/0x10
[   15.661895]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.661919]  ? calculate_sigpending+0x7b/0xa0
[   15.661944]  ? __pfx_kthread+0x10/0x10
[   15.661967]  ret_from_fork+0x116/0x1d0
[   15.661986]  ? __pfx_kthread+0x10/0x10
[   15.662024]  ret_from_fork_asm+0x1a/0x30
[   15.662058]  </TASK>
[   15.662069] 
[   15.677075] Allocated by task 282:
[   15.677258]  kasan_save_stack+0x45/0x70
[   15.677495]  kasan_save_track+0x18/0x40
[   15.677683]  kasan_save_alloc_info+0x3b/0x50
[   15.677919]  __kasan_kmalloc+0xb7/0xc0
[   15.678094]  __kmalloc_cache_noprof+0x189/0x420
[   15.678321]  kasan_atomics+0x95/0x310
[   15.678574]  kunit_try_run_case+0x1a5/0x480
[   15.678787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.679079]  kthread+0x337/0x6f0
[   15.679248]  ret_from_fork+0x116/0x1d0
[   15.679461]  ret_from_fork_asm+0x1a/0x30
[   15.679624] 
[   15.679704] The buggy address belongs to the object at ffff8881038e7800
[   15.679704]  which belongs to the cache kmalloc-64 of size 64
[   15.680272] The buggy address is located 0 bytes to the right of
[   15.680272]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.680810] 
[   15.680929] The buggy address belongs to the physical page:
[   15.681163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.681530] flags: 0x200000000000000(node=0|zone=2)
[   15.681776] page_type: f5(slab)
[   15.681937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.682248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.682508] page dumped because: kasan: bad access detected
[   15.682763] 
[   15.682860] Memory state around the buggy address:
[   15.683091]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.683368]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.683706] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.684032]                                      ^
[   15.684192]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.684409]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.684642] ==================================================================
[   15.419498] ==================================================================
[   15.420018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.420350] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.420611] 
[   15.420884] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.420931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.420944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.420965] Call Trace:
[   15.420977]  <TASK>
[   15.420992]  dump_stack_lvl+0x73/0xb0
[   15.421024]  print_report+0xd1/0x610
[   15.421047]  ? __virt_addr_valid+0x1db/0x2d0
[   15.421071]  ? kasan_atomics_helper+0xd47/0x5450
[   15.421095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.421120]  ? kasan_atomics_helper+0xd47/0x5450
[   15.421144]  kasan_report+0x141/0x180
[   15.421167]  ? kasan_atomics_helper+0xd47/0x5450
[   15.421196]  kasan_check_range+0x10c/0x1c0
[   15.421222]  __kasan_check_write+0x18/0x20
[   15.421243]  kasan_atomics_helper+0xd47/0x5450
[   15.421267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.421291]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.421319]  ? kasan_atomics+0x152/0x310
[   15.421348]  kasan_atomics+0x1dc/0x310
[   15.421372]  ? __pfx_kasan_atomics+0x10/0x10
[   15.421398]  ? __pfx_read_tsc+0x10/0x10
[   15.421421]  ? ktime_get_ts64+0x86/0x230
[   15.421507]  kunit_try_run_case+0x1a5/0x480
[   15.421564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.421616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.421642]  ? __kthread_parkme+0x82/0x180
[   15.421663]  ? preempt_count_sub+0x50/0x80
[   15.421688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.421742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.421779]  kthread+0x337/0x6f0
[   15.421799]  ? trace_preempt_on+0x20/0xc0
[   15.421823]  ? __pfx_kthread+0x10/0x10
[   15.421846]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.421869]  ? calculate_sigpending+0x7b/0xa0
[   15.421904]  ? __pfx_kthread+0x10/0x10
[   15.421927]  ret_from_fork+0x116/0x1d0
[   15.421946]  ? __pfx_kthread+0x10/0x10
[   15.421979]  ret_from_fork_asm+0x1a/0x30
[   15.422012]  </TASK>
[   15.422023] 
[   15.431071] Allocated by task 282:
[   15.431216]  kasan_save_stack+0x45/0x70
[   15.431546]  kasan_save_track+0x18/0x40
[   15.431740]  kasan_save_alloc_info+0x3b/0x50
[   15.431977]  __kasan_kmalloc+0xb7/0xc0
[   15.432178]  __kmalloc_cache_noprof+0x189/0x420
[   15.432481]  kasan_atomics+0x95/0x310
[   15.432691]  kunit_try_run_case+0x1a5/0x480
[   15.432960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.433204]  kthread+0x337/0x6f0
[   15.433450]  ret_from_fork+0x116/0x1d0
[   15.433635]  ret_from_fork_asm+0x1a/0x30
[   15.433862] 
[   15.433957] The buggy address belongs to the object at ffff8881038e7800
[   15.433957]  which belongs to the cache kmalloc-64 of size 64
[   15.434360] The buggy address is located 0 bytes to the right of
[   15.434360]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.434771] 
[   15.434885] The buggy address belongs to the physical page:
[   15.435208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.435786] flags: 0x200000000000000(node=0|zone=2)
[   15.435986] page_type: f5(slab)
[   15.436180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.436628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.436973] page dumped because: kasan: bad access detected
[   15.437146] 
[   15.437217] Memory state around the buggy address:
[   15.437551]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.437929]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.438277] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.438671]                                      ^
[   15.438912]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.439193]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.439409] ==================================================================
[   14.942185] ==================================================================
[   14.942497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.942814] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   14.943110] 
[   14.943220] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.943263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.943274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.943296] Call Trace:
[   14.943306]  <TASK>
[   14.943321]  dump_stack_lvl+0x73/0xb0
[   14.943349]  print_report+0xd1/0x610
[   14.943371]  ? __virt_addr_valid+0x1db/0x2d0
[   14.943394]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.943416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.943440]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.943463]  kasan_report+0x141/0x180
[   14.943484]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.943511]  __asan_report_store4_noabort+0x1b/0x30
[   14.943536]  kasan_atomics_helper+0x4ba2/0x5450
[   14.943560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.943582]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.943664]  ? kasan_atomics+0x152/0x310
[   14.943694]  kasan_atomics+0x1dc/0x310
[   14.943716]  ? __pfx_kasan_atomics+0x10/0x10
[   14.943742]  ? __pfx_read_tsc+0x10/0x10
[   14.943774]  ? ktime_get_ts64+0x86/0x230
[   14.943797]  kunit_try_run_case+0x1a5/0x480
[   14.943822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.943847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.943871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.943896]  ? __kthread_parkme+0x82/0x180
[   14.943917]  ? preempt_count_sub+0x50/0x80
[   14.943941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.943966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.943991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.944017]  kthread+0x337/0x6f0
[   14.944036]  ? trace_preempt_on+0x20/0xc0
[   14.944060]  ? __pfx_kthread+0x10/0x10
[   14.944080]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.944103]  ? calculate_sigpending+0x7b/0xa0
[   14.944128]  ? __pfx_kthread+0x10/0x10
[   14.944149]  ret_from_fork+0x116/0x1d0
[   14.944168]  ? __pfx_kthread+0x10/0x10
[   14.944189]  ret_from_fork_asm+0x1a/0x30
[   14.944220]  </TASK>
[   14.944229] 
[   14.952536] Allocated by task 282:
[   14.952701]  kasan_save_stack+0x45/0x70
[   14.952905]  kasan_save_track+0x18/0x40
[   14.953103]  kasan_save_alloc_info+0x3b/0x50
[   14.953291]  __kasan_kmalloc+0xb7/0xc0
[   14.953500]  __kmalloc_cache_noprof+0x189/0x420
[   14.953678]  kasan_atomics+0x95/0x310
[   14.953872]  kunit_try_run_case+0x1a5/0x480
[   14.954083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954293]  kthread+0x337/0x6f0
[   14.954475]  ret_from_fork+0x116/0x1d0
[   14.954854]  ret_from_fork_asm+0x1a/0x30
[   14.955046] 
[   14.955130] The buggy address belongs to the object at ffff8881038e7800
[   14.955130]  which belongs to the cache kmalloc-64 of size 64
[   14.955740] The buggy address is located 0 bytes to the right of
[   14.955740]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   14.956232] 
[   14.956317] The buggy address belongs to the physical page:
[   14.956569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   14.956929] flags: 0x200000000000000(node=0|zone=2)
[   14.957128] page_type: f5(slab)
[   14.957283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.957679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.957938] page dumped because: kasan: bad access detected
[   14.958111] 
[   14.958179] Memory state around the buggy address:
[   14.958334]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.958700]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.959034] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.959437]                                      ^
[   14.959591]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.959814]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.960514] ==================================================================
[   15.723291] ==================================================================
[   15.723684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.724022] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.724330] 
[   15.724454] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.724500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.724514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.724536] Call Trace:
[   15.724568]  <TASK>
[   15.724583]  dump_stack_lvl+0x73/0xb0
[   15.724628]  print_report+0xd1/0x610
[   15.724665]  ? __virt_addr_valid+0x1db/0x2d0
[   15.724703]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.724753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.724787]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.724824]  kasan_report+0x141/0x180
[   15.724861]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.724888]  kasan_check_range+0x10c/0x1c0
[   15.724913]  __kasan_check_read+0x15/0x20
[   15.724934]  kasan_atomics_helper+0x13b5/0x5450
[   15.724958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.724982]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.725008]  ? kasan_atomics+0x152/0x310
[   15.725036]  kasan_atomics+0x1dc/0x310
[   15.725060]  ? __pfx_kasan_atomics+0x10/0x10
[   15.725085]  ? __pfx_read_tsc+0x10/0x10
[   15.725107]  ? ktime_get_ts64+0x86/0x230
[   15.725131]  kunit_try_run_case+0x1a5/0x480
[   15.725157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.725181]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.725206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.725232]  ? __kthread_parkme+0x82/0x180
[   15.725254]  ? preempt_count_sub+0x50/0x80
[   15.725278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.725304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.725331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.725359]  kthread+0x337/0x6f0
[   15.725379]  ? trace_preempt_on+0x20/0xc0
[   15.725403]  ? __pfx_kthread+0x10/0x10
[   15.725463]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.725487]  ? calculate_sigpending+0x7b/0xa0
[   15.725512]  ? __pfx_kthread+0x10/0x10
[   15.725551]  ret_from_fork+0x116/0x1d0
[   15.725570]  ? __pfx_kthread+0x10/0x10
[   15.725606]  ret_from_fork_asm+0x1a/0x30
[   15.725651]  </TASK>
[   15.725662] 
[   15.733494] Allocated by task 282:
[   15.733625]  kasan_save_stack+0x45/0x70
[   15.733834]  kasan_save_track+0x18/0x40
[   15.734047]  kasan_save_alloc_info+0x3b/0x50
[   15.734277]  __kasan_kmalloc+0xb7/0xc0
[   15.734537]  __kmalloc_cache_noprof+0x189/0x420
[   15.734775]  kasan_atomics+0x95/0x310
[   15.734971]  kunit_try_run_case+0x1a5/0x480
[   15.735214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.735547]  kthread+0x337/0x6f0
[   15.735722]  ret_from_fork+0x116/0x1d0
[   15.735915]  ret_from_fork_asm+0x1a/0x30
[   15.736111] 
[   15.736207] The buggy address belongs to the object at ffff8881038e7800
[   15.736207]  which belongs to the cache kmalloc-64 of size 64
[   15.736658] The buggy address is located 0 bytes to the right of
[   15.736658]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.737113] 
[   15.737234] The buggy address belongs to the physical page:
[   15.737540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.737961] flags: 0x200000000000000(node=0|zone=2)
[   15.738214] page_type: f5(slab)
[   15.738374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.738647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.739012] page dumped because: kasan: bad access detected
[   15.739312] 
[   15.739406] Memory state around the buggy address:
[   15.739642]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.739895]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.740234] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.740547]                                      ^
[   15.740795]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.741089]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.741420] ==================================================================
[   16.133808] ==================================================================
[   16.134142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.134745] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.135250] 
[   16.135359] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.135404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.135417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.135439] Call Trace:
[   16.135452]  <TASK>
[   16.135466]  dump_stack_lvl+0x73/0xb0
[   16.135509]  print_report+0xd1/0x610
[   16.135533]  ? __virt_addr_valid+0x1db/0x2d0
[   16.135557]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.135580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.135605]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.135629]  kasan_report+0x141/0x180
[   16.135653]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.135681]  kasan_check_range+0x10c/0x1c0
[   16.135706]  __kasan_check_write+0x18/0x20
[   16.135727]  kasan_atomics_helper+0x1e12/0x5450
[   16.135752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.135787]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.135814]  ? kasan_atomics+0x152/0x310
[   16.135842]  kasan_atomics+0x1dc/0x310
[   16.135867]  ? __pfx_kasan_atomics+0x10/0x10
[   16.135893]  ? __pfx_read_tsc+0x10/0x10
[   16.135916]  ? ktime_get_ts64+0x86/0x230
[   16.135941]  kunit_try_run_case+0x1a5/0x480
[   16.135967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.135991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.136018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.136043]  ? __kthread_parkme+0x82/0x180
[   16.136065]  ? preempt_count_sub+0x50/0x80
[   16.136091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.136117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.136144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.136171]  kthread+0x337/0x6f0
[   16.136191]  ? trace_preempt_on+0x20/0xc0
[   16.136215]  ? __pfx_kthread+0x10/0x10
[   16.136238]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.136260]  ? calculate_sigpending+0x7b/0xa0
[   16.136285]  ? __pfx_kthread+0x10/0x10
[   16.136309]  ret_from_fork+0x116/0x1d0
[   16.136328]  ? __pfx_kthread+0x10/0x10
[   16.136350]  ret_from_fork_asm+0x1a/0x30
[   16.136382]  </TASK>
[   16.136393] 
[   16.146523] Allocated by task 282:
[   16.146704]  kasan_save_stack+0x45/0x70
[   16.146895]  kasan_save_track+0x18/0x40
[   16.147088]  kasan_save_alloc_info+0x3b/0x50
[   16.147282]  __kasan_kmalloc+0xb7/0xc0
[   16.147444]  __kmalloc_cache_noprof+0x189/0x420
[   16.148040]  kasan_atomics+0x95/0x310
[   16.148208]  kunit_try_run_case+0x1a5/0x480
[   16.148412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.148845]  kthread+0x337/0x6f0
[   16.149024]  ret_from_fork+0x116/0x1d0
[   16.149312]  ret_from_fork_asm+0x1a/0x30
[   16.149571] 
[   16.149778] The buggy address belongs to the object at ffff8881038e7800
[   16.149778]  which belongs to the cache kmalloc-64 of size 64
[   16.150316] The buggy address is located 0 bytes to the right of
[   16.150316]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.151046] 
[   16.151264] The buggy address belongs to the physical page:
[   16.151469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.151955] flags: 0x200000000000000(node=0|zone=2)
[   16.152187] page_type: f5(slab)
[   16.152334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.152830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.153228] page dumped because: kasan: bad access detected
[   16.153496] 
[   16.153573] Memory state around the buggy address:
[   16.153789]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.154084]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.154401] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.154988]                                      ^
[   16.155182]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.155685]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156041] ==================================================================
[   15.947617] ==================================================================
[   15.947946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.948596] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.949039] 
[   15.949321] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.949453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.949470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.949492] Call Trace:
[   15.949509]  <TASK>
[   15.949528]  dump_stack_lvl+0x73/0xb0
[   15.949559]  print_report+0xd1/0x610
[   15.949583]  ? __virt_addr_valid+0x1db/0x2d0
[   15.949607]  ? kasan_atomics_helper+0x194a/0x5450
[   15.949630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.949656]  ? kasan_atomics_helper+0x194a/0x5450
[   15.949680]  kasan_report+0x141/0x180
[   15.949703]  ? kasan_atomics_helper+0x194a/0x5450
[   15.949732]  kasan_check_range+0x10c/0x1c0
[   15.949771]  __kasan_check_write+0x18/0x20
[   15.949793]  kasan_atomics_helper+0x194a/0x5450
[   15.949817]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.949842]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.949871]  ? kasan_atomics+0x152/0x310
[   15.949898]  kasan_atomics+0x1dc/0x310
[   15.949923]  ? __pfx_kasan_atomics+0x10/0x10
[   15.949949]  ? __pfx_read_tsc+0x10/0x10
[   15.949971]  ? ktime_get_ts64+0x86/0x230
[   15.949997]  kunit_try_run_case+0x1a5/0x480
[   15.950024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.950048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.950073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.950099]  ? __kthread_parkme+0x82/0x180
[   15.950121]  ? preempt_count_sub+0x50/0x80
[   15.950145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.950172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.950198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.950225]  kthread+0x337/0x6f0
[   15.950246]  ? trace_preempt_on+0x20/0xc0
[   15.950269]  ? __pfx_kthread+0x10/0x10
[   15.950291]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.950314]  ? calculate_sigpending+0x7b/0xa0
[   15.950340]  ? __pfx_kthread+0x10/0x10
[   15.950362]  ret_from_fork+0x116/0x1d0
[   15.950388]  ? __pfx_kthread+0x10/0x10
[   15.950409]  ret_from_fork_asm+0x1a/0x30
[   15.950448]  </TASK>
[   15.950459] 
[   15.961040] Allocated by task 282:
[   15.961303]  kasan_save_stack+0x45/0x70
[   15.961612]  kasan_save_track+0x18/0x40
[   15.961854]  kasan_save_alloc_info+0x3b/0x50
[   15.962033]  __kasan_kmalloc+0xb7/0xc0
[   15.962447]  __kmalloc_cache_noprof+0x189/0x420
[   15.962784]  kasan_atomics+0x95/0x310
[   15.962985]  kunit_try_run_case+0x1a5/0x480
[   15.963309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963684]  kthread+0x337/0x6f0
[   15.963882]  ret_from_fork+0x116/0x1d0
[   15.964198]  ret_from_fork_asm+0x1a/0x30
[   15.964503] 
[   15.964602] The buggy address belongs to the object at ffff8881038e7800
[   15.964602]  which belongs to the cache kmalloc-64 of size 64
[   15.965255] The buggy address is located 0 bytes to the right of
[   15.965255]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.965955] 
[   15.966250] The buggy address belongs to the physical page:
[   15.966522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.966853] flags: 0x200000000000000(node=0|zone=2)
[   15.967177] page_type: f5(slab)
[   15.967468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.968119] page dumped because: kasan: bad access detected
[   15.968374] 
[   15.968468] Memory state around the buggy address:
[   15.968693]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.969305]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.969782] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.970164]                                      ^
[   15.970478]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.970836]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.971202] ==================================================================
[   15.782632] ==================================================================
[   15.783054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.783462] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.783831] 
[   15.783943] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.783986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.783998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.784037] Call Trace:
[   15.784053]  <TASK>
[   15.784069]  dump_stack_lvl+0x73/0xb0
[   15.784098]  print_report+0xd1/0x610
[   15.784121]  ? __virt_addr_valid+0x1db/0x2d0
[   15.784146]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.784169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.784194]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.784218]  kasan_report+0x141/0x180
[   15.784242]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.784269]  __asan_report_store8_noabort+0x1b/0x30
[   15.784297]  kasan_atomics_helper+0x50d4/0x5450
[   15.784321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.784346]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.784373]  ? kasan_atomics+0x152/0x310
[   15.784401]  kasan_atomics+0x1dc/0x310
[   15.784458]  ? __pfx_kasan_atomics+0x10/0x10
[   15.784486]  ? __pfx_read_tsc+0x10/0x10
[   15.784508]  ? ktime_get_ts64+0x86/0x230
[   15.784534]  kunit_try_run_case+0x1a5/0x480
[   15.784560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.784585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.784611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.784636]  ? __kthread_parkme+0x82/0x180
[   15.784658]  ? preempt_count_sub+0x50/0x80
[   15.784684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.784710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.784737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.784773]  kthread+0x337/0x6f0
[   15.784794]  ? trace_preempt_on+0x20/0xc0
[   15.784838]  ? __pfx_kthread+0x10/0x10
[   15.784861]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.784884]  ? calculate_sigpending+0x7b/0xa0
[   15.784927]  ? __pfx_kthread+0x10/0x10
[   15.784950]  ret_from_fork+0x116/0x1d0
[   15.784971]  ? __pfx_kthread+0x10/0x10
