Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-x86_64

[   15.404007] ==================================================================
[   15.404829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.405274] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.405859] 
[   15.406102] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.406152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.406165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.406292] Call Trace:
[   15.406310]  <TASK>
[   15.406329]  dump_stack_lvl+0x73/0xb0
[   15.406362]  print_report+0xd1/0x650
[   15.406386]  ? __virt_addr_valid+0x1db/0x2d0
[   15.406413]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.406437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.406466]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.406489]  kasan_report+0x141/0x180
[   15.406513]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.406541]  kasan_check_range+0x10c/0x1c0
[   15.406566]  __kasan_check_write+0x18/0x20
[   15.406586]  kasan_atomics_helper+0x7c7/0x5450
[   15.406624]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.406648]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.406674]  ? kasan_atomics+0x152/0x310
[   15.406701]  kasan_atomics+0x1dc/0x310
[   15.406724]  ? __pfx_kasan_atomics+0x10/0x10
[   15.406750]  ? __pfx_read_tsc+0x10/0x10
[   15.406783]  ? ktime_get_ts64+0x86/0x230
[   15.406809]  kunit_try_run_case+0x1a5/0x480
[   15.406842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.406866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.406891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.406917]  ? __kthread_parkme+0x82/0x180
[   15.406939]  ? preempt_count_sub+0x50/0x80
[   15.406965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.406990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.407016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.407042]  kthread+0x337/0x6f0
[   15.407061]  ? trace_preempt_on+0x20/0xc0
[   15.407087]  ? __pfx_kthread+0x10/0x10
[   15.407108]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.407130]  ? calculate_sigpending+0x7b/0xa0
[   15.407156]  ? __pfx_kthread+0x10/0x10
[   15.407178]  ret_from_fork+0x116/0x1d0
[   15.407198]  ? __pfx_kthread+0x10/0x10
[   15.407219]  ret_from_fork_asm+0x1a/0x30
[   15.407251]  </TASK>
[   15.407262] 
[   15.418207] Allocated by task 282:
[   15.418502]  kasan_save_stack+0x45/0x70
[   15.418798]  kasan_save_track+0x18/0x40
[   15.419010]  kasan_save_alloc_info+0x3b/0x50
[   15.419369]  __kasan_kmalloc+0xb7/0xc0
[   15.419553]  __kmalloc_cache_noprof+0x189/0x420
[   15.419775]  kasan_atomics+0x95/0x310
[   15.420250]  kunit_try_run_case+0x1a5/0x480
[   15.420413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.420824]  kthread+0x337/0x6f0
[   15.421107]  ret_from_fork+0x116/0x1d0
[   15.421246]  ret_from_fork_asm+0x1a/0x30
[   15.421589] 
[   15.421697] The buggy address belongs to the object at ffff8881029cd380
[   15.421697]  which belongs to the cache kmalloc-64 of size 64
[   15.422514] The buggy address is located 0 bytes to the right of
[   15.422514]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.423146] 
[   15.423361] The buggy address belongs to the physical page:
[   15.423550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.424083] flags: 0x200000000000000(node=0|zone=2)
[   15.424318] page_type: f5(slab)
[   15.424474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.424947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.425262] page dumped because: kasan: bad access detected
[   15.425485] 
[   15.425558] Memory state around the buggy address:
[   15.425768]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.426386]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.426650] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.427169]                                      ^
[   15.427437]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.427712]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.428171] ==================================================================
[   15.881625] ==================================================================
[   15.882423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.883193] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.883707] 
[   15.883811] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.883857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.883905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.883927] Call Trace:
[   15.883946]  <TASK>
[   15.883965]  dump_stack_lvl+0x73/0xb0
[   15.883995]  print_report+0xd1/0x650
[   15.884045]  ? __virt_addr_valid+0x1db/0x2d0
[   15.884070]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.884092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.884116]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.884139]  kasan_report+0x141/0x180
[   15.884161]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.884188]  __asan_report_load4_noabort+0x18/0x20
[   15.884214]  kasan_atomics_helper+0x49ce/0x5450
[   15.884237]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.884261]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.884291]  ? kasan_atomics+0x152/0x310
[   15.884320]  kasan_atomics+0x1dc/0x310
[   15.884344]  ? __pfx_kasan_atomics+0x10/0x10
[   15.884370]  ? __pfx_read_tsc+0x10/0x10
[   15.884391]  ? ktime_get_ts64+0x86/0x230
[   15.884418]  kunit_try_run_case+0x1a5/0x480
[   15.884444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.884467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.884493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.884521]  ? __kthread_parkme+0x82/0x180
[   15.884542]  ? preempt_count_sub+0x50/0x80
[   15.884567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.884603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.884628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.884654]  kthread+0x337/0x6f0
[   15.884673]  ? trace_preempt_on+0x20/0xc0
[   15.884699]  ? __pfx_kthread+0x10/0x10
[   15.884720]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.884742]  ? calculate_sigpending+0x7b/0xa0
[   15.884768]  ? __pfx_kthread+0x10/0x10
[   15.884801]  ret_from_fork+0x116/0x1d0
[   15.884820]  ? __pfx_kthread+0x10/0x10
[   15.884841]  ret_from_fork_asm+0x1a/0x30
[   15.884874]  </TASK>
[   15.884885] 
[   15.898044] Allocated by task 282:
[   15.898389]  kasan_save_stack+0x45/0x70
[   15.898793]  kasan_save_track+0x18/0x40
[   15.899030]  kasan_save_alloc_info+0x3b/0x50
[   15.899176]  __kasan_kmalloc+0xb7/0xc0
[   15.899304]  __kmalloc_cache_noprof+0x189/0x420
[   15.899455]  kasan_atomics+0x95/0x310
[   15.899584]  kunit_try_run_case+0x1a5/0x480
[   15.899737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.900234]  kthread+0x337/0x6f0
[   15.900525]  ret_from_fork+0x116/0x1d0
[   15.900916]  ret_from_fork_asm+0x1a/0x30
[   15.901352] 
[   15.901533] The buggy address belongs to the object at ffff8881029cd380
[   15.901533]  which belongs to the cache kmalloc-64 of size 64
[   15.902617] The buggy address is located 0 bytes to the right of
[   15.902617]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.903867] 
[   15.904027] The buggy address belongs to the physical page:
[   15.904530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.905224] flags: 0x200000000000000(node=0|zone=2)
[   15.905472] page_type: f5(slab)
[   15.905590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.905931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.906564] page dumped because: kasan: bad access detected
[   15.907080] 
[   15.907263] Memory state around the buggy address:
[   15.907717]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.908319]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.908535] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.908759]                                      ^
[   15.909189]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909839]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.910565] ==================================================================
[   16.240027] ==================================================================
[   16.240361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.240696] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.241296] 
[   16.241515] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.241563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.241577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.241699] Call Trace:
[   16.241717]  <TASK>
[   16.241736]  dump_stack_lvl+0x73/0xb0
[   16.241769]  print_report+0xd1/0x650
[   16.241802]  ? __virt_addr_valid+0x1db/0x2d0
[   16.241826]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.241884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.241910]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.241932]  kasan_report+0x141/0x180
[   16.241956]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.241983]  __asan_report_load8_noabort+0x18/0x20
[   16.242009]  kasan_atomics_helper+0x4f30/0x5450
[   16.242033]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.242056]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.242082]  ? kasan_atomics+0x152/0x310
[   16.242109]  kasan_atomics+0x1dc/0x310
[   16.242132]  ? __pfx_kasan_atomics+0x10/0x10
[   16.242158]  ? __pfx_read_tsc+0x10/0x10
[   16.242179]  ? ktime_get_ts64+0x86/0x230
[   16.242205]  kunit_try_run_case+0x1a5/0x480
[   16.242230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.242254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.242278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.242303]  ? __kthread_parkme+0x82/0x180
[   16.242325]  ? preempt_count_sub+0x50/0x80
[   16.242350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.242375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.242401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.242427]  kthread+0x337/0x6f0
[   16.242446]  ? trace_preempt_on+0x20/0xc0
[   16.242471]  ? __pfx_kthread+0x10/0x10
[   16.242493]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.242516]  ? calculate_sigpending+0x7b/0xa0
[   16.242541]  ? __pfx_kthread+0x10/0x10
[   16.242563]  ret_from_fork+0x116/0x1d0
[   16.242583]  ? __pfx_kthread+0x10/0x10
[   16.242617]  ret_from_fork_asm+0x1a/0x30
[   16.242649]  </TASK>
[   16.242661] 
[   16.251575] Allocated by task 282:
[   16.251824]  kasan_save_stack+0x45/0x70
[   16.252071]  kasan_save_track+0x18/0x40
[   16.252282]  kasan_save_alloc_info+0x3b/0x50
[   16.252491]  __kasan_kmalloc+0xb7/0xc0
[   16.252699]  __kmalloc_cache_noprof+0x189/0x420
[   16.252858]  kasan_atomics+0x95/0x310
[   16.252992]  kunit_try_run_case+0x1a5/0x480
[   16.253201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.253689]  kthread+0x337/0x6f0
[   16.253814]  ret_from_fork+0x116/0x1d0
[   16.254128]  ret_from_fork_asm+0x1a/0x30
[   16.254320] 
[   16.254425] The buggy address belongs to the object at ffff8881029cd380
[   16.254425]  which belongs to the cache kmalloc-64 of size 64
[   16.254858] The buggy address is located 0 bytes to the right of
[   16.254858]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.255535] 
[   16.255627] The buggy address belongs to the physical page:
[   16.255806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.256373] flags: 0x200000000000000(node=0|zone=2)
[   16.257219] page_type: f5(slab)
[   16.257741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.258198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.258631] page dumped because: kasan: bad access detected
[   16.259000] 
[   16.259088] Memory state around the buggy address:
[   16.259470]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.259927]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.260297] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.260707]                                      ^
[   16.261072]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261364]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261670] ==================================================================
[   15.669890] ==================================================================
[   15.670131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.670977] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.671414] 
[   15.671525] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.671570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.671582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.671679] Call Trace:
[   15.671749]  <TASK>
[   15.671768]  dump_stack_lvl+0x73/0xb0
[   15.671799]  print_report+0xd1/0x650
[   15.671823]  ? __virt_addr_valid+0x1db/0x2d0
[   15.671846]  ? kasan_atomics_helper+0xf10/0x5450
[   15.671869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.671895]  ? kasan_atomics_helper+0xf10/0x5450
[   15.671918]  kasan_report+0x141/0x180
[   15.671941]  ? kasan_atomics_helper+0xf10/0x5450
[   15.671970]  kasan_check_range+0x10c/0x1c0
[   15.672097]  __kasan_check_write+0x18/0x20
[   15.672119]  kasan_atomics_helper+0xf10/0x5450
[   15.672142]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.672167]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.672194]  ? kasan_atomics+0x152/0x310
[   15.672221]  kasan_atomics+0x1dc/0x310
[   15.672245]  ? __pfx_kasan_atomics+0x10/0x10
[   15.672271]  ? __pfx_read_tsc+0x10/0x10
[   15.672292]  ? ktime_get_ts64+0x86/0x230
[   15.672318]  kunit_try_run_case+0x1a5/0x480
[   15.672343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.672367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.672392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.672416]  ? __kthread_parkme+0x82/0x180
[   15.672438]  ? preempt_count_sub+0x50/0x80
[   15.672463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.672488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.672513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.672540]  kthread+0x337/0x6f0
[   15.672559]  ? trace_preempt_on+0x20/0xc0
[   15.672585]  ? __pfx_kthread+0x10/0x10
[   15.672618]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.672640]  ? calculate_sigpending+0x7b/0xa0
[   15.672666]  ? __pfx_kthread+0x10/0x10
[   15.672688]  ret_from_fork+0x116/0x1d0
[   15.672708]  ? __pfx_kthread+0x10/0x10
[   15.672728]  ret_from_fork_asm+0x1a/0x30
[   15.672760]  </TASK>
[   15.672772] 
[   15.682942] Allocated by task 282:
[   15.683128]  kasan_save_stack+0x45/0x70
[   15.683330]  kasan_save_track+0x18/0x40
[   15.683511]  kasan_save_alloc_info+0x3b/0x50
[   15.683734]  __kasan_kmalloc+0xb7/0xc0
[   15.683924]  __kmalloc_cache_noprof+0x189/0x420
[   15.684530]  kasan_atomics+0x95/0x310
[   15.684688]  kunit_try_run_case+0x1a5/0x480
[   15.685073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.685294]  kthread+0x337/0x6f0
[   15.685569]  ret_from_fork+0x116/0x1d0
[   15.685730]  ret_from_fork_asm+0x1a/0x30
[   15.686084] 
[   15.686180] The buggy address belongs to the object at ffff8881029cd380
[   15.686180]  which belongs to the cache kmalloc-64 of size 64
[   15.686747] The buggy address is located 0 bytes to the right of
[   15.686747]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.687525] 
[   15.687644] The buggy address belongs to the physical page:
[   15.688054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.688423] flags: 0x200000000000000(node=0|zone=2)
[   15.688742] page_type: f5(slab)
[   15.689007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.689330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.689632] page dumped because: kasan: bad access detected
[   15.690066] 
[   15.690151] Memory state around the buggy address:
[   15.690369]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.690772]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.691187] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.691475]                                      ^
[   15.691795]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.692169]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.692454] ==================================================================
[   16.202062] ==================================================================
[   16.202548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.202944] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.203234] 
[   16.203346] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.203390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.203402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.203424] Call Trace:
[   16.203440]  <TASK>
[   16.203457]  dump_stack_lvl+0x73/0xb0
[   16.203485]  print_report+0xd1/0x650
[   16.203508]  ? __virt_addr_valid+0x1db/0x2d0
[   16.203532]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.203554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.203578]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.203616]  kasan_report+0x141/0x180
[   16.203638]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.203666]  kasan_check_range+0x10c/0x1c0
[   16.203690]  __kasan_check_write+0x18/0x20
[   16.203711]  kasan_atomics_helper+0x1b22/0x5450
[   16.203734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.203757]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.203782]  ? kasan_atomics+0x152/0x310
[   16.203808]  kasan_atomics+0x1dc/0x310
[   16.203831]  ? __pfx_kasan_atomics+0x10/0x10
[   16.203856]  ? __pfx_read_tsc+0x10/0x10
[   16.203879]  ? ktime_get_ts64+0x86/0x230
[   16.203903]  kunit_try_run_case+0x1a5/0x480
[   16.203928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.203952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.203976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.204000]  ? __kthread_parkme+0x82/0x180
[   16.204021]  ? preempt_count_sub+0x50/0x80
[   16.204046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.204070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.204096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.204122]  kthread+0x337/0x6f0
[   16.204141]  ? trace_preempt_on+0x20/0xc0
[   16.204165]  ? __pfx_kthread+0x10/0x10
[   16.204186]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.204208]  ? calculate_sigpending+0x7b/0xa0
[   16.204245]  ? __pfx_kthread+0x10/0x10
[   16.204267]  ret_from_fork+0x116/0x1d0
[   16.204286]  ? __pfx_kthread+0x10/0x10
[   16.204307]  ret_from_fork_asm+0x1a/0x30
[   16.204338]  </TASK>
[   16.204350] 
[   16.211553] Allocated by task 282:
[   16.211734]  kasan_save_stack+0x45/0x70
[   16.212140]  kasan_save_track+0x18/0x40
[   16.212332]  kasan_save_alloc_info+0x3b/0x50
[   16.212553]  __kasan_kmalloc+0xb7/0xc0
[   16.212756]  __kmalloc_cache_noprof+0x189/0x420
[   16.212988]  kasan_atomics+0x95/0x310
[   16.213162]  kunit_try_run_case+0x1a5/0x480
[   16.213316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.213555]  kthread+0x337/0x6f0
[   16.213735]  ret_from_fork+0x116/0x1d0
[   16.213937]  ret_from_fork_asm+0x1a/0x30
[   16.214083] 
[   16.214157] The buggy address belongs to the object at ffff8881029cd380
[   16.214157]  which belongs to the cache kmalloc-64 of size 64
[   16.214684] The buggy address is located 0 bytes to the right of
[   16.214684]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.215138] 
[   16.215229] The buggy address belongs to the physical page:
[   16.215477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.215734] flags: 0x200000000000000(node=0|zone=2)
[   16.216209] page_type: f5(slab)
[   16.216338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.216569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.216861] page dumped because: kasan: bad access detected
[   16.217113] 
[   16.217206] Memory state around the buggy address:
[   16.217430]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.217725]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.218063] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.218279]                                      ^
[   16.218433]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.218659]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.218976] ==================================================================
[   15.693026] ==================================================================
[   15.693305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.694100] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.694536] 
[   15.694728] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.694774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.694787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.694809] Call Trace:
[   15.694948]  <TASK>
[   15.694966]  dump_stack_lvl+0x73/0xb0
[   15.694997]  print_report+0xd1/0x650
[   15.695019]  ? __virt_addr_valid+0x1db/0x2d0
[   15.695043]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.695065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.695090]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.695112]  kasan_report+0x141/0x180
[   15.695134]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.695161]  kasan_check_range+0x10c/0x1c0
[   15.695186]  __kasan_check_write+0x18/0x20
[   15.695207]  kasan_atomics_helper+0xfa9/0x5450
[   15.695230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.695254]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.695280]  ? kasan_atomics+0x152/0x310
[   15.695307]  kasan_atomics+0x1dc/0x310
[   15.695329]  ? __pfx_kasan_atomics+0x10/0x10
[   15.695354]  ? __pfx_read_tsc+0x10/0x10
[   15.695377]  ? ktime_get_ts64+0x86/0x230
[   15.695403]  kunit_try_run_case+0x1a5/0x480
[   15.695427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.695451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.695475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.695500]  ? __kthread_parkme+0x82/0x180
[   15.695522]  ? preempt_count_sub+0x50/0x80
[   15.695547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.695572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.695609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.695636]  kthread+0x337/0x6f0
[   15.695656]  ? trace_preempt_on+0x20/0xc0
[   15.695681]  ? __pfx_kthread+0x10/0x10
[   15.695704]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.695727]  ? calculate_sigpending+0x7b/0xa0
[   15.695753]  ? __pfx_kthread+0x10/0x10
[   15.695788]  ret_from_fork+0x116/0x1d0
[   15.695807]  ? __pfx_kthread+0x10/0x10
[   15.695829]  ret_from_fork_asm+0x1a/0x30
[   15.695861]  </TASK>
[   15.695872] 
[   15.705520] Allocated by task 282:
[   15.705802]  kasan_save_stack+0x45/0x70
[   15.706164]  kasan_save_track+0x18/0x40
[   15.706416]  kasan_save_alloc_info+0x3b/0x50
[   15.706700]  __kasan_kmalloc+0xb7/0xc0
[   15.706903]  __kmalloc_cache_noprof+0x189/0x420
[   15.707234]  kasan_atomics+0x95/0x310
[   15.707423]  kunit_try_run_case+0x1a5/0x480
[   15.707619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.707848]  kthread+0x337/0x6f0
[   15.708198]  ret_from_fork+0x116/0x1d0
[   15.708446]  ret_from_fork_asm+0x1a/0x30
[   15.708619] 
[   15.708713] The buggy address belongs to the object at ffff8881029cd380
[   15.708713]  which belongs to the cache kmalloc-64 of size 64
[   15.709459] The buggy address is located 0 bytes to the right of
[   15.709459]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.710150] 
[   15.710227] The buggy address belongs to the physical page:
[   15.710611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.711008] flags: 0x200000000000000(node=0|zone=2)
[   15.711293] page_type: f5(slab)