[   15.784992]  ret_from_fork_asm+0x1a/0x30
[   15.785024]  </TASK>
[   15.785035] 
[   15.792724] Allocated by task 282:
[   15.792897]  kasan_save_stack+0x45/0x70
[   15.793078]  kasan_save_track+0x18/0x40
[   15.793261]  kasan_save_alloc_info+0x3b/0x50
[   15.793516]  __kasan_kmalloc+0xb7/0xc0
[   15.793715]  __kmalloc_cache_noprof+0x189/0x420
[   15.793933]  kasan_atomics+0x95/0x310
[   15.794106]  kunit_try_run_case+0x1a5/0x480
[   15.794338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.794620]  kthread+0x337/0x6f0
[   15.794790]  ret_from_fork+0x116/0x1d0
[   15.794951]  ret_from_fork_asm+0x1a/0x30
[   15.795165] 
[   15.795287] The buggy address belongs to the object at ffff8881038e7800
[   15.795287]  which belongs to the cache kmalloc-64 of size 64
[   15.795777] The buggy address is located 0 bytes to the right of
[   15.795777]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.796307] 
[   15.796413] The buggy address belongs to the physical page:
[   15.796657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.797039] flags: 0x200000000000000(node=0|zone=2)
[   15.797269] page_type: f5(slab)
[   15.797542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.797833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.798177] page dumped because: kasan: bad access detected
[   15.798446] 
[   15.798541] Memory state around the buggy address:
[   15.798801]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.799129]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.799415] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.799646]                                      ^
[   15.799839]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800173]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800538] ==================================================================
[   16.088156] ==================================================================
[   16.088752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.089153] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.089602] 
[   16.089780] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.089827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.089840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.089962] Call Trace:
[   16.089980]  <TASK>
[   16.089996]  dump_stack_lvl+0x73/0xb0
[   16.090027]  print_report+0xd1/0x610
[   16.090050]  ? __virt_addr_valid+0x1db/0x2d0
[   16.090074]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.090098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.090123]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.090148]  kasan_report+0x141/0x180
[   16.090172]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.090200]  kasan_check_range+0x10c/0x1c0
[   16.090226]  __kasan_check_write+0x18/0x20
[   16.090247]  kasan_atomics_helper+0x1ce1/0x5450
[   16.090272]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.090297]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.090324]  ? kasan_atomics+0x152/0x310
[   16.090352]  kasan_atomics+0x1dc/0x310
[   16.090377]  ? __pfx_kasan_atomics+0x10/0x10
[   16.090410]  ? __pfx_read_tsc+0x10/0x10
[   16.090433]  ? ktime_get_ts64+0x86/0x230
[   16.090466]  kunit_try_run_case+0x1a5/0x480
[   16.090493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.090518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.090544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.090570]  ? __kthread_parkme+0x82/0x180
[   16.090591]  ? preempt_count_sub+0x50/0x80
[   16.090616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.090642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.090669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.090696]  kthread+0x337/0x6f0
[   16.090716]  ? trace_preempt_on+0x20/0xc0
[   16.090741]  ? __pfx_kthread+0x10/0x10
[   16.090773]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.090797]  ? calculate_sigpending+0x7b/0xa0
[   16.090822]  ? __pfx_kthread+0x10/0x10
[   16.090845]  ret_from_fork+0x116/0x1d0
[   16.090865]  ? __pfx_kthread+0x10/0x10
[   16.090887]  ret_from_fork_asm+0x1a/0x30
[   16.090918]  </TASK>
[   16.090929] 
[   16.100496] Allocated by task 282:
[   16.100750]  kasan_save_stack+0x45/0x70
[   16.101033]  kasan_save_track+0x18/0x40
[   16.101282]  kasan_save_alloc_info+0x3b/0x50
[   16.101569]  __kasan_kmalloc+0xb7/0xc0
[   16.101743]  __kmalloc_cache_noprof+0x189/0x420
[   16.102073]  kasan_atomics+0x95/0x310
[   16.102265]  kunit_try_run_case+0x1a5/0x480
[   16.102565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.102876]  kthread+0x337/0x6f0
[   16.103048]  ret_from_fork+0x116/0x1d0
[   16.103218]  ret_from_fork_asm+0x1a/0x30
[   16.103398] 
[   16.103746] The buggy address belongs to the object at ffff8881038e7800
[   16.103746]  which belongs to the cache kmalloc-64 of size 64
[   16.104213] The buggy address is located 0 bytes to the right of
[   16.104213]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.104942] 
[   16.105036] The buggy address belongs to the physical page:
[   16.105265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.105765] flags: 0x200000000000000(node=0|zone=2)
[   16.105992] page_type: f5(slab)
[   16.106230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.106628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.107070] page dumped because: kasan: bad access detected
[   16.107364] 
[   16.107441] Memory state around the buggy address:
[   16.107696]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.108169]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.108549] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.108812]                                      ^
[   16.109120]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.109427]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.109926] ==================================================================
[   16.256969] ==================================================================
[   16.257364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.257774] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.258115] 
[   16.258212] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.258286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.258299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.258331] Call Trace:
[   16.258346]  <TASK>
[   16.258361]  dump_stack_lvl+0x73/0xb0
[   16.258398]  print_report+0xd1/0x610
[   16.258465]  ? __virt_addr_valid+0x1db/0x2d0
[   16.258491]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.258513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.258549]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.258573]  kasan_report+0x141/0x180
[   16.258623]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.258651]  __asan_report_load8_noabort+0x18/0x20
[   16.258678]  kasan_atomics_helper+0x4f98/0x5450
[   16.258713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.258737]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.258772]  ? kasan_atomics+0x152/0x310
[   16.258800]  kasan_atomics+0x1dc/0x310
[   16.258824]  ? __pfx_kasan_atomics+0x10/0x10
[   16.258850]  ? __pfx_read_tsc+0x10/0x10
[   16.258872]  ? ktime_get_ts64+0x86/0x230
[   16.258925]  kunit_try_run_case+0x1a5/0x480
[   16.258952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.259043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.259083]  ? __kthread_parkme+0x82/0x180
[   16.259105]  ? preempt_count_sub+0x50/0x80
[   16.259143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.259210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.259238]  kthread+0x337/0x6f0
[   16.259258]  ? trace_preempt_on+0x20/0xc0
[   16.259283]  ? __pfx_kthread+0x10/0x10
[   16.259314]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.259338]  ? calculate_sigpending+0x7b/0xa0
[   16.259374]  ? __pfx_kthread+0x10/0x10
[   16.259397]  ret_from_fork+0x116/0x1d0
[   16.259416]  ? __pfx_kthread+0x10/0x10
[   16.259456]  ret_from_fork_asm+0x1a/0x30
[   16.259489]  </TASK>
[   16.259500] 
[   16.271628] Allocated by task 282:
[   16.271990]  kasan_save_stack+0x45/0x70
[   16.272380]  kasan_save_track+0x18/0x40
[   16.272783]  kasan_save_alloc_info+0x3b/0x50
[   16.273174]  __kasan_kmalloc+0xb7/0xc0
[   16.273310]  __kmalloc_cache_noprof+0x189/0x420
[   16.273573]  kasan_atomics+0x95/0x310
[   16.273957]  kunit_try_run_case+0x1a5/0x480
[   16.274363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.274878]  kthread+0x337/0x6f0
[   16.275119]  ret_from_fork+0x116/0x1d0
[   16.275353]  ret_from_fork_asm+0x1a/0x30
[   16.275747] 
[   16.275830] The buggy address belongs to the object at ffff8881038e7800
[   16.275830]  which belongs to the cache kmalloc-64 of size 64
[   16.276185] The buggy address is located 0 bytes to the right of
[   16.276185]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.276876] 
[   16.277037] The buggy address belongs to the physical page:
[   16.277542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.278224] flags: 0x200000000000000(node=0|zone=2)
[   16.278695] page_type: f5(slab)
[   16.279016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.279727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.280345] page dumped because: kasan: bad access detected
[   16.280529] 
[   16.280600] Memory state around the buggy address:
[   16.280766]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.281238]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.281618] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.281842]                                      ^
[   16.281994]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282205]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282418] ==================================================================
[   15.859189] ==================================================================
[   15.859623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.859952] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.860285] 
[   15.860403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.860468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.860481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.860502] Call Trace:
[   15.860519]  <TASK>
[   15.860558]  dump_stack_lvl+0x73/0xb0
[   15.860590]  print_report+0xd1/0x610
[   15.860612]  ? __virt_addr_valid+0x1db/0x2d0
[   15.860637]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.860659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.860684]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.860724]  kasan_report+0x141/0x180
[   15.860748]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.860801]  kasan_check_range+0x10c/0x1c0
[   15.860827]  __kasan_check_write+0x18/0x20
[   15.860848]  kasan_atomics_helper+0x16e7/0x5450
[   15.860874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.860898]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.860924]  ? kasan_atomics+0x152/0x310
[   15.860953]  kasan_atomics+0x1dc/0x310
[   15.860977]  ? __pfx_kasan_atomics+0x10/0x10
[   15.861003]  ? __pfx_read_tsc+0x10/0x10
[   15.861025]  ? ktime_get_ts64+0x86/0x230
[   15.861050]  kunit_try_run_case+0x1a5/0x480
[   15.861075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.861118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.861145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.861183]  ? __kthread_parkme+0x82/0x180
[   15.861219]  ? preempt_count_sub+0x50/0x80
[   15.861258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.861286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.861326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.861367]  kthread+0x337/0x6f0
[   15.861388]  ? trace_preempt_on+0x20/0xc0
[   15.861413]  ? __pfx_kthread+0x10/0x10
[   15.861455]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.861479]  ? calculate_sigpending+0x7b/0xa0
[   15.861505]  ? __pfx_kthread+0x10/0x10
[   15.861528]  ret_from_fork+0x116/0x1d0
[   15.861548]  ? __pfx_kthread+0x10/0x10
[   15.861570]  ret_from_fork_asm+0x1a/0x30
[   15.861602]  </TASK>
[   15.861613] 
[   15.869270] Allocated by task 282:
[   15.869479]  kasan_save_stack+0x45/0x70
[   15.869679]  kasan_save_track+0x18/0x40
[   15.869904]  kasan_save_alloc_info+0x3b/0x50
[   15.870096]  __kasan_kmalloc+0xb7/0xc0
[   15.870275]  __kmalloc_cache_noprof+0x189/0x420
[   15.870540]  kasan_atomics+0x95/0x310
[   15.870742]  kunit_try_run_case+0x1a5/0x480
[   15.870961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.871239]  kthread+0x337/0x6f0
[   15.871399]  ret_from_fork+0x116/0x1d0
[   15.871604]  ret_from_fork_asm+0x1a/0x30
[   15.871787] 
[   15.871886] The buggy address belongs to the object at ffff8881038e7800
[   15.871886]  which belongs to the cache kmalloc-64 of size 64
[   15.872369] The buggy address is located 0 bytes to the right of
[   15.872369]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.872983] 
[   15.873113] The buggy address belongs to the physical page:
[   15.873396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.873794] flags: 0x200000000000000(node=0|zone=2)
[   15.874030] page_type: f5(slab)
[   15.874199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.874533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.874770] page dumped because: kasan: bad access detected
[   15.874942] 
[   15.875017] Memory state around the buggy address:
[   15.875241]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.875627]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.875995] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.876317]                                      ^
[   15.877194]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.877598]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878244] ==================================================================
[   15.898596] ==================================================================
[   15.898956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.899358] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.899719] 
[   15.899860] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.899905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.899918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.899941] Call Trace:
[   15.899955]  <TASK>
[   15.899970]  dump_stack_lvl+0x73/0xb0
[   15.899999]  print_report+0xd1/0x610
[   15.900022]  ? __virt_addr_valid+0x1db/0x2d0
[   15.900045]  ? kasan_atomics_helper+0x1818/0x5450
[   15.900068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.900092]  ? kasan_atomics_helper+0x1818/0x5450
[   15.900116]  kasan_report+0x141/0x180
[   15.900140]  ? kasan_atomics_helper+0x1818/0x5450
[   15.900168]  kasan_check_range+0x10c/0x1c0
[   15.900193]  __kasan_check_write+0x18/0x20
[   15.900236]  kasan_atomics_helper+0x1818/0x5450
[   15.900261]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.900286]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.900313]  ? kasan_atomics+0x152/0x310
[   15.900357]  kasan_atomics+0x1dc/0x310
[   15.900381]  ? __pfx_kasan_atomics+0x10/0x10
[   15.900444]  ? __pfx_read_tsc+0x10/0x10
[   15.900468]  ? ktime_get_ts64+0x86/0x230
[   15.900493]  kunit_try_run_case+0x1a5/0x480
[   15.900519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.900543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.900569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.900595]  ? __kthread_parkme+0x82/0x180
[   15.900616]  ? preempt_count_sub+0x50/0x80
[   15.900641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.900667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.900693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.900720]  kthread+0x337/0x6f0
[   15.900768]  ? trace_preempt_on+0x20/0xc0
[   15.900793]  ? __pfx_kthread+0x10/0x10
[   15.900815]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.900838]  ? calculate_sigpending+0x7b/0xa0
[   15.900863]  ? __pfx_kthread+0x10/0x10
[   15.900887]  ret_from_fork+0x116/0x1d0
[   15.900923]  ? __pfx_kthread+0x10/0x10
[   15.900947]  ret_from_fork_asm+0x1a/0x30
[   15.900978]  </TASK>
[   15.900989] 
[   15.908586] Allocated by task 282:
[   15.910033]  kasan_save_stack+0x45/0x70
[   15.910237]  kasan_save_track+0x18/0x40
[   15.910407]  kasan_save_alloc_info+0x3b/0x50
[   15.910777]  __kasan_kmalloc+0xb7/0xc0
[   15.911060]  __kmalloc_cache_noprof+0x189/0x420
[   15.911374]  kasan_atomics+0x95/0x310
[   15.911667]  kunit_try_run_case+0x1a5/0x480
[   15.911955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.912287]  kthread+0x337/0x6f0
[   15.912586]  ret_from_fork+0x116/0x1d0
[   15.912914]  ret_from_fork_asm+0x1a/0x30
[   15.913188] 
[   15.913373] The buggy address belongs to the object at ffff8881038e7800
[   15.913373]  which belongs to the cache kmalloc-64 of size 64
[   15.914007] The buggy address is located 0 bytes to the right of
[   15.914007]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.914823] 
[   15.914944] The buggy address belongs to the physical page:
[   15.915300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.915771] flags: 0x200000000000000(node=0|zone=2)
[   15.916088] page_type: f5(slab)
[   15.916319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.916793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.917220] page dumped because: kasan: bad access detected
[   15.917569] 
[   15.917651] Memory state around the buggy address:
[   15.918036]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.918413]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.918831] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.919120]                                      ^
[   15.919506]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919907]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920288] ==================================================================
[   15.819951] ==================================================================
[   15.820788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.821093] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.821497] 
[   15.821627] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.821683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.821695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.821731] Call Trace:
[   15.821768]  <TASK>
[   15.821782]  dump_stack_lvl+0x73/0xb0
[   15.821842]  print_report+0xd1/0x610
[   15.821865]  ? __virt_addr_valid+0x1db/0x2d0
[   15.821902]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.821939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.821978]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.822002]  kasan_report+0x141/0x180
[   15.822026]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.822055]  kasan_check_range+0x10c/0x1c0
[   15.822080]  __kasan_check_write+0x18/0x20
[   15.822102]  kasan_atomics_helper+0x15b6/0x5450
[   15.822126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.822151]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.822178]  ? kasan_atomics+0x152/0x310
[   15.822206]  kasan_atomics+0x1dc/0x310
[   15.822229]  ? __pfx_kasan_atomics+0x10/0x10
[   15.822256]  ? __pfx_read_tsc+0x10/0x10
[   15.822278]  ? ktime_get_ts64+0x86/0x230
[   15.822303]  kunit_try_run_case+0x1a5/0x480
[   15.822329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.822353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.822379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.822412]  ? __kthread_parkme+0x82/0x180
[   15.822453]  ? preempt_count_sub+0x50/0x80
[   15.822479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.822505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.822558]  kthread+0x337/0x6f0
[   15.822579]  ? trace_preempt_on+0x20/0xc0
[   15.822623]  ? __pfx_kthread+0x10/0x10
[   15.822645]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.822669]  ? calculate_sigpending+0x7b/0xa0
[   15.822711]  ? __pfx_kthread+0x10/0x10
[   15.822733]  ret_from_fork+0x116/0x1d0
[   15.822833]  ? __pfx_kthread+0x10/0x10
[   15.822856]  ret_from_fork_asm+0x1a/0x30
[   15.822910]  </TASK>
[   15.822923] 
[   15.830727] Allocated by task 282:
[   15.830925]  kasan_save_stack+0x45/0x70
[   15.831149]  kasan_save_track+0x18/0x40
[   15.831355]  kasan_save_alloc_info+0x3b/0x50
[   15.831558]  __kasan_kmalloc+0xb7/0xc0
[   15.831775]  __kmalloc_cache_noprof+0x189/0x420
[   15.832055]  kasan_atomics+0x95/0x310
[   15.832248]  kunit_try_run_case+0x1a5/0x480
[   15.832485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.832740]  kthread+0x337/0x6f0
[   15.832917]  ret_from_fork+0x116/0x1d0
[   15.833108]  ret_from_fork_asm+0x1a/0x30
[   15.833307] 
[   15.833403] The buggy address belongs to the object at ffff8881038e7800
[   15.833403]  which belongs to the cache kmalloc-64 of size 64
[   15.833928] The buggy address is located 0 bytes to the right of
[   15.833928]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.834300] 
[   15.834407] The buggy address belongs to the physical page:
[   15.834700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.835115] flags: 0x200000000000000(node=0|zone=2)
[   15.835365] page_type: f5(slab)
[   15.835602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.835881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.836112] page dumped because: kasan: bad access detected
[   15.836368] 
[   15.836473] Memory state around the buggy address:
[   15.836702]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.837033]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.837308] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.837550]                                      ^
[   15.837808]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838123]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838484] ==================================================================
[   15.742111] ==================================================================
[   15.742661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.743007] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.743332] 
[   15.743417] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.743459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.743471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.743493] Call Trace:
[   15.743507]  <TASK>
[   15.743522]  dump_stack_lvl+0x73/0xb0
[   15.743552]  print_report+0xd1/0x610
[   15.743575]  ? __virt_addr_valid+0x1db/0x2d0
[   15.743599]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.743622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.743647]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.743670]  kasan_report+0x141/0x180
[   15.743693]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.743721]  __asan_report_load8_noabort+0x18/0x20
[   15.743747]  kasan_atomics_helper+0x4eae/0x5450
[   15.743781]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.743805]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.743831]  ? kasan_atomics+0x152/0x310
[   15.743859]  kasan_atomics+0x1dc/0x310
[   15.743883]  ? __pfx_kasan_atomics+0x10/0x10
[   15.743908]  ? __pfx_read_tsc+0x10/0x10
[   15.743931]  ? ktime_get_ts64+0x86/0x230
[   15.743956]  kunit_try_run_case+0x1a5/0x480
[   15.743982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.744006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.744032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.744057]  ? __kthread_parkme+0x82/0x180
[   15.744079]  ? preempt_count_sub+0x50/0x80
[   15.744103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.744129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.744156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.744183]  kthread+0x337/0x6f0
[   15.744204]  ? trace_preempt_on+0x20/0xc0
[   15.744229]  ? __pfx_kthread+0x10/0x10
[   15.744251]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.744273]  ? calculate_sigpending+0x7b/0xa0
[   15.744299]  ? __pfx_kthread+0x10/0x10
[   15.744322]  ret_from_fork+0x116/0x1d0
[   15.744342]  ? __pfx_kthread+0x10/0x10
[   15.744365]  ret_from_fork_asm+0x1a/0x30
[   15.744396]  </TASK>
[   15.744407] 
[   15.753615] Allocated by task 282:
[   15.753791]  kasan_save_stack+0x45/0x70
[   15.754157]  kasan_save_track+0x18/0x40
[   15.754384]  kasan_save_alloc_info+0x3b/0x50
[   15.754767]  __kasan_kmalloc+0xb7/0xc0
[   15.754963]  __kmalloc_cache_noprof+0x189/0x420
[   15.755311]  kasan_atomics+0x95/0x310
[   15.755621]  kunit_try_run_case+0x1a5/0x480
[   15.755917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.756170]  kthread+0x337/0x6f0
[   15.756475]  ret_from_fork+0x116/0x1d0
[   15.756770]  ret_from_fork_asm+0x1a/0x30
[   15.757057] 
[   15.757181] The buggy address belongs to the object at ffff8881038e7800
[   15.757181]  which belongs to the cache kmalloc-64 of size 64
[   15.757829] The buggy address is located 0 bytes to the right of
[   15.757829]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.758337] 
[   15.758491] The buggy address belongs to the physical page:
[   15.758708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.759074] flags: 0x200000000000000(node=0|zone=2)
[   15.759304] page_type: f5(slab)
[   15.759495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.759846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.760170] page dumped because: kasan: bad access detected
[   15.760411] 
[   15.760535] Memory state around the buggy address:
[   15.760770]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.761074]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.761376] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.761687]                                      ^
[   15.761932]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.762251]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.762571] ==================================================================
[   16.019326] ==================================================================
[   16.019938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.020279] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.020961] 
[   16.021177] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.021225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.021238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.021261] Call Trace:
[   16.021277]  <TASK>
[   16.021294]  dump_stack_lvl+0x73/0xb0
[   16.021396]  print_report+0xd1/0x610
[   16.021423]  ? __virt_addr_valid+0x1db/0x2d0
[   16.021458]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.021481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.021507]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.021531]  kasan_report+0x141/0x180
[   16.021554]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.021582]  kasan_check_range+0x10c/0x1c0
[   16.021607]  __kasan_check_write+0x18/0x20
[   16.021628]  kasan_atomics_helper+0x1b22/0x5450
[   16.021653]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.021678]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.021705]  ? kasan_atomics+0x152/0x310
[   16.021733]  kasan_atomics+0x1dc/0x310
[   16.021770]  ? __pfx_kasan_atomics+0x10/0x10
[   16.021796]  ? __pfx_read_tsc+0x10/0x10
[   16.021817]  ? ktime_get_ts64+0x86/0x230
[   16.021843]  kunit_try_run_case+0x1a5/0x480
[   16.021869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.021894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.021919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.021945]  ? __kthread_parkme+0x82/0x180
[   16.021967]  ? preempt_count_sub+0x50/0x80
[   16.021992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.022018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.022043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.022070]  kthread+0x337/0x6f0
[   16.022092]  ? trace_preempt_on+0x20/0xc0
[   16.022117]  ? __pfx_kthread+0x10/0x10
[   16.022142]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.022167]  ? calculate_sigpending+0x7b/0xa0
[   16.022192]  ? __pfx_kthread+0x10/0x10
[   16.022216]  ret_from_fork+0x116/0x1d0
[   16.022235]  ? __pfx_kthread+0x10/0x10
[   16.022257]  ret_from_fork_asm+0x1a/0x30
[   16.022290]  </TASK>
[   16.022301] 
[   16.031958] Allocated by task 282:
[   16.032158]  kasan_save_stack+0x45/0x70
[   16.032355]  kasan_save_track+0x18/0x40
[   16.032873]  kasan_save_alloc_info+0x3b/0x50
[   16.033060]  __kasan_kmalloc+0xb7/0xc0
[   16.033251]  __kmalloc_cache_noprof+0x189/0x420
[   16.033663]  kasan_atomics+0x95/0x310
[   16.033840]  kunit_try_run_case+0x1a5/0x480
[   16.034054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.034293]  kthread+0x337/0x6f0
[   16.034462]  ret_from_fork+0x116/0x1d0
[   16.034917]  ret_from_fork_asm+0x1a/0x30
[   16.035068] 
[   16.035292] The buggy address belongs to the object at ffff8881038e7800
[   16.035292]  which belongs to the cache kmalloc-64 of size 64
[   16.035974] The buggy address is located 0 bytes to the right of
[   16.035974]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.036656] 
[   16.036737] The buggy address belongs to the physical page:
[   16.037017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.037340] flags: 0x200000000000000(node=0|zone=2)
[   16.037787] page_type: f5(slab)
[   16.037965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.038395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.038851] page dumped because: kasan: bad access detected
[   16.039192] 
[   16.039291] Memory state around the buggy address:
[   16.039455]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.039952]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.040341] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.040692]                                      ^
[   16.041033]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041416]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041695] ==================================================================
[   16.111150] ==================================================================
[   16.111752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.112090] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.112614] 
[   16.112724] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.112781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.112795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.112816] Call Trace:
[   16.112833]  <TASK>
[   16.112852]  dump_stack_lvl+0x73/0xb0
[   16.113056]  print_report+0xd1/0x610
[   16.113080]  ? __virt_addr_valid+0x1db/0x2d0
[   16.113105]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.113128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.113153]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.113177]  kasan_report+0x141/0x180
[   16.113200]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.113228]  kasan_check_range+0x10c/0x1c0
[   16.113254]  __kasan_check_write+0x18/0x20
[   16.113275]  kasan_atomics_helper+0x1d7a/0x5450
[   16.113299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.113325]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.113353]  ? kasan_atomics+0x152/0x310
[   16.113381]  kasan_atomics+0x1dc/0x310
[   16.113405]  ? __pfx_kasan_atomics+0x10/0x10
[   16.113431]  ? __pfx_read_tsc+0x10/0x10
[   16.113517]  ? ktime_get_ts64+0x86/0x230
[   16.113544]  kunit_try_run_case+0x1a5/0x480
[   16.113572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.113597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.113623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.113649]  ? __kthread_parkme+0x82/0x180
[   16.113671]  ? preempt_count_sub+0x50/0x80
[   16.113696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.113722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.113748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.113787]  kthread+0x337/0x6f0
[   16.113807]  ? trace_preempt_on+0x20/0xc0
[   16.113832]  ? __pfx_kthread+0x10/0x10
[   16.113853]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.113877]  ? calculate_sigpending+0x7b/0xa0
[   16.113902]  ? __pfx_kthread+0x10/0x10
[   16.113925]  ret_from_fork+0x116/0x1d0
[   16.113945]  ? __pfx_kthread+0x10/0x10
[   16.113967]  ret_from_fork_asm+0x1a/0x30
[   16.113998]  </TASK>
[   16.114009] 
[   16.123705] Allocated by task 282:
[   16.124005]  kasan_save_stack+0x45/0x70
[   16.124188]  kasan_save_track+0x18/0x40
[   16.124429]  kasan_save_alloc_info+0x3b/0x50
[   16.124771]  __kasan_kmalloc+0xb7/0xc0
[   16.124946]  __kmalloc_cache_noprof+0x189/0x420
[   16.125269]  kasan_atomics+0x95/0x310
[   16.125456]  kunit_try_run_case+0x1a5/0x480
[   16.125661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.125914]  kthread+0x337/0x6f0
[   16.126059]  ret_from_fork+0x116/0x1d0
[   16.126242]  ret_from_fork_asm+0x1a/0x30
[   16.126436] 
[   16.126854] The buggy address belongs to the object at ffff8881038e7800
[   16.126854]  which belongs to the cache kmalloc-64 of size 64
[   16.127312] The buggy address is located 0 bytes to the right of
[   16.127312]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.128028] 
[   16.128227] The buggy address belongs to the physical page:
[   16.128427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.129029] flags: 0x200000000000000(node=0|zone=2)
[   16.129322] page_type: f5(slab)
[   16.129466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.129907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.130283] page dumped because: kasan: bad access detected
[   16.130607] 
[   16.130689] Memory state around the buggy address:
[   16.130910]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.131206]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.131730] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.132022]                                      ^
[   16.132243]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.132714]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.133094] ==================================================================
[   16.234391] ==================================================================
[   16.234721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.235054] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.235907] 
[   16.236253] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.236305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.236319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.236340] Call Trace:
[   16.236355]  <TASK>
[   16.236370]  dump_stack_lvl+0x73/0xb0
[   16.236451]  print_report+0xd1/0x610
[   16.236476]  ? __virt_addr_valid+0x1db/0x2d0
[   16.236500]  ? kasan_atomics_helper+0x2006/0x5450
[   16.236523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.236549]  ? kasan_atomics_helper+0x2006/0x5450
[   16.236574]  kasan_report+0x141/0x180
[   16.236597]  ? kasan_atomics_helper+0x2006/0x5450
[   16.236626]  kasan_check_range+0x10c/0x1c0
[   16.236652]  __kasan_check_write+0x18/0x20
[   16.236673]  kasan_atomics_helper+0x2006/0x5450
[   16.236697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.236724]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.236767]  ? kasan_atomics+0x152/0x310
[   16.236795]  kasan_atomics+0x1dc/0x310
[   16.236819]  ? __pfx_kasan_atomics+0x10/0x10
[   16.236845]  ? __pfx_read_tsc+0x10/0x10
[   16.236867]  ? ktime_get_ts64+0x86/0x230
[   16.236893]  kunit_try_run_case+0x1a5/0x480
[   16.236919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.236944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.236970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.236996]  ? __kthread_parkme+0x82/0x180
[   16.237018]  ? preempt_count_sub+0x50/0x80
[   16.237043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.237070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.237097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.237124]  kthread+0x337/0x6f0
[   16.237144]  ? trace_preempt_on+0x20/0xc0
[   16.237169]  ? __pfx_kthread+0x10/0x10
[   16.237191]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.237215]  ? calculate_sigpending+0x7b/0xa0
[   16.237240]  ? __pfx_kthread+0x10/0x10
[   16.237263]  ret_from_fork+0x116/0x1d0
[   16.237283]  ? __pfx_kthread+0x10/0x10
[   16.237305]  ret_from_fork_asm+0x1a/0x30
[   16.237337]  </TASK>
[   16.237348] 
[   16.248100] Allocated by task 282:
[   16.248241]  kasan_save_stack+0x45/0x70
[   16.248393]  kasan_save_track+0x18/0x40
[   16.248540]  kasan_save_alloc_info+0x3b/0x50
[   16.248692]  __kasan_kmalloc+0xb7/0xc0
[   16.249263]  __kmalloc_cache_noprof+0x189/0x420
[   16.249608]  kasan_atomics+0x95/0x310
[   16.249750]  kunit_try_run_case+0x1a5/0x480
[   16.249909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.250086]  kthread+0x337/0x6f0
[   16.250217]  ret_from_fork+0x116/0x1d0
[   16.250489]  ret_from_fork_asm+0x1a/0x30
[   16.250695] 
[   16.250802] The buggy address belongs to the object at ffff8881038e7800
[   16.250802]  which belongs to the cache kmalloc-64 of size 64
[   16.251372] The buggy address is located 0 bytes to the right of
[   16.251372]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.251961] 
[   16.252036] The buggy address belongs to the physical page:
[   16.252284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.252764] flags: 0x200000000000000(node=0|zone=2)
[   16.252959] page_type: f5(slab)
[   16.253171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.253566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.253932] page dumped because: kasan: bad access detected
[   16.254118] 
[   16.254215] Memory state around the buggy address:
[   16.254500]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.254749]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.255041] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.255380]                                      ^
[   16.255687]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.255998]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256299] ==================================================================
[   15.287099] ==================================================================
[   15.287340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.288484] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.289284] 
[   15.289444] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.289726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.289744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.289778] Call Trace:
[   15.289796]  <TASK>
[   15.289812]  dump_stack_lvl+0x73/0xb0
[   15.289845]  print_report+0xd1/0x610
[   15.289867]  ? __virt_addr_valid+0x1db/0x2d0
[   15.289892]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.289915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.289939]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.289963]  kasan_report+0x141/0x180
[   15.289988]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.290017]  kasan_check_range+0x10c/0x1c0
[   15.290042]  __kasan_check_write+0x18/0x20
[   15.290063]  kasan_atomics_helper+0xa2b/0x5450
[   15.290088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.290112]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.290140]  ? kasan_atomics+0x152/0x310
[   15.290167]  kasan_atomics+0x1dc/0x310
[   15.290191]  ? __pfx_kasan_atomics+0x10/0x10
[   15.290217]  ? __pfx_read_tsc+0x10/0x10
[   15.290239]  ? ktime_get_ts64+0x86/0x230
[   15.290264]  kunit_try_run_case+0x1a5/0x480
[   15.290291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.290315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.290390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.290417]  ? __kthread_parkme+0x82/0x180
[   15.290449]  ? preempt_count_sub+0x50/0x80
[   15.290474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.290502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.290529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.290556]  kthread+0x337/0x6f0
[   15.290578]  ? trace_preempt_on+0x20/0xc0
[   15.290602]  ? __pfx_kthread+0x10/0x10
[   15.290625]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.290648]  ? calculate_sigpending+0x7b/0xa0
[   15.290674]  ? __pfx_kthread+0x10/0x10
[   15.290697]  ret_from_fork+0x116/0x1d0
[   15.290717]  ? __pfx_kthread+0x10/0x10
[   15.290740]  ret_from_fork_asm+0x1a/0x30
[   15.290782]  </TASK>
[   15.290794] 
[   15.303061] Allocated by task 282:
[   15.303238]  kasan_save_stack+0x45/0x70
[   15.303644]  kasan_save_track+0x18/0x40
[   15.304009]  kasan_save_alloc_info+0x3b/0x50
[   15.304374]  __kasan_kmalloc+0xb7/0xc0
[   15.304739]  __kmalloc_cache_noprof+0x189/0x420
[   15.305101]  kasan_atomics+0x95/0x310
[   15.305614]  kunit_try_run_case+0x1a5/0x480
[   15.305858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306110]  kthread+0x337/0x6f0
[   15.306276]  ret_from_fork+0x116/0x1d0
[   15.306898]  ret_from_fork_asm+0x1a/0x30
[   15.307080] 
[   15.307349] The buggy address belongs to the object at ffff8881038e7800
[   15.307349]  which belongs to the cache kmalloc-64 of size 64
[   15.308050] The buggy address is located 0 bytes to the right of
[   15.308050]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.308971] 
[   15.309071] The buggy address belongs to the physical page:
[   15.309292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.309887] flags: 0x200000000000000(node=0|zone=2)
[   15.310127] page_type: f5(slab)
[   15.310641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.311151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.311709] page dumped because: kasan: bad access detected
[   15.312072] 
[   15.312176] Memory state around the buggy address:
[   15.312678]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.312989]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.313428] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.313913]                                      ^
[   15.314240]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314878]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.315293] ==================================================================
[   16.305071] ==================================================================
[   16.305724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.306153] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.306392] 
[   16.306525] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.306568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.306581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.306601] Call Trace:
[   16.306615]  <TASK>
[   16.306628]  dump_stack_lvl+0x73/0xb0
[   16.306669]  print_report+0xd1/0x610
[   16.306691]  ? __virt_addr_valid+0x1db/0x2d0
[   16.306728]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.306750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.306785]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.306818]  kasan_report+0x141/0x180
[   16.306841]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.306879]  __asan_report_load8_noabort+0x18/0x20
[   16.306905]  kasan_atomics_helper+0x4fb2/0x5450
[   16.306930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.306954]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.306981]  ? kasan_atomics+0x152/0x310
[   16.307008]  kasan_atomics+0x1dc/0x310
[   16.307032]  ? __pfx_kasan_atomics+0x10/0x10
[   16.307057]  ? __pfx_read_tsc+0x10/0x10
[   16.307079]  ? ktime_get_ts64+0x86/0x230
[   16.307104]  kunit_try_run_case+0x1a5/0x480
[   16.307129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.307155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.307180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.307215]  ? __kthread_parkme+0x82/0x180
[   16.307237]  ? preempt_count_sub+0x50/0x80
[   16.307272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.307299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.307325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.307352]  kthread+0x337/0x6f0
[   16.307372]  ? trace_preempt_on+0x20/0xc0
[   16.307397]  ? __pfx_kthread+0x10/0x10
[   16.307419]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.307451]  ? calculate_sigpending+0x7b/0xa0
[   16.307476]  ? __pfx_kthread+0x10/0x10
[   16.307508]  ret_from_fork+0x116/0x1d0
[   16.307527]  ? __pfx_kthread+0x10/0x10
[   16.307549]  ret_from_fork_asm+0x1a/0x30
[   16.307591]  </TASK>
[   16.307602] 
[   16.315358] Allocated by task 282:
[   16.315584]  kasan_save_stack+0x45/0x70
[   16.315779]  kasan_save_track+0x18/0x40
[   16.315975]  kasan_save_alloc_info+0x3b/0x50
[   16.316198]  __kasan_kmalloc+0xb7/0xc0
[   16.316366]  __kmalloc_cache_noprof+0x189/0x420
[   16.316625]  kasan_atomics+0x95/0x310
[   16.316824]  kunit_try_run_case+0x1a5/0x480
[   16.317008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.317260]  kthread+0x337/0x6f0
[   16.317452]  ret_from_fork+0x116/0x1d0
[   16.317624]  ret_from_fork_asm+0x1a/0x30
[   16.317838] 
[   16.317911] The buggy address belongs to the object at ffff8881038e7800
[   16.317911]  which belongs to the cache kmalloc-64 of size 64
[   16.318424] The buggy address is located 0 bytes to the right of
[   16.318424]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.318952] 
[   16.319025] The buggy address belongs to the physical page:
[   16.319200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.319571] flags: 0x200000000000000(node=0|zone=2)
[   16.319837] page_type: f5(slab)
[   16.319994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.320239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.320770] page dumped because: kasan: bad access detected
[   16.321046] 
[   16.321152] Memory state around the buggy address:
[   16.321338]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.321677]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.321991] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.322300]                                      ^
[   16.322558]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322803]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.323019] ==================================================================
[   15.642843] ==================================================================
[   15.643192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.643481] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.643779] 
[   15.643905] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.643950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.643963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.643985] Call Trace:
[   15.644001]  <TASK>
[   15.644031]  dump_stack_lvl+0x73/0xb0
[   15.644078]  print_report+0xd1/0x610
[   15.644102]  ? __virt_addr_valid+0x1db/0x2d0
[   15.644126]  ? kasan_atomics_helper+0x1217/0x5450
[   15.644150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.644175]  ? kasan_atomics_helper+0x1217/0x5450
[   15.644199]  kasan_report+0x141/0x180
[   15.644222]  ? kasan_atomics_helper+0x1217/0x5450
[   15.644250]  kasan_check_range+0x10c/0x1c0
[   15.644275]  __kasan_check_write+0x18/0x20
[   15.644296]  kasan_atomics_helper+0x1217/0x5450
[   15.644338]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.644363]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.644390]  ? kasan_atomics+0x152/0x310
[   15.644418]  kasan_atomics+0x1dc/0x310
[   15.644459]  ? __pfx_kasan_atomics+0x10/0x10
[   15.644484]  ? __pfx_read_tsc+0x10/0x10
[   15.644507]  ? ktime_get_ts64+0x86/0x230
[   15.644532]  kunit_try_run_case+0x1a5/0x480
[   15.644558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.644608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.644633]  ? __kthread_parkme+0x82/0x180
[   15.644654]  ? preempt_count_sub+0x50/0x80
[   15.644680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.644732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.644767]  kthread+0x337/0x6f0
[   15.644788]  ? trace_preempt_on+0x20/0xc0
[   15.644813]  ? __pfx_kthread+0x10/0x10
[   15.644835]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.644858]  ? calculate_sigpending+0x7b/0xa0
[   15.644883]  ? __pfx_kthread+0x10/0x10
[   15.644906]  ret_from_fork+0x116/0x1d0
[   15.644926]  ? __pfx_kthread+0x10/0x10
[   15.644947]  ret_from_fork_asm+0x1a/0x30
[   15.644979]  </TASK>
[   15.644990] 
[   15.652369] Allocated by task 282:
[   15.652553]  kasan_save_stack+0x45/0x70
[   15.652734]  kasan_save_track+0x18/0x40
[   15.652916]  kasan_save_alloc_info+0x3b/0x50
[   15.653118]  __kasan_kmalloc+0xb7/0xc0
[   15.653276]  __kmalloc_cache_noprof+0x189/0x420