[   15.711430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.711857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.712263] page dumped because: kasan: bad access detected
[   15.712499] 
[   15.712576] Memory state around the buggy address:
[   15.712981]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.713274]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.713632] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.713989]                                      ^
[   15.714326]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.714652]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.715058] ==================================================================
[   15.501341] ==================================================================
[   15.501931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.502375] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.502612] 
[   15.502722] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.502785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.502815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.502840] Call Trace:
[   15.502857]  <TASK>
[   15.502874]  dump_stack_lvl+0x73/0xb0
[   15.502903]  print_report+0xd1/0x650
[   15.502925]  ? __virt_addr_valid+0x1db/0x2d0
[   15.502950]  ? kasan_atomics_helper+0xac7/0x5450
[   15.502972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.502997]  ? kasan_atomics_helper+0xac7/0x5450
[   15.503019]  kasan_report+0x141/0x180
[   15.503051]  ? kasan_atomics_helper+0xac7/0x5450
[   15.503078]  kasan_check_range+0x10c/0x1c0
[   15.503120]  __kasan_check_write+0x18/0x20
[   15.503141]  kasan_atomics_helper+0xac7/0x5450
[   15.503164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.503188]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.503214]  ? kasan_atomics+0x152/0x310
[   15.503241]  kasan_atomics+0x1dc/0x310
[   15.503273]  ? __pfx_kasan_atomics+0x10/0x10
[   15.503297]  ? __pfx_read_tsc+0x10/0x10
[   15.503319]  ? ktime_get_ts64+0x86/0x230
[   15.503344]  kunit_try_run_case+0x1a5/0x480
[   15.503368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.503401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.503426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.503450]  ? __kthread_parkme+0x82/0x180
[   15.503471]  ? preempt_count_sub+0x50/0x80
[   15.503496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.503522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.503547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.503573]  kthread+0x337/0x6f0
[   15.503603]  ? trace_preempt_on+0x20/0xc0
[   15.503628]  ? __pfx_kthread+0x10/0x10
[   15.503649]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.503672]  ? calculate_sigpending+0x7b/0xa0
[   15.503696]  ? __pfx_kthread+0x10/0x10
[   15.503718]  ret_from_fork+0x116/0x1d0
[   15.503738]  ? __pfx_kthread+0x10/0x10
[   15.503759]  ret_from_fork_asm+0x1a/0x30
[   15.503808]  </TASK>
[   15.503820] 
[   15.511018] Allocated by task 282:
[   15.511198]  kasan_save_stack+0x45/0x70
[   15.511401]  kasan_save_track+0x18/0x40
[   15.511617]  kasan_save_alloc_info+0x3b/0x50
[   15.511815]  __kasan_kmalloc+0xb7/0xc0
[   15.512012]  __kmalloc_cache_noprof+0x189/0x420
[   15.512198]  kasan_atomics+0x95/0x310
[   15.512371]  kunit_try_run_case+0x1a5/0x480
[   15.512573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.512777]  kthread+0x337/0x6f0
[   15.512911]  ret_from_fork+0x116/0x1d0
[   15.513098]  ret_from_fork_asm+0x1a/0x30
[   15.513296] 
[   15.513389] The buggy address belongs to the object at ffff8881029cd380
[   15.513389]  which belongs to the cache kmalloc-64 of size 64
[   15.513778] The buggy address is located 0 bytes to the right of
[   15.513778]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.514329] 
[   15.514428] The buggy address belongs to the physical page:
[   15.514672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.515039] flags: 0x200000000000000(node=0|zone=2)
[   15.515219] page_type: f5(slab)
[   15.515338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.515570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.516265] page dumped because: kasan: bad access detected
[   15.516943] 
[   15.517025] Memory state around the buggy address:
[   15.517229]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.517545]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.518731] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.518978]                                      ^
[   15.519139]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.519360]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.519578] ==================================================================
[   15.239441] ==================================================================
[   15.239942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.240275] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.240563] 
[   15.240692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.240735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.240748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.240843] Call Trace:
[   15.240863]  <TASK>
[   15.240879]  dump_stack_lvl+0x73/0xb0
[   15.240907]  print_report+0xd1/0x650
[   15.240930]  ? __virt_addr_valid+0x1db/0x2d0
[   15.240954]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.240977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.241001]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.241024]  kasan_report+0x141/0x180
[   15.241047]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.241074]  __asan_report_load4_noabort+0x18/0x20
[   15.241100]  kasan_atomics_helper+0x4b54/0x5450
[   15.241124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.241148]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.241174]  ? kasan_atomics+0x152/0x310
[   15.241201]  kasan_atomics+0x1dc/0x310
[   15.241224]  ? __pfx_kasan_atomics+0x10/0x10
[   15.241249]  ? __pfx_read_tsc+0x10/0x10
[   15.241271]  ? ktime_get_ts64+0x86/0x230
[   15.241296]  kunit_try_run_case+0x1a5/0x480
[   15.241320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.241369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.241397]  ? __kthread_parkme+0x82/0x180
[   15.241419]  ? preempt_count_sub+0x50/0x80
[   15.241444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.241496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.241522]  kthread+0x337/0x6f0
[   15.241542]  ? trace_preempt_on+0x20/0xc0
[   15.241566]  ? __pfx_kthread+0x10/0x10
[   15.241587]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.241622]  ? calculate_sigpending+0x7b/0xa0
[   15.241648]  ? __pfx_kthread+0x10/0x10
[   15.241670]  ret_from_fork+0x116/0x1d0
[   15.241690]  ? __pfx_kthread+0x10/0x10
[   15.241711]  ret_from_fork_asm+0x1a/0x30
[   15.241743]  </TASK>
[   15.241753] 
[   15.249460] Allocated by task 282:
[   15.249664]  kasan_save_stack+0x45/0x70
[   15.249936]  kasan_save_track+0x18/0x40
[   15.250136]  kasan_save_alloc_info+0x3b/0x50
[   15.250349]  __kasan_kmalloc+0xb7/0xc0
[   15.250539]  __kmalloc_cache_noprof+0x189/0x420
[   15.250783]  kasan_atomics+0x95/0x310
[   15.250947]  kunit_try_run_case+0x1a5/0x480
[   15.251096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.251304]  kthread+0x337/0x6f0
[   15.251474]  ret_from_fork+0x116/0x1d0
[   15.251942]  ret_from_fork_asm+0x1a/0x30
[   15.252151] 
[   15.252248] The buggy address belongs to the object at ffff8881029cd380
[   15.252248]  which belongs to the cache kmalloc-64 of size 64
[   15.252744] The buggy address is located 0 bytes to the right of
[   15.252744]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.253300] 
[   15.253400] The buggy address belongs to the physical page:
[   15.253633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.254038] flags: 0x200000000000000(node=0|zone=2)
[   15.254256] page_type: f5(slab)
[   15.254422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.254707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.255149] page dumped because: kasan: bad access detected
[   15.255412] 
[   15.255509] Memory state around the buggy address:
[   15.255752]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.256096]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.256367] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.256582]                                      ^
[   15.256748]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.257072]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.257394] ==================================================================
[   15.842227] ==================================================================
[   15.842492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.843261] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.843562] 
[   15.843689] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.843735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.843748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.843770] Call Trace:
[   15.843789]  <TASK>
[   15.843808]  dump_stack_lvl+0x73/0xb0
[   15.843836]  print_report+0xd1/0x650
[   15.843859]  ? __virt_addr_valid+0x1db/0x2d0
[   15.843883]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.843905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.843929]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.843952]  kasan_report+0x141/0x180
[   15.843974]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.844001]  __asan_report_load4_noabort+0x18/0x20
[   15.844026]  kasan_atomics_helper+0x49e8/0x5450
[   15.844050]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.844073]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.844100]  ? kasan_atomics+0x152/0x310
[   15.844126]  kasan_atomics+0x1dc/0x310
[   15.844148]  ? __pfx_kasan_atomics+0x10/0x10
[   15.844173]  ? __pfx_read_tsc+0x10/0x10
[   15.844194]  ? ktime_get_ts64+0x86/0x230
[   15.844219]  kunit_try_run_case+0x1a5/0x480
[   15.844245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844268]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.844293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.844318]  ? __kthread_parkme+0x82/0x180
[   15.844340]  ? preempt_count_sub+0x50/0x80
[   15.844365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.844416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.844442]  kthread+0x337/0x6f0
[   15.844463]  ? trace_preempt_on+0x20/0xc0
[   15.844488]  ? __pfx_kthread+0x10/0x10
[   15.844509]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.844531]  ? calculate_sigpending+0x7b/0xa0
[   15.844556]  ? __pfx_kthread+0x10/0x10
[   15.844579]  ret_from_fork+0x116/0x1d0
[   15.844614]  ? __pfx_kthread+0x10/0x10
[   15.844635]  ret_from_fork_asm+0x1a/0x30
[   15.844666]  </TASK>
[   15.844678] 
[   15.852004] Allocated by task 282:
[   15.852220]  kasan_save_stack+0x45/0x70
[   15.852445]  kasan_save_track+0x18/0x40
[   15.852637]  kasan_save_alloc_info+0x3b/0x50
[   15.852785]  __kasan_kmalloc+0xb7/0xc0
[   15.853015]  __kmalloc_cache_noprof+0x189/0x420
[   15.853417]  kasan_atomics+0x95/0x310
[   15.853583]  kunit_try_run_case+0x1a5/0x480
[   15.853775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.853988]  kthread+0x337/0x6f0
[   15.854171]  ret_from_fork+0x116/0x1d0
[   15.854381]  ret_from_fork_asm+0x1a/0x30
[   15.854519] 
[   15.854588] The buggy address belongs to the object at ffff8881029cd380
[   15.854588]  which belongs to the cache kmalloc-64 of size 64
[   15.855373] The buggy address is located 0 bytes to the right of
[   15.855373]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.855887] 
[   15.856005] The buggy address belongs to the physical page:
[   15.856252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.856506] flags: 0x200000000000000(node=0|zone=2)
[   15.856678] page_type: f5(slab)
[   15.856797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.857253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.857585] page dumped because: kasan: bad access detected
[   15.858047] 
[   15.858116] Memory state around the buggy address:
[   15.858268]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858473]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858913] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.859233]                                      ^
[   15.859465]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.859812]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.860135] ==================================================================
[   15.446538] ==================================================================
[   15.447051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.447310] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.447636] 
[   15.447722] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.448672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.448684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.448705] Call Trace:
[   15.448722]  <TASK>
[   15.448740]  dump_stack_lvl+0x73/0xb0
[   15.448776]  print_report+0xd1/0x650
[   15.448798]  ? __virt_addr_valid+0x1db/0x2d0
[   15.448821]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.448844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.448894]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.448939]  kasan_report+0x141/0x180
[   15.448965]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.449004]  kasan_check_range+0x10c/0x1c0
[   15.449028]  __kasan_check_write+0x18/0x20
[   15.449049]  kasan_atomics_helper+0x8f9/0x5450
[   15.449072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.449096]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.449124]  ? kasan_atomics+0x152/0x310
[   15.449151]  kasan_atomics+0x1dc/0x310
[   15.449174]  ? __pfx_kasan_atomics+0x10/0x10
[   15.449199]  ? __pfx_read_tsc+0x10/0x10
[   15.449222]  ? ktime_get_ts64+0x86/0x230
[   15.449247]  kunit_try_run_case+0x1a5/0x480
[   15.449272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.449296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.449321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.449346]  ? __kthread_parkme+0x82/0x180
[   15.449368]  ? preempt_count_sub+0x50/0x80
[   15.449393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.449438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.449465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.449491]  kthread+0x337/0x6f0
[   15.449511]  ? trace_preempt_on+0x20/0xc0
[   15.449537]  ? __pfx_kthread+0x10/0x10
[   15.449558]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.449581]  ? calculate_sigpending+0x7b/0xa0
[   15.449615]  ? __pfx_kthread+0x10/0x10
[   15.449638]  ret_from_fork+0x116/0x1d0
[   15.449657]  ? __pfx_kthread+0x10/0x10
[   15.449701]  ret_from_fork_asm+0x1a/0x30
[   15.449734]  </TASK>
[   15.449745] 
[   15.456933] Allocated by task 282:
[   15.457064]  kasan_save_stack+0x45/0x70
[   15.457270]  kasan_save_track+0x18/0x40
[   15.457480]  kasan_save_alloc_info+0x3b/0x50
[   15.457715]  __kasan_kmalloc+0xb7/0xc0
[   15.457929]  __kmalloc_cache_noprof+0x189/0x420
[   15.458155]  kasan_atomics+0x95/0x310
[   15.458344]  kunit_try_run_case+0x1a5/0x480
[   15.458524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.458705]  kthread+0x337/0x6f0
[   15.458862]  ret_from_fork+0x116/0x1d0
[   15.459073]  ret_from_fork_asm+0x1a/0x30
[   15.459268] 
[   15.459359] The buggy address belongs to the object at ffff8881029cd380
[   15.459359]  which belongs to the cache kmalloc-64 of size 64
[   15.459828] The buggy address is located 0 bytes to the right of
[   15.459828]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.460235] 
[   15.460333] The buggy address belongs to the physical page:
[   15.460619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.461031] flags: 0x200000000000000(node=0|zone=2)
[   15.461273] page_type: f5(slab)
[   15.461452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.461723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.461969] page dumped because: kasan: bad access detected
[   15.462212] 
[   15.462302] Memory state around the buggy address:
[   15.462545]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.462889]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.463105] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.463362]                                      ^
[   15.463588]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.463956]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.464243] ==================================================================
[   15.624766] ==================================================================
[   15.625029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.625868] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.626320] 
[   15.626478] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.626582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.626607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.626629] Call Trace:
[   15.626645]  <TASK>
[   15.626663]  dump_stack_lvl+0x73/0xb0
[   15.626694]  print_report+0xd1/0x650
[   15.626718]  ? __virt_addr_valid+0x1db/0x2d0
[   15.626743]  ? kasan_atomics_helper+0xde0/0x5450
[   15.626765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.626804]  ? kasan_atomics_helper+0xde0/0x5450
[   15.626832]  kasan_report+0x141/0x180
[   15.626855]  ? kasan_atomics_helper+0xde0/0x5450
[   15.626883]  kasan_check_range+0x10c/0x1c0
[   15.626908]  __kasan_check_write+0x18/0x20
[   15.626928]  kasan_atomics_helper+0xde0/0x5450
[   15.626952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.626976]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.627002]  ? kasan_atomics+0x152/0x310
[   15.627028]  kasan_atomics+0x1dc/0x310
[   15.627052]  ? __pfx_kasan_atomics+0x10/0x10
[   15.627077]  ? __pfx_read_tsc+0x10/0x10
[   15.627099]  ? ktime_get_ts64+0x86/0x230
[   15.627124]  kunit_try_run_case+0x1a5/0x480
[   15.627149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.627173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.627198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.627223]  ? __kthread_parkme+0x82/0x180
[   15.627246]  ? preempt_count_sub+0x50/0x80
[   15.627271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.627297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.627322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.627348]  kthread+0x337/0x6f0
[   15.627369]  ? trace_preempt_on+0x20/0xc0
[   15.627394]  ? __pfx_kthread+0x10/0x10
[   15.627415]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.627438]  ? calculate_sigpending+0x7b/0xa0
[   15.627464]  ? __pfx_kthread+0x10/0x10
[   15.627486]  ret_from_fork+0x116/0x1d0
[   15.627509]  ? __pfx_kthread+0x10/0x10
[   15.627530]  ret_from_fork_asm+0x1a/0x30
[   15.627562]  </TASK>
[   15.627574] 
[   15.637178] Allocated by task 282:
[   15.637514]  kasan_save_stack+0x45/0x70
[   15.637697]  kasan_save_track+0x18/0x40
[   15.638084]  kasan_save_alloc_info+0x3b/0x50
[   15.638361]  __kasan_kmalloc+0xb7/0xc0
[   15.638609]  __kmalloc_cache_noprof+0x189/0x420
[   15.638938]  kasan_atomics+0x95/0x310
[   15.639103]  kunit_try_run_case+0x1a5/0x480
[   15.639312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.639551]  kthread+0x337/0x6f0
[   15.639723]  ret_from_fork+0x116/0x1d0
[   15.640166]  ret_from_fork_asm+0x1a/0x30
[   15.640417] 
[   15.640506] The buggy address belongs to the object at ffff8881029cd380
[   15.640506]  which belongs to the cache kmalloc-64 of size 64
[   15.641220] The buggy address is located 0 bytes to the right of
[   15.641220]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.641874] 
[   15.641953] The buggy address belongs to the physical page:
[   15.642296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.642647] flags: 0x200000000000000(node=0|zone=2)
[   15.643031] page_type: f5(slab)
[   15.643202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.643633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.644062] page dumped because: kasan: bad access detected
[   15.644286] 
[   15.644477] Memory state around the buggy address:
[   15.644749]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.645141]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.645432] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.645844]                                      ^
[   15.646117]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.646408]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.646724] ==================================================================
[   16.124324] ==================================================================
[   16.124647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.125016] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.125246] 
[   16.125327] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.125366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.125378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.125399] Call Trace:
[   16.125413]  <TASK>
[   16.125429]  dump_stack_lvl+0x73/0xb0
[   16.125456]  print_report+0xd1/0x650
[   16.125478]  ? __virt_addr_valid+0x1db/0x2d0
[   16.125501]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.125523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.125547]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.125570]  kasan_report+0x141/0x180
[   16.125604]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.125631]  kasan_check_range+0x10c/0x1c0
[   16.125655]  __kasan_check_write+0x18/0x20
[   16.125676]  kasan_atomics_helper+0x18b1/0x5450
[   16.125700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.125723]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.125748]  ? kasan_atomics+0x152/0x310
[   16.125775]  kasan_atomics+0x1dc/0x310
[   16.125797]  ? __pfx_kasan_atomics+0x10/0x10
[   16.125823]  ? __pfx_read_tsc+0x10/0x10
[   16.125845]  ? ktime_get_ts64+0x86/0x230
[   16.125869]  kunit_try_run_case+0x1a5/0x480
[   16.125894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.125917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.125941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.125966]  ? __kthread_parkme+0x82/0x180
[   16.125986]  ? preempt_count_sub+0x50/0x80
[   16.126011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.126036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.126061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.126088]  kthread+0x337/0x6f0
[   16.126107]  ? trace_preempt_on+0x20/0xc0
[   16.126131]  ? __pfx_kthread+0x10/0x10
[   16.126152]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.126175]  ? calculate_sigpending+0x7b/0xa0
[   16.126199]  ? __pfx_kthread+0x10/0x10
[   16.126222]  ret_from_fork+0x116/0x1d0
[   16.126241]  ? __pfx_kthread+0x10/0x10
[   16.126262]  ret_from_fork_asm+0x1a/0x30
[   16.126293]  </TASK>
[   16.126304] 
[   16.134286] Allocated by task 282:
[   16.134415]  kasan_save_stack+0x45/0x70
[   16.134556]  kasan_save_track+0x18/0x40
[   16.134703]  kasan_save_alloc_info+0x3b/0x50
[   16.134858]  __kasan_kmalloc+0xb7/0xc0
[   16.134991]  __kmalloc_cache_noprof+0x189/0x420
[   16.135409]  kasan_atomics+0x95/0x310
[   16.135610]  kunit_try_run_case+0x1a5/0x480
[   16.135822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.136298]  kthread+0x337/0x6f0
[   16.136476]  ret_from_fork+0x116/0x1d0
[   16.136675]  ret_from_fork_asm+0x1a/0x30
[   16.136981] 
[   16.137079] The buggy address belongs to the object at ffff8881029cd380
[   16.137079]  which belongs to the cache kmalloc-64 of size 64
[   16.137560] The buggy address is located 0 bytes to the right of
[   16.137560]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.138250] 
[   16.138351] The buggy address belongs to the physical page:
[   16.138548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.138858] flags: 0x200000000000000(node=0|zone=2)
[   16.139103] page_type: f5(slab)
[   16.139258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.139527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.139848] page dumped because: kasan: bad access detected
[   16.140093] 
[   16.140171] Memory state around the buggy address:
[   16.140363]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.140663]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.140976] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.141222]                                      ^
[   16.141379]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.141604]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.142105] ==================================================================
[   15.555468] ==================================================================
[   15.555809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.556898] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.557144] 
[   15.557240] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.557286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.557300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.557323] Call Trace:
[   15.557341]  <TASK>
[   15.557361]  dump_stack_lvl+0x73/0xb0
[   15.557393]  print_report+0xd1/0x650
[   15.557417]  ? __virt_addr_valid+0x1db/0x2d0
[   15.557442]  ? kasan_atomics_helper+0xc70/0x5450
[   15.557465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.557490]  ? kasan_atomics_helper+0xc70/0x5450
[   15.557512]  kasan_report+0x141/0x180
[   15.557535]  ? kasan_atomics_helper+0xc70/0x5450
[   15.557562]  kasan_check_range+0x10c/0x1c0
[   15.557587]  __kasan_check_write+0x18/0x20
[   15.557622]  kasan_atomics_helper+0xc70/0x5450
[   15.557855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.557881]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.557909]  ? kasan_atomics+0x152/0x310
[   15.557936]  kasan_atomics+0x1dc/0x310
[   15.557959]  ? __pfx_kasan_atomics+0x10/0x10
[   15.558151]  ? __pfx_read_tsc+0x10/0x10
[   15.558176]  ? ktime_get_ts64+0x86/0x230
[   15.558203]  kunit_try_run_case+0x1a5/0x480
[   15.558229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.558253]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.558279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.558303]  ? __kthread_parkme+0x82/0x180
[   15.558325]  ? preempt_count_sub+0x50/0x80
[   15.558351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.558376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.558401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.558428]  kthread+0x337/0x6f0
[   15.558447]  ? trace_preempt_on+0x20/0xc0
[   15.558474]  ? __pfx_kthread+0x10/0x10
[   15.558496]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.558518]  ? calculate_sigpending+0x7b/0xa0
[   15.558543]  ? __pfx_kthread+0x10/0x10
[   15.558565]  ret_from_fork+0x116/0x1d0
[   15.558584]  ? __pfx_kthread+0x10/0x10
[   15.558618]  ret_from_fork_asm+0x1a/0x30
[   15.558651]  </TASK>
[   15.558664] 
[   15.569683] Allocated by task 282:
[   15.570125]  kasan_save_stack+0x45/0x70
[   15.570388]  kasan_save_track+0x18/0x40
[   15.570683]  kasan_save_alloc_info+0x3b/0x50
[   15.571043]  __kasan_kmalloc+0xb7/0xc0
[   15.571331]  __kmalloc_cache_noprof+0x189/0x420
[   15.571562]  kasan_atomics+0x95/0x310
[   15.571746]  kunit_try_run_case+0x1a5/0x480
[   15.572180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.572527]  kthread+0x337/0x6f0
[   15.572765]  ret_from_fork+0x116/0x1d0
[   15.573128]  ret_from_fork_asm+0x1a/0x30
[   15.573328] 
[   15.573418] The buggy address belongs to the object at ffff8881029cd380
[   15.573418]  which belongs to the cache kmalloc-64 of size 64
[   15.574131] The buggy address is located 0 bytes to the right of
[   15.574131]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.575049] 
[   15.575159] The buggy address belongs to the physical page:
[   15.575399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.575705] flags: 0x200000000000000(node=0|zone=2)
[   15.575875] page_type: f5(slab)
[   15.576073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.576400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.576649] page dumped because: kasan: bad access detected
[   15.576903] 
[   15.577033] Memory state around the buggy address:
[   15.577234]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.577498]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.577846] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.578145]                                      ^
[   15.578338]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.578588]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.578932] ==================================================================
[   16.358330] ==================================================================
[   16.358705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.359091] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.359420] 
[   16.359527] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.359571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.359583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.359617] Call Trace:
[   16.359635]  <TASK>
[   16.359653]  dump_stack_lvl+0x73/0xb0
[   16.359683]  print_report+0xd1/0x650
[   16.359706]  ? __virt_addr_valid+0x1db/0x2d0
[   16.359731]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.359753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.359778]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.359812]  kasan_report+0x141/0x180
[   16.359854]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.359882]  kasan_check_range+0x10c/0x1c0
[   16.359910]  __kasan_check_write+0x18/0x20
[   16.359929]  kasan_atomics_helper+0x1f43/0x5450
[   16.359953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.359977]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.360003]  ? kasan_atomics+0x152/0x310
[   16.360030]  kasan_atomics+0x1dc/0x310
[   16.360053]  ? __pfx_kasan_atomics+0x10/0x10
[   16.360079]  ? __pfx_read_tsc+0x10/0x10
[   16.360101]  ? ktime_get_ts64+0x86/0x230
[   16.360126]  kunit_try_run_case+0x1a5/0x480
[   16.360151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.360175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.360201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.360226]  ? __kthread_parkme+0x82/0x180
[   16.360248]  ? preempt_count_sub+0x50/0x80
[   16.360273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.360299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.360324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.360351]  kthread+0x337/0x6f0
[   16.360370]  ? trace_preempt_on+0x20/0xc0
[   16.360396]  ? __pfx_kthread+0x10/0x10
[   16.360417]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.360440]  ? calculate_sigpending+0x7b/0xa0
[   16.360466]  ? __pfx_kthread+0x10/0x10
[   16.360488]  ret_from_fork+0x116/0x1d0
[   16.360507]  ? __pfx_kthread+0x10/0x10
[   16.360528]  ret_from_fork_asm+0x1a/0x30
[   16.360559]  </TASK>
[   16.360570] 
[   16.368216] Allocated by task 282:
[   16.368476]  kasan_save_stack+0x45/0x70
[   16.368717]  kasan_save_track+0x18/0x40
[   16.368962]  kasan_save_alloc_info+0x3b/0x50
[   16.369112]  __kasan_kmalloc+0xb7/0xc0
[   16.369244]  __kmalloc_cache_noprof+0x189/0x420
[   16.369439]  kasan_atomics+0x95/0x310
[   16.369638]  kunit_try_run_case+0x1a5/0x480
[   16.369975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.370235]  kthread+0x337/0x6f0
[   16.370415]  ret_from_fork+0x116/0x1d0
[   16.370572]  ret_from_fork_asm+0x1a/0x30
[   16.370800] 
[   16.370954] The buggy address belongs to the object at ffff8881029cd380
[   16.370954]  which belongs to the cache kmalloc-64 of size 64
[   16.371449] The buggy address is located 0 bytes to the right of
[   16.371449]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.372118] 
[   16.372206] The buggy address belongs to the physical page:
[   16.372445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.372767] flags: 0x200000000000000(node=0|zone=2)
[   16.373033] page_type: f5(slab)
[   16.373181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.373416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.373693] page dumped because: kasan: bad access detected
[   16.373949] 
[   16.374048] Memory state around the buggy address:
[   16.374295]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.374628]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.375039] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.375327]                                      ^
[   16.375483]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.375758]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.376419] ==================================================================
[   16.415092] ==================================================================
[   16.415642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.416013] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.416340] 
[   16.416468] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.416513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.416525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.416547] Call Trace:
[   16.416565]  <TASK>
[   16.416583]  dump_stack_lvl+0x73/0xb0
[   16.416625]  print_report+0xd1/0x650
[   16.416648]  ? __virt_addr_valid+0x1db/0x2d0
[   16.416672]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.416695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.416720]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.416744]  kasan_report+0x141/0x180
[   16.416766]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.416802]  __asan_report_load8_noabort+0x18/0x20
[   16.416850]  kasan_atomics_helper+0x4f98/0x5450
[   16.416874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.416898]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.416925]  ? kasan_atomics+0x152/0x310
[   16.416952]  kasan_atomics+0x1dc/0x310
[   16.416975]  ? __pfx_kasan_atomics+0x10/0x10
[   16.417000]  ? __pfx_read_tsc+0x10/0x10
[   16.417023]  ? ktime_get_ts64+0x86/0x230
[   16.417049]  kunit_try_run_case+0x1a5/0x480
[   16.417074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.417098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.417124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.417149]  ? __kthread_parkme+0x82/0x180
[   16.417193]  ? preempt_count_sub+0x50/0x80
[   16.417218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.417243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.417269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.417295]  kthread+0x337/0x6f0
[   16.417315]  ? trace_preempt_on+0x20/0xc0
[   16.417340]  ? __pfx_kthread+0x10/0x10
[   16.417362]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.417385]  ? calculate_sigpending+0x7b/0xa0
[   16.417410]  ? __pfx_kthread+0x10/0x10
[   16.417432]  ret_from_fork+0x116/0x1d0
[   16.417453]  ? __pfx_kthread+0x10/0x10
[   16.417475]  ret_from_fork_asm+0x1a/0x30
[   16.417507]  </TASK>
[   16.417518] 
[   16.425043] Allocated by task 282:
[   16.425230]  kasan_save_stack+0x45/0x70
[   16.425433]  kasan_save_track+0x18/0x40
[   16.425638]  kasan_save_alloc_info+0x3b/0x50
[   16.425931]  __kasan_kmalloc+0xb7/0xc0
[   16.426068]  __kmalloc_cache_noprof+0x189/0x420
[   16.426225]  kasan_atomics+0x95/0x310
[   16.426378]  kunit_try_run_case+0x1a5/0x480
[   16.426587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.426875]  kthread+0x337/0x6f0
[   16.427050]  ret_from_fork+0x116/0x1d0
[   16.427298]  ret_from_fork_asm+0x1a/0x30
[   16.427440] 
[   16.427509] The buggy address belongs to the object at ffff8881029cd380
[   16.427509]  which belongs to the cache kmalloc-64 of size 64
[   16.428468] The buggy address is located 0 bytes to the right of
[   16.428468]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.429649] 
[   16.429953] The buggy address belongs to the physical page:
[   16.430391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.431250] flags: 0x200000000000000(node=0|zone=2)
[   16.431549] page_type: f5(slab)
[   16.431849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.432388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.432696] page dumped because: kasan: bad access detected
[   16.433120] 
[   16.433341] Memory state around the buggy address:
[   16.433795]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.434124]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.434401] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.434700]                                      ^
[   16.435236]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.435706]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.436200] ==================================================================
[   16.262843] ==================================================================
[   16.263614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.264034] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.264394] 
[   16.264615] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.264662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.264674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.264697] Call Trace:
[   16.264719]  <TASK>
[   16.264921]  dump_stack_lvl+0x73/0xb0
[   16.265108]  print_report+0xd1/0x650
[   16.265138]  ? __virt_addr_valid+0x1db/0x2d0
[   16.265163]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.265185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.265210]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.265233]  kasan_report+0x141/0x180
[   16.265256]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.265284]  kasan_check_range+0x10c/0x1c0
[   16.265308]  __kasan_check_write+0x18/0x20
[   16.265329]  kasan_atomics_helper+0x1ce1/0x5450
[   16.265353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.265376]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.265404]  ? kasan_atomics+0x152/0x310
[   16.265430]  kasan_atomics+0x1dc/0x310
[   16.265453]  ? __pfx_kasan_atomics+0x10/0x10
[   16.265478]  ? __pfx_read_tsc+0x10/0x10
[   16.265501]  ? ktime_get_ts64+0x86/0x230
[   16.265526]  kunit_try_run_case+0x1a5/0x480
[   16.265552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.265576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.265613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.265637]  ? __kthread_parkme+0x82/0x180
[   16.265659]  ? preempt_count_sub+0x50/0x80
[   16.265685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.265710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.265735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.265762]  kthread+0x337/0x6f0
[   16.265794]  ? trace_preempt_on+0x20/0xc0
[   16.265820]  ? __pfx_kthread+0x10/0x10
[   16.265841]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.265863]  ? calculate_sigpending+0x7b/0xa0
[   16.265889]  ? __pfx_kthread+0x10/0x10
[   16.265911]  ret_from_fork+0x116/0x1d0
[   16.265930]  ? __pfx_kthread+0x10/0x10
[   16.265951]  ret_from_fork_asm+0x1a/0x30
[   16.265983]  </TASK>
[   16.265994] 
[   16.276320] Allocated by task 282:
[   16.276653]  kasan_save_stack+0x45/0x70
[   16.276906]  kasan_save_track+0x18/0x40
[   16.277169]  kasan_save_alloc_info+0x3b/0x50
[   16.277460]  __kasan_kmalloc+0xb7/0xc0
[   16.277731]  __kmalloc_cache_noprof+0x189/0x420
[   16.278089]  kasan_atomics+0x95/0x310
[   16.278296]  kunit_try_run_case+0x1a5/0x480
[   16.278590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.279117]  kthread+0x337/0x6f0
[   16.279313]  ret_from_fork+0x116/0x1d0
[   16.279629]  ret_from_fork_asm+0x1a/0x30
[   16.279865] 
[   16.280206] The buggy address belongs to the object at ffff8881029cd380
[   16.280206]  which belongs to the cache kmalloc-64 of size 64
[   16.280703] The buggy address is located 0 bytes to the right of
[   16.280703]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.281499] 
[   16.281606] The buggy address belongs to the physical page:
[   16.282001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.282341] flags: 0x200000000000000(node=0|zone=2)
[   16.282642] page_type: f5(slab)
[   16.282917] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.283226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.283543] page dumped because: kasan: bad access detected
[   16.284008] 
[   16.284109] Memory state around the buggy address:
[   16.284396]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.284792]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.285151] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.285527]                                      ^
[   16.285714]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.286292]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.286671] ==================================================================
[   15.912069] ==================================================================
[   15.912796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.913043] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.913266] 
[   15.913355] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.913400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.913412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.913434] Call Trace:
[   15.913453]  <TASK>
[   15.913471]  dump_stack_lvl+0x73/0xb0
[   15.913499]  print_report+0xd1/0x650
[   15.913522]  ? __virt_addr_valid+0x1db/0x2d0
[   15.913546]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.913569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.914032]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.914084]  kasan_report+0x141/0x180
[   15.914109]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.914136]  kasan_check_range+0x10c/0x1c0
[   15.914161]  __kasan_check_read+0x15/0x20
[   15.914180]  kasan_atomics_helper+0x13b5/0x5450
[   15.914204]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.914228]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.914255]  ? kasan_atomics+0x152/0x310
[   15.914282]  kasan_atomics+0x1dc/0x310
[   15.914304]  ? __pfx_kasan_atomics+0x10/0x10
[   15.914329]  ? __pfx_read_tsc+0x10/0x10
[   15.914351]  ? ktime_get_ts64+0x86/0x230
[   15.914396]  kunit_try_run_case+0x1a5/0x480
[   15.914422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.914445]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.914471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.914496]  ? __kthread_parkme+0x82/0x180
[   15.914517]  ? preempt_count_sub+0x50/0x80
[   15.914542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.914567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.914622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.914649]  kthread+0x337/0x6f0
[   15.914668]  ? trace_preempt_on+0x20/0xc0
[   15.914693]  ? __pfx_kthread+0x10/0x10
[   15.914715]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.914737]  ? calculate_sigpending+0x7b/0xa0
[   15.914763]  ? __pfx_kthread+0x10/0x10
[   15.914798]  ret_from_fork+0x116/0x1d0
[   15.914818]  ? __pfx_kthread+0x10/0x10
[   15.914846]  ret_from_fork_asm+0x1a/0x30
[   15.914879]  </TASK>
[   15.914891] 
[   15.929253] Allocated by task 282:
[   15.929402]  kasan_save_stack+0x45/0x70
[   15.929555]  kasan_save_track+0x18/0x40
[   15.929715]  kasan_save_alloc_info+0x3b/0x50
[   15.929937]  __kasan_kmalloc+0xb7/0xc0
[   15.930071]  __kmalloc_cache_noprof+0x189/0x420
[   15.930332]  kasan_atomics+0x95/0x310
[   15.930521]  kunit_try_run_case+0x1a5/0x480
[   15.930688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930920]  kthread+0x337/0x6f0
[   15.931131]  ret_from_fork+0x116/0x1d0
[   15.931285]  ret_from_fork_asm+0x1a/0x30
[   15.931425] 
[   15.931517] The buggy address belongs to the object at ffff8881029cd380
[   15.931517]  which belongs to the cache kmalloc-64 of size 64
[   15.932231] The buggy address is located 0 bytes to the right of
[   15.932231]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.932737] 
[   15.932907] The buggy address belongs to the physical page:
[   15.933162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.933430] flags: 0x200000000000000(node=0|zone=2)
[   15.933697] page_type: f5(slab)
[   15.933939] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.934261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.934584] page dumped because: kasan: bad access detected
[   15.934840] 
[   15.934931] Memory state around the buggy address:
[   15.935167]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935426]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935651] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.936113]                                      ^
[   15.936300]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936621]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936932] ==================================================================
[   16.106664] ==================================================================
[   16.107019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.107342] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.107558] 
[   16.107657] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.107701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.107714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.107735] Call Trace:
[   16.107753]  <TASK>
[   16.107771]  dump_stack_lvl+0x73/0xb0
[   16.107799]  print_report+0xd1/0x650
[   16.107822]  ? __virt_addr_valid+0x1db/0x2d0
[   16.107846]  ? kasan_atomics_helper+0x1818/0x5450
[   16.107868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.107893]  ? kasan_atomics_helper+0x1818/0x5450
[   16.107916]  kasan_report+0x141/0x180
[   16.107938]  ? kasan_atomics_helper+0x1818/0x5450
[   16.107965]  kasan_check_range+0x10c/0x1c0
[   16.107990]  __kasan_check_write+0x18/0x20
[   16.108010]  kasan_atomics_helper+0x1818/0x5450
[   16.108043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.108067]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.108094]  ? kasan_atomics+0x152/0x310
[   16.108119]  kasan_atomics+0x1dc/0x310
[   16.108142]  ? __pfx_kasan_atomics+0x10/0x10
[   16.108168]  ? __pfx_read_tsc+0x10/0x10
[   16.108190]  ? ktime_get_ts64+0x86/0x230
[   16.108215]  kunit_try_run_case+0x1a5/0x480
[   16.108240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.108289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.108314]  ? __kthread_parkme+0x82/0x180
[   16.108335]  ? preempt_count_sub+0x50/0x80
[   16.108360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.108412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.108439]  kthread+0x337/0x6f0
[   16.108458]  ? trace_preempt_on+0x20/0xc0
[   16.108483]  ? __pfx_kthread+0x10/0x10
[   16.108503]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.108526]  ? calculate_sigpending+0x7b/0xa0
[   16.108551]  ? __pfx_kthread+0x10/0x10
[   16.108573]  ret_from_fork+0x116/0x1d0
[   16.108606]  ? __pfx_kthread+0x10/0x10
[   16.108628]  ret_from_fork_asm+0x1a/0x30
[   16.108658]  </TASK>
[   16.108669] 
[   16.116476] Allocated by task 282:
[   16.116636]  kasan_save_stack+0x45/0x70
[   16.116836]  kasan_save_track+0x18/0x40
[   16.116968]  kasan_save_alloc_info+0x3b/0x50
[   16.117113]  __kasan_kmalloc+0xb7/0xc0
[   16.117241]  __kmalloc_cache_noprof+0x189/0x420