[   15.653520]  kasan_atomics+0x95/0x310
[   15.653667]  kunit_try_run_case+0x1a5/0x480
[   15.653894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.654123]  kthread+0x337/0x6f0
[   15.654285]  ret_from_fork+0x116/0x1d0
[   15.654498]  ret_from_fork_asm+0x1a/0x30
[   15.654660] 
[   15.654767] The buggy address belongs to the object at ffff8881038e7800
[   15.654767]  which belongs to the cache kmalloc-64 of size 64
[   15.655221] The buggy address is located 0 bytes to the right of
[   15.655221]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.655736] 
[   15.655818] The buggy address belongs to the physical page:
[   15.655991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.656232] flags: 0x200000000000000(node=0|zone=2)
[   15.656396] page_type: f5(slab)
[   15.656543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.656786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.657122] page dumped because: kasan: bad access detected
[   15.657373] 
[   15.657495] Memory state around the buggy address:
[   15.657719]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.658054]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.658373] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.658726]                                      ^
[   15.658940]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659159]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659375] ==================================================================
[   15.044140] ==================================================================
[   15.044481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.045377] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.045813] 
[   15.045922] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.045968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.045980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.046002] Call Trace:
[   15.046171]  <TASK>
[   15.046187]  dump_stack_lvl+0x73/0xb0
[   15.046219]  print_report+0xd1/0x610
[   15.046242]  ? __virt_addr_valid+0x1db/0x2d0
[   15.046267]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.046289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.046314]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.046404]  kasan_report+0x141/0x180
[   15.046429]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.046463]  kasan_check_range+0x10c/0x1c0
[   15.046488]  __kasan_check_write+0x18/0x20
[   15.046509]  kasan_atomics_helper+0x4a0/0x5450
[   15.046534]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.046558]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.046585]  ? kasan_atomics+0x152/0x310
[   15.046614]  kasan_atomics+0x1dc/0x310
[   15.046637]  ? __pfx_kasan_atomics+0x10/0x10
[   15.046664]  ? __pfx_read_tsc+0x10/0x10
[   15.046686]  ? ktime_get_ts64+0x86/0x230
[   15.046711]  kunit_try_run_case+0x1a5/0x480
[   15.046737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.046801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.046827]  ? __kthread_parkme+0x82/0x180
[   15.046852]  ? preempt_count_sub+0x50/0x80
[   15.046876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.046957]  kthread+0x337/0x6f0
[   15.046978]  ? trace_preempt_on+0x20/0xc0
[   15.047003]  ? __pfx_kthread+0x10/0x10
[   15.047026]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.047050]  ? calculate_sigpending+0x7b/0xa0
[   15.047075]  ? __pfx_kthread+0x10/0x10
[   15.047099]  ret_from_fork+0x116/0x1d0
[   15.047121]  ? __pfx_kthread+0x10/0x10
[   15.047145]  ret_from_fork_asm+0x1a/0x30
[   15.047177]  </TASK>
[   15.047188] 
[   15.057997] Allocated by task 282:
[   15.058172]  kasan_save_stack+0x45/0x70
[   15.058713]  kasan_save_track+0x18/0x40
[   15.058924]  kasan_save_alloc_info+0x3b/0x50
[   15.059127]  __kasan_kmalloc+0xb7/0xc0
[   15.059600]  __kmalloc_cache_noprof+0x189/0x420
[   15.059798]  kasan_atomics+0x95/0x310
[   15.059995]  kunit_try_run_case+0x1a5/0x480
[   15.060180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.060443]  kthread+0x337/0x6f0
[   15.060928]  ret_from_fork+0x116/0x1d0
[   15.061197]  ret_from_fork_asm+0x1a/0x30
[   15.061352] 
[   15.061691] The buggy address belongs to the object at ffff8881038e7800
[   15.061691]  which belongs to the cache kmalloc-64 of size 64
[   15.062219] The buggy address is located 0 bytes to the right of
[   15.062219]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.062918] 
[   15.063101] The buggy address belongs to the physical page:
[   15.063508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.063866] flags: 0x200000000000000(node=0|zone=2)
[   15.064082] page_type: f5(slab)
[   15.064243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.064878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.065186] page dumped because: kasan: bad access detected
[   15.065718] 
[   15.065929] Memory state around the buggy address:
[   15.066222]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.066691]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.067086] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.067491]                                      ^
[   15.067878]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.068193]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.068610] ==================================================================
[   16.207219] ==================================================================
[   16.207792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.208219] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.208805] 
[   16.209130] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.209185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.209199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.209221] Call Trace:
[   16.209238]  <TASK>
[   16.209256]  dump_stack_lvl+0x73/0xb0
[   16.209322]  print_report+0xd1/0x610
[   16.209346]  ? __virt_addr_valid+0x1db/0x2d0
[   16.209371]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.209394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.209420]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.209457]  kasan_report+0x141/0x180
[   16.209481]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.209510]  __asan_report_load8_noabort+0x18/0x20
[   16.209536]  kasan_atomics_helper+0x4f71/0x5450
[   16.209562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.209586]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.209613]  ? kasan_atomics+0x152/0x310
[   16.209641]  kasan_atomics+0x1dc/0x310
[   16.209665]  ? __pfx_kasan_atomics+0x10/0x10
[   16.209691]  ? __pfx_read_tsc+0x10/0x10
[   16.209713]  ? ktime_get_ts64+0x86/0x230
[   16.209738]  kunit_try_run_case+0x1a5/0x480
[   16.209775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.209800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.209826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.209851]  ? __kthread_parkme+0x82/0x180
[   16.209874]  ? preempt_count_sub+0x50/0x80
[   16.209899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.209925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.209951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.209979]  kthread+0x337/0x6f0
[   16.209999]  ? trace_preempt_on+0x20/0xc0
[   16.210024]  ? __pfx_kthread+0x10/0x10
[   16.210046]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.210069]  ? calculate_sigpending+0x7b/0xa0
[   16.210094]  ? __pfx_kthread+0x10/0x10
[   16.210117]  ret_from_fork+0x116/0x1d0
[   16.210137]  ? __pfx_kthread+0x10/0x10
[   16.210158]  ret_from_fork_asm+0x1a/0x30
[   16.210190]  </TASK>
[   16.210202] 
[   16.221336] Allocated by task 282:
[   16.221712]  kasan_save_stack+0x45/0x70
[   16.222047]  kasan_save_track+0x18/0x40
[   16.222430]  kasan_save_alloc_info+0x3b/0x50
[   16.222874]  __kasan_kmalloc+0xb7/0xc0
[   16.223088]  __kmalloc_cache_noprof+0x189/0x420
[   16.223295]  kasan_atomics+0x95/0x310
[   16.223682]  kunit_try_run_case+0x1a5/0x480
[   16.223948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.224347]  kthread+0x337/0x6f0
[   16.224647]  ret_from_fork+0x116/0x1d0
[   16.224852]  ret_from_fork_asm+0x1a/0x30
[   16.225038] 
[   16.225130] The buggy address belongs to the object at ffff8881038e7800
[   16.225130]  which belongs to the cache kmalloc-64 of size 64
[   16.225946] The buggy address is located 0 bytes to the right of
[   16.225946]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.226828] 
[   16.227057] The buggy address belongs to the physical page:
[   16.227398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.227892] flags: 0x200000000000000(node=0|zone=2)
[   16.228115] page_type: f5(slab)
[   16.228276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.228880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.229487] page dumped because: kasan: bad access detected
[   16.229791] 
[   16.230012] Memory state around the buggy address:
[   16.230339]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.230792]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.231084] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.231369]                                      ^
[   16.231947]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.232460]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.232952] ==================================================================
[   15.763896] ==================================================================
[   15.764219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.764599] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.764950] 
[   15.765057] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.765100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.765114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.765134] Call Trace:
[   15.765148]  <TASK>
[   15.765163]  dump_stack_lvl+0x73/0xb0
[   15.765192]  print_report+0xd1/0x610
[   15.765236]  ? __virt_addr_valid+0x1db/0x2d0
[   15.765260]  ? kasan_atomics_helper+0x1467/0x5450
[   15.765283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.765309]  ? kasan_atomics_helper+0x1467/0x5450
[   15.765333]  kasan_report+0x141/0x180
[   15.765356]  ? kasan_atomics_helper+0x1467/0x5450
[   15.765384]  kasan_check_range+0x10c/0x1c0
[   15.765409]  __kasan_check_write+0x18/0x20
[   15.765458]  kasan_atomics_helper+0x1467/0x5450
[   15.765483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.765507]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.765534]  ? kasan_atomics+0x152/0x310
[   15.765561]  kasan_atomics+0x1dc/0x310
[   15.765586]  ? __pfx_kasan_atomics+0x10/0x10
[   15.765634]  ? __pfx_read_tsc+0x10/0x10
[   15.765657]  ? ktime_get_ts64+0x86/0x230
[   15.765699]  kunit_try_run_case+0x1a5/0x480
[   15.765726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.765750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.765786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.765812]  ? __kthread_parkme+0x82/0x180
[   15.765834]  ? preempt_count_sub+0x50/0x80
[   15.765860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.765886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.765913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.765940]  kthread+0x337/0x6f0
[   15.765961]  ? trace_preempt_on+0x20/0xc0
[   15.765986]  ? __pfx_kthread+0x10/0x10
[   15.766009]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.766033]  ? calculate_sigpending+0x7b/0xa0
[   15.766058]  ? __pfx_kthread+0x10/0x10
[   15.766081]  ret_from_fork+0x116/0x1d0
[   15.766102]  ? __pfx_kthread+0x10/0x10
[   15.766123]  ret_from_fork_asm+0x1a/0x30
[   15.766155]  </TASK>
[   15.766167] 
[   15.774012] Allocated by task 282:
[   15.774209]  kasan_save_stack+0x45/0x70
[   15.774505]  kasan_save_track+0x18/0x40
[   15.774710]  kasan_save_alloc_info+0x3b/0x50
[   15.774936]  __kasan_kmalloc+0xb7/0xc0
[   15.775125]  __kmalloc_cache_noprof+0x189/0x420
[   15.775349]  kasan_atomics+0x95/0x310
[   15.775625]  kunit_try_run_case+0x1a5/0x480
[   15.775881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.776153]  kthread+0x337/0x6f0
[   15.776336]  ret_from_fork+0x116/0x1d0
[   15.776542]  ret_from_fork_asm+0x1a/0x30
[   15.776740] 
[   15.776849] The buggy address belongs to the object at ffff8881038e7800
[   15.776849]  which belongs to the cache kmalloc-64 of size 64
[   15.777301] The buggy address is located 0 bytes to the right of
[   15.777301]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.777742] 
[   15.777874] The buggy address belongs to the physical page:
[   15.778138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.778583] flags: 0x200000000000000(node=0|zone=2)
[   15.778857] page_type: f5(slab)
[   15.779049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.779288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.779638] page dumped because: kasan: bad access detected
[   15.779921] 
[   15.780016] Memory state around the buggy address:
[   15.780234]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.780585]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.780920] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.781167]                                      ^
[   15.781383]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781740]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.782032] ==================================================================
[   15.704908] ==================================================================
[   15.705252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.705647] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.706005] 
[   15.706117] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.706161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.706173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.706195] Call Trace:
[   15.706210]  <TASK>
[   15.706226]  dump_stack_lvl+0x73/0xb0
[   15.706254]  print_report+0xd1/0x610
[   15.706277]  ? __virt_addr_valid+0x1db/0x2d0
[   15.706302]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.706325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.706350]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.706374]  kasan_report+0x141/0x180
[   15.706403]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.706475]  __asan_report_load4_noabort+0x18/0x20
[   15.706503]  kasan_atomics_helper+0x49ce/0x5450
[   15.706527]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.706569]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.706596]  ? kasan_atomics+0x152/0x310
[   15.706641]  kasan_atomics+0x1dc/0x310
[   15.706666]  ? __pfx_kasan_atomics+0x10/0x10
[   15.706691]  ? __pfx_read_tsc+0x10/0x10
[   15.706713]  ? ktime_get_ts64+0x86/0x230
[   15.706738]  kunit_try_run_case+0x1a5/0x480
[   15.706773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.706797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.706823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.706849]  ? __kthread_parkme+0x82/0x180
[   15.706870]  ? preempt_count_sub+0x50/0x80
[   15.706896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.706922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.706948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.706975]  kthread+0x337/0x6f0
[   15.706995]  ? trace_preempt_on+0x20/0xc0
[   15.707038]  ? __pfx_kthread+0x10/0x10
[   15.707060]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.707083]  ? calculate_sigpending+0x7b/0xa0
[   15.707109]  ? __pfx_kthread+0x10/0x10
[   15.707131]  ret_from_fork+0x116/0x1d0
[   15.707151]  ? __pfx_kthread+0x10/0x10
[   15.707172]  ret_from_fork_asm+0x1a/0x30
[   15.707204]  </TASK>
[   15.707215] 
[   15.714748] Allocated by task 282:
[   15.714935]  kasan_save_stack+0x45/0x70
[   15.715156]  kasan_save_track+0x18/0x40
[   15.715351]  kasan_save_alloc_info+0x3b/0x50
[   15.715595]  __kasan_kmalloc+0xb7/0xc0
[   15.715787]  __kmalloc_cache_noprof+0x189/0x420
[   15.716000]  kasan_atomics+0x95/0x310
[   15.716208]  kunit_try_run_case+0x1a5/0x480
[   15.716415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.716705]  kthread+0x337/0x6f0
[   15.716876]  ret_from_fork+0x116/0x1d0
[   15.717095]  ret_from_fork_asm+0x1a/0x30
[   15.717328] 
[   15.717467] The buggy address belongs to the object at ffff8881038e7800
[   15.717467]  which belongs to the cache kmalloc-64 of size 64
[   15.718017] The buggy address is located 0 bytes to the right of
[   15.718017]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.718484] 
[   15.718559] The buggy address belongs to the physical page:
[   15.718734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.719098] flags: 0x200000000000000(node=0|zone=2)
[   15.719355] page_type: f5(slab)
[   15.719585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.719990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.720361] page dumped because: kasan: bad access detected
[   15.720592] 
[   15.720663] Memory state around the buggy address:
[   15.720831]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.721175]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.721536] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.721904]                                      ^
[   15.722065]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.722366]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.722735] ==================================================================
[   15.019254] ==================================================================
[   15.019665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.020056] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.020622] 
[   15.020728] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.020786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.020801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.020824] Call Trace:
[   15.020840]  <TASK>
[   15.020857]  dump_stack_lvl+0x73/0xb0
[   15.020888]  print_report+0xd1/0x610
[   15.020913]  ? __virt_addr_valid+0x1db/0x2d0
[   15.020939]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.020966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.020991]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.021015]  kasan_report+0x141/0x180
[   15.021040]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.021069]  __asan_report_load4_noabort+0x18/0x20
[   15.021096]  kasan_atomics_helper+0x4b54/0x5450
[   15.021121]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.021145]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.021172]  ? kasan_atomics+0x152/0x310
[   15.021202]  kasan_atomics+0x1dc/0x310
[   15.021227]  ? __pfx_kasan_atomics+0x10/0x10
[   15.021252]  ? __pfx_read_tsc+0x10/0x10
[   15.021274]  ? ktime_get_ts64+0x86/0x230
[   15.021299]  kunit_try_run_case+0x1a5/0x480
[   15.021325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.021837]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.021867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.021892]  ? __kthread_parkme+0x82/0x180
[   15.021914]  ? preempt_count_sub+0x50/0x80
[   15.021940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.021965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.021993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.022019]  kthread+0x337/0x6f0
[   15.022040]  ? trace_preempt_on+0x20/0xc0
[   15.022065]  ? __pfx_kthread+0x10/0x10
[   15.022086]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.022110]  ? calculate_sigpending+0x7b/0xa0
[   15.022136]  ? __pfx_kthread+0x10/0x10
[   15.022159]  ret_from_fork+0x116/0x1d0
[   15.022179]  ? __pfx_kthread+0x10/0x10
[   15.022201]  ret_from_fork_asm+0x1a/0x30
[   15.022233]  </TASK>
[   15.022243] 
[   15.032496] Allocated by task 282:
[   15.033108]  kasan_save_stack+0x45/0x70
[   15.033318]  kasan_save_track+0x18/0x40
[   15.033555]  kasan_save_alloc_info+0x3b/0x50
[   15.033909]  __kasan_kmalloc+0xb7/0xc0
[   15.034178]  __kmalloc_cache_noprof+0x189/0x420
[   15.034670]  kasan_atomics+0x95/0x310
[   15.034884]  kunit_try_run_case+0x1a5/0x480
[   15.035066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.035535]  kthread+0x337/0x6f0
[   15.035806]  ret_from_fork+0x116/0x1d0
[   15.036076]  ret_from_fork_asm+0x1a/0x30
[   15.036378] 
[   15.036485] The buggy address belongs to the object at ffff8881038e7800
[   15.036485]  which belongs to the cache kmalloc-64 of size 64
[   15.037111] The buggy address is located 0 bytes to the right of
[   15.037111]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.037834] 
[   15.037935] The buggy address belongs to the physical page:
[   15.038167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.038771] flags: 0x200000000000000(node=0|zone=2)
[   15.039072] page_type: f5(slab)
[   15.039204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.039988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.040308] page dumped because: kasan: bad access detected
[   15.040634] 
[   15.040737] Memory state around the buggy address:
[   15.040959]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.041264]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.041929] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.042190]                                      ^
[   15.042643]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043080]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043575] ==================================================================
[   15.127022] ==================================================================
[   15.127347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.127672] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.127912] 
[   15.127996] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.128039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.128051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.128072] Call Trace:
[   15.128085]  <TASK>
[   15.128098]  dump_stack_lvl+0x73/0xb0
[   15.128127]  print_report+0xd1/0x610
[   15.128150]  ? __virt_addr_valid+0x1db/0x2d0
[   15.128174]  ? kasan_atomics_helper+0x697/0x5450
[   15.128197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.128222]  ? kasan_atomics_helper+0x697/0x5450
[   15.128246]  kasan_report+0x141/0x180
[   15.128270]  ? kasan_atomics_helper+0x697/0x5450
[   15.128297]  kasan_check_range+0x10c/0x1c0
[   15.128323]  __kasan_check_write+0x18/0x20
[   15.128390]  kasan_atomics_helper+0x697/0x5450
[   15.128415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.128440]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.128467]  ? kasan_atomics+0x152/0x310
[   15.128495]  kasan_atomics+0x1dc/0x310
[   15.128520]  ? __pfx_kasan_atomics+0x10/0x10
[   15.128546]  ? __pfx_read_tsc+0x10/0x10
[   15.128567]  ? ktime_get_ts64+0x86/0x230
[   15.128593]  kunit_try_run_case+0x1a5/0x480
[   15.128619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.128670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.128695]  ? __kthread_parkme+0x82/0x180
[   15.128717]  ? preempt_count_sub+0x50/0x80
[   15.128741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.128835]  kthread+0x337/0x6f0
[   15.128856]  ? trace_preempt_on+0x20/0xc0
[   15.128879]  ? __pfx_kthread+0x10/0x10
[   15.128902]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.128925]  ? calculate_sigpending+0x7b/0xa0
[   15.128951]  ? __pfx_kthread+0x10/0x10
[   15.128973]  ret_from_fork+0x116/0x1d0
[   15.128993]  ? __pfx_kthread+0x10/0x10
[   15.129014]  ret_from_fork_asm+0x1a/0x30
[   15.129046]  </TASK>
[   15.129057] 
[   15.137584] Allocated by task 282:
[   15.137722]  kasan_save_stack+0x45/0x70
[   15.138043]  kasan_save_track+0x18/0x40
[   15.138246]  kasan_save_alloc_info+0x3b/0x50
[   15.138767]  __kasan_kmalloc+0xb7/0xc0
[   15.138915]  __kmalloc_cache_noprof+0x189/0x420
[   15.139074]  kasan_atomics+0x95/0x310
[   15.139208]  kunit_try_run_case+0x1a5/0x480
[   15.139356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.139533]  kthread+0x337/0x6f0
[   15.139654]  ret_from_fork+0x116/0x1d0
[   15.139889]  ret_from_fork_asm+0x1a/0x30
[   15.140234] 
[   15.140368] The buggy address belongs to the object at ffff8881038e7800
[   15.140368]  which belongs to the cache kmalloc-64 of size 64
[   15.140915] The buggy address is located 0 bytes to the right of