[   16.117391]  kasan_atomics+0x95/0x310
[   16.117518]  kunit_try_run_case+0x1a5/0x480
[   16.117739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.117987]  kthread+0x337/0x6f0
[   16.118151]  ret_from_fork+0x116/0x1d0
[   16.118334]  ret_from_fork_asm+0x1a/0x30
[   16.118526] 
[   16.118602] The buggy address belongs to the object at ffff8881029cd380
[   16.118602]  which belongs to the cache kmalloc-64 of size 64
[   16.118943] The buggy address is located 0 bytes to the right of
[   16.118943]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.119292] 
[   16.119466] The buggy address belongs to the physical page:
[   16.119728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.120470] flags: 0x200000000000000(node=0|zone=2)
[   16.120717] page_type: f5(slab)
[   16.120884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.121310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.121619] page dumped because: kasan: bad access detected
[   16.121880] 
[   16.121949] Memory state around the buggy address:
[   16.122105]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.122435]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.122761] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.123031]                                      ^
[   16.123253]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.123523]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.123841] ==================================================================
[   16.161261] ==================================================================
[   16.161703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.162240] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.162477] 
[   16.162563] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.162617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.162629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.162651] Call Trace:
[   16.162668]  <TASK>
[   16.162684]  dump_stack_lvl+0x73/0xb0
[   16.162713]  print_report+0xd1/0x650
[   16.162735]  ? __virt_addr_valid+0x1db/0x2d0
[   16.162760]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.162781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.162815]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.162845]  kasan_report+0x141/0x180
[   16.162867]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.162894]  kasan_check_range+0x10c/0x1c0
[   16.162918]  __kasan_check_write+0x18/0x20
[   16.162939]  kasan_atomics_helper+0x19e3/0x5450
[   16.162962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.162986]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.163011]  ? kasan_atomics+0x152/0x310
[   16.163037]  kasan_atomics+0x1dc/0x310
[   16.163061]  ? __pfx_kasan_atomics+0x10/0x10
[   16.163085]  ? __pfx_read_tsc+0x10/0x10
[   16.163107]  ? ktime_get_ts64+0x86/0x230
[   16.163132]  kunit_try_run_case+0x1a5/0x480
[   16.163156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.163206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.163231]  ? __kthread_parkme+0x82/0x180
[   16.163251]  ? preempt_count_sub+0x50/0x80
[   16.163276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.163326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.163352]  kthread+0x337/0x6f0
[   16.163372]  ? trace_preempt_on+0x20/0xc0
[   16.163397]  ? __pfx_kthread+0x10/0x10
[   16.163417]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.163440]  ? calculate_sigpending+0x7b/0xa0
[   16.163464]  ? __pfx_kthread+0x10/0x10
[   16.163487]  ret_from_fork+0x116/0x1d0
[   16.163505]  ? __pfx_kthread+0x10/0x10
[   16.163527]  ret_from_fork_asm+0x1a/0x30
[   16.163557]  </TASK>
[   16.163568] 
[   16.170998] Allocated by task 282:
[   16.171155]  kasan_save_stack+0x45/0x70
[   16.171361]  kasan_save_track+0x18/0x40
[   16.171722]  kasan_save_alloc_info+0x3b/0x50
[   16.172137]  __kasan_kmalloc+0xb7/0xc0
[   16.172323]  __kmalloc_cache_noprof+0x189/0x420
[   16.172580]  kasan_atomics+0x95/0x310
[   16.172795]  kunit_try_run_case+0x1a5/0x480
[   16.173002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.173257]  kthread+0x337/0x6f0
[   16.173425]  ret_from_fork+0x116/0x1d0
[   16.173618]  ret_from_fork_asm+0x1a/0x30
[   16.173860] 
[   16.173955] The buggy address belongs to the object at ffff8881029cd380
[   16.173955]  which belongs to the cache kmalloc-64 of size 64
[   16.175527] The buggy address is located 0 bytes to the right of
[   16.175527]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.176537] 
[   16.176660] The buggy address belongs to the physical page:
[   16.177122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.177734] flags: 0x200000000000000(node=0|zone=2)
[   16.178195] page_type: f5(slab)
[   16.178508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.179070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.179570] page dumped because: kasan: bad access detected
[   16.180023] 
[   16.180131] Memory state around the buggy address:
[   16.180367]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.180699]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.181350] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.181763]                                      ^
[   16.182207]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.182712]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.183200] ==================================================================
[   16.142732] ==================================================================
[   16.143249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.143560] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.143833] 
[   16.143989] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.144031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.144044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.144065] Call Trace:
[   16.144081]  <TASK>
[   16.144098]  dump_stack_lvl+0x73/0xb0
[   16.144125]  print_report+0xd1/0x650
[   16.144148]  ? __virt_addr_valid+0x1db/0x2d0
[   16.144172]  ? kasan_atomics_helper+0x194a/0x5450
[   16.144194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.144217]  ? kasan_atomics_helper+0x194a/0x5450
[   16.144240]  kasan_report+0x141/0x180
[   16.144264]  ? kasan_atomics_helper+0x194a/0x5450
[   16.144292]  kasan_check_range+0x10c/0x1c0
[   16.144316]  __kasan_check_write+0x18/0x20
[   16.144337]  kasan_atomics_helper+0x194a/0x5450
[   16.144361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.144385]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.144411]  ? kasan_atomics+0x152/0x310
[   16.144437]  kasan_atomics+0x1dc/0x310
[   16.144460]  ? __pfx_kasan_atomics+0x10/0x10
[   16.144484]  ? __pfx_read_tsc+0x10/0x10
[   16.144506]  ? ktime_get_ts64+0x86/0x230
[   16.144531]  kunit_try_run_case+0x1a5/0x480
[   16.144556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.144615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.144640]  ? __kthread_parkme+0x82/0x180
[   16.144662]  ? preempt_count_sub+0x50/0x80
[   16.144687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.144738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.144764]  kthread+0x337/0x6f0
[   16.144784]  ? trace_preempt_on+0x20/0xc0
[   16.144809]  ? __pfx_kthread+0x10/0x10
[   16.144831]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.144854]  ? calculate_sigpending+0x7b/0xa0
[   16.144879]  ? __pfx_kthread+0x10/0x10
[   16.144901]  ret_from_fork+0x116/0x1d0
[   16.144920]  ? __pfx_kthread+0x10/0x10
[   16.144940]  ret_from_fork_asm+0x1a/0x30
[   16.144973]  </TASK>
[   16.144984] 
[   16.153216] Allocated by task 282:
[   16.153405]  kasan_save_stack+0x45/0x70
[   16.153616]  kasan_save_track+0x18/0x40
[   16.153838]  kasan_save_alloc_info+0x3b/0x50
[   16.154038]  __kasan_kmalloc+0xb7/0xc0
[   16.154171]  __kmalloc_cache_noprof+0x189/0x420
[   16.154328]  kasan_atomics+0x95/0x310
[   16.154463]  kunit_try_run_case+0x1a5/0x480
[   16.154619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.154997]  kthread+0x337/0x6f0
[   16.155169]  ret_from_fork+0x116/0x1d0
[   16.155361]  ret_from_fork_asm+0x1a/0x30
[   16.155563] 
[   16.155668] The buggy address belongs to the object at ffff8881029cd380
[   16.155668]  which belongs to the cache kmalloc-64 of size 64
[   16.156268] The buggy address is located 0 bytes to the right of
[   16.156268]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.156784] 
[   16.156874] The buggy address belongs to the physical page:
[   16.157072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.157377] flags: 0x200000000000000(node=0|zone=2)
[   16.157542] page_type: f5(slab)
[   16.157726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.158242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.158532] page dumped because: kasan: bad access detected
[   16.158713] 
[   16.158783] Memory state around the buggy address:
[   16.158945]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.159160]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.159372] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.159714]                                      ^
[   16.160060]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.160375]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.160697] ==================================================================
[   16.464630] ==================================================================
[   16.465244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.465572] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.466142] 
[   16.466259] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.466521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.466535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.466558] Call Trace:
[   16.466575]  <TASK>
[   16.466633]  dump_stack_lvl+0x73/0xb0
[   16.466669]  print_report+0xd1/0x650
[   16.466693]  ? __virt_addr_valid+0x1db/0x2d0
[   16.466718]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.466741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.466765]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.466804]  kasan_report+0x141/0x180
[   16.466832]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.466859]  __asan_report_load8_noabort+0x18/0x20
[   16.466885]  kasan_atomics_helper+0x4fb2/0x5450
[   16.466909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.466933]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.466959]  ? kasan_atomics+0x152/0x310
[   16.466986]  kasan_atomics+0x1dc/0x310
[   16.467009]  ? __pfx_kasan_atomics+0x10/0x10
[   16.467034]  ? __pfx_read_tsc+0x10/0x10
[   16.467056]  ? ktime_get_ts64+0x86/0x230
[   16.467081]  kunit_try_run_case+0x1a5/0x480
[   16.467107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.467157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.467183]  ? __kthread_parkme+0x82/0x180
[   16.467205]  ? preempt_count_sub+0x50/0x80
[   16.467230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.467283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.467310]  kthread+0x337/0x6f0
[   16.467330]  ? trace_preempt_on+0x20/0xc0
[   16.467356]  ? __pfx_kthread+0x10/0x10
[   16.467378]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.467400]  ? calculate_sigpending+0x7b/0xa0
[   16.467425]  ? __pfx_kthread+0x10/0x10
[   16.467448]  ret_from_fork+0x116/0x1d0
[   16.467467]  ? __pfx_kthread+0x10/0x10
[   16.467489]  ret_from_fork_asm+0x1a/0x30
[   16.467521]  </TASK>
[   16.467533] 
[   16.478748] Allocated by task 282:
[   16.479139]  kasan_save_stack+0x45/0x70
[   16.479335]  kasan_save_track+0x18/0x40
[   16.479514]  kasan_save_alloc_info+0x3b/0x50
[   16.479714]  __kasan_kmalloc+0xb7/0xc0
[   16.480315]  __kmalloc_cache_noprof+0x189/0x420
[   16.480589]  kasan_atomics+0x95/0x310
[   16.480967]  kunit_try_run_case+0x1a5/0x480
[   16.481282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.481712]  kthread+0x337/0x6f0
[   16.481992]  ret_from_fork+0x116/0x1d0
[   16.482370]  ret_from_fork_asm+0x1a/0x30
[   16.482707] 
[   16.482830] The buggy address belongs to the object at ffff8881029cd380
[   16.482830]  which belongs to the cache kmalloc-64 of size 64
[   16.483305] The buggy address is located 0 bytes to the right of
[   16.483305]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.483761] 
[   16.483835] The buggy address belongs to the physical page:
[   16.484100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.484431] flags: 0x200000000000000(node=0|zone=2)
[   16.484616] page_type: f5(slab)
[   16.484796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.485145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.485435] page dumped because: kasan: bad access detected
[   16.485669] 
[   16.485738] Memory state around the buggy address:
[   16.486121]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.486422]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.486728] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.487033]                                      ^
[   16.487227]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.487515]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.487742] ==================================================================
[   16.524521] ==================================================================
[   16.524971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.525355] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.525726] 
[   16.525868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.525913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.525926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.525947] Call Trace:
[   16.525963]  <TASK>
[   16.525980]  dump_stack_lvl+0x73/0xb0
[   16.526010]  print_report+0xd1/0x650
[   16.526032]  ? __virt_addr_valid+0x1db/0x2d0
[   16.526056]  ? kasan_atomics_helper+0x224c/0x5450
[   16.526079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.526102]  ? kasan_atomics_helper+0x224c/0x5450
[   16.526126]  kasan_report+0x141/0x180
[   16.526149]  ? kasan_atomics_helper+0x224c/0x5450
[   16.526176]  kasan_check_range+0x10c/0x1c0
[   16.526201]  __kasan_check_write+0x18/0x20
[   16.526221]  kasan_atomics_helper+0x224c/0x5450
[   16.526245]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.526269]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.526295]  ? kasan_atomics+0x152/0x310
[   16.526322]  kasan_atomics+0x1dc/0x310
[   16.526346]  ? __pfx_kasan_atomics+0x10/0x10
[   16.526371]  ? __pfx_read_tsc+0x10/0x10
[   16.526392]  ? ktime_get_ts64+0x86/0x230
[   16.526418]  kunit_try_run_case+0x1a5/0x480
[   16.526443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.526467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.526492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.526517]  ? __kthread_parkme+0x82/0x180
[   16.526565]  ? preempt_count_sub+0x50/0x80
[   16.526591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.526627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.526652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.526679]  kthread+0x337/0x6f0
[   16.526698]  ? trace_preempt_on+0x20/0xc0
[   16.526723]  ? __pfx_kthread+0x10/0x10
[   16.526744]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.526787]  ? calculate_sigpending+0x7b/0xa0
[   16.526813]  ? __pfx_kthread+0x10/0x10
[   16.526844]  ret_from_fork+0x116/0x1d0
[   16.526864]  ? __pfx_kthread+0x10/0x10
[   16.526886]  ret_from_fork_asm+0x1a/0x30
[   16.526918]  </TASK>
[   16.526929] 
[   16.534375] Allocated by task 282:
[   16.534564]  kasan_save_stack+0x45/0x70
[   16.534789]  kasan_save_track+0x18/0x40
[   16.534989]  kasan_save_alloc_info+0x3b/0x50
[   16.535189]  __kasan_kmalloc+0xb7/0xc0
[   16.535319]  __kmalloc_cache_noprof+0x189/0x420
[   16.535470]  kasan_atomics+0x95/0x310
[   16.535610]  kunit_try_run_case+0x1a5/0x480
[   16.535830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.536109]  kthread+0x337/0x6f0
[   16.536280]  ret_from_fork+0x116/0x1d0
[   16.536483]  ret_from_fork_asm+0x1a/0x30
[   16.536693] 
[   16.536809] The buggy address belongs to the object at ffff8881029cd380
[   16.536809]  which belongs to the cache kmalloc-64 of size 64
[   16.537285] The buggy address is located 0 bytes to the right of
[   16.537285]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.537647] 
[   16.537717] The buggy address belongs to the physical page:
[   16.538011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.538359] flags: 0x200000000000000(node=0|zone=2)
[   16.538589] page_type: f5(slab)
[   16.538780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.539097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.539315] page dumped because: kasan: bad access detected
[   16.539481] 
[   16.539548] Memory state around the buggy address:
[   16.539783]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.540109]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.540434] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.540807]                                      ^
[   16.540960]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.541256]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.541573] ==================================================================
[   15.336235] ==================================================================
[   15.336543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.337339] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.337693] 
[   15.337812] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.337858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.337870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.337892] Call Trace:
[   15.337920]  <TASK>
[   15.337938]  dump_stack_lvl+0x73/0xb0
[   15.337968]  print_report+0xd1/0x650
[   15.338003]  ? __virt_addr_valid+0x1db/0x2d0
[   15.338029]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.338051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.338084]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.338107]  kasan_report+0x141/0x180
[   15.338130]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.338168]  kasan_check_range+0x10c/0x1c0
[   15.338194]  __kasan_check_write+0x18/0x20
[   15.338214]  kasan_atomics_helper+0x5fe/0x5450
[   15.338238]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.338263]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.338291]  ? kasan_atomics+0x152/0x310
[   15.338318]  kasan_atomics+0x1dc/0x310
[   15.338341]  ? __pfx_kasan_atomics+0x10/0x10
[   15.338375]  ? __pfx_read_tsc+0x10/0x10
[   15.338397]  ? ktime_get_ts64+0x86/0x230
[   15.338422]  kunit_try_run_case+0x1a5/0x480
[   15.338458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.338507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.338538]  ? __kthread_parkme+0x82/0x180
[   15.338560]  ? preempt_count_sub+0x50/0x80
[   15.338585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.338678]  kthread+0x337/0x6f0
[   15.338698]  ? trace_preempt_on+0x20/0xc0
[   15.338722]  ? __pfx_kthread+0x10/0x10
[   15.338744]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.338766]  ? calculate_sigpending+0x7b/0xa0
[   15.338800]  ? __pfx_kthread+0x10/0x10
[   15.338822]  ret_from_fork+0x116/0x1d0
[   15.338846]  ? __pfx_kthread+0x10/0x10
[   15.338867]  ret_from_fork_asm+0x1a/0x30
[   15.338900]  </TASK>
[   15.338911] 
[   15.347257] Allocated by task 282:
[   15.347479]  kasan_save_stack+0x45/0x70
[   15.347657]  kasan_save_track+0x18/0x40
[   15.347977]  kasan_save_alloc_info+0x3b/0x50
[   15.348159]  __kasan_kmalloc+0xb7/0xc0
[   15.348386]  __kmalloc_cache_noprof+0x189/0x420
[   15.348634]  kasan_atomics+0x95/0x310
[   15.348855]  kunit_try_run_case+0x1a5/0x480
[   15.349101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.349349]  kthread+0x337/0x6f0
[   15.349570]  ret_from_fork+0x116/0x1d0
[   15.349799]  ret_from_fork_asm+0x1a/0x30
[   15.349977] 
[   15.350045] The buggy address belongs to the object at ffff8881029cd380
[   15.350045]  which belongs to the cache kmalloc-64 of size 64
[   15.350426] The buggy address is located 0 bytes to the right of
[   15.350426]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.350992] 
[   15.351069] The buggy address belongs to the physical page:
[   15.351237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.351500] flags: 0x200000000000000(node=0|zone=2)
[   15.351756] page_type: f5(slab)
[   15.351978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.352327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.352683] page dumped because: kasan: bad access detected
[   15.352978] 
[   15.353094] Memory state around the buggy address:
[   15.353283]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.353616]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.353952] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.354316]                                      ^
[   15.354531]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.354882]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.355148] ==================================================================
[   15.428866] ==================================================================
[   15.429249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.429787] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.430139] 
[   15.430252] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.430296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.430308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.430329] Call Trace:
[   15.430348]  <TASK>
[   15.430365]  dump_stack_lvl+0x73/0xb0
[   15.430394]  print_report+0xd1/0x650
[   15.430417]  ? __virt_addr_valid+0x1db/0x2d0
[   15.430441]  ? kasan_atomics_helper+0x860/0x5450
[   15.430464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.430488]  ? kasan_atomics_helper+0x860/0x5450
[   15.430511]  kasan_report+0x141/0x180
[   15.430534]  ? kasan_atomics_helper+0x860/0x5450
[   15.430561]  kasan_check_range+0x10c/0x1c0
[   15.430585]  __kasan_check_write+0x18/0x20
[   15.430618]  kasan_atomics_helper+0x860/0x5450
[   15.430642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.430665]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.430692]  ? kasan_atomics+0x152/0x310
[   15.430718]  kasan_atomics+0x1dc/0x310
[   15.430742]  ? __pfx_kasan_atomics+0x10/0x10
[   15.430767]  ? __pfx_read_tsc+0x10/0x10
[   15.430801]  ? ktime_get_ts64+0x86/0x230
[   15.430833]  kunit_try_run_case+0x1a5/0x480
[   15.430859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.430883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.430910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.430936]  ? __kthread_parkme+0x82/0x180
[   15.430957]  ? preempt_count_sub+0x50/0x80
[   15.430982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.431008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.431034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.431061]  kthread+0x337/0x6f0
[   15.431080]  ? trace_preempt_on+0x20/0xc0
[   15.431106]  ? __pfx_kthread+0x10/0x10
[   15.431128]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.431151]  ? calculate_sigpending+0x7b/0xa0
[   15.431175]  ? __pfx_kthread+0x10/0x10
[   15.431197]  ret_from_fork+0x116/0x1d0
[   15.431216]  ? __pfx_kthread+0x10/0x10
[   15.431237]  ret_from_fork_asm+0x1a/0x30
[   15.431267]  </TASK>
[   15.431278] 
[   15.438712] Allocated by task 282:
[   15.438931]  kasan_save_stack+0x45/0x70
[   15.439082]  kasan_save_track+0x18/0x40
[   15.439278]  kasan_save_alloc_info+0x3b/0x50
[   15.439494]  __kasan_kmalloc+0xb7/0xc0
[   15.439672]  __kmalloc_cache_noprof+0x189/0x420
[   15.439903]  kasan_atomics+0x95/0x310
[   15.440055]  kunit_try_run_case+0x1a5/0x480
[   15.440258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.440493]  kthread+0x337/0x6f0
[   15.440640]  ret_from_fork+0x116/0x1d0
[   15.440887]  ret_from_fork_asm+0x1a/0x30
[   15.441085] 
[   15.441174] The buggy address belongs to the object at ffff8881029cd380
[   15.441174]  which belongs to the cache kmalloc-64 of size 64
[   15.441640] The buggy address is located 0 bytes to the right of
[   15.441640]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.442139] 
[   15.442231] The buggy address belongs to the physical page:
[   15.442405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.442654] flags: 0x200000000000000(node=0|zone=2)
[   15.442818] page_type: f5(slab)
[   15.442940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.443298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.443645] page dumped because: kasan: bad access detected
[   15.443948] 
[   15.444018] Memory state around the buggy address:
[   15.444174]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.444391]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.444618] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.444905]                                      ^
[   15.445131]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.445454]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.445784] ==================================================================
[   16.183928] ==================================================================
[   16.184721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.185255] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.185752] 
[   16.185879] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.185925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.185938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.185959] Call Trace:
[   16.185976]  <TASK>
[   16.185992]  dump_stack_lvl+0x73/0xb0
[   16.186022]  print_report+0xd1/0x650
[   16.186044]  ? __virt_addr_valid+0x1db/0x2d0
[   16.186068]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.186091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.186114]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.186137]  kasan_report+0x141/0x180
[   16.186160]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.186187]  kasan_check_range+0x10c/0x1c0
[   16.186211]  __kasan_check_write+0x18/0x20
[   16.186231]  kasan_atomics_helper+0x1a7f/0x5450
[   16.186255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.186278]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.186305]  ? kasan_atomics+0x152/0x310
[   16.186332]  kasan_atomics+0x1dc/0x310
[   16.186355]  ? __pfx_kasan_atomics+0x10/0x10
[   16.186381]  ? __pfx_read_tsc+0x10/0x10
[   16.186402]  ? ktime_get_ts64+0x86/0x230
[   16.186427]  kunit_try_run_case+0x1a5/0x480
[   16.186452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.186476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.186499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.186524]  ? __kthread_parkme+0x82/0x180
[   16.186545]  ? preempt_count_sub+0x50/0x80
[   16.186569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.186605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.186632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.186657]  kthread+0x337/0x6f0
[   16.186676]  ? trace_preempt_on+0x20/0xc0
[   16.186702]  ? __pfx_kthread+0x10/0x10
[   16.186725]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.186747]  ? calculate_sigpending+0x7b/0xa0
[   16.186772]  ? __pfx_kthread+0x10/0x10
[   16.186794]  ret_from_fork+0x116/0x1d0
[   16.186813]  ? __pfx_kthread+0x10/0x10
[   16.186841]  ret_from_fork_asm+0x1a/0x30
[   16.186872]  </TASK>
[   16.186882] 
[   16.193941] Allocated by task 282:
[   16.194073]  kasan_save_stack+0x45/0x70
[   16.194471]  kasan_save_track+0x18/0x40
[   16.194675]  kasan_save_alloc_info+0x3b/0x50
[   16.194893]  __kasan_kmalloc+0xb7/0xc0
[   16.195086]  __kmalloc_cache_noprof+0x189/0x420
[   16.195322]  kasan_atomics+0x95/0x310
[   16.195505]  kunit_try_run_case+0x1a5/0x480
[   16.195726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.195940]  kthread+0x337/0x6f0
[   16.196074]  ret_from_fork+0x116/0x1d0
[   16.196266]  ret_from_fork_asm+0x1a/0x30
[   16.196462] 
[   16.196549] The buggy address belongs to the object at ffff8881029cd380
[   16.196549]  which belongs to the cache kmalloc-64 of size 64
[   16.197026] The buggy address is located 0 bytes to the right of
[   16.197026]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.197397] 
[   16.197469] The buggy address belongs to the physical page:
[   16.197652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.198210] flags: 0x200000000000000(node=0|zone=2)
[   16.198442] page_type: f5(slab)
[   16.198623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.198972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.199230] page dumped because: kasan: bad access detected
[   16.199402] 
[   16.199470] Memory state around the buggy address:
[   16.199636]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.199853]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.200176] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.200496]                                      ^
[   16.200735]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201064]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201581] ==================================================================
[   15.220649] ==================================================================
[   15.220984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.221282] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.221619] 
[   15.221735] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.221779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.221791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.221878] Call Trace:
[   15.221898]  <TASK>
[   15.221917]  dump_stack_lvl+0x73/0xb0
[   15.221946]  print_report+0xd1/0x650
[   15.221969]  ? __virt_addr_valid+0x1db/0x2d0
[   15.221993]  ? kasan_atomics_helper+0x3df/0x5450
[   15.222016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.222041]  ? kasan_atomics_helper+0x3df/0x5450
[   15.222065]  kasan_report+0x141/0x180
[   15.222087]  ? kasan_atomics_helper+0x3df/0x5450
[   15.222114]  kasan_check_range+0x10c/0x1c0
[   15.222138]  __kasan_check_read+0x15/0x20
[   15.222160]  kasan_atomics_helper+0x3df/0x5450
[   15.222184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.222207]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.222234]  ? kasan_atomics+0x152/0x310
[   15.222261]  kasan_atomics+0x1dc/0x310
[   15.222284]  ? __pfx_kasan_atomics+0x10/0x10
[   15.222308]  ? __pfx_read_tsc+0x10/0x10
[   15.222331]  ? ktime_get_ts64+0x86/0x230
[   15.222357]  kunit_try_run_case+0x1a5/0x480
[   15.222381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.222405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.222431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.222455]  ? __kthread_parkme+0x82/0x180
[   15.222477]  ? preempt_count_sub+0x50/0x80
[   15.222505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.222531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.222557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.222583]  kthread+0x337/0x6f0
[   15.222613]  ? trace_preempt_on+0x20/0xc0
[   15.222639]  ? __pfx_kthread+0x10/0x10
[   15.222660]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.222683]  ? calculate_sigpending+0x7b/0xa0
[   15.222709]  ? __pfx_kthread+0x10/0x10
[   15.222731]  ret_from_fork+0x116/0x1d0
[   15.222751]  ? __pfx_kthread+0x10/0x10
[   15.222772]  ret_from_fork_asm+0x1a/0x30
[   15.223125]  </TASK>
[   15.223144] 
[   15.231109] Allocated by task 282:
[   15.231299]  kasan_save_stack+0x45/0x70
[   15.231503]  kasan_save_track+0x18/0x40
[   15.231719]  kasan_save_alloc_info+0x3b/0x50
[   15.232034]  __kasan_kmalloc+0xb7/0xc0
[   15.232229]  __kmalloc_cache_noprof+0x189/0x420
[   15.232451]  kasan_atomics+0x95/0x310
[   15.232646]  kunit_try_run_case+0x1a5/0x480
[   15.232906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.233143]  kthread+0x337/0x6f0
[   15.233278]  ret_from_fork+0x116/0x1d0
[   15.233411]  ret_from_fork_asm+0x1a/0x30
[   15.233553] 
[   15.233635] The buggy address belongs to the object at ffff8881029cd380
[   15.233635]  which belongs to the cache kmalloc-64 of size 64
[   15.234236] The buggy address is located 0 bytes to the right of
[   15.234236]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.234784] 
[   15.235046] The buggy address belongs to the physical page:
[   15.235226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.235471] flags: 0x200000000000000(node=0|zone=2)
[   15.235722] page_type: f5(slab)
[   15.235892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.236315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.236680] page dumped because: kasan: bad access detected
[   15.237016] 
[   15.237117] Memory state around the buggy address:
[   15.237355]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.237663]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.237955] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.238197]                                      ^
[   15.238420]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238747]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.239087] ==================================================================
[   16.396512] ==================================================================
[   16.396886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.397276] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.397583] 
[   16.397681] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.397726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.397738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.397759] Call Trace:
[   16.397776]  <TASK>
[   16.397803]  dump_stack_lvl+0x73/0xb0
[   16.397832]  print_report+0xd1/0x650
[   16.397856]  ? __virt_addr_valid+0x1db/0x2d0
[   16.397880]  ? kasan_atomics_helper+0x2006/0x5450
[   16.397902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.397926]  ? kasan_atomics_helper+0x2006/0x5450
[   16.397972]  kasan_report+0x141/0x180
[   16.397994]  ? kasan_atomics_helper+0x2006/0x5450
[   16.398021]  kasan_check_range+0x10c/0x1c0
[   16.398046]  __kasan_check_write+0x18/0x20
[   16.398067]  kasan_atomics_helper+0x2006/0x5450
[   16.398091]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.398115]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.398142]  ? kasan_atomics+0x152/0x310
[   16.398168]  kasan_atomics+0x1dc/0x310
[   16.398191]  ? __pfx_kasan_atomics+0x10/0x10
[   16.398216]  ? __pfx_read_tsc+0x10/0x10
[   16.398238]  ? ktime_get_ts64+0x86/0x230
[   16.398264]  kunit_try_run_case+0x1a5/0x480
[   16.398289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.398338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.398363]  ? __kthread_parkme+0x82/0x180
[   16.398386]  ? preempt_count_sub+0x50/0x80
[   16.398411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.398505]  kthread+0x337/0x6f0
[   16.398525]  ? trace_preempt_on+0x20/0xc0
[   16.398552]  ? __pfx_kthread+0x10/0x10
[   16.398574]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.398608]  ? calculate_sigpending+0x7b/0xa0
[   16.398634]  ? __pfx_kthread+0x10/0x10
[   16.398657]  ret_from_fork+0x116/0x1d0
[   16.398676]  ? __pfx_kthread+0x10/0x10
[   16.398697]  ret_from_fork_asm+0x1a/0x30
[   16.398730]  </TASK>
[   16.398742] 
[   16.406973] Allocated by task 282:
[   16.407155]  kasan_save_stack+0x45/0x70
[   16.407351]  kasan_save_track+0x18/0x40
[   16.407528]  kasan_save_alloc_info+0x3b/0x50
[   16.407738]  __kasan_kmalloc+0xb7/0xc0
[   16.407951]  __kmalloc_cache_noprof+0x189/0x420
[   16.408131]  kasan_atomics+0x95/0x310
[   16.408263]  kunit_try_run_case+0x1a5/0x480
[   16.408490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.408759]  kthread+0x337/0x6f0
[   16.409020]  ret_from_fork+0x116/0x1d0
[   16.409233]  ret_from_fork_asm+0x1a/0x30
[   16.409426] 
[   16.409498] The buggy address belongs to the object at ffff8881029cd380
[   16.409498]  which belongs to the cache kmalloc-64 of size 64
[   16.410031] The buggy address is located 0 bytes to the right of
[   16.410031]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.410404] 
[   16.410481] The buggy address belongs to the physical page:
[   16.410745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.411105] flags: 0x200000000000000(node=0|zone=2)
[   16.411351] page_type: f5(slab)
[   16.411521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.411845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.412172] page dumped because: kasan: bad access detected
[   16.412429] 
[   16.412522] Memory state around the buggy address:
[   16.412746]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.413024]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.413243] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.413458]                                      ^
[   16.413698]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414188]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414616] ==================================================================
[   15.993974] ==================================================================
[   15.994310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.994668] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.995062] 
[   15.995152] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.995199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.995211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.995233] Call Trace:
[   15.995251]  <TASK>
[   15.995268]  dump_stack_lvl+0x73/0xb0
[   15.995299]  print_report+0xd1/0x650
[   15.995322]  ? __virt_addr_valid+0x1db/0x2d0
[   15.995401]  ? kasan_atomics_helper+0x151d/0x5450
[   15.995464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.995489]  ? kasan_atomics_helper+0x151d/0x5450
[   15.995512]  kasan_report+0x141/0x180
[   15.995535]  ? kasan_atomics_helper+0x151d/0x5450
[   15.995562]  kasan_check_range+0x10c/0x1c0
[   15.995587]  __kasan_check_write+0x18/0x20
[   15.995619]  kasan_atomics_helper+0x151d/0x5450
[   15.995642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.995666]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.995693]  ? kasan_atomics+0x152/0x310
[   15.995720]  kasan_atomics+0x1dc/0x310
[   15.995743]  ? __pfx_kasan_atomics+0x10/0x10
[   15.995768]  ? __pfx_read_tsc+0x10/0x10
[   15.995819]  ? ktime_get_ts64+0x86/0x230
[   15.995844]  kunit_try_run_case+0x1a5/0x480
[   15.995869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.995894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.995919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.995944]  ? __kthread_parkme+0x82/0x180
[   15.995966]  ? preempt_count_sub+0x50/0x80
[   15.995991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.996017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.996042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.996069]  kthread+0x337/0x6f0
[   15.996089]  ? trace_preempt_on+0x20/0xc0
[   15.996113]  ? __pfx_kthread+0x10/0x10
[   15.996134]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.996157]  ? calculate_sigpending+0x7b/0xa0
[   15.996182]  ? __pfx_kthread+0x10/0x10
[   15.996204]  ret_from_fork+0x116/0x1d0
[   15.996223]  ? __pfx_kthread+0x10/0x10
[   15.996245]  ret_from_fork_asm+0x1a/0x30
[   15.996276]  </TASK>
[   15.996287] 
[   16.004464] Allocated by task 282:
[   16.004689]  kasan_save_stack+0x45/0x70
[   16.005038]  kasan_save_track+0x18/0x40
[   16.005217]  kasan_save_alloc_info+0x3b/0x50
[   16.005435]  __kasan_kmalloc+0xb7/0xc0
[   16.005635]  __kmalloc_cache_noprof+0x189/0x420
[   16.005885]  kasan_atomics+0x95/0x310
[   16.006100]  kunit_try_run_case+0x1a5/0x480
[   16.006312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.006571]  kthread+0x337/0x6f0
[   16.006744]  ret_from_fork+0x116/0x1d0
[   16.006984]  ret_from_fork_asm+0x1a/0x30
[   16.007175] 
[   16.007299] The buggy address belongs to the object at ffff8881029cd380
[   16.007299]  which belongs to the cache kmalloc-64 of size 64
[   16.007774] The buggy address is located 0 bytes to the right of
[   16.007774]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.008342] 
[   16.008436] The buggy address belongs to the physical page:
[   16.008616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.009047] flags: 0x200000000000000(node=0|zone=2)
[   16.009277] page_type: f5(slab)
[   16.009476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.009756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.009999] page dumped because: kasan: bad access detected
[   16.010317] 
[   16.010432] Memory state around the buggy address:
[   16.010703]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.011023]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.011346] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.011553]                                      ^
[   16.011806]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.012422]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.012700] ==================================================================
[   15.937662] ==================================================================
[   15.938023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.938278] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.938523] 
[   15.938645] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.938690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.938702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.938722] Call Trace:
[   15.938742]  <TASK>
[   15.938759]  dump_stack_lvl+0x73/0xb0
[   15.938801]  print_report+0xd1/0x650
[   15.938831]  ? __virt_addr_valid+0x1db/0x2d0
[   15.938858]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.938880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.938904]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.938926]  kasan_report+0x141/0x180
[   15.938949]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.938976]  __asan_report_load8_noabort+0x18/0x20
[   15.939002]  kasan_atomics_helper+0x4eae/0x5450
[   15.939025]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.939048]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.939075]  ? kasan_atomics+0x152/0x310
[   15.939101]  kasan_atomics+0x1dc/0x310
[   15.939123]  ? __pfx_kasan_atomics+0x10/0x10
[   15.939149]  ? __pfx_read_tsc+0x10/0x10
[   15.939170]  ? ktime_get_ts64+0x86/0x230
[   15.939195]  kunit_try_run_case+0x1a5/0x480
[   15.939245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.939294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.939318]  ? __kthread_parkme+0x82/0x180
[   15.939340]  ? preempt_count_sub+0x50/0x80
[   15.939383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.939459]  kthread+0x337/0x6f0
[   15.939479]  ? trace_preempt_on+0x20/0xc0
[   15.939505]  ? __pfx_kthread+0x10/0x10
[   15.939526]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.939564]  ? calculate_sigpending+0x7b/0xa0
[   15.939589]  ? __pfx_kthread+0x10/0x10
[   15.939624]  ret_from_fork+0x116/0x1d0
[   15.939644]  ? __pfx_kthread+0x10/0x10
[   15.939664]  ret_from_fork_asm+0x1a/0x30
[   15.939713]  </TASK>
[   15.939725] 
[   15.947605] Allocated by task 282:
[   15.947790]  kasan_save_stack+0x45/0x70
[   15.948036]  kasan_save_track+0x18/0x40
[   15.948229]  kasan_save_alloc_info+0x3b/0x50
[   15.948441]  __kasan_kmalloc+0xb7/0xc0
[   15.948634]  __kmalloc_cache_noprof+0x189/0x420
[   15.948803]  kasan_atomics+0x95/0x310
[   15.948941]  kunit_try_run_case+0x1a5/0x480
[   15.949090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.949340]  kthread+0x337/0x6f0
[   15.949587]  ret_from_fork+0x116/0x1d0
[   15.949813]  ret_from_fork_asm+0x1a/0x30
[   15.950077] 
[   15.950149] The buggy address belongs to the object at ffff8881029cd380
[   15.950149]  which belongs to the cache kmalloc-64 of size 64
[   15.950719] The buggy address is located 0 bytes to the right of
[   15.950719]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.951358] 
[   15.951431] The buggy address belongs to the physical page:
[   15.951903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.952227] flags: 0x200000000000000(node=0|zone=2)
[   15.952384] page_type: f5(slab)
[   15.952500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.952733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.953063] page dumped because: kasan: bad access detected
[   15.953316] 
[   15.953410] Memory state around the buggy address:
[   15.953842]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.954111]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.954370] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.954701]                                      ^
[   15.955116]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.955339]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.955544] ==================================================================
[   15.141364] ==================================================================
[   15.142216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.142553] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.142972] 
[   15.143096] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.143144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.143156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.143177] Call Trace:
[   15.143189]  <TASK>
[   15.143206]  dump_stack_lvl+0x73/0xb0
[   15.143234]  print_report+0xd1/0x650
[   15.143282]  ? __virt_addr_valid+0x1db/0x2d0
[   15.143306]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.143327]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.143350]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.143372]  kasan_report+0x141/0x180
[   15.143393]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.143420]  __asan_report_load4_noabort+0x18/0x20
[   15.143444]  kasan_atomics_helper+0x4bbc/0x5450
[   15.143484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.143507]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.143534]  ? kasan_atomics+0x152/0x310
[   15.143559]  kasan_atomics+0x1dc/0x310
[   15.143582]  ? __pfx_kasan_atomics+0x10/0x10
[   15.143619]  ? __pfx_read_tsc+0x10/0x10
[   15.143657]  ? ktime_get_ts64+0x86/0x230
[   15.143683]  kunit_try_run_case+0x1a5/0x480
[   15.143707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.143755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.143810]  ? __kthread_parkme+0x82/0x180
[   15.143832]  ? preempt_count_sub+0x50/0x80
[   15.143857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.143942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.143968]  kthread+0x337/0x6f0
[   15.143986]  ? trace_preempt_on+0x20/0xc0
[   15.144012]  ? __pfx_kthread+0x10/0x10
[   15.144031]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.144053]  ? calculate_sigpending+0x7b/0xa0
[   15.144077]  ? __pfx_kthread+0x10/0x10
[   15.144099]  ret_from_fork+0x116/0x1d0
[   15.144118]  ? __pfx_kthread+0x10/0x10
[   15.144138]  ret_from_fork_asm+0x1a/0x30
[   15.144186]  </TASK>
[   15.144196] 
[   15.152428] Allocated by task 282:
[   15.152736]  kasan_save_stack+0x45/0x70
[   15.152984]  kasan_save_track+0x18/0x40