[   15.140915]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.144647] 
[   15.145255] The buggy address belongs to the physical page:
[   15.146083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.146985] flags: 0x200000000000000(node=0|zone=2)
[   15.147460] page_type: f5(slab)
[   15.147869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.148105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.148335] page dumped because: kasan: bad access detected
[   15.148688] 
[   15.149660] Memory state around the buggy address:
[   15.149874]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.150096]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.150314] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.151652]                                      ^
[   15.151894]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.152360]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153009] ==================================================================
[   15.801175] ==================================================================
[   15.801597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.801924] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.802232] 
[   15.802354] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.802405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.802417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.802477] Call Trace:
[   15.802491]  <TASK>
[   15.802505]  dump_stack_lvl+0x73/0xb0
[   15.802534]  print_report+0xd1/0x610
[   15.802576]  ? __virt_addr_valid+0x1db/0x2d0
[   15.802600]  ? kasan_atomics_helper+0x151d/0x5450
[   15.802623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.802648]  ? kasan_atomics_helper+0x151d/0x5450
[   15.802672]  kasan_report+0x141/0x180
[   15.802696]  ? kasan_atomics_helper+0x151d/0x5450
[   15.802741]  kasan_check_range+0x10c/0x1c0
[   15.802776]  __kasan_check_write+0x18/0x20
[   15.802798]  kasan_atomics_helper+0x151d/0x5450
[   15.802822]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.802848]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.802892]  ? kasan_atomics+0x152/0x310
[   15.802921]  kasan_atomics+0x1dc/0x310
[   15.802945]  ? __pfx_kasan_atomics+0x10/0x10
[   15.802971]  ? __pfx_read_tsc+0x10/0x10
[   15.802993]  ? ktime_get_ts64+0x86/0x230
[   15.803019]  kunit_try_run_case+0x1a5/0x480
[   15.803045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.803069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.803095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.803121]  ? __kthread_parkme+0x82/0x180
[   15.803142]  ? preempt_count_sub+0x50/0x80
[   15.803168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.803210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.803237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.803291]  kthread+0x337/0x6f0
[   15.803326]  ? trace_preempt_on+0x20/0xc0
[   15.803365]  ? __pfx_kthread+0x10/0x10
[   15.803401]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.803470]  ? calculate_sigpending+0x7b/0xa0
[   15.803510]  ? __pfx_kthread+0x10/0x10
[   15.803533]  ret_from_fork+0x116/0x1d0
[   15.803554]  ? __pfx_kthread+0x10/0x10
[   15.803576]  ret_from_fork_asm+0x1a/0x30
[   15.803608]  </TASK>
[   15.803619] 
[   15.811498] Allocated by task 282:
[   15.811703]  kasan_save_stack+0x45/0x70
[   15.811935]  kasan_save_track+0x18/0x40
[   15.812092]  kasan_save_alloc_info+0x3b/0x50
[   15.812242]  __kasan_kmalloc+0xb7/0xc0
[   15.812398]  __kmalloc_cache_noprof+0x189/0x420
[   15.812656]  kasan_atomics+0x95/0x310
[   15.812897]  kunit_try_run_case+0x1a5/0x480
[   15.813096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.813347]  kthread+0x337/0x6f0
[   15.813512]  ret_from_fork+0x116/0x1d0
[   15.813688]  ret_from_fork_asm+0x1a/0x30
[   15.813922] 
[   15.814035] The buggy address belongs to the object at ffff8881038e7800
[   15.814035]  which belongs to the cache kmalloc-64 of size 64
[   15.814557] The buggy address is located 0 bytes to the right of
[   15.814557]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.815080] 
[   15.815174] The buggy address belongs to the physical page:
[   15.815436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.815836] flags: 0x200000000000000(node=0|zone=2)
[   15.816071] page_type: f5(slab)
[   15.816239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.816525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.816762] page dumped because: kasan: bad access detected
[   15.817002] 
[   15.817097] Memory state around the buggy address:
[   15.817344]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.817721]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.818048] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.818388]                                      ^
[   15.818650]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.818965]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819237] ==================================================================
[   15.839017] ==================================================================
[   15.839255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.839678] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.840068] 
[   15.840197] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.840254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.840267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.840288] Call Trace:
[   15.840302]  <TASK>
[   15.840316]  dump_stack_lvl+0x73/0xb0
[   15.840345]  print_report+0xd1/0x610
[   15.840368]  ? __virt_addr_valid+0x1db/0x2d0
[   15.840392]  ? kasan_atomics_helper+0x164f/0x5450
[   15.840414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.840461]  ? kasan_atomics_helper+0x164f/0x5450
[   15.840485]  kasan_report+0x141/0x180
[   15.840508]  ? kasan_atomics_helper+0x164f/0x5450
[   15.840555]  kasan_check_range+0x10c/0x1c0
[   15.840582]  __kasan_check_write+0x18/0x20
[   15.840602]  kasan_atomics_helper+0x164f/0x5450
[   15.840626]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.840652]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.840679]  ? kasan_atomics+0x152/0x310
[   15.840707]  kasan_atomics+0x1dc/0x310
[   15.840731]  ? __pfx_kasan_atomics+0x10/0x10
[   15.840767]  ? __pfx_read_tsc+0x10/0x10
[   15.840791]  ? ktime_get_ts64+0x86/0x230
[   15.840817]  kunit_try_run_case+0x1a5/0x480
[   15.840843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.840912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.840939]  ? __kthread_parkme+0x82/0x180
[   15.840961]  ? preempt_count_sub+0x50/0x80
[   15.841003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.841029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.841056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.841100]  kthread+0x337/0x6f0
[   15.841121]  ? trace_preempt_on+0x20/0xc0
[   15.841146]  ? __pfx_kthread+0x10/0x10
[   15.841168]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.841192]  ? calculate_sigpending+0x7b/0xa0
[   15.841217]  ? __pfx_kthread+0x10/0x10
[   15.841240]  ret_from_fork+0x116/0x1d0
[   15.841260]  ? __pfx_kthread+0x10/0x10
[   15.841299]  ret_from_fork_asm+0x1a/0x30
[   15.841331]  </TASK>
[   15.841342] 
[   15.850492] Allocated by task 282:
[   15.850666]  kasan_save_stack+0x45/0x70
[   15.850911]  kasan_save_track+0x18/0x40
[   15.851109]  kasan_save_alloc_info+0x3b/0x50
[   15.851301]  __kasan_kmalloc+0xb7/0xc0
[   15.851529]  __kmalloc_cache_noprof+0x189/0x420
[   15.851769]  kasan_atomics+0x95/0x310
[   15.851974]  kunit_try_run_case+0x1a5/0x480
[   15.852178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.852504]  kthread+0x337/0x6f0
[   15.852681]  ret_from_fork+0x116/0x1d0
[   15.852885]  ret_from_fork_asm+0x1a/0x30
[   15.853084] 
[   15.853179] The buggy address belongs to the object at ffff8881038e7800
[   15.853179]  which belongs to the cache kmalloc-64 of size 64
[   15.853621] The buggy address is located 0 bytes to the right of
[   15.853621]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.854203] 
[   15.854301] The buggy address belongs to the physical page:
[   15.854572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.854916] flags: 0x200000000000000(node=0|zone=2)
[   15.855133] page_type: f5(slab)
[   15.855325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.855681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.856015] page dumped because: kasan: bad access detected
[   15.856262] 
[   15.856361] Memory state around the buggy address:
[   15.856619]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.856950]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.857273] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.857649]                                      ^
[   15.857889]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.858183]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.858400] ==================================================================
[   14.918777] ==================================================================
[   14.919587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.919932] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   14.920227] 
[   14.920317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.920362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.920373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.920394] Call Trace:
[   14.920406]  <TASK>
[   14.920422]  dump_stack_lvl+0x73/0xb0
[   14.920521]  print_report+0xd1/0x610
[   14.920545]  ? __virt_addr_valid+0x1db/0x2d0
[   14.920569]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.920591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.920616]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.920639]  kasan_report+0x141/0x180
[   14.920661]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.920688]  __asan_report_load4_noabort+0x18/0x20
[   14.920714]  kasan_atomics_helper+0x4bbc/0x5450
[   14.920736]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.920770]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.920798]  ? kasan_atomics+0x152/0x310
[   14.920824]  kasan_atomics+0x1dc/0x310
[   14.920847]  ? __pfx_kasan_atomics+0x10/0x10
[   14.920872]  ? __pfx_read_tsc+0x10/0x10
[   14.920894]  ? ktime_get_ts64+0x86/0x230
[   14.920920]  kunit_try_run_case+0x1a5/0x480
[   14.920945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.920996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.921021]  ? __kthread_parkme+0x82/0x180
[   14.921042]  ? preempt_count_sub+0x50/0x80
[   14.921067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.921092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.921118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.921144]  kthread+0x337/0x6f0
[   14.921163]  ? trace_preempt_on+0x20/0xc0
[   14.921188]  ? __pfx_kthread+0x10/0x10
[   14.921209]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.921231]  ? calculate_sigpending+0x7b/0xa0
[   14.921257]  ? __pfx_kthread+0x10/0x10
[   14.921279]  ret_from_fork+0x116/0x1d0
[   14.921298]  ? __pfx_kthread+0x10/0x10
[   14.921319]  ret_from_fork_asm+0x1a/0x30
[   14.921399]  </TASK>
[   14.921410] 
[   14.931543] Allocated by task 282:
[   14.931884]  kasan_save_stack+0x45/0x70
[   14.932068]  kasan_save_track+0x18/0x40
[   14.932257]  kasan_save_alloc_info+0x3b/0x50
[   14.932809]  __kasan_kmalloc+0xb7/0xc0
[   14.933003]  __kmalloc_cache_noprof+0x189/0x420
[   14.933181]  kasan_atomics+0x95/0x310
[   14.933374]  kunit_try_run_case+0x1a5/0x480
[   14.933801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.934067]  kthread+0x337/0x6f0
[   14.934230]  ret_from_fork+0x116/0x1d0
[   14.934698]  ret_from_fork_asm+0x1a/0x30
[   14.934922] 
[   14.935002] The buggy address belongs to the object at ffff8881038e7800
[   14.935002]  which belongs to the cache kmalloc-64 of size 64
[   14.935690] The buggy address is located 0 bytes to the right of
[   14.935690]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   14.936196] 
[   14.936300] The buggy address belongs to the physical page:
[   14.936921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   14.937293] flags: 0x200000000000000(node=0|zone=2)
[   14.937644] page_type: f5(slab)
[   14.937795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.938126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.938467] page dumped because: kasan: bad access detected
[   14.939096] 
[   14.939175] Memory state around the buggy address:
[   14.939502]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.939859]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.940154] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.940432]                                      ^
[   14.940741]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.941079]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.941383] ==================================================================
[   14.980095] ==================================================================
[   14.980692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.980951] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   14.981279] 
[   14.981382] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.981423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.981434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.981454] Call Trace:
[   14.981468]  <TASK>
[   14.981481]  dump_stack_lvl+0x73/0xb0
[   14.981510]  print_report+0xd1/0x610
[   14.981531]  ? __virt_addr_valid+0x1db/0x2d0
[   14.981553]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.981575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.981598]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.981621]  kasan_report+0x141/0x180
[   14.981716]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.981864]  __asan_report_store4_noabort+0x1b/0x30
[   14.981893]  kasan_atomics_helper+0x4b6e/0x5450
[   14.981935]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.981959]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.981985]  ? kasan_atomics+0x152/0x310
[   14.982014]  kasan_atomics+0x1dc/0x310
[   14.982039]  ? __pfx_kasan_atomics+0x10/0x10
[   14.982064]  ? __pfx_read_tsc+0x10/0x10
[   14.982087]  ? ktime_get_ts64+0x86/0x230
[   14.982112]  kunit_try_run_case+0x1a5/0x480
[   14.982138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.982163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.982189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.982215]  ? __kthread_parkme+0x82/0x180
[   14.982237]  ? preempt_count_sub+0x50/0x80
[   14.982263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.982290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.982317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.982359]  kthread+0x337/0x6f0
[   14.982380]  ? trace_preempt_on+0x20/0xc0
[   14.982412]  ? __pfx_kthread+0x10/0x10
[   14.982434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.982504]  ? calculate_sigpending+0x7b/0xa0
[   14.982529]  ? __pfx_kthread+0x10/0x10
[   14.982552]  ret_from_fork+0x116/0x1d0
[   14.982572]  ? __pfx_kthread+0x10/0x10
[   14.982595]  ret_from_fork_asm+0x1a/0x30
[   14.982627]  </TASK>
[   14.982638] 
[   14.990377] Allocated by task 282:
[   14.990562]  kasan_save_stack+0x45/0x70
[   14.990790]  kasan_save_track+0x18/0x40
[   14.990997]  kasan_save_alloc_info+0x3b/0x50
[   14.991213]  __kasan_kmalloc+0xb7/0xc0
[   14.991405]  __kmalloc_cache_noprof+0x189/0x420
[   14.991614]  kasan_atomics+0x95/0x310
[   14.991851]  kunit_try_run_case+0x1a5/0x480
[   14.992026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992284]  kthread+0x337/0x6f0
[   14.992518]  ret_from_fork+0x116/0x1d0
[   14.992657]  ret_from_fork_asm+0x1a/0x30
[   14.992810] 
[   14.992882] The buggy address belongs to the object at ffff8881038e7800
[   14.992882]  which belongs to the cache kmalloc-64 of size 64
[   14.993684] The buggy address is located 0 bytes to the right of
[   14.993684]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   14.994086] 
[   14.994160] The buggy address belongs to the physical page:
[   14.994363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   14.994803] flags: 0x200000000000000(node=0|zone=2)
[   14.995061] page_type: f5(slab)
[   14.995234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.995773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.996005] page dumped because: kasan: bad access detected
[   14.996179] 
[   14.996249] Memory state around the buggy address:
[   14.996691]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.997039]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.997363] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.997880]                                      ^
[   14.998102]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998410]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998805] ==================================================================
[   15.259947] ==================================================================
[   15.260280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.260813] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.261564] 
[   15.261891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.261940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.261954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.261975] Call Trace:
[   15.261991]  <TASK>
[   15.262008]  dump_stack_lvl+0x73/0xb0
[   15.262040]  print_report+0xd1/0x610
[   15.262064]  ? __virt_addr_valid+0x1db/0x2d0
[   15.262088]  ? kasan_atomics_helper+0x992/0x5450
[   15.262111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.262136]  ? kasan_atomics_helper+0x992/0x5450
[   15.262159]  kasan_report+0x141/0x180
[   15.262183]  ? kasan_atomics_helper+0x992/0x5450
[   15.262211]  kasan_check_range+0x10c/0x1c0
[   15.262236]  __kasan_check_write+0x18/0x20
[   15.262258]  kasan_atomics_helper+0x992/0x5450
[   15.262283]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.262311]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.262605]  ? kasan_atomics+0x152/0x310
[   15.262638]  kasan_atomics+0x1dc/0x310
[   15.262665]  ? __pfx_kasan_atomics+0x10/0x10
[   15.262691]  ? __pfx_read_tsc+0x10/0x10
[   15.262714]  ? ktime_get_ts64+0x86/0x230
[   15.262741]  kunit_try_run_case+0x1a5/0x480
[   15.262778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.262829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.262855]  ? __kthread_parkme+0x82/0x180
[   15.262876]  ? preempt_count_sub+0x50/0x80
[   15.262901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.262953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.262980]  kthread+0x337/0x6f0
[   15.263001]  ? trace_preempt_on+0x20/0xc0
[   15.263025]  ? __pfx_kthread+0x10/0x10
[   15.263048]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.263071]  ? calculate_sigpending+0x7b/0xa0
[   15.263096]  ? __pfx_kthread+0x10/0x10
[   15.263119]  ret_from_fork+0x116/0x1d0
[   15.263139]  ? __pfx_kthread+0x10/0x10
[   15.263162]  ret_from_fork_asm+0x1a/0x30
[   15.263197]  </TASK>
[   15.263209] 
[   15.276034] Allocated by task 282:
[   15.276221]  kasan_save_stack+0x45/0x70
[   15.276454]  kasan_save_track+0x18/0x40
[   15.277104]  kasan_save_alloc_info+0x3b/0x50
[   15.277458]  __kasan_kmalloc+0xb7/0xc0
[   15.277855]  __kmalloc_cache_noprof+0x189/0x420
[   15.278206]  kasan_atomics+0x95/0x310
[   15.278621]  kunit_try_run_case+0x1a5/0x480
[   15.279009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.279448]  kthread+0x337/0x6f0
[   15.279640]  ret_from_fork+0x116/0x1d0
[   15.279847]  ret_from_fork_asm+0x1a/0x30
[   15.280039] 
[   15.280129] The buggy address belongs to the object at ffff8881038e7800
[   15.280129]  which belongs to the cache kmalloc-64 of size 64
[   15.281168] The buggy address is located 0 bytes to the right of
[   15.281168]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.282164] 
[   15.282511] The buggy address belongs to the physical page:
[   15.282773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.283237] flags: 0x200000000000000(node=0|zone=2)
[   15.283623] page_type: f5(slab)
[   15.283767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.283998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.284220] page dumped because: kasan: bad access detected
[   15.284388] 
[   15.284457] Memory state around the buggy address:
[   15.284609]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.285366]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.285749] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.285995]                                      ^
[   15.286153]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.286367]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.286586] ==================================================================
[   15.564857] ==================================================================
[   15.565173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.565791] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.566127] 
[   15.566226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.566270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.566283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.566303] Call Trace:
[   15.566319]  <TASK>
[   15.566335]  dump_stack_lvl+0x73/0xb0
[   15.566365]  print_report+0xd1/0x610
[   15.566394]  ? __virt_addr_valid+0x1db/0x2d0
[   15.566419]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.566776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.566804]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.566828]  kasan_report+0x141/0x180
[   15.566852]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.566881]  __asan_report_load4_noabort+0x18/0x20
[   15.566908]  kasan_atomics_helper+0x4a1c/0x5450
[   15.566933]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.566957]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.566984]  ? kasan_atomics+0x152/0x310
[   15.567014]  kasan_atomics+0x1dc/0x310
[   15.567038]  ? __pfx_kasan_atomics+0x10/0x10
[   15.567064]  ? __pfx_read_tsc+0x10/0x10
[   15.567086]  ? ktime_get_ts64+0x86/0x230
[   15.567112]  kunit_try_run_case+0x1a5/0x480
[   15.567137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.567162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.567187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.567214]  ? __kthread_parkme+0x82/0x180
[   15.567235]  ? preempt_count_sub+0x50/0x80
[   15.567260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.567286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.567313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.567340]  kthread+0x337/0x6f0
[   15.567361]  ? trace_preempt_on+0x20/0xc0
[   15.567386]  ? __pfx_kthread+0x10/0x10
[   15.567408]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.567454]  ? calculate_sigpending+0x7b/0xa0
[   15.567480]  ? __pfx_kthread+0x10/0x10
[   15.567503]  ret_from_fork+0x116/0x1d0
[   15.567523]  ? __pfx_kthread+0x10/0x10
[   15.567546]  ret_from_fork_asm+0x1a/0x30
[   15.567578]  </TASK>
[   15.567589] 
[   15.579062] Allocated by task 282:
[   15.579227]  kasan_save_stack+0x45/0x70
[   15.579709]  kasan_save_track+0x18/0x40
[   15.579922]  kasan_save_alloc_info+0x3b/0x50
[   15.580234]  __kasan_kmalloc+0xb7/0xc0
[   15.580582]  __kmalloc_cache_noprof+0x189/0x420
[   15.580974]  kasan_atomics+0x95/0x310
[   15.581282]  kunit_try_run_case+0x1a5/0x480
[   15.581636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.582046]  kthread+0x337/0x6f0
[   15.582353]  ret_from_fork+0x116/0x1d0
[   15.582710]  ret_from_fork_asm+0x1a/0x30
[   15.582911] 
[   15.583010] The buggy address belongs to the object at ffff8881038e7800
[   15.583010]  which belongs to the cache kmalloc-64 of size 64
[   15.583844] The buggy address is located 0 bytes to the right of
[   15.583844]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.584530] 
[   15.584771] The buggy address belongs to the physical page:
[   15.585168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.585627] flags: 0x200000000000000(node=0|zone=2)
[   15.585998] page_type: f5(slab)