[   15.153148]  kasan_save_alloc_info+0x3b/0x50
[   15.153346]  __kasan_kmalloc+0xb7/0xc0
[   15.153532]  __kmalloc_cache_noprof+0x189/0x420
[   15.153726]  kasan_atomics+0x95/0x310
[   15.153905]  kunit_try_run_case+0x1a5/0x480
[   15.154054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154230]  kthread+0x337/0x6f0
[   15.154352]  ret_from_fork+0x116/0x1d0
[   15.154485]  ret_from_fork_asm+0x1a/0x30
[   15.154701] 
[   15.154890] The buggy address belongs to the object at ffff8881029cd380
[   15.154890]  which belongs to the cache kmalloc-64 of size 64
[   15.155488] The buggy address is located 0 bytes to the right of
[   15.155488]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.156122] 
[   15.156224] The buggy address belongs to the physical page:
[   15.156775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.157109] flags: 0x200000000000000(node=0|zone=2)
[   15.157368] page_type: f5(slab)
[   15.157580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.158033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.158693] page dumped because: kasan: bad access detected
[   15.159008] 
[   15.159102] Memory state around the buggy address:
[   15.159267]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.159483]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.159719] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.159933]                                      ^
[   15.160290]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160835]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.161182] ==================================================================
[   15.183153] ==================================================================
[   15.183474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.183841] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.184090] 
[   15.184176] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.184219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.184230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.184250] Call Trace:
[   15.184263]  <TASK>
[   15.184278]  dump_stack_lvl+0x73/0xb0
[   15.184305]  print_report+0xd1/0x650
[   15.184327]  ? __virt_addr_valid+0x1db/0x2d0
[   15.184349]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.184371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.184394]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.184415]  kasan_report+0x141/0x180
[   15.184436]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.184463]  __asan_report_load4_noabort+0x18/0x20
[   15.184488]  kasan_atomics_helper+0x4b88/0x5450
[   15.184510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.184533]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.184566]  ? kasan_atomics+0x152/0x310
[   15.184604]  kasan_atomics+0x1dc/0x310
[   15.184626]  ? __pfx_kasan_atomics+0x10/0x10
[   15.184650]  ? __pfx_read_tsc+0x10/0x10
[   15.184670]  ? ktime_get_ts64+0x86/0x230
[   15.184697]  kunit_try_run_case+0x1a5/0x480
[   15.184722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.184745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.184788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.184846]  ? __kthread_parkme+0x82/0x180
[   15.184866]  ? preempt_count_sub+0x50/0x80
[   15.184891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.184915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.184939]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.184965]  kthread+0x337/0x6f0
[   15.184984]  ? trace_preempt_on+0x20/0xc0
[   15.185008]  ? __pfx_kthread+0x10/0x10
[   15.185028]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.185049]  ? calculate_sigpending+0x7b/0xa0
[   15.185074]  ? __pfx_kthread+0x10/0x10
[   15.185095]  ret_from_fork+0x116/0x1d0
[   15.185114]  ? __pfx_kthread+0x10/0x10
[   15.185134]  ret_from_fork_asm+0x1a/0x30
[   15.185165]  </TASK>
[   15.185175] 
[   15.192821] Allocated by task 282:
[   15.192998]  kasan_save_stack+0x45/0x70
[   15.193172]  kasan_save_track+0x18/0x40
[   15.193307]  kasan_save_alloc_info+0x3b/0x50
[   15.193456]  __kasan_kmalloc+0xb7/0xc0
[   15.193588]  __kmalloc_cache_noprof+0x189/0x420
[   15.193992]  kasan_atomics+0x95/0x310
[   15.194184]  kunit_try_run_case+0x1a5/0x480
[   15.194396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194666]  kthread+0x337/0x6f0
[   15.194968]  ret_from_fork+0x116/0x1d0
[   15.195122]  ret_from_fork_asm+0x1a/0x30
[   15.195321] 
[   15.195400] The buggy address belongs to the object at ffff8881029cd380
[   15.195400]  which belongs to the cache kmalloc-64 of size 64
[   15.195991] The buggy address is located 0 bytes to the right of
[   15.195991]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.196675] 
[   15.196793] The buggy address belongs to the physical page:
[   15.197010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.197359] flags: 0x200000000000000(node=0|zone=2)
[   15.197676] page_type: f5(slab)
[   15.197873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.198137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.198366] page dumped because: kasan: bad access detected
[   15.198539] 
[   15.198619] Memory state around the buggy address:
[   15.198895]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199521]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199790] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.200104]                                      ^
[   15.200278]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200514]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.201081] ==================================================================
[   16.437651] ==================================================================
[   16.438287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.438687] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.439224] 
[   16.439339] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.439384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.439396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.439417] Call Trace:
[   16.439434]  <TASK>
[   16.439452]  dump_stack_lvl+0x73/0xb0
[   16.439482]  print_report+0xd1/0x650
[   16.439505]  ? __virt_addr_valid+0x1db/0x2d0
[   16.439529]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.439551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.439576]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.439611]  kasan_report+0x141/0x180
[   16.439633]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.439661]  kasan_check_range+0x10c/0x1c0
[   16.439686]  __kasan_check_write+0x18/0x20
[   16.439706]  kasan_atomics_helper+0x20c8/0x5450
[   16.439729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.439753]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.439931]  ? kasan_atomics+0x152/0x310
[   16.439963]  kasan_atomics+0x1dc/0x310
[   16.439987]  ? __pfx_kasan_atomics+0x10/0x10
[   16.440013]  ? __pfx_read_tsc+0x10/0x10
[   16.440035]  ? ktime_get_ts64+0x86/0x230
[   16.440097]  kunit_try_run_case+0x1a5/0x480
[   16.440125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.440149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.440177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.440202]  ? __kthread_parkme+0x82/0x180
[   16.440223]  ? preempt_count_sub+0x50/0x80
[   16.440249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.440274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.440300]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.440326]  kthread+0x337/0x6f0
[   16.440346]  ? trace_preempt_on+0x20/0xc0
[   16.440371]  ? __pfx_kthread+0x10/0x10
[   16.440392]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.440415]  ? calculate_sigpending+0x7b/0xa0
[   16.440440]  ? __pfx_kthread+0x10/0x10
[   16.440462]  ret_from_fork+0x116/0x1d0
[   16.440482]  ? __pfx_kthread+0x10/0x10
[   16.440504]  ret_from_fork_asm+0x1a/0x30
[   16.440536]  </TASK>
[   16.440548] 
[   16.451561] Allocated by task 282:
[   16.451760]  kasan_save_stack+0x45/0x70
[   16.452284]  kasan_save_track+0x18/0x40
[   16.452574]  kasan_save_alloc_info+0x3b/0x50
[   16.452977]  __kasan_kmalloc+0xb7/0xc0
[   16.453280]  __kmalloc_cache_noprof+0x189/0x420
[   16.453489]  kasan_atomics+0x95/0x310
[   16.453672]  kunit_try_run_case+0x1a5/0x480
[   16.454204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.454505]  kthread+0x337/0x6f0
[   16.454776]  ret_from_fork+0x116/0x1d0
[   16.455174]  ret_from_fork_asm+0x1a/0x30
[   16.455467] 
[   16.455696] The buggy address belongs to the object at ffff8881029cd380
[   16.455696]  which belongs to the cache kmalloc-64 of size 64
[   16.456357] The buggy address is located 0 bytes to the right of
[   16.456357]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.457084] 
[   16.457309] The buggy address belongs to the physical page:
[   16.457806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.458272] flags: 0x200000000000000(node=0|zone=2)
[   16.458624] page_type: f5(slab)
[   16.458953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.459359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.459684] page dumped because: kasan: bad access detected
[   16.460069] 
[   16.460298] Memory state around the buggy address:
[   16.460690]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.461141]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.461443] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.461743]                                      ^
[   16.462298]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.462793]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.463279] ==================================================================
[   15.520702] ==================================================================
[   15.522073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.523187] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.524200] 
[   15.524570] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.524811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.524827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.524849] Call Trace:
[   15.524866]  <TASK>
[   15.524885]  dump_stack_lvl+0x73/0xb0
[   15.524927]  print_report+0xd1/0x650
[   15.524950]  ? __virt_addr_valid+0x1db/0x2d0
[   15.524973]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.524996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.525020]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.525042]  kasan_report+0x141/0x180
[   15.525065]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.525092]  kasan_check_range+0x10c/0x1c0
[   15.525117]  __kasan_check_write+0x18/0x20
[   15.525137]  kasan_atomics_helper+0xb6a/0x5450
[   15.525161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.525184]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.525210]  ? kasan_atomics+0x152/0x310
[   15.525237]  kasan_atomics+0x1dc/0x310
[   15.525260]  ? __pfx_kasan_atomics+0x10/0x10
[   15.525284]  ? __pfx_read_tsc+0x10/0x10
[   15.525307]  ? ktime_get_ts64+0x86/0x230
[   15.525331]  kunit_try_run_case+0x1a5/0x480
[   15.525356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.525379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.525403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.525428]  ? __kthread_parkme+0x82/0x180
[   15.525452]  ? preempt_count_sub+0x50/0x80
[   15.525476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.525580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.525631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.525657]  kthread+0x337/0x6f0
[   15.525677]  ? trace_preempt_on+0x20/0xc0
[   15.525702]  ? __pfx_kthread+0x10/0x10
[   15.525723]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.525746]  ? calculate_sigpending+0x7b/0xa0
[   15.525772]  ? __pfx_kthread+0x10/0x10
[   15.525793]  ret_from_fork+0x116/0x1d0
[   15.525813]  ? __pfx_kthread+0x10/0x10
[   15.525835]  ret_from_fork_asm+0x1a/0x30
[   15.525867]  </TASK>
[   15.525878] 
[   15.542088] Allocated by task 282:
[   15.542487]  kasan_save_stack+0x45/0x70
[   15.542982]  kasan_save_track+0x18/0x40
[   15.543122]  kasan_save_alloc_info+0x3b/0x50
[   15.543270]  __kasan_kmalloc+0xb7/0xc0
[   15.543398]  __kmalloc_cache_noprof+0x189/0x420
[   15.543550]  kasan_atomics+0x95/0x310
[   15.543689]  kunit_try_run_case+0x1a5/0x480
[   15.543854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.544024]  kthread+0x337/0x6f0
[   15.544559]  ret_from_fork+0x116/0x1d0
[   15.545116]  ret_from_fork_asm+0x1a/0x30
[   15.545513] 
[   15.545719] The buggy address belongs to the object at ffff8881029cd380
[   15.545719]  which belongs to the cache kmalloc-64 of size 64
[   15.546490] The buggy address is located 0 bytes to the right of
[   15.546490]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.547275] 
[   15.547376] The buggy address belongs to the physical page:
[   15.547575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.548318] flags: 0x200000000000000(node=0|zone=2)
[   15.548965] page_type: f5(slab)
[   15.549458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.550300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.550894] page dumped because: kasan: bad access detected
[   15.551511] 
[   15.551698] Memory state around the buggy address:
[   15.552123]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.552855]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.553081] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.553288]                                      ^
[   15.553438]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553670]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.554323] ==================================================================
[   16.013321] ==================================================================
[   16.013575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.013824] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.014047] 
[   16.014126] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.014167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.014179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.014198] Call Trace:
[   16.014262]  <TASK>
[   16.014279]  dump_stack_lvl+0x73/0xb0
[   16.014306]  print_report+0xd1/0x650
[   16.014328]  ? __virt_addr_valid+0x1db/0x2d0
[   16.014351]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.014374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.014398]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.014421]  kasan_report+0x141/0x180
[   16.014444]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.014470]  kasan_check_range+0x10c/0x1c0
[   16.014495]  __kasan_check_write+0x18/0x20
[   16.014516]  kasan_atomics_helper+0x15b6/0x5450
[   16.014539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.014563]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.014589]  ? kasan_atomics+0x152/0x310
[   16.014627]  kasan_atomics+0x1dc/0x310
[   16.014652]  ? __pfx_kasan_atomics+0x10/0x10
[   16.014676]  ? __pfx_read_tsc+0x10/0x10
[   16.014700]  ? ktime_get_ts64+0x86/0x230
[   16.014725]  kunit_try_run_case+0x1a5/0x480
[   16.014750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.014808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.014843]  ? __kthread_parkme+0x82/0x180
[   16.014901]  ? preempt_count_sub+0x50/0x80
[   16.014926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.014979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.015006]  kthread+0x337/0x6f0
[   16.015026]  ? trace_preempt_on+0x20/0xc0
[   16.015049]  ? __pfx_kthread+0x10/0x10
[   16.015071]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.015094]  ? calculate_sigpending+0x7b/0xa0
[   16.015119]  ? __pfx_kthread+0x10/0x10
[   16.015141]  ret_from_fork+0x116/0x1d0
[   16.015190]  ? __pfx_kthread+0x10/0x10
[   16.015235]  ret_from_fork_asm+0x1a/0x30
[   16.015266]  </TASK>
[   16.015278] 
[   16.023777] Allocated by task 282:
[   16.023958]  kasan_save_stack+0x45/0x70
[   16.024106]  kasan_save_track+0x18/0x40
[   16.024238]  kasan_save_alloc_info+0x3b/0x50
[   16.024384]  __kasan_kmalloc+0xb7/0xc0
[   16.024616]  __kmalloc_cache_noprof+0x189/0x420
[   16.025034]  kasan_atomics+0x95/0x310
[   16.025287]  kunit_try_run_case+0x1a5/0x480
[   16.025505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.025817]  kthread+0x337/0x6f0
[   16.026002]  ret_from_fork+0x116/0x1d0
[   16.026131]  ret_from_fork_asm+0x1a/0x30
[   16.026302] 
[   16.026429] The buggy address belongs to the object at ffff8881029cd380
[   16.026429]  which belongs to the cache kmalloc-64 of size 64
[   16.027062] The buggy address is located 0 bytes to the right of
[   16.027062]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.027616] 
[   16.027719] The buggy address belongs to the physical page:
[   16.027989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.028435] flags: 0x200000000000000(node=0|zone=2)
[   16.028609] page_type: f5(slab)
[   16.028727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.028967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.029295] page dumped because: kasan: bad access detected
[   16.029540] 
[   16.029676] Memory state around the buggy address:
[   16.029897]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.030207]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.030627] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.031273]                                      ^
[   16.031516]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.032264]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.033060] ==================================================================
[   16.089301] ==================================================================
[   16.089613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.089869] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.090162] 
[   16.090250] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.090298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.090310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.090333] Call Trace:
[   16.090353]  <TASK>
[   16.090373]  dump_stack_lvl+0x73/0xb0
[   16.090403]  print_report+0xd1/0x650
[   16.090426]  ? __virt_addr_valid+0x1db/0x2d0
[   16.090451]  ? kasan_atomics_helper+0x177f/0x5450
[   16.090474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.090498]  ? kasan_atomics_helper+0x177f/0x5450
[   16.090521]  kasan_report+0x141/0x180
[   16.090544]  ? kasan_atomics_helper+0x177f/0x5450
[   16.090571]  kasan_check_range+0x10c/0x1c0
[   16.090606]  __kasan_check_write+0x18/0x20
[   16.090627]  kasan_atomics_helper+0x177f/0x5450
[   16.090651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.090674]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.090701]  ? kasan_atomics+0x152/0x310
[   16.090727]  kasan_atomics+0x1dc/0x310
[   16.090750]  ? __pfx_kasan_atomics+0x10/0x10
[   16.090775]  ? __pfx_read_tsc+0x10/0x10
[   16.090810]  ? ktime_get_ts64+0x86/0x230
[   16.090839]  kunit_try_run_case+0x1a5/0x480
[   16.090864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.090888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.090913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.090938]  ? __kthread_parkme+0x82/0x180
[   16.090960]  ? preempt_count_sub+0x50/0x80
[   16.090985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.091010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.091035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.091061]  kthread+0x337/0x6f0
[   16.091081]  ? trace_preempt_on+0x20/0xc0
[   16.091107]  ? __pfx_kthread+0x10/0x10
[   16.091127]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.091151]  ? calculate_sigpending+0x7b/0xa0
[   16.091176]  ? __pfx_kthread+0x10/0x10
[   16.091198]  ret_from_fork+0x116/0x1d0
[   16.091218]  ? __pfx_kthread+0x10/0x10
[   16.091239]  ret_from_fork_asm+0x1a/0x30
[   16.091271]  </TASK>
[   16.091282] 
[   16.098588] Allocated by task 282:
[   16.098734]  kasan_save_stack+0x45/0x70
[   16.098893]  kasan_save_track+0x18/0x40
[   16.099027]  kasan_save_alloc_info+0x3b/0x50
[   16.099425]  __kasan_kmalloc+0xb7/0xc0
[   16.099619]  __kmalloc_cache_noprof+0x189/0x420
[   16.099834]  kasan_atomics+0x95/0x310
[   16.099997]  kunit_try_run_case+0x1a5/0x480
[   16.100139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.100309]  kthread+0x337/0x6f0
[   16.100425]  ret_from_fork+0x116/0x1d0
[   16.100553]  ret_from_fork_asm+0x1a/0x30
[   16.100768] 
[   16.100864] The buggy address belongs to the object at ffff8881029cd380
[   16.100864]  which belongs to the cache kmalloc-64 of size 64
[   16.101401] The buggy address is located 0 bytes to the right of
[   16.101401]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.102147] 
[   16.102219] The buggy address belongs to the physical page:
[   16.102384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.102643] flags: 0x200000000000000(node=0|zone=2)
[   16.102878] page_type: f5(slab)
[   16.103045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.103383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.103745] page dumped because: kasan: bad access detected
[   16.104104] 
[   16.104205] Memory state around the buggy address:
[   16.104408]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.104624]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.104831] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.105121]                                      ^
[   16.105351]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105687]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.106126] ==================================================================
[   16.542225] ==================================================================
[   16.542471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.542859] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.543193] 
[   16.543292] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.543336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.543347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.543369] Call Trace:
[   16.543384]  <TASK>
[   16.543404]  dump_stack_lvl+0x73/0xb0
[   16.543431]  print_report+0xd1/0x650
[   16.543453]  ? __virt_addr_valid+0x1db/0x2d0
[   16.543477]  ? kasan_atomics_helper+0x5115/0x5450
[   16.543499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.543523]  ? kasan_atomics_helper+0x5115/0x5450
[   16.543547]  kasan_report+0x141/0x180
[   16.543570]  ? kasan_atomics_helper+0x5115/0x5450
[   16.543608]  __asan_report_load8_noabort+0x18/0x20
[   16.543634]  kasan_atomics_helper+0x5115/0x5450
[   16.543658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.543682]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.543708]  ? kasan_atomics+0x152/0x310
[   16.543735]  kasan_atomics+0x1dc/0x310
[   16.543758]  ? __pfx_kasan_atomics+0x10/0x10
[   16.543790]  ? __pfx_read_tsc+0x10/0x10
[   16.543812]  ? ktime_get_ts64+0x86/0x230
[   16.543837]  kunit_try_run_case+0x1a5/0x480
[   16.543862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.543885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.543910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.543936]  ? __kthread_parkme+0x82/0x180
[   16.543957]  ? preempt_count_sub+0x50/0x80
[   16.543982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.544007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.544033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.544059]  kthread+0x337/0x6f0
[   16.544079]  ? trace_preempt_on+0x20/0xc0
[   16.544104]  ? __pfx_kthread+0x10/0x10
[   16.544126]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.544148]  ? calculate_sigpending+0x7b/0xa0
[   16.544175]  ? __pfx_kthread+0x10/0x10
[   16.544196]  ret_from_fork+0x116/0x1d0
[   16.544216]  ? __pfx_kthread+0x10/0x10
[   16.544237]  ret_from_fork_asm+0x1a/0x30
[   16.544269]  </TASK>
[   16.544280] 
[   16.554966] Allocated by task 282:
[   16.555301]  kasan_save_stack+0x45/0x70
[   16.555540]  kasan_save_track+0x18/0x40
[   16.555757]  kasan_save_alloc_info+0x3b/0x50
[   16.556172]  __kasan_kmalloc+0xb7/0xc0
[   16.556479]  __kmalloc_cache_noprof+0x189/0x420
[   16.556710]  kasan_atomics+0x95/0x310
[   16.557000]  kunit_try_run_case+0x1a5/0x480
[   16.557305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.557636]  kthread+0x337/0x6f0
[   16.557950]  ret_from_fork+0x116/0x1d0
[   16.558292]  ret_from_fork_asm+0x1a/0x30
[   16.558491] 
[   16.558572] The buggy address belongs to the object at ffff8881029cd380
[   16.558572]  which belongs to the cache kmalloc-64 of size 64
[   16.559381] The buggy address is located 0 bytes to the right of
[   16.559381]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.560081] 
[   16.560166] The buggy address belongs to the physical page:
[   16.560547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.560855] flags: 0x200000000000000(node=0|zone=2)
[   16.561020] page_type: f5(slab)
[   16.561138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.561363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.561584] page dumped because: kasan: bad access detected
[   16.561781] 
[   16.561850] Memory state around the buggy address:
[   16.562003]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.562213]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.562424] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.562644]                                      ^
[   16.562834]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.563045]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.563576] ==================================================================
[   16.065644] ==================================================================
[   16.066400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.067096] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.067880] 
[   16.068055] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.068124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.068138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.068171] Call Trace:
[   16.068190]  <TASK>
[   16.068208]  dump_stack_lvl+0x73/0xb0
[   16.068238]  print_report+0xd1/0x650
[   16.068261]  ? __virt_addr_valid+0x1db/0x2d0
[   16.068285]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.068307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.068331]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.068354]  kasan_report+0x141/0x180
[   16.068377]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.068404]  kasan_check_range+0x10c/0x1c0
[   16.068428]  __kasan_check_write+0x18/0x20
[   16.068449]  kasan_atomics_helper+0x16e7/0x5450
[   16.068472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.068496]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.068523]  ? kasan_atomics+0x152/0x310
[   16.068549]  kasan_atomics+0x1dc/0x310
[   16.068571]  ? __pfx_kasan_atomics+0x10/0x10
[   16.068607]  ? __pfx_read_tsc+0x10/0x10
[   16.068629]  ? ktime_get_ts64+0x86/0x230
[   16.068653]  kunit_try_run_case+0x1a5/0x480
[   16.068678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.068728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.068753]  ? __kthread_parkme+0x82/0x180
[   16.068785]  ? preempt_count_sub+0x50/0x80
[   16.068813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.068865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.068891]  kthread+0x337/0x6f0
[   16.068911]  ? trace_preempt_on+0x20/0xc0
[   16.068937]  ? __pfx_kthread+0x10/0x10
[   16.068959]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.068981]  ? calculate_sigpending+0x7b/0xa0
[   16.069007]  ? __pfx_kthread+0x10/0x10
[   16.069029]  ret_from_fork+0x116/0x1d0
[   16.069049]  ? __pfx_kthread+0x10/0x10
[   16.069070]  ret_from_fork_asm+0x1a/0x30
[   16.069102]  </TASK>
[   16.069112] 
[   16.076738] Allocated by task 282:
[   16.077628]  kasan_save_stack+0x45/0x70
[   16.077907]  kasan_save_track+0x18/0x40
[   16.078111]  kasan_save_alloc_info+0x3b/0x50
[   16.078324]  __kasan_kmalloc+0xb7/0xc0
[   16.078512]  __kmalloc_cache_noprof+0x189/0x420
[   16.078726]  kasan_atomics+0x95/0x310
[   16.079180]  kunit_try_run_case+0x1a5/0x480
[   16.079549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.079828]  kthread+0x337/0x6f0
[   16.079988]  ret_from_fork+0x116/0x1d0
[   16.080166]  ret_from_fork_asm+0x1a/0x30
[   16.080349] 
[   16.080439] The buggy address belongs to the object at ffff8881029cd380
[   16.080439]  which belongs to the cache kmalloc-64 of size 64
[   16.081313] The buggy address is located 0 bytes to the right of
[   16.081313]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.082147] 
[   16.082251] The buggy address belongs to the physical page:
[   16.082483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.083040] flags: 0x200000000000000(node=0|zone=2)
[   16.083257] page_type: f5(slab)
[   16.083410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.083727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.084722] page dumped because: kasan: bad access detected
[   16.085117] 
[   16.085286] Memory state around the buggy address:
[   16.085714]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086202]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086681] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.087196]                                      ^
[   16.087536]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.088079]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.088492] ==================================================================
[   15.600704] ==================================================================
[   15.601480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.601909] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.602362] 
[   15.602626] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.602676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.602689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.602712] Call Trace:
[   15.602731]  <TASK>
[   15.602750]  dump_stack_lvl+0x73/0xb0
[   15.602782]  print_report+0xd1/0x650
[   15.602815]  ? __virt_addr_valid+0x1db/0x2d0
[   15.602845]  ? kasan_atomics_helper+0xd47/0x5450
[   15.602868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.602892]  ? kasan_atomics_helper+0xd47/0x5450
[   15.602914]  kasan_report+0x141/0x180
[   15.602937]  ? kasan_atomics_helper+0xd47/0x5450
[   15.602964]  kasan_check_range+0x10c/0x1c0
[   15.602989]  __kasan_check_write+0x18/0x20
[   15.603010]  kasan_atomics_helper+0xd47/0x5450
[   15.603033]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.603057]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.603085]  ? kasan_atomics+0x152/0x310
[   15.603112]  kasan_atomics+0x1dc/0x310
[   15.603135]  ? __pfx_kasan_atomics+0x10/0x10
[   15.603161]  ? __pfx_read_tsc+0x10/0x10
[   15.603184]  ? ktime_get_ts64+0x86/0x230
[   15.603209]  kunit_try_run_case+0x1a5/0x480
[   15.603234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.603261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.603285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.603310]  ? __kthread_parkme+0x82/0x180
[   15.603332]  ? preempt_count_sub+0x50/0x80
[   15.603357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.603383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.603408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.603435]  kthread+0x337/0x6f0
[   15.603454]  ? trace_preempt_on+0x20/0xc0
[   15.603479]  ? __pfx_kthread+0x10/0x10
[   15.603500]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.603523]  ? calculate_sigpending+0x7b/0xa0
[   15.603549]  ? __pfx_kthread+0x10/0x10
[   15.603572]  ret_from_fork+0x116/0x1d0
[   15.603591]  ? __pfx_kthread+0x10/0x10
[   15.603624]  ret_from_fork_asm+0x1a/0x30
[   15.603655]  </TASK>
[   15.603667] 
[   15.615170] Allocated by task 282:
[   15.615304]  kasan_save_stack+0x45/0x70
[   15.615464]  kasan_save_track+0x18/0x40
[   15.615648]  kasan_save_alloc_info+0x3b/0x50
[   15.615864]  __kasan_kmalloc+0xb7/0xc0
[   15.615998]  __kmalloc_cache_noprof+0x189/0x420
[   15.616247]  kasan_atomics+0x95/0x310
[   15.616448]  kunit_try_run_case+0x1a5/0x480
[   15.616631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.616908]  kthread+0x337/0x6f0
[   15.617029]  ret_from_fork+0x116/0x1d0
[   15.617163]  ret_from_fork_asm+0x1a/0x30
[   15.617358] 
[   15.617453] The buggy address belongs to the object at ffff8881029cd380
[   15.617453]  which belongs to the cache kmalloc-64 of size 64
[   15.618067] The buggy address is located 0 bytes to the right of
[   15.618067]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.618892] 
[   15.618994] The buggy address belongs to the physical page:
[   15.619221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.619551] flags: 0x200000000000000(node=0|zone=2)
[   15.620423] page_type: f5(slab)
[   15.620588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.620986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.621404] page dumped because: kasan: bad access detected
[   15.621721] 
[   15.621823] Memory state around the buggy address:
[   15.621987]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.622422]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.622728] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.623136]                                      ^
[   15.623364]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.623750]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.624185] ==================================================================
[   15.974260] ==================================================================
[   15.974545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.975056] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.975274] 
[   15.975356] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.975397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.975409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.975429] Call Trace:
[   15.975444]  <TASK>
[   15.975461]  dump_stack_lvl+0x73/0xb0
[   15.975489]  print_report+0xd1/0x650
[   15.975510]  ? __virt_addr_valid+0x1db/0x2d0
[   15.975533]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.975607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.975661]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.975685]  kasan_report+0x141/0x180
[   15.975731]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.975758]  __asan_report_store8_noabort+0x1b/0x30
[   15.975824]  kasan_atomics_helper+0x50d4/0x5450
[   15.975848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.975895]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.975921]  ? kasan_atomics+0x152/0x310
[   15.975948]  kasan_atomics+0x1dc/0x310
[   15.975970]  ? __pfx_kasan_atomics+0x10/0x10
[   15.975996]  ? __pfx_read_tsc+0x10/0x10
[   15.976017]  ? ktime_get_ts64+0x86/0x230
[   15.976041]  kunit_try_run_case+0x1a5/0x480
[   15.976066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.976090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.976115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.976139]  ? __kthread_parkme+0x82/0x180
[   15.976161]  ? preempt_count_sub+0x50/0x80
[   15.976217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.976242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.976268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.976294]  kthread+0x337/0x6f0
[   15.976313]  ? trace_preempt_on+0x20/0xc0
[   15.976369]  ? __pfx_kthread+0x10/0x10
[   15.976390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.976412]  ? calculate_sigpending+0x7b/0xa0
[   15.976438]  ? __pfx_kthread+0x10/0x10
[   15.976460]  ret_from_fork+0x116/0x1d0
[   15.976508]  ? __pfx_kthread+0x10/0x10
[   15.976529]  ret_from_fork_asm+0x1a/0x30
[   15.976561]  </TASK>
[   15.976572] 
[   15.984863] Allocated by task 282:
[   15.985076]  kasan_save_stack+0x45/0x70
[   15.985241]  kasan_save_track+0x18/0x40
[   15.985405]  kasan_save_alloc_info+0x3b/0x50
[   15.985560]  __kasan_kmalloc+0xb7/0xc0
[   15.985702]  __kmalloc_cache_noprof+0x189/0x420
[   15.985854]  kasan_atomics+0x95/0x310
[   15.985985]  kunit_try_run_case+0x1a5/0x480
[   15.986128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.986333]  kthread+0x337/0x6f0
[   15.986497]  ret_from_fork+0x116/0x1d0
[   15.986733]  ret_from_fork_asm+0x1a/0x30
[   15.987153] 
[   15.987247] The buggy address belongs to the object at ffff8881029cd380
[   15.987247]  which belongs to the cache kmalloc-64 of size 64
[   15.987772] The buggy address is located 0 bytes to the right of
[   15.987772]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.988184] 
[   15.988256] The buggy address belongs to the physical page:
[   15.988424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.988669] flags: 0x200000000000000(node=0|zone=2)
[   15.989003] page_type: f5(slab)
[   15.989174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.989627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.990330] page dumped because: kasan: bad access detected
[   15.990625] 
[   15.990720] Memory state around the buggy address:
[   15.991172]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.991518]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.991741] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.992416]                                      ^
[   15.992641]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.993006]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.993318] ==================================================================
[   15.733687] ==================================================================
[   15.734058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.734369] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.734689] 
[   15.734778] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.734822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.734841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.734863] Call Trace:
[   15.734882]  <TASK>
[   15.734902]  dump_stack_lvl+0x73/0xb0
[   15.734930]  print_report+0xd1/0x650
[   15.734954]  ? __virt_addr_valid+0x1db/0x2d0
[   15.734978]  ? kasan_atomics_helper+0x1079/0x5450
[   15.735000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.735024]  ? kasan_atomics_helper+0x1079/0x5450
[   15.735047]  kasan_report+0x141/0x180
[   15.735069]  ? kasan_atomics_helper+0x1079/0x5450
[   15.735097]  kasan_check_range+0x10c/0x1c0
[   15.735121]  __kasan_check_write+0x18/0x20
[   15.735142]  kasan_atomics_helper+0x1079/0x5450
[   15.735165]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.735192]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.735219]  ? kasan_atomics+0x152/0x310
[   15.735246]  kasan_atomics+0x1dc/0x310
[   15.735269]  ? __pfx_kasan_atomics+0x10/0x10
[   15.735294]  ? __pfx_read_tsc+0x10/0x10
[   15.735316]  ? ktime_get_ts64+0x86/0x230
[   15.735342]  kunit_try_run_case+0x1a5/0x480
[   15.735367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.735391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.735415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.735440]  ? __kthread_parkme+0x82/0x180
[   15.735462]  ? preempt_count_sub+0x50/0x80
[   15.735487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.735513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.735538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.735564]  kthread+0x337/0x6f0
[   15.735584]  ? trace_preempt_on+0x20/0xc0
[   15.735618]  ? __pfx_kthread+0x10/0x10
[   15.735639]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.735662]  ? calculate_sigpending+0x7b/0xa0
[   15.735688]  ? __pfx_kthread+0x10/0x10
[   15.735711]  ret_from_fork+0x116/0x1d0
[   15.735730]  ? __pfx_kthread+0x10/0x10
[   15.735751]  ret_from_fork_asm+0x1a/0x30
[   15.735784]  </TASK>
[   15.735795] 
[   15.743497] Allocated by task 282:
[   15.743688]  kasan_save_stack+0x45/0x70
[   15.743986]  kasan_save_track+0x18/0x40
[   15.744180]  kasan_save_alloc_info+0x3b/0x50
[   15.744389]  __kasan_kmalloc+0xb7/0xc0
[   15.744547]  __kmalloc_cache_noprof+0x189/0x420
[   15.744772]  kasan_atomics+0x95/0x310
[   15.744959]  kunit_try_run_case+0x1a5/0x480
[   15.745145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.745371]  kthread+0x337/0x6f0
[   15.745494]  ret_from_fork+0x116/0x1d0
[   15.745637]  ret_from_fork_asm+0x1a/0x30
[   15.745778] 
[   15.745848] The buggy address belongs to the object at ffff8881029cd380
[   15.745848]  which belongs to the cache kmalloc-64 of size 64
[   15.746203] The buggy address is located 0 bytes to the right of
[   15.746203]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.746960] 
[   15.747058] The buggy address belongs to the physical page:
[   15.747312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.747674] flags: 0x200000000000000(node=0|zone=2)
[   15.748002] page_type: f5(slab)
[   15.748133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.748366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.748609] page dumped because: kasan: bad access detected
[   15.748789] 
[   15.748886] Memory state around the buggy address:
[   15.749125]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.749454]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.749796] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.750119]                                      ^
[   15.750339]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750653]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750944] ==================================================================
[   16.377575] ==================================================================
[   16.377925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.378814] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.379055] 
[   16.379221] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.379290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.379303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.379323] Call Trace:
[   16.379339]  <TASK>
[   16.379357]  dump_stack_lvl+0x73/0xb0
[   16.379387]  print_report+0xd1/0x650
[   16.379409]  ? __virt_addr_valid+0x1db/0x2d0
[   16.379434]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.379475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.379500]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.379523]  kasan_report+0x141/0x180
[   16.379545]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.379573]  __asan_report_load8_noabort+0x18/0x20
[   16.379610]  kasan_atomics_helper+0x4f71/0x5450
[   16.379634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.379658]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.379684]  ? kasan_atomics+0x152/0x310
[   16.379728]  kasan_atomics+0x1dc/0x310
[   16.379752]  ? __pfx_kasan_atomics+0x10/0x10
[   16.379777]  ? __pfx_read_tsc+0x10/0x10
[   16.379799]  ? ktime_get_ts64+0x86/0x230
[   16.379824]  kunit_try_run_case+0x1a5/0x480
[   16.379849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.379873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.379899]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.379925]  ? __kthread_parkme+0x82/0x180
[   16.379946]  ? preempt_count_sub+0x50/0x80
[   16.379973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.379998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.380025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.380052]  kthread+0x337/0x6f0
[   16.380072]  ? trace_preempt_on+0x20/0xc0
[   16.380097]  ? __pfx_kthread+0x10/0x10
[   16.380118]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.380141]  ? calculate_sigpending+0x7b/0xa0
[   16.380167]  ? __pfx_kthread+0x10/0x10
[   16.380189]  ret_from_fork+0x116/0x1d0
[   16.380208]  ? __pfx_kthread+0x10/0x10
[   16.380237]  ret_from_fork_asm+0x1a/0x30
[   16.380288]  </TASK>
[   16.380299] 
[   16.387708] Allocated by task 282:
[   16.387943]  kasan_save_stack+0x45/0x70
[   16.388097]  kasan_save_track+0x18/0x40
[   16.388233]  kasan_save_alloc_info+0x3b/0x50
[   16.388415]  __kasan_kmalloc+0xb7/0xc0
[   16.388611]  __kmalloc_cache_noprof+0x189/0x420
[   16.388832]  kasan_atomics+0x95/0x310
[   16.389021]  kunit_try_run_case+0x1a5/0x480
[   16.389169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.389429]  kthread+0x337/0x6f0
[   16.389611]  ret_from_fork+0x116/0x1d0
[   16.389857]  ret_from_fork_asm+0x1a/0x30
[   16.390063] 
[   16.390153] The buggy address belongs to the object at ffff8881029cd380
[   16.390153]  which belongs to the cache kmalloc-64 of size 64
[   16.390506] The buggy address is located 0 bytes to the right of
[   16.390506]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.391110] 
[   16.391208] The buggy address belongs to the physical page:
[   16.391545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.391797] flags: 0x200000000000000(node=0|zone=2)
[   16.391971] page_type: f5(slab)
[   16.392227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.392606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.393157] page dumped because: kasan: bad access detected
[   16.393418] 
[   16.393489] Memory state around the buggy address:
[   16.393714]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.394041]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.394257] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.394764]                                      ^
[   16.394945]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.395161]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.395374] ==================================================================
[   15.860787] ==================================================================
[   15.861087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.861406] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.861902] 
[   15.861995] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.862040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.862053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.862075] Call Trace:
[   15.862094]  <TASK>
[   15.862111]  dump_stack_lvl+0x73/0xb0
[   15.862169]  print_report+0xd1/0x650
[   15.862191]  ? __virt_addr_valid+0x1db/0x2d0
[   15.862215]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.862237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.862261]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.862284]  kasan_report+0x141/0x180
[   15.862330]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.862358]  kasan_check_range+0x10c/0x1c0
[   15.862383]  __kasan_check_write+0x18/0x20
[   15.862403]  kasan_atomics_helper+0x12e6/0x5450
[   15.862427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.862450]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.862494]  ? kasan_atomics+0x152/0x310
[   15.862520]  kasan_atomics+0x1dc/0x310
[   15.862544]  ? __pfx_kasan_atomics+0x10/0x10
[   15.862568]  ? __pfx_read_tsc+0x10/0x10
[   15.862590]  ? ktime_get_ts64+0x86/0x230
[   15.862626]  kunit_try_run_case+0x1a5/0x480
[   15.862651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.862674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.862699]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.862725]  ? __kthread_parkme+0x82/0x180