[   15.586282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.586777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.587070] page dumped because: kasan: bad access detected
[   15.587332] 
[   15.587691] Memory state around the buggy address:
[   15.587932]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.588338]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.588821] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.589263]                                      ^
[   15.589646]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.590102]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.590564] ==================================================================
[   15.186898] ==================================================================
[   15.187201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.187816] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.188556] 
[   15.188794] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.188845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.188857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.188880] Call Trace:
[   15.188898]  <TASK>
[   15.188916]  dump_stack_lvl+0x73/0xb0
[   15.188949]  print_report+0xd1/0x610
[   15.188996]  ? __virt_addr_valid+0x1db/0x2d0
[   15.189022]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.189046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.189071]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.189095]  kasan_report+0x141/0x180
[   15.189119]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.189147]  kasan_check_range+0x10c/0x1c0
[   15.189172]  __kasan_check_write+0x18/0x20
[   15.189193]  kasan_atomics_helper+0x7c7/0x5450
[   15.189218]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.189242]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.189269]  ? kasan_atomics+0x152/0x310
[   15.189297]  kasan_atomics+0x1dc/0x310
[   15.189321]  ? __pfx_kasan_atomics+0x10/0x10
[   15.189358]  ? __pfx_read_tsc+0x10/0x10
[   15.189381]  ? ktime_get_ts64+0x86/0x230
[   15.189408]  kunit_try_run_case+0x1a5/0x480
[   15.189434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.189509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.189536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.189563]  ? __kthread_parkme+0x82/0x180
[   15.189584]  ? preempt_count_sub+0x50/0x80
[   15.189609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.189635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.189662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.189690]  kthread+0x337/0x6f0
[   15.189710]  ? trace_preempt_on+0x20/0xc0
[   15.189734]  ? __pfx_kthread+0x10/0x10
[   15.189767]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.189790]  ? calculate_sigpending+0x7b/0xa0
[   15.189815]  ? __pfx_kthread+0x10/0x10
[   15.189838]  ret_from_fork+0x116/0x1d0
[   15.189859]  ? __pfx_kthread+0x10/0x10
[   15.189880]  ret_from_fork_asm+0x1a/0x30
[   15.189911]  </TASK>
[   15.189922] 
[   15.198671] Allocated by task 282:
[   15.198819]  kasan_save_stack+0x45/0x70
[   15.198969]  kasan_save_track+0x18/0x40
[   15.199105]  kasan_save_alloc_info+0x3b/0x50
[   15.199368]  __kasan_kmalloc+0xb7/0xc0
[   15.199660]  __kmalloc_cache_noprof+0x189/0x420
[   15.199906]  kasan_atomics+0x95/0x310
[   15.200113]  kunit_try_run_case+0x1a5/0x480
[   15.200540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.200787]  kthread+0x337/0x6f0
[   15.200959]  ret_from_fork+0x116/0x1d0
[   15.201149]  ret_from_fork_asm+0x1a/0x30
[   15.201348] 
[   15.201432] The buggy address belongs to the object at ffff8881038e7800
[   15.201432]  which belongs to the cache kmalloc-64 of size 64
[   15.201785] The buggy address is located 0 bytes to the right of
[   15.201785]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.202730] 
[   15.202809] The buggy address belongs to the physical page:
[   15.202974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.203204] flags: 0x200000000000000(node=0|zone=2)
[   15.203709] page_type: f5(slab)
[   15.203898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.204270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.204646] page dumped because: kasan: bad access detected
[   15.204823] 
[   15.205064] Memory state around the buggy address:
[   15.205292]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.205793]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.206137] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.206349]                                      ^
[   15.206580]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.206943]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207278] ==================================================================
[   15.231136] ==================================================================
[   15.231416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.232246] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.232636] 
[   15.232871] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.232918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.232931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.232953] Call Trace:
[   15.232969]  <TASK>
[   15.232983]  dump_stack_lvl+0x73/0xb0
[   15.233015]  print_report+0xd1/0x610
[   15.233038]  ? __virt_addr_valid+0x1db/0x2d0
[   15.233062]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.233085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.233110]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.233133]  kasan_report+0x141/0x180
[   15.233157]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.233184]  kasan_check_range+0x10c/0x1c0
[   15.233210]  __kasan_check_write+0x18/0x20
[   15.233231]  kasan_atomics_helper+0x8f9/0x5450
[   15.233256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.233280]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.233422]  ? kasan_atomics+0x152/0x310
[   15.233466]  kasan_atomics+0x1dc/0x310
[   15.233491]  ? __pfx_kasan_atomics+0x10/0x10
[   15.233517]  ? __pfx_read_tsc+0x10/0x10
[   15.233540]  ? ktime_get_ts64+0x86/0x230
[   15.233565]  kunit_try_run_case+0x1a5/0x480
[   15.233591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.233616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.233641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.233666]  ? __kthread_parkme+0x82/0x180
[   15.233688]  ? preempt_count_sub+0x50/0x80
[   15.233714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.233740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.233777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.233805]  kthread+0x337/0x6f0
[   15.233826]  ? trace_preempt_on+0x20/0xc0
[   15.233851]  ? __pfx_kthread+0x10/0x10
[   15.233873]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.233897]  ? calculate_sigpending+0x7b/0xa0
[   15.233923]  ? __pfx_kthread+0x10/0x10
[   15.233945]  ret_from_fork+0x116/0x1d0
[   15.233966]  ? __pfx_kthread+0x10/0x10
[   15.233988]  ret_from_fork_asm+0x1a/0x30
[   15.234020]  </TASK>
[   15.234032] 
[   15.245870] Allocated by task 282:
[   15.246067]  kasan_save_stack+0x45/0x70
[   15.246258]  kasan_save_track+0x18/0x40
[   15.247007]  kasan_save_alloc_info+0x3b/0x50
[   15.247227]  __kasan_kmalloc+0xb7/0xc0
[   15.247560]  __kmalloc_cache_noprof+0x189/0x420
[   15.248204]  kasan_atomics+0x95/0x310
[   15.248477]  kunit_try_run_case+0x1a5/0x480
[   15.248810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249241]  kthread+0x337/0x6f0
[   15.249582]  ret_from_fork+0x116/0x1d0
[   15.249793]  ret_from_fork_asm+0x1a/0x30
[   15.249990] 
[   15.250080] The buggy address belongs to the object at ffff8881038e7800
[   15.250080]  which belongs to the cache kmalloc-64 of size 64
[   15.251003] The buggy address is located 0 bytes to the right of
[   15.251003]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.251864] 
[   15.251978] The buggy address belongs to the physical page:
[   15.252530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.253035] flags: 0x200000000000000(node=0|zone=2)
[   15.253445] page_type: f5(slab)
[   15.253806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.254279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.254821] page dumped because: kasan: bad access detected
[   15.255215] 
[   15.255479] Memory state around the buggy address:
[   15.255924]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.256714]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.257035] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.257584]                                      ^
[   15.257893]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.258224]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.258845] ==================================================================
[   16.283332] ==================================================================
[   16.284032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.284820] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.285469] 
[   16.285673] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.285717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.285730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.285752] Call Trace:
[   16.285780]  <TASK>
[   16.285799]  dump_stack_lvl+0x73/0xb0
[   16.285828]  print_report+0xd1/0x610
[   16.285850]  ? __virt_addr_valid+0x1db/0x2d0
[   16.285885]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.285908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.285933]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.285968]  kasan_report+0x141/0x180
[   16.285992]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.286019]  kasan_check_range+0x10c/0x1c0
[   16.286044]  __kasan_check_write+0x18/0x20
[   16.286065]  kasan_atomics_helper+0x20c8/0x5450
[   16.286090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.286114]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.286141]  ? kasan_atomics+0x152/0x310
[   16.286168]  kasan_atomics+0x1dc/0x310
[   16.286192]  ? __pfx_kasan_atomics+0x10/0x10
[   16.286218]  ? __pfx_read_tsc+0x10/0x10
[   16.286240]  ? ktime_get_ts64+0x86/0x230
[   16.286266]  kunit_try_run_case+0x1a5/0x480
[   16.286291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.286341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.286367]  ? __kthread_parkme+0x82/0x180
[   16.286402]  ? preempt_count_sub+0x50/0x80
[   16.286426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.286489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.286517]  kthread+0x337/0x6f0
[   16.286537]  ? trace_preempt_on+0x20/0xc0
[   16.286561]  ? __pfx_kthread+0x10/0x10
[   16.286583]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.286606]  ? calculate_sigpending+0x7b/0xa0
[   16.286632]  ? __pfx_kthread+0x10/0x10
[   16.286655]  ret_from_fork+0x116/0x1d0
[   16.286675]  ? __pfx_kthread+0x10/0x10
[   16.286697]  ret_from_fork_asm+0x1a/0x30
[   16.286728]  </TASK>
[   16.286739] 
[   16.296819] Allocated by task 282:
[   16.297002]  kasan_save_stack+0x45/0x70
[   16.297198]  kasan_save_track+0x18/0x40
[   16.297394]  kasan_save_alloc_info+0x3b/0x50
[   16.297660]  __kasan_kmalloc+0xb7/0xc0
[   16.297868]  __kmalloc_cache_noprof+0x189/0x420
[   16.298033]  kasan_atomics+0x95/0x310
[   16.298169]  kunit_try_run_case+0x1a5/0x480
[   16.298317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.298688]  kthread+0x337/0x6f0
[   16.298878]  ret_from_fork+0x116/0x1d0
[   16.299069]  ret_from_fork_asm+0x1a/0x30
[   16.299268] 
[   16.299365] The buggy address belongs to the object at ffff8881038e7800
[   16.299365]  which belongs to the cache kmalloc-64 of size 64
[   16.299830] The buggy address is located 0 bytes to the right of
[   16.299830]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.300293] 
[   16.300393] The buggy address belongs to the physical page:
[   16.300932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.301298] flags: 0x200000000000000(node=0|zone=2)
[   16.301574] page_type: f5(slab)
[   16.301749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.302094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.302410] page dumped because: kasan: bad access detected
[   16.302707] 
[   16.302813] Memory state around the buggy address:
[   16.303035]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.303301]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303621] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.303929]                                      ^
[   16.304153]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304370]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304584] ==================================================================
[   16.156836] ==================================================================
[   16.157427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.157832] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.158205] 
[   16.158294] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.158339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.158352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.158373] Call Trace:
[   16.158395]  <TASK>
[   16.158410]  dump_stack_lvl+0x73/0xb0
[   16.158636]  print_report+0xd1/0x610
[   16.158670]  ? __virt_addr_valid+0x1db/0x2d0
[   16.158694]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.158718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.158743]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.158781]  kasan_report+0x141/0x180
[   16.158805]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.158833]  kasan_check_range+0x10c/0x1c0
[   16.158858]  __kasan_check_write+0x18/0x20
[   16.158879]  kasan_atomics_helper+0x1eaa/0x5450
[   16.158904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.158929]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.158956]  ? kasan_atomics+0x152/0x310
[   16.158985]  kasan_atomics+0x1dc/0x310
[   16.159009]  ? __pfx_kasan_atomics+0x10/0x10
[   16.159035]  ? __pfx_read_tsc+0x10/0x10
[   16.159057]  ? ktime_get_ts64+0x86/0x230
[   16.159082]  kunit_try_run_case+0x1a5/0x480
[   16.159108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.159133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.159159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.159186]  ? __kthread_parkme+0x82/0x180
[   16.159208]  ? preempt_count_sub+0x50/0x80
[   16.159234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.159260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.159287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.159314]  kthread+0x337/0x6f0
[   16.159335]  ? trace_preempt_on+0x20/0xc0
[   16.159360]  ? __pfx_kthread+0x10/0x10
[   16.159382]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.159406]  ? calculate_sigpending+0x7b/0xa0
[   16.159431]  ? __pfx_kthread+0x10/0x10
[   16.159462]  ret_from_fork+0x116/0x1d0
[   16.159482]  ? __pfx_kthread+0x10/0x10
[   16.159504]  ret_from_fork_asm+0x1a/0x30
[   16.159535]  </TASK>
[   16.159547] 
[   16.168997] Allocated by task 282:
[   16.169132]  kasan_save_stack+0x45/0x70
[   16.169343]  kasan_save_track+0x18/0x40
[   16.169975]  kasan_save_alloc_info+0x3b/0x50
[   16.170194]  __kasan_kmalloc+0xb7/0xc0
[   16.170347]  __kmalloc_cache_noprof+0x189/0x420
[   16.170703]  kasan_atomics+0x95/0x310
[   16.170903]  kunit_try_run_case+0x1a5/0x480
[   16.171226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.171527]  kthread+0x337/0x6f0
[   16.171764]  ret_from_fork+0x116/0x1d0
[   16.171953]  ret_from_fork_asm+0x1a/0x30
[   16.172293] 
[   16.172374] The buggy address belongs to the object at ffff8881038e7800
[   16.172374]  which belongs to the cache kmalloc-64 of size 64
[   16.172968] The buggy address is located 0 bytes to the right of
[   16.172968]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.173491] 
[   16.173836] The buggy address belongs to the physical page:
[   16.174079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.174548] flags: 0x200000000000000(node=0|zone=2)
[   16.174856] page_type: f5(slab)
[   16.174993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.175477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.175800] page dumped because: kasan: bad access detected
[   16.176151] 
[   16.176242] Memory state around the buggy address:
[   16.176592]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.176985]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.177299] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.177721]                                      ^
[   16.177930]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.178334]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.178752] ==================================================================
[   15.460540] ==================================================================
[   15.460901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.461294] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.461803] 
[   15.461955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.462000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.462013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.462034] Call Trace:
[   15.462055]  <TASK>
[   15.462069]  dump_stack_lvl+0x73/0xb0
[   15.462099]  print_report+0xd1/0x610
[   15.462134]  ? __virt_addr_valid+0x1db/0x2d0
[   15.462158]  ? kasan_atomics_helper+0xe78/0x5450
[   15.462181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.462206]  ? kasan_atomics_helper+0xe78/0x5450
[   15.462229]  kasan_report+0x141/0x180
[   15.462252]  ? kasan_atomics_helper+0xe78/0x5450
[   15.462279]  kasan_check_range+0x10c/0x1c0
[   15.462305]  __kasan_check_write+0x18/0x20
[   15.462336]  kasan_atomics_helper+0xe78/0x5450
[   15.462361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.462390]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.462427]  ? kasan_atomics+0x152/0x310
[   15.462463]  kasan_atomics+0x1dc/0x310
[   15.462497]  ? __pfx_kasan_atomics+0x10/0x10
[   15.462525]  ? __pfx_read_tsc+0x10/0x10
[   15.462546]  ? ktime_get_ts64+0x86/0x230
[   15.462571]  kunit_try_run_case+0x1a5/0x480
[   15.462597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.462621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.462647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.462672]  ? __kthread_parkme+0x82/0x180
[   15.462694]  ? preempt_count_sub+0x50/0x80
[   15.462720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.462746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.462782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.462809]  kthread+0x337/0x6f0
[   15.462829]  ? trace_preempt_on+0x20/0xc0
[   15.462854]  ? __pfx_kthread+0x10/0x10
[   15.462877]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.462909]  ? calculate_sigpending+0x7b/0xa0
[   15.462935]  ? __pfx_kthread+0x10/0x10
[   15.462958]  ret_from_fork+0x116/0x1d0
[   15.462988]  ? __pfx_kthread+0x10/0x10
[   15.463010]  ret_from_fork_asm+0x1a/0x30
[   15.463042]  </TASK>
[   15.463053] 
[   15.470807] Allocated by task 282:
[   15.471034]  kasan_save_stack+0x45/0x70
[   15.471240]  kasan_save_track+0x18/0x40
[   15.471459]  kasan_save_alloc_info+0x3b/0x50
[   15.471896]  __kasan_kmalloc+0xb7/0xc0
[   15.472884]  __kmalloc_cache_noprof+0x189/0x420
[   15.473091]  kasan_atomics+0x95/0x310
[   15.473272]  kunit_try_run_case+0x1a5/0x480
[   15.474178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.474425]  kthread+0x337/0x6f0
[   15.474776]  ret_from_fork+0x116/0x1d0
[   15.474961]  ret_from_fork_asm+0x1a/0x30
[   15.475140] 
[   15.475317] The buggy address belongs to the object at ffff8881038e7800
[   15.475317]  which belongs to the cache kmalloc-64 of size 64
[   15.476347] The buggy address is located 0 bytes to the right of
[   15.476347]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.476993] 
[   15.477248] The buggy address belongs to the physical page:
[   15.477635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.478056] flags: 0x200000000000000(node=0|zone=2)
[   15.478392] page_type: f5(slab)
[   15.478768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.479224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.479750] page dumped because: kasan: bad access detected
[   15.480102] 
[   15.480315] Memory state around the buggy address:
[   15.480589]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.480980]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.481405] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.481832]                                      ^
[   15.482141]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482424]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482897] ==================================================================
[   15.996382] ==================================================================
[   15.996773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.997212] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.997602] 
[   15.997728] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.997785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.997798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.997820] Call Trace:
[   15.997837]  <TASK>
[   15.997852]  dump_stack_lvl+0x73/0xb0
[   15.997882]  print_report+0xd1/0x610
[   15.997906]  ? __virt_addr_valid+0x1db/0x2d0
[   15.997930]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.997954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.997979]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.998003]  kasan_report+0x141/0x180
[   15.998027]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.998055]  kasan_check_range+0x10c/0x1c0
[   15.998081]  __kasan_check_write+0x18/0x20
[   15.998102]  kasan_atomics_helper+0x1a7f/0x5450
[   15.998127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.998151]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.998178]  ? kasan_atomics+0x152/0x310
[   15.998205]  kasan_atomics+0x1dc/0x310
[   15.998229]  ? __pfx_kasan_atomics+0x10/0x10
[   15.998255]  ? __pfx_read_tsc+0x10/0x10
[   15.998278]  ? ktime_get_ts64+0x86/0x230
[   15.998303]  kunit_try_run_case+0x1a5/0x480
[   15.998329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.998353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.998379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.998411]  ? __kthread_parkme+0x82/0x180
[   15.998433]  ? preempt_count_sub+0x50/0x80
[   15.998697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.998725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.998752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.998792]  kthread+0x337/0x6f0
[   15.998813]  ? trace_preempt_on+0x20/0xc0
[   15.998838]  ? __pfx_kthread+0x10/0x10
[   15.998860]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.998883]  ? calculate_sigpending+0x7b/0xa0
[   15.998910]  ? __pfx_kthread+0x10/0x10
[   15.998934]  ret_from_fork+0x116/0x1d0
[   15.998953]  ? __pfx_kthread+0x10/0x10
[   15.998976]  ret_from_fork_asm+0x1a/0x30
[   15.999007]  </TASK>
[   15.999018] 
[   16.009068] Allocated by task 282:
[   16.009331]  kasan_save_stack+0x45/0x70
[   16.009556]  kasan_save_track+0x18/0x40
[   16.009770]  kasan_save_alloc_info+0x3b/0x50
[   16.009967]  __kasan_kmalloc+0xb7/0xc0
[   16.010160]  __kmalloc_cache_noprof+0x189/0x420
[   16.010355]  kasan_atomics+0x95/0x310
[   16.010536]  kunit_try_run_case+0x1a5/0x480
[   16.011067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.011293]  kthread+0x337/0x6f0
[   16.011629]  ret_from_fork+0x116/0x1d0
[   16.011842]  ret_from_fork_asm+0x1a/0x30
[   16.012157] 
[   16.012261] The buggy address belongs to the object at ffff8881038e7800
[   16.012261]  which belongs to the cache kmalloc-64 of size 64
[   16.012888] The buggy address is located 0 bytes to the right of
[   16.012888]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.013517] 
[   16.013614] The buggy address belongs to the physical page:
[   16.013870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.014195] flags: 0x200000000000000(node=0|zone=2)
[   16.014412] page_type: f5(slab)
[   16.014904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.015196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.015740] page dumped because: kasan: bad access detected