[   15.862746]  ? preempt_count_sub+0x50/0x80
[   15.862771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.862804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.862834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.862880]  kthread+0x337/0x6f0
[   15.862900]  ? trace_preempt_on+0x20/0xc0
[   15.862924]  ? __pfx_kthread+0x10/0x10
[   15.862946]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.862968]  ? calculate_sigpending+0x7b/0xa0
[   15.862994]  ? __pfx_kthread+0x10/0x10
[   15.863017]  ret_from_fork+0x116/0x1d0
[   15.863036]  ? __pfx_kthread+0x10/0x10
[   15.863058]  ret_from_fork_asm+0x1a/0x30
[   15.863090]  </TASK>
[   15.863100] 
[   15.870562] Allocated by task 282:
[   15.870747]  kasan_save_stack+0x45/0x70
[   15.870935]  kasan_save_track+0x18/0x40
[   15.871070]  kasan_save_alloc_info+0x3b/0x50
[   15.871217]  __kasan_kmalloc+0xb7/0xc0
[   15.871346]  __kmalloc_cache_noprof+0x189/0x420
[   15.871498]  kasan_atomics+0x95/0x310
[   15.871696]  kunit_try_run_case+0x1a5/0x480
[   15.871927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.872216]  kthread+0x337/0x6f0
[   15.872412]  ret_from_fork+0x116/0x1d0
[   15.872601]  ret_from_fork_asm+0x1a/0x30
[   15.872798] 
[   15.872890] The buggy address belongs to the object at ffff8881029cd380
[   15.872890]  which belongs to the cache kmalloc-64 of size 64
[   15.873418] The buggy address is located 0 bytes to the right of
[   15.873418]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.873976] 
[   15.874066] The buggy address belongs to the physical page:
[   15.874300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.874566] flags: 0x200000000000000(node=0|zone=2)
[   15.875127] page_type: f5(slab)
[   15.875485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.876074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.876891] page dumped because: kasan: bad access detected
[   15.877376] 
[   15.877448] Memory state around the buggy address:
[   15.877616]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878009]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878636] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.879332]                                      ^
[   15.879795]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.880425]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.880801] ==================================================================
[   15.956026] ==================================================================
[   15.956358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.956729] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.957019] 
[   15.957102] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.957142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.957155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.957202] Call Trace:
[   15.957217]  <TASK>
[   15.957233]  dump_stack_lvl+0x73/0xb0
[   15.957261]  print_report+0xd1/0x650
[   15.957282]  ? __virt_addr_valid+0x1db/0x2d0
[   15.957306]  ? kasan_atomics_helper+0x1467/0x5450
[   15.957328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.957352]  ? kasan_atomics_helper+0x1467/0x5450
[   15.957375]  kasan_report+0x141/0x180
[   15.957397]  ? kasan_atomics_helper+0x1467/0x5450
[   15.957423]  kasan_check_range+0x10c/0x1c0
[   15.957447]  __kasan_check_write+0x18/0x20
[   15.957468]  kasan_atomics_helper+0x1467/0x5450
[   15.957491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.957515]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.957540]  ? kasan_atomics+0x152/0x310
[   15.957566]  kasan_atomics+0x1dc/0x310
[   15.957589]  ? __pfx_kasan_atomics+0x10/0x10
[   15.957625]  ? __pfx_read_tsc+0x10/0x10
[   15.957646]  ? ktime_get_ts64+0x86/0x230
[   15.957673]  kunit_try_run_case+0x1a5/0x480
[   15.957698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.957722]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.957747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.957772]  ? __kthread_parkme+0x82/0x180
[   15.957824]  ? preempt_count_sub+0x50/0x80
[   15.957849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.957875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.957901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.957927]  kthread+0x337/0x6f0
[   15.957947]  ? trace_preempt_on+0x20/0xc0
[   15.957970]  ? __pfx_kthread+0x10/0x10
[   15.958009]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.958032]  ? calculate_sigpending+0x7b/0xa0
[   15.958068]  ? __pfx_kthread+0x10/0x10
[   15.958091]  ret_from_fork+0x116/0x1d0
[   15.958110]  ? __pfx_kthread+0x10/0x10
[   15.958131]  ret_from_fork_asm+0x1a/0x30
[   15.958163]  </TASK>
[   15.958173] 
[   15.965538] Allocated by task 282:
[   15.965742]  kasan_save_stack+0x45/0x70
[   15.965944]  kasan_save_track+0x18/0x40
[   15.966150]  kasan_save_alloc_info+0x3b/0x50
[   15.966313]  __kasan_kmalloc+0xb7/0xc0
[   15.966506]  __kmalloc_cache_noprof+0x189/0x420
[   15.966747]  kasan_atomics+0x95/0x310
[   15.966946]  kunit_try_run_case+0x1a5/0x480
[   15.967146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.967367]  kthread+0x337/0x6f0
[   15.967549]  ret_from_fork+0x116/0x1d0
[   15.967737]  ret_from_fork_asm+0x1a/0x30
[   15.967941] 
[   15.968050] The buggy address belongs to the object at ffff8881029cd380
[   15.968050]  which belongs to the cache kmalloc-64 of size 64
[   15.968481] The buggy address is located 0 bytes to the right of
[   15.968481]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.969111] 
[   15.969262] The buggy address belongs to the physical page:
[   15.969546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.970003] flags: 0x200000000000000(node=0|zone=2)
[   15.970165] page_type: f5(slab)
[   15.970282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.970636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.970964] page dumped because: kasan: bad access detected
[   15.971208] 
[   15.971379] Memory state around the buggy address:
[   15.971558]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.971920]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.972216] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.972456]                                      ^
[   15.972616]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.972908]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.973289] ==================================================================
[   16.219481] ==================================================================
[   16.220111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.220455] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.220762] 
[   16.220934] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.220974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.220985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.221006] Call Trace:
[   16.221019]  <TASK>
[   16.221033]  dump_stack_lvl+0x73/0xb0
[   16.221060]  print_report+0xd1/0x650
[   16.221082]  ? __virt_addr_valid+0x1db/0x2d0
[   16.221106]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.221128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.221152]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.221175]  kasan_report+0x141/0x180
[   16.221198]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.221225]  kasan_check_range+0x10c/0x1c0
[   16.221249]  __kasan_check_write+0x18/0x20
[   16.221270]  kasan_atomics_helper+0x1c18/0x5450
[   16.221293]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.221317]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.221343]  ? kasan_atomics+0x152/0x310
[   16.221369]  kasan_atomics+0x1dc/0x310
[   16.221393]  ? __pfx_kasan_atomics+0x10/0x10
[   16.221419]  ? __pfx_read_tsc+0x10/0x10
[   16.221440]  ? ktime_get_ts64+0x86/0x230
[   16.221464]  kunit_try_run_case+0x1a5/0x480
[   16.221488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.221512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.221536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.221561]  ? __kthread_parkme+0x82/0x180
[   16.221583]  ? preempt_count_sub+0x50/0x80
[   16.221619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.221645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.221671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.221697]  kthread+0x337/0x6f0
[   16.221716]  ? trace_preempt_on+0x20/0xc0
[   16.221740]  ? __pfx_kthread+0x10/0x10
[   16.221761]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.221783]  ? calculate_sigpending+0x7b/0xa0
[   16.221807]  ? __pfx_kthread+0x10/0x10
[   16.221829]  ret_from_fork+0x116/0x1d0
[   16.221848]  ? __pfx_kthread+0x10/0x10
[   16.221869]  ret_from_fork_asm+0x1a/0x30
[   16.221900]  </TASK>
[   16.221910] 
[   16.229634] Allocated by task 282:
[   16.229823]  kasan_save_stack+0x45/0x70
[   16.229998]  kasan_save_track+0x18/0x40
[   16.230163]  kasan_save_alloc_info+0x3b/0x50
[   16.230317]  __kasan_kmalloc+0xb7/0xc0
[   16.230507]  __kmalloc_cache_noprof+0x189/0x420
[   16.230739]  kasan_atomics+0x95/0x310
[   16.230906]  kunit_try_run_case+0x1a5/0x480
[   16.231115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.231341]  kthread+0x337/0x6f0
[   16.231497]  ret_from_fork+0x116/0x1d0
[   16.231683]  ret_from_fork_asm+0x1a/0x30
[   16.231944] 
[   16.232027] The buggy address belongs to the object at ffff8881029cd380
[   16.232027]  which belongs to the cache kmalloc-64 of size 64
[   16.232495] The buggy address is located 0 bytes to the right of
[   16.232495]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.232876] 
[   16.232947] The buggy address belongs to the physical page:
[   16.233121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.233361] flags: 0x200000000000000(node=0|zone=2)
[   16.233522] page_type: f5(slab)
[   16.233695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.234424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.234766] page dumped because: kasan: bad access detected
[   16.234981] 
[   16.235051] Memory state around the buggy address:
[   16.235207]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.235425]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.235650] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.236300]                                      ^
[   16.237207]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.237716]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.238563] ==================================================================
[   15.162059] ==================================================================
[   15.162418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.162760] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.163123] 
[   15.163218] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.163266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.163277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.163299] Call Trace:
[   15.163318]  <TASK>
[   15.163336]  dump_stack_lvl+0x73/0xb0
[   15.163365]  print_report+0xd1/0x650
[   15.163386]  ? __virt_addr_valid+0x1db/0x2d0
[   15.163410]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.163432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.163454]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.163477]  kasan_report+0x141/0x180
[   15.163498]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.163546]  __asan_report_store4_noabort+0x1b/0x30
[   15.163571]  kasan_atomics_helper+0x4ba2/0x5450
[   15.163604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.163627]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.163671]  ? kasan_atomics+0x152/0x310
[   15.163707]  kasan_atomics+0x1dc/0x310
[   15.163728]  ? __pfx_kasan_atomics+0x10/0x10
[   15.163753]  ? __pfx_read_tsc+0x10/0x10
[   15.163807]  ? ktime_get_ts64+0x86/0x230
[   15.163832]  kunit_try_run_case+0x1a5/0x480
[   15.163857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.163881]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.163906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.163930]  ? __kthread_parkme+0x82/0x180
[   15.163951]  ? preempt_count_sub+0x50/0x80
[   15.163975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.164024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.164069]  kthread+0x337/0x6f0
[   15.164088]  ? trace_preempt_on+0x20/0xc0
[   15.164114]  ? __pfx_kthread+0x10/0x10
[   15.164135]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.164156]  ? calculate_sigpending+0x7b/0xa0
[   15.164181]  ? __pfx_kthread+0x10/0x10
[   15.164202]  ret_from_fork+0x116/0x1d0
[   15.164221]  ? __pfx_kthread+0x10/0x10
[   15.164242]  ret_from_fork_asm+0x1a/0x30
[   15.164273]  </TASK>
[   15.164283] 
[   15.173739] Allocated by task 282:
[   15.174240]  kasan_save_stack+0x45/0x70
[   15.174610]  kasan_save_track+0x18/0x40
[   15.175017]  kasan_save_alloc_info+0x3b/0x50
[   15.175377]  __kasan_kmalloc+0xb7/0xc0
[   15.175571]  __kmalloc_cache_noprof+0x189/0x420
[   15.175753]  kasan_atomics+0x95/0x310
[   15.175981]  kunit_try_run_case+0x1a5/0x480
[   15.176205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.176441]  kthread+0x337/0x6f0
[   15.176624]  ret_from_fork+0x116/0x1d0
[   15.176845]  ret_from_fork_asm+0x1a/0x30
[   15.177001] 
[   15.177168] The buggy address belongs to the object at ffff8881029cd380
[   15.177168]  which belongs to the cache kmalloc-64 of size 64
[   15.177585] The buggy address is located 0 bytes to the right of
[   15.177585]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.178239] 
[   15.178314] The buggy address belongs to the physical page:
[   15.178533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.178966] flags: 0x200000000000000(node=0|zone=2)
[   15.179223] page_type: f5(slab)
[   15.179361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.179678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.179986] page dumped because: kasan: bad access detected
[   15.180232] 
[   15.180327] Memory state around the buggy address:
[   15.180518]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.180743]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.181107] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.181392]                                      ^
[   15.181547]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.181834]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182184] ==================================================================
[   15.311610] ==================================================================
[   15.312355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.312736] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.313145] 
[   15.313338] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.313384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.313397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.313421] Call Trace:
[   15.313442]  <TASK>
[   15.313505]  dump_stack_lvl+0x73/0xb0
[   15.313538]  print_report+0xd1/0x650
[   15.313623]  ? __virt_addr_valid+0x1db/0x2d0
[   15.313651]  ? kasan_atomics_helper+0x565/0x5450
[   15.313673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.313708]  ? kasan_atomics_helper+0x565/0x5450
[   15.313731]  kasan_report+0x141/0x180
[   15.313754]  ? kasan_atomics_helper+0x565/0x5450
[   15.313791]  kasan_check_range+0x10c/0x1c0
[   15.313817]  __kasan_check_write+0x18/0x20
[   15.313839]  kasan_atomics_helper+0x565/0x5450
[   15.313862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.313886]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.313914]  ? kasan_atomics+0x152/0x310
[   15.313941]  kasan_atomics+0x1dc/0x310
[   15.313966]  ? __pfx_kasan_atomics+0x10/0x10
[   15.313991]  ? __pfx_read_tsc+0x10/0x10
[   15.314013]  ? ktime_get_ts64+0x86/0x230
[   15.314040]  kunit_try_run_case+0x1a5/0x480
[   15.314065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.314116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.314143]  ? __kthread_parkme+0x82/0x180
[   15.314165]  ? preempt_count_sub+0x50/0x80
[   15.314191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.314242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.314268]  kthread+0x337/0x6f0
[   15.314290]  ? trace_preempt_on+0x20/0xc0
[   15.314317]  ? __pfx_kthread+0x10/0x10
[   15.314339]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.314362]  ? calculate_sigpending+0x7b/0xa0
[   15.314386]  ? __pfx_kthread+0x10/0x10
[   15.314409]  ret_from_fork+0x116/0x1d0
[   15.314428]  ? __pfx_kthread+0x10/0x10
[   15.314449]  ret_from_fork_asm+0x1a/0x30
[   15.314481]  </TASK>
[   15.314492] 
[   15.327002] Allocated by task 282:
[   15.327350]  kasan_save_stack+0x45/0x70
[   15.327510]  kasan_save_track+0x18/0x40
[   15.327657]  kasan_save_alloc_info+0x3b/0x50
[   15.327920]  __kasan_kmalloc+0xb7/0xc0
[   15.328116]  __kmalloc_cache_noprof+0x189/0x420
[   15.328407]  kasan_atomics+0x95/0x310
[   15.328632]  kunit_try_run_case+0x1a5/0x480
[   15.328792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.329050]  kthread+0x337/0x6f0
[   15.329379]  ret_from_fork+0x116/0x1d0
[   15.329574]  ret_from_fork_asm+0x1a/0x30
[   15.329774] 
[   15.329947] The buggy address belongs to the object at ffff8881029cd380
[   15.329947]  which belongs to the cache kmalloc-64 of size 64
[   15.330401] The buggy address is located 0 bytes to the right of
[   15.330401]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.330934] 
[   15.331009] The buggy address belongs to the physical page:
[   15.331479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.331770] flags: 0x200000000000000(node=0|zone=2)
[   15.332093] page_type: f5(slab)
[   15.332226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.332465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.332799] page dumped because: kasan: bad access detected
[   15.333111] 
[   15.333210] Memory state around the buggy address:
[   15.333470]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.333795]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334051] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.334444]                                      ^
[   15.334722]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335092]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335383] ==================================================================
[   15.464885] ==================================================================
[   15.465210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.465532] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.465849] 
[   15.465937] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.465980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.465994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.466015] Call Trace:
[   15.466031]  <TASK>
[   15.466047]  dump_stack_lvl+0x73/0xb0
[   15.466075]  print_report+0xd1/0x650
[   15.466119]  ? __virt_addr_valid+0x1db/0x2d0
[   15.466144]  ? kasan_atomics_helper+0x992/0x5450
[   15.466166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.466191]  ? kasan_atomics_helper+0x992/0x5450
[   15.466213]  kasan_report+0x141/0x180
[   15.466236]  ? kasan_atomics_helper+0x992/0x5450
[   15.466263]  kasan_check_range+0x10c/0x1c0
[   15.466287]  __kasan_check_write+0x18/0x20
[   15.466308]  kasan_atomics_helper+0x992/0x5450
[   15.466331]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.466354]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.466379]  ? kasan_atomics+0x152/0x310
[   15.466405]  kasan_atomics+0x1dc/0x310
[   15.466429]  ? __pfx_kasan_atomics+0x10/0x10
[   15.466454]  ? __pfx_read_tsc+0x10/0x10
[   15.466476]  ? ktime_get_ts64+0x86/0x230
[   15.466501]  kunit_try_run_case+0x1a5/0x480
[   15.466525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.466550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.466575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.466609]  ? __kthread_parkme+0x82/0x180
[   15.466631]  ? preempt_count_sub+0x50/0x80
[   15.466655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.466681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.466707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.466734]  kthread+0x337/0x6f0
[   15.466754]  ? trace_preempt_on+0x20/0xc0
[   15.466800]  ? __pfx_kthread+0x10/0x10
[   15.466821]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.466848]  ? calculate_sigpending+0x7b/0xa0
[   15.466873]  ? __pfx_kthread+0x10/0x10
[   15.466895]  ret_from_fork+0x116/0x1d0
[   15.466914]  ? __pfx_kthread+0x10/0x10
[   15.466936]  ret_from_fork_asm+0x1a/0x30
[   15.466967]  </TASK>
[   15.466979] 
[   15.474260] Allocated by task 282:
[   15.474410]  kasan_save_stack+0x45/0x70
[   15.474551]  kasan_save_track+0x18/0x40
[   15.474709]  kasan_save_alloc_info+0x3b/0x50
[   15.474972]  __kasan_kmalloc+0xb7/0xc0
[   15.475163]  __kmalloc_cache_noprof+0x189/0x420
[   15.475380]  kasan_atomics+0x95/0x310
[   15.475567]  kunit_try_run_case+0x1a5/0x480
[   15.475804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.476038]  kthread+0x337/0x6f0
[   15.476191]  ret_from_fork+0x116/0x1d0
[   15.476376]  ret_from_fork_asm+0x1a/0x30
[   15.476549] 
[   15.476630] The buggy address belongs to the object at ffff8881029cd380
[   15.476630]  which belongs to the cache kmalloc-64 of size 64
[   15.477138] The buggy address is located 0 bytes to the right of
[   15.477138]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.477496] 
[   15.477613] The buggy address belongs to the physical page:
[   15.477891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.478240] flags: 0x200000000000000(node=0|zone=2)
[   15.478467] page_type: f5(slab)
[   15.478609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.478864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.479174] page dumped because: kasan: bad access detected
[   15.479448] 
[   15.479543] Memory state around the buggy address:
[   15.479852]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.480141]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.480886] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.481676]                                      ^
[   15.482414]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482673]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.483282] ==================================================================
[   15.647684] ==================================================================
[   15.648006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.648645] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.649035] 
[   15.649272] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.649321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.649334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.649356] Call Trace:
[   15.649374]  <TASK>
[   15.649391]  dump_stack_lvl+0x73/0xb0
[   15.649423]  print_report+0xd1/0x650
[   15.649447]  ? __virt_addr_valid+0x1db/0x2d0
[   15.649472]  ? kasan_atomics_helper+0xe78/0x5450
[   15.649494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.649518]  ? kasan_atomics_helper+0xe78/0x5450
[   15.649541]  kasan_report+0x141/0x180
[   15.649564]  ? kasan_atomics_helper+0xe78/0x5450
[   15.649591]  kasan_check_range+0x10c/0x1c0
[   15.649632]  __kasan_check_write+0x18/0x20
[   15.649652]  kasan_atomics_helper+0xe78/0x5450
[   15.649676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.649700]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.649727]  ? kasan_atomics+0x152/0x310
[   15.649754]  kasan