[   16.016064] 
[   16.016159] Memory state around the buggy address:
[   16.016369]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.016835]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.017214] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.017593]                                      ^
[   16.017903]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.018278]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.018667] ==================================================================
[   15.088109] ==================================================================
[   15.088745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.089074] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.089496] 
[   15.089601] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.089644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.089656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.089679] Call Trace:
[   15.089693]  <TASK>
[   15.089708]  dump_stack_lvl+0x73/0xb0
[   15.089739]  print_report+0xd1/0x610
[   15.089775]  ? __virt_addr_valid+0x1db/0x2d0
[   15.089799]  ? kasan_atomics_helper+0x565/0x5450
[   15.089822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.089848]  ? kasan_atomics_helper+0x565/0x5450
[   15.089871]  kasan_report+0x141/0x180
[   15.089894]  ? kasan_atomics_helper+0x565/0x5450
[   15.089924]  kasan_check_range+0x10c/0x1c0
[   15.089950]  __kasan_check_write+0x18/0x20
[   15.089972]  kasan_atomics_helper+0x565/0x5450
[   15.089997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.090022]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.090050]  ? kasan_atomics+0x152/0x310
[   15.090078]  kasan_atomics+0x1dc/0x310
[   15.090103]  ? __pfx_kasan_atomics+0x10/0x10
[   15.090129]  ? __pfx_read_tsc+0x10/0x10
[   15.090152]  ? ktime_get_ts64+0x86/0x230
[   15.090178]  kunit_try_run_case+0x1a5/0x480
[   15.090203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.090257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.090284]  ? __kthread_parkme+0x82/0x180
[   15.090306]  ? preempt_count_sub+0x50/0x80
[   15.090330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.090419]  kthread+0x337/0x6f0
[   15.090441]  ? trace_preempt_on+0x20/0xc0
[   15.090465]  ? __pfx_kthread+0x10/0x10
[   15.090487]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.090511]  ? calculate_sigpending+0x7b/0xa0
[   15.090537]  ? __pfx_kthread+0x10/0x10
[   15.090559]  ret_from_fork+0x116/0x1d0
[   15.090579]  ? __pfx_kthread+0x10/0x10
[   15.090601]  ret_from_fork_asm+0x1a/0x30
[   15.090633]  </TASK>
[   15.090644] 
[   15.099031] Allocated by task 282:
[   15.099227]  kasan_save_stack+0x45/0x70
[   15.099525]  kasan_save_track+0x18/0x40
[   15.099817]  kasan_save_alloc_info+0x3b/0x50
[   15.100110]  __kasan_kmalloc+0xb7/0xc0
[   15.100271]  __kmalloc_cache_noprof+0x189/0x420
[   15.100642]  kasan_atomics+0x95/0x310
[   15.100865]  kunit_try_run_case+0x1a5/0x480
[   15.101056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.101260]  kthread+0x337/0x6f0
[   15.101413]  ret_from_fork+0x116/0x1d0
[   15.101674]  ret_from_fork_asm+0x1a/0x30
[   15.101965] 
[   15.102051] The buggy address belongs to the object at ffff8881038e7800
[   15.102051]  which belongs to the cache kmalloc-64 of size 64
[   15.102484] The buggy address is located 0 bytes to the right of
[   15.102484]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.103002] 
[   15.103079] The buggy address belongs to the physical page:
[   15.103251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.103585] flags: 0x200000000000000(node=0|zone=2)
[   15.103973] page_type: f5(slab)
[   15.104251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.104574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.104824] page dumped because: kasan: bad access detected
[   15.105009] 
[   15.105083] Memory state around the buggy address:
[   15.105426]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.105784]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.106115] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.106620]                                      ^
[   15.106871]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.107155]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.107743] ==================================================================
[   16.179444] ==================================================================
[   16.180026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.180503] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.180791] 
[   16.181058] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.181106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.181119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.181140] Call Trace:
[   16.181155]  <TASK>
[   16.181237]  dump_stack_lvl+0x73/0xb0
[   16.181272]  print_report+0xd1/0x610
[   16.181296]  ? __virt_addr_valid+0x1db/0x2d0
[   16.181319]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.181342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.181368]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.181392]  kasan_report+0x141/0x180
[   16.181415]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.181456]  kasan_check_range+0x10c/0x1c0
[   16.181482]  __kasan_check_write+0x18/0x20
[   16.181503]  kasan_atomics_helper+0x1f43/0x5450
[   16.181528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.181552]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.181579]  ? kasan_atomics+0x152/0x310
[   16.181607]  kasan_atomics+0x1dc/0x310
[   16.181631]  ? __pfx_kasan_atomics+0x10/0x10
[   16.181657]  ? __pfx_read_tsc+0x10/0x10
[   16.181680]  ? ktime_get_ts64+0x86/0x230
[   16.181707]  kunit_try_run_case+0x1a5/0x480
[   16.181733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.181780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.181808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.181834]  ? __kthread_parkme+0x82/0x180
[   16.181856]  ? preempt_count_sub+0x50/0x80
[   16.181881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.181908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.181934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.181962]  kthread+0x337/0x6f0
[   16.181982]  ? trace_preempt_on+0x20/0xc0
[   16.182006]  ? __pfx_kthread+0x10/0x10
[   16.182028]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.182052]  ? calculate_sigpending+0x7b/0xa0
[   16.182077]  ? __pfx_kthread+0x10/0x10
[   16.182100]  ret_from_fork+0x116/0x1d0
[   16.182120]  ? __pfx_kthread+0x10/0x10
[   16.182143]  ret_from_fork_asm+0x1a/0x30
[   16.182174]  </TASK>
[   16.182185] 
[   16.194247] Allocated by task 282:
[   16.194399]  kasan_save_stack+0x45/0x70
[   16.194554]  kasan_save_track+0x18/0x40
[   16.195181]  kasan_save_alloc_info+0x3b/0x50
[   16.195358]  __kasan_kmalloc+0xb7/0xc0
[   16.196027]  __kmalloc_cache_noprof+0x189/0x420
[   16.196197]  kasan_atomics+0x95/0x310
[   16.196340]  kunit_try_run_case+0x1a5/0x480
[   16.197030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.197308]  kthread+0x337/0x6f0
[   16.198345]  ret_from_fork+0x116/0x1d0
[   16.198551]  ret_from_fork_asm+0x1a/0x30
[   16.198710] 
[   16.198827] The buggy address belongs to the object at ffff8881038e7800
[   16.198827]  which belongs to the cache kmalloc-64 of size 64
[   16.199254] The buggy address is located 0 bytes to the right of
[   16.199254]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.199783] 
[   16.199883] The buggy address belongs to the physical page:
[   16.200068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.200391] flags: 0x200000000000000(node=0|zone=2)
[   16.200874] page_type: f5(slab)
[   16.201037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.201357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.202294] page dumped because: kasan: bad access detected
[   16.202726] 
[   16.203016] Memory state around the buggy address:
[   16.203310]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.203778]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.204081] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.204377]                                      ^
[   16.205035]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205566]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.206064] ==================================================================
[   16.323439] ==================================================================
[   16.323820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.324225] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.324875] 
[   16.324960] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.325002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.325014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.325035] Call Trace:
[   16.325050]  <TASK>
[   16.325064]  dump_stack_lvl+0x73/0xb0
[   16.325092]  print_report+0xd1/0x610
[   16.325113]  ? __virt_addr_valid+0x1db/0x2d0
[   16.325136]  ? kasan_atomics_helper+0x218a/0x5450
[   16.325157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.325179]  ? kasan_atomics_helper+0x218a/0x5450
[   16.325201]  kasan_report+0x141/0x180
[   16.325223]  ? kasan_atomics_helper+0x218a/0x5450
[   16.325250]  kasan_check_range+0x10c/0x1c0
[   16.325274]  __kasan_check_write+0x18/0x20
[   16.325293]  kasan_atomics_helper+0x218a/0x5450
[   16.325316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.325339]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.325364]  ? kasan_atomics+0x152/0x310
[   16.325390]  kasan_atomics+0x1dc/0x310
[   16.325412]  ? __pfx_kasan_atomics+0x10/0x10
[   16.325437]  ? __pfx_read_tsc+0x10/0x10
[   16.325458]  ? ktime_get_ts64+0x86/0x230
[   16.325482]  kunit_try_run_case+0x1a5/0x480
[   16.325506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.325528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.325552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.325594]  ? __kthread_parkme+0x82/0x180
[   16.325616]  ? preempt_count_sub+0x50/0x80
[   16.325641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.325667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.325703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.325730]  kthread+0x337/0x6f0
[   16.325750]  ? trace_preempt_on+0x20/0xc0
[   16.325793]  ? __pfx_kthread+0x10/0x10
[   16.325815]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.325838]  ? calculate_sigpending+0x7b/0xa0
[   16.325863]  ? __pfx_kthread+0x10/0x10
[   16.325886]  ret_from_fork+0x116/0x1d0
[   16.325906]  ? __pfx_kthread+0x10/0x10
[   16.325927]  ret_from_fork_asm+0x1a/0x30
[   16.325968]  </TASK>
[   16.325980] 
[   16.333838] Allocated by task 282:
[   16.333995]  kasan_save_stack+0x45/0x70
[   16.334225]  kasan_save_track+0x18/0x40
[   16.334412]  kasan_save_alloc_info+0x3b/0x50
[   16.334618]  __kasan_kmalloc+0xb7/0xc0
[   16.334801]  __kmalloc_cache_noprof+0x189/0x420
[   16.335028]  kasan_atomics+0x95/0x310
[   16.335219]  kunit_try_run_case+0x1a5/0x480
[   16.335416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.335684]  kthread+0x337/0x6f0
[   16.335871]  ret_from_fork+0x116/0x1d0
[   16.336065]  ret_from_fork_asm+0x1a/0x30
[   16.336255] 
[   16.336367] The buggy address belongs to the object at ffff8881038e7800
[   16.336367]  which belongs to the cache kmalloc-64 of size 64
[   16.336934] The buggy address is located 0 bytes to the right of
[   16.336934]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.337451] 
[   16.337550] The buggy address belongs to the physical page:
[   16.337769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.338008] flags: 0x200000000000000(node=0|zone=2)
[   16.338170] page_type: f5(slab)
[   16.338291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.338527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.338764] page dumped because: kasan: bad access detected
[   16.338935] 
[   16.339004] Memory state around the buggy address:
[   16.339388]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.339730]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.340053] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.340368]                                      ^
[   16.340804]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341127]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341421] ==================================================================
[   15.624799] ==================================================================
[   15.625625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.626062] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.626295] 
[   15.626391] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.626439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.626638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.626663] Call Trace:
[   15.626681]  <TASK>
[   15.626699]  dump_stack_lvl+0x73/0xb0
[   15.626733]  print_report+0xd1/0x610
[   15.626918]  ? __virt_addr_valid+0x1db/0x2d0
[   15.626953]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.626977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.627002]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.627026]  kasan_report+0x141/0x180
[   15.627049]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.627078]  __asan_report_load4_noabort+0x18/0x20
[   15.627104]  kasan_atomics_helper+0x4a02/0x5450
[   15.627128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.627153]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.627180]  ? kasan_atomics+0x152/0x310
[   15.627209]  kasan_atomics+0x1dc/0x310
[   15.627232]  ? __pfx_kasan_atomics+0x10/0x10
[   15.627258]  ? __pfx_read_tsc+0x10/0x10
[   15.627281]  ? ktime_get_ts64+0x86/0x230
[   15.627306]  kunit_try_run_case+0x1a5/0x480
[   15.627332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.627357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.627382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.627408]  ? __kthread_parkme+0x82/0x180
[   15.627430]  ? preempt_count_sub+0x50/0x80
[   15.627469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.627496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.627522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.627549]  kthread+0x337/0x6f0
[   15.627570]  ? trace_preempt_on+0x20/0xc0
[   15.627594]  ? __pfx_kthread+0x10/0x10
[   15.627617]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.627641]  ? calculate_sigpending+0x7b/0xa0
[   15.627666]  ? __pfx_kthread+0x10/0x10
[   15.627689]  ret_from_fork+0x116/0x1d0
[   15.627709]  ? __pfx_kthread+0x10/0x10
[   15.627731]  ret_from_fork_asm+0x1a/0x30
[   15.627777]  </TASK>
[   15.627788] 
[   15.634747] Allocated by task 282:
[   15.635077]  kasan_save_stack+0x45/0x70
[   15.635229]  kasan_save_track+0x18/0x40
[   15.635367]  kasan_save_alloc_info+0x3b/0x50
[   15.635521]  __kasan_kmalloc+0xb7/0xc0
[   15.635656]  __kmalloc_cache_noprof+0x189/0x420
[   15.635896]  kasan_atomics+0x95/0x310
[   15.636087]  kunit_try_run_case+0x1a5/0x480
[   15.636307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.636568]  kthread+0x337/0x6f0
[   15.636736]  ret_from_fork+0x116/0x1d0
[   15.636953]  ret_from_fork_asm+0x1a/0x30
[   15.637153] 
[   15.637250] The buggy address belongs to the object at ffff8881038e7800
[   15.637250]  which belongs to the cache kmalloc-64 of size 64
[   15.637765] The buggy address is located 0 bytes to the right of
[   15.637765]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.638263] 
[   15.638339] The buggy address belongs to the physical page:
[   15.638607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.638920] flags: 0x200000000000000(node=0|zone=2)
[   15.639127] page_type: f5(slab)
[   15.639290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.639590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.639862] page dumped because: kasan: bad access detected
[   15.640118] 
[   15.640215] Memory state around the buggy address:
[   15.640458]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.640771]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.641043] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.641278]                                      ^
[   15.641532]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.641851]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.642100] ==================================================================
[   14.961082] ==================================================================
[   14.961563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.961845] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   14.962069] 
[   14.962149] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.962190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.962201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.962220] Call Trace:
[   14.962232]  <TASK>
[   14.962244]  dump_stack_lvl+0x73/0xb0
[   14.962270]  print_report+0xd1/0x610
[   14.962293]  ? __virt_addr_valid+0x1db/0x2d0
[   14.962314]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.962396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.962421]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.962455]  kasan_report+0x141/0x180
[   14.962478]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.962505]  __asan_report_load4_noabort+0x18/0x20
[   14.962531]  kasan_atomics_helper+0x4b88/0x5450
[   14.962554]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.962578]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.962603]  ? kasan_atomics+0x152/0x310
[   14.962630]  kasan_atomics+0x1dc/0x310
[   14.962652]  ? __pfx_kasan_atomics+0x10/0x10
[   14.962677]  ? __pfx_read_tsc+0x10/0x10
[   14.962697]  ? ktime_get_ts64+0x86/0x230
[   14.962722]  kunit_try_run_case+0x1a5/0x480
[   14.962747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.962782]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.962806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.962831]  ? __kthread_parkme+0x82/0x180
[   14.962852]  ? preempt_count_sub+0x50/0x80
[   14.962876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.962901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.962927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.962954]  kthread+0x337/0x6f0
[   14.962975]  ? trace_preempt_on+0x20/0xc0
[   14.962998]  ? __pfx_kthread+0x10/0x10
[   14.963019]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.963041]  ? calculate_sigpending+0x7b/0xa0
[   14.963066]  ? __pfx_kthread+0x10/0x10
[   14.963088]  ret_from_fork+0x116/0x1d0
[   14.963107]  ? __pfx_kthread+0x10/0x10
[   14.963130]  ret_from_fork_asm+0x1a/0x30
[   14.963161]  </TASK>
[   14.963171] 
[   14.971577] Allocated by task 282:
[   14.971744]  kasan_save_stack+0x45/0x70
[   14.971901]  kasan_save_track+0x18/0x40
[   14.972037]  kasan_save_alloc_info+0x3b/0x50
[   14.972191]  __kasan_kmalloc+0xb7/0xc0
[   14.972381]  __kmalloc_cache_noprof+0x189/0x420
[   14.972784]  kasan_atomics+0x95/0x310
[   14.972962]  kunit_try_run_case+0x1a5/0x480
[   14.973173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.973395]  kthread+0x337/0x6f0
[   14.973622]  ret_from_fork+0x116/0x1d0
[   14.973799]  ret_from_fork_asm+0x1a/0x30
[   14.973958] 
[   14.974031] The buggy address belongs to the object at ffff8881038e7800
[   14.974031]  which belongs to the cache kmalloc-64 of size 64
[   14.974589] The buggy address is located 0 bytes to the right of
[   14.974589]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   14.974991] 
[   14.975062] The buggy address belongs to the physical page:
[   14.975238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   14.975559] flags: 0x200000000000000(node=0|zone=2)
[   14.975798] page_type: f5(slab)
[   14.975970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.976339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.976676] page dumped because: kasan: bad access detected
[   14.976872] 
[   14.976941] Memory state around the buggy address:
[   14.977094]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.977311]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.977904] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.978229]                                      ^
[   14.978499]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.979150]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.979371] ==================================================================
[   16.065544] ==================================================================
[   16.065941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.066265] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.066977] 
[   16.067219] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.067265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.067279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.067300] Call Trace:
[   16.067315]  <TASK>
[   16.067330]  dump_stack_lvl+0x73/0xb0
[   16.067361]  print_report+0xd1/0x610
[   16.067384]  ? __virt_addr_valid+0x1db/0x2d0
[   16.067483]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.067509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.067535]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.067559]  kasan_report+0x141/0x180
[   16.067583]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.067611]  __asan_report_load8_noabort+0x18/0x20
[   16.067638]  kasan_atomics_helper+0x4f30/0x5450
[   16.067663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.067688]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.067716]  ? kasan_atomics+0x152/0x310
[   16.067744]  kasan_atomics+0x1dc/0x310
[   16.067780]  ? __pfx_kasan_atomics+0x10/0x10
[   16.067806]  ? __pfx_read_tsc+0x10/0x10
[   16.067829]  ? ktime_get_ts64+0x86/0x230
[   16.067855]  kunit_try_run_case+0x1a5/0x480
[   16.067882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.067906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.067931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.067957]  ? __kthread_parkme+0x82/0x180
[   16.067978]  ? preempt_count_sub+0x50/0x80
[   16.068003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.068055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.068083]  kthread+0x337/0x6f0
[   16.068104]  ? trace_preempt_on+0x20/0xc0
[   16.068128]  ? __pfx_kthread+0x10/0x10
[   16.068150]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.068173]  ? calculate_sigpending+0x7b/0xa0
[   16.068199]  ? __pfx_kthread+0x10/0x10
[   16.068222]  ret_from_fork+0x116/0x1d0
[   16.068242]  ? __pfx_kthread+0x10/0x10
[   16.068264]  ret_from_fork_asm+0x1a/0x30
[   16.068296]  </TASK>
[   16.068307] 
[   16.077745] Allocated by task 282:
[   16.078106]  kasan_save_stack+0x45/0x70
[   16.078276]  kasan_save_track+0x18/0x40
[   16.078619]  kasan_save_alloc_info+0x3b/0x50
[   16.078845]  __kasan_kmalloc+0xb7/0xc0
[   16.079023]  __kmalloc_cache_noprof+0x189/0x420
[   16.079229]  kasan_atomics+0x95/0x310
[   16.079403]  kunit_try_run_case+0x1a5/0x480
[   16.079857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.080195]  kthread+0x337/0x6f0
[   16.080434]  ret_from_fork+0x116/0x1d0
[   16.080672]  ret_from_fork_asm+0x1a/0x30
[   16.080963] 
[   16.081057] The buggy address belongs to the object at ffff8881038e7800
[   16.081057]  which belongs to the cache kmalloc-64 of size 64
[   16.081678] The buggy address is located 0 bytes to the right of
[   16.081678]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.082222] 
[   16.082305] The buggy address belongs to the physical page:
[   16.082840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.083146] flags: 0x200000000000000(node=0|zone=2)
[   16.083474] page_type: f5(slab)
[   16.083661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.084141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.084549] page dumped because: kasan: bad access detected
[   16.084810] 
[   16.085021] Memory state around the buggy address:
[   16.085190]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.085605]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086021] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.086315]                                      ^
[   16.086640]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.087033]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.087332] ==================================================================
[   15.503745] ==================================================================
[   15.504072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.504448] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.504785] 
[   15.504868] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.504940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.504953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.504991] Call Trace:
[   15.505016]  <TASK>
[   15.505030]  dump_stack_lvl+0x73/0xb0
[   15.505060]  print_report+0xd1/0x610
[   15.505087]  ? __virt_addr_valid+0x1db/0x2d0
[   15.505111]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.505133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.505159]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.505211]  kasan_report+0x141/0x180
[   15.505235]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.505307]  kasan_check_range+0x10c/0x1c0
[   15.505342]  __kasan_check_write+0x18/0x20
[   15.505362]  kasan_atomics_helper+0xfa9/0x5450
[   15.505399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.505424]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.505462]  ? kasan_atomics+0x152/0x310
[   15.505490]  kasan_atomics+0x1dc/0x310
[   15.505531]  ? __pfx_kasan_atomics+0x10/0x10
[   15.505570]  ? __pfx_read_tsc+0x10/0x10
[   15.505608]  ? ktime_get_ts64+0x86/0x230
[   15.505634]  kunit_try_run_case+0x1a5/0x480
[   15.505687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.505720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.505747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.505789]  ? __kthread_parkme+0x82/0x180
[   15.505811]  ? preempt_count_sub+0x50/0x80
[   15.505836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.505862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.505916]  kthread+0x337/0x6f0
[   15.505937]  ? trace_preempt_on+0x20/0xc0
[   15.505961]  ? __pfx_kthread+0x10/0x10
[   15.505984]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.506007]  ? calculate_sigpending+0x7b/0xa0
[   15.506033]  ? __pfx_kthread+0x10/0x10
[   15.506056]  ret_from_fork+0x116/0x1d0
[   15.506076]  ? __pfx_kthread+0x10/0x10
[   15.506098]  ret_from_fork_asm+0x1a/0x30
[   15.506130]  </TASK>
[   15.506141] 
[   15.514403] Allocated by task 282:
[   15.514538]  kasan_save_stack+0x45/0x70
[   15.514678]  kasan_save_track+0x18/0x40
[   15.514822]  kasan_save_alloc_info+0x3b/0x50
[   15.515107]  __kasan_kmalloc+0xb7/0xc0
[   15.515347]  __kmalloc_cache_noprof+0x189/0x420
[   15.515660]  kasan_atomics+0x95/0x310
[   15.515864]  kunit_try_run_case+0x1a5/0x480
[   15.516131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.516411]  kthread+0x337/0x6f0
[   15.516622]  ret_from_fork+0x116/0x1d0
[   15.516834]  ret_from_fork_asm+0x1a/0x30
[   15.517075] 
[   15.517166] The buggy address belongs to the object at ffff8881038e7800
[   15.517166]  which belongs to the cache kmalloc-64 of size 64
[   15.517724] The buggy address is located 0 bytes to the right of
[   15.517724]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.518279] 
[   15.518390] The buggy address belongs to the physical page:
[   15.518733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.519084] flags: 0x200000000000000(node=0|zone=2)
[   15.519337] page_type: f5(slab)
[   15.519514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.519883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.520280] page dumped because: kasan: bad access detected
[   15.520652] 
[   15.520781] Memory state around the buggy address:
[   15.521035]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.521390]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.522065] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.522352]                                      ^
[   15.522685]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523037]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523333] ==================================================================
[   16.360201] ==================================================================
[   16.360714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.360991] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.361221] 
[   16.361305] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.361347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.361359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.361380] Call Trace:
[   16.361395]  <TASK>
[   16.361411]  dump_stack_lvl+0x73/0xb0
[   16.361439]  print_report+0xd1/0x610
[   16.361474]  ? __virt_addr_valid+0x1db/0x2d0
[   16.361508]  ? kasan_atomics_helper+0x224c/0x5450
[   16.361532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.361557]  ? kasan_atomics_helper+0x224c/0x5450
[   16.361592]  kasan_report+0x141/0x180
[   16.361615]  ? kasan_atomics_helper+0x224c/0x5450
[   16.361643]  kasan_check_range+0x10c/0x1c0
[   16.361669]  __kasan_check_write+0x18/0x20
[   16.361690]  kasan_atomics_helper+0x224c/0x5450
[   16.361713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.361738]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.361776]  ? kasan_atomics+0x152/0x310
[   16.361804]  kasan_atomics+0x1dc/0x310
[   16.361828]  ? __pfx_kasan_atomics+0x10/0x10
[   16.361854]  ? __pfx_read_tsc+0x10/0x10
[   16.361876]  ? ktime_get_ts64+0x86/0x230
[   16.361901]  kunit_try_run_case+0x1a5/0x480
[   16.361927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.361952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.361978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.362004]  ? __kthread_parkme+0x82/0x180
[   16.362025]  ? preempt_count_sub+0x50/0x80
[   16.362050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.362076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.362102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.362130]  kthread+0x337/0x6f0
[   16.362150]  ? trace_preempt_on+0x20/0xc0
[   16.362174]  ? __pfx_kthread+0x10/0x10
[   16.362196]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.362219]  ? calculate_sigpending+0x7b/0xa0
[   16.362245]  ? __pfx_kthread+0x10/0x10
[   16.362267]  ret_from_fork+0x116/0x1d0
[   16.362286]  ? __pfx_kthread+0x10/0x10
[   16.362308]  ret_from_fork_asm+0x1a/0x30
[   16.362361]  </TASK>
[   16.362371] 
[   16.370300] Allocated by task 282:
[   16.370441]  kasan_save_stack+0x45/0x70
[   16.370648]  kasan_save_track+0x18/0x40
[   16.370856]  kasan_save_alloc_info+0x3b/0x50
[   16.371077]  __kasan_kmalloc+0xb7/0xc0
[   16.371463]  __kmalloc_cache_noprof+0x189/0x420
[   16.371693]  kasan_atomics+0x95/0x310
[   16.371924]  kunit_try_run_case+0x1a5/0x480
[   16.372103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.372371]  kthread+0x337/0x6f0
[   16.372613]  ret_from_fork+0x116/0x1d0
[   16.372749]  ret_from_fork_asm+0x1a/0x30
[   16.373185] 
[   16.373285] The buggy address belongs to the object at ffff8881038e7800
[   16.373285]  which belongs to the cache kmalloc-64 of size 64
[   16.374834] The buggy address is located 0 bytes to the right of
[   16.374834]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.375219] 
[   16.375316] The buggy address belongs to the physical page:
[   16.375925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.376532] flags: 0x200000000000000(node=0|zone=2)
[   16.376776] page_type: f5(slab)
[   16.376936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.377261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.377997] page dumped because: kasan: bad access detected
[   16.378309] 
[   16.378555] Memory state around the buggy address:
[   16.378995]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.379604]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.380132] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.380951]                                      ^
[   16.381378]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.382099]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.382619] ==================================================================
[   16.383255] ==================================================================
[   16.383962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.384588] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   16.385212] 
[   16.385325] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.385371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.385384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.385406] Call Trace:
[   16.385420]  <TASK>
[   16.385436]  dump_stack_lvl+0x73/0xb0
[   16.385468]  print_report+0xd1/0x610
[   16.385490]  ? __virt_addr_valid+0x1db/0x2d0
[   16.385515]  ? kasan_atomics_helper+0x5115/0x5450
[   16.385538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.385563]  ? kasan_atomics_helper+0x5115/0x5450
[   16.385587]  kasan_report+0x141/0x180
[   16.385610]  ? kasan_atomics_helper+0x5115/0x5450
[   16.385638]  __asan_report_load8_noabort+0x18/0x20
[   16.385666]  kasan_atomics_helper+0x5115/0x5450
[   16.385689]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.385714]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.385741]  ? kasan_atomics+0x152/0x310
[   16.385781]  kasan_atomics+0x1dc/0x310
[   16.385805]  ? __pfx_kasan_atomics+0x10/0x10
[   16.385831]  ? __pfx_read_tsc+0x10/0x10
[   16.385853]  ? ktime_get_ts64+0x86/0x230
[   16.385878]  kunit_try_run_case+0x1a5/0x480
[   16.385915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.385940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.385977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.386003]  ? __kthread_parkme+0x82/0x180
[   16.386026]  ? preempt_count_sub+0x50/0x80
[   16.386051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.386086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.386112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.386140]  kthread+0x337/0x6f0
[   16.386171]  ? trace_preempt_on+0x20/0xc0
[   16.386196]  ? __pfx_kthread+0x10/0x10
[   16.386218]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.386241]  ? calculate_sigpending+0x7b/0xa0
[   16.386267]  ? __pfx_kthread+0x10/0x10
[   16.386290]  ret_from_fork+0x116/0x1d0
[   16.386311]  ? __pfx_kthread+0x10/0x10
[   16.386334]  ret_from_fork_asm+0x1a/0x30
[   16.386366]  </TASK>
[   16.386376] 
[   16.393858] Allocated by task 282:
[   16.394024]  kasan_save_stack+0x45/0x70
[   16.394237]  kasan_save_track+0x18/0x40
[   16.394432]  kasan_save_alloc_info+0x3b/0x50
[   16.394645]  __kasan_kmalloc+0xb7/0xc0
[   16.394861]  __kmalloc_cache_noprof+0x189/0x420
[   16.395073]  kasan_atomics+0x95/0x310
[   16.395260]  kunit_try_run_case+0x1a5/0x480
[   16.395410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.395708]  kthread+0x337/0x6f0
[   16.395892]  ret_from_fork+0x116/0x1d0
[   16.396042]  ret_from_fork_asm+0x1a/0x30
[   16.396183] 
[   16.396256] The buggy address belongs to the object at ffff8881038e7800
[   16.396256]  which belongs to the cache kmalloc-64 of size 64
[   16.396629] The buggy address is located 0 bytes to the right of
[   16.396629]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   16.397471] 
[   16.397544] The buggy address belongs to the physical page:
[   16.397718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   16.397965] flags: 0x200000000000000(node=0|zone=2)
[   16.398165] page_type: f5(slab)
[   16.398336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.398971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.399350] page dumped because: kasan: bad access detected
[   16.399630] 
[   16.399750] Memory state around the buggy address:
[   16.399986]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.400234]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.400656] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.400980]                                      ^
[   16.401180]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.401495]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.401813] ==================================================================
[   15.108217] ==================================================================
[   15.108785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.109104] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.109354] 
[   15.109535] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.109579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.109591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.109614] Call Trace:
[   15.109630]  <TASK>
[   15.109648]  dump_stack_lvl+0x73/0xb0
[   15.109676]  print_report+0xd1/0x610
[   15.109699]  ? __virt_addr_valid+0x1db/0x2d0
[   15.109723]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.109746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.109782]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.109806]  kasan_report+0x141/0x180
[   15.109829]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.109857]  kasan_check_range+0x10c/0x1c0
[   15.109883]  __kasan_check_write+0x18/0x20
[   15.109904]  kasan_atomics_helper+0x5fe/0x5450
[   15.109929]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.109954]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.109981]  ? kasan_atomics+0x152/0x310
[   15.110010]  kasan_atomics+0x1dc/0x310
[   15.110034]  ? __pfx_kasan_atomics+0x10/0x10
[   15.110061]  ? __pfx_read_tsc+0x10/0x10
[   15.110083]  ? ktime_get_ts64+0x86/0x230
[   15.110108]  kunit_try_run_case+0x1a5/0x480
[   15.110134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.110159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.110185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.110211]  ? __kthread_parkme+0x82/0x180
[   15.110232]  ? preempt_count_sub+0x50/0x80
[   15.110258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.110283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.110396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.110424]  kthread+0x337/0x6f0
[   15.110456]  ? trace_preempt_on+0x20/0xc0
[   15.110481]  ? __pfx_kthread+0x10/0x10
[   15.110504]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.110527]  ? calculate_sigpending+0x7b/0xa0
[   15.110552]  ? __pfx_kthread+0x10/0x10
[   15.110575]  ret_from_fork+0x116/0x1d0
[   15.110595]  ? __pfx_kthread+0x10/0x10
[   15.110617]  ret_from_fork_asm+0x1a/0x30
[   15.110649]  </TASK>
[   15.110660] 
[   15.118263] Allocated by task 282:
[   15.118420]  kasan_save_stack+0x45/0x70
[   15.118693]  kasan_save_track+0x18/0x40
[   15.118887]  kasan_save_alloc_info+0x3b/0x50
[   15.119097]  __kasan_kmalloc+0xb7/0xc0
[   15.119264]  __kmalloc_cache_noprof+0x189/0x420
[   15.119477]  kasan_atomics+0x95/0x310
[   15.119829]  kunit_try_run_case+0x1a5/0x480
[   15.120016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.120195]  kthread+0x337/0x6f0
[   15.120316]  ret_from_fork+0x116/0x1d0
[   15.120504]  ret_from_fork_asm+0x1a/0x30
[   15.120705] 
[   15.120813] The buggy address belongs to the object at ffff8881038e7800
[   15.120813]  which belongs to the cache kmalloc-64 of size 64
[   15.121579] The buggy address is located 0 bytes to the right of
[   15.121579]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.122065] 
[   15.122167] The buggy address belongs to the physical page:
[   15.122506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.122861] flags: 0x200000000000000(node=0|zone=2)
[   15.123078] page_type: f5(slab)
[   15.123221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.123589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.123926] page dumped because: kasan: bad access detected
[   15.124149] 
[   15.124246] Memory state around the buggy address:
[   15.124616]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.124882]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.125102] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.125317]                                      ^
[   15.125769]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.126093]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.126564] ==================================================================
[   15.591829] ==================================================================
[   15.592153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.592684] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.593362] 
[   15.593654] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.593703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.593717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.593739] Call Trace:
[   15.593766]  <TASK>
[   15.593783]  dump_stack_lvl+0x73/0xb0
[   15.593934]  print_report+0xd1/0x610
[   15.593970]  ? __virt_addr_valid+0x1db/0x2d0
[   15.593995]  ? kasan_atomics_helper+0x1148/0x5450
[   15.594019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.594045]  ? kasan_atomics_helper+0x1148/0x5450
[   15.594068]  kasan_report+0x141/0x180
[   15.594091]  ? kasan_atomics_helper+0x1148/0x5450
[   15.594120]  kasan_check_range+0x10c/0x1c0
[   15.594144]  __kasan_check_write+0x18/0x20
[   15.594166]  kasan_atomics_helper+0x1148/0x5450
[   15.594190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.594215]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.594242]  ? kasan_atomics+0x152/0x310
[   15.594270]  kasan_atomics+0x1dc/0x310
[   15.594295]  ? __pfx_kasan_atomics+0x10/0x10
[   15.594320]  ? __pfx_read_tsc+0x10/0x10
[   15.594343]  ? ktime_get_ts64+0x86/0x230
[   15.594370]  kunit_try_run_case+0x1a5/0x480
[   15.594402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.594513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.594539]  ? __kthread_parkme+0x82/0x180
[   15.594561]  ? preempt_count_sub+0x50/0x80
[   15.594586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.594639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.594666]  kthread+0x337/0x6f0
[   15.594688]  ? trace_preempt_on+0x20/0xc0
[   15.594713]  ? __pfx_kthread+0x10/0x10
[   15.594734]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.594768]  ? calculate_sigpending+0x7b/0xa0
[   15.594793]  ? __pfx_kthread+0x10/0x10
[   15.594816]  ret_from_fork+0x116/0x1d0
[   15.594836]  ? __pfx_kthread+0x10/0x10
[   15.594858]  ret_from_fork_asm+0x1a/0x30
[   15.594890]  </TASK>
[   15.594901] 
[   15.607829] Allocated by task 282:
[   15.608295]  kasan_save_stack+0x45/0x70
[   15.608676]  kasan_save_track+0x18/0x40
[   15.608848]  kasan_save_alloc_info+0x3b/0x50
[   15.609001]  __kasan_kmalloc+0xb7/0xc0
[   15.609137]  __kmalloc_cache_noprof+0x189/0x420
[   15.609296]  kasan_atomics+0x95/0x310
[   15.609432]  kunit_try_run_case+0x1a5/0x480
[   15.610230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.611038]  kthread+0x337/0x6f0
[   15.611498]  ret_from_fork+0x116/0x1d0
[   15.612014]  ret_from_fork_asm+0x1a/0x30
[   15.612531] 
[   15.612824] The buggy address belongs to the object at ffff8881038e7800
[   15.612824]  which belongs to the cache kmalloc-64 of size 64
[   15.614181] The buggy address is located 0 bytes to the right of
[   15.614181]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.614886] 
[   15.614970] The buggy address belongs to the physical page:
[   15.615148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.615390] flags: 0x200000000000000(node=0|zone=2)
[   15.616175] page_type: f5(slab)
[   15.616698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.617805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.618585] page dumped because: kasan: bad access detected
[   15.619208] 
[   15.619527] Memory state around the buggy address:
[   15.620084]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.620643]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.621364] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.621953]                                      ^
[   15.622118]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.622774]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.623726] ==================================================================
[   15.879809] ==================================================================
[   15.880128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.880620] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282
[   15.880991] 
[   15.881106] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.881150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.881163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.881185] Call Trace:
[   15.881199]  <TASK>
[   15.881213]  dump_stack_lvl+0x73/0xb0
[   15.881243]  print_report+0xd1/0x610
[   15.881266]  ? __virt_addr_valid+0x1db/0x2d0
[   15.881290]  ? kasan_atomics_helper+0x177f/0x5450
[   15.881312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.881338]  ? kasan_atomics_helper+0x177f/0x5450
[   15.881361]  kasan_report+0x141/0x180
[   15.881384]  ? kasan_atomics_helper+0x177f/0x5450
[   15.881412]  kasan_check_range+0x10c/0x1c0
[   15.881640]  __kasan_check_write+0x18/0x20
[   15.881663]  kasan_atomics_helper+0x177f/0x5450
[   15.881688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.881713]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.881739]  ? kasan_atomics+0x152/0x310
[   15.881781]  kasan_atomics+0x1dc/0x310
[   15.881805]  ? __pfx_kasan_atomics+0x10/0x10
[   15.881831]  ? __pfx_read_tsc+0x10/0x10
[   15.881853]  ? ktime_get_ts64+0x86/0x230
[   15.881878]  kunit_try_run_case+0x1a5/0x480
[   15.881904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.881928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.881954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.881980]  ? __kthread_parkme+0x82/0x180
[   15.882002]  ? preempt_count_sub+0x50/0x80
[   15.882027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.882079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.882106]  kthread+0x337/0x6f0
[   15.882127]  ? trace_preempt_on+0x20/0xc0
[   15.882152]  ? __pfx_kthread+0x10/0x10
[   15.882173]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.882197]  ? calculate_sigpending+0x7b/0xa0
[   15.882223]  ? __pfx_kthread+0x10/0x10
[   15.882246]  ret_from_fork+0x116/0x1d0
[   15.882265]  ? __pfx_kthread+0x10/0x10
[   15.882288]  ret_from_fork_asm+0x1a/0x30
[   15.882320]  </TASK>
[   15.882331] 
[   15.889842] Allocated by task 282:
[   15.890047]  kasan_save_stack+0x45/0x70
[   15.890268]  kasan_save_track+0x18/0x40
[   15.890484]  kasan_save_alloc_info+0x3b/0x50
[   15.890638]  __kasan_kmalloc+0xb7/0xc0
[   15.890837]  __kmalloc_cache_noprof+0x189/0x420
[   15.891103]  kasan_atomics+0x95/0x310
[   15.891306]  kunit_try_run_case+0x1a5/0x480
[   15.891538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.891789]  kthread+0x337/0x6f0
[   15.892005]  ret_from_fork+0x116/0x1d0
[   15.892261]  ret_from_fork_asm+0x1a/0x30
[   15.892529] 
[   15.892631] The buggy address belongs to the object at ffff8881038e7800
[   15.892631]  which belongs to the cache kmalloc-64 of size 64
[   15.893167] The buggy address is located 0 bytes to the right of
[   15.893167]  allocated 48-byte region [ffff8881038e7800, ffff8881038e7830)
[   15.893745] 
[   15.893841] The buggy address belongs to the physical page:
[   15.894015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   15.894280] flags: 0x200000000000000(node=0|zone=2)
[   15.894551] page_type: f5(slab)
[   15.894743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.895102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.895467] page dumped because: kasan: bad access detected
[   15.895762] 
[   15.895876] Memory state around the buggy address:
[   15.896101]  ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.896420]  ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.896766] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.897069]                                      ^
[   15.897226]  ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.897583]  ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.897911] ==================================================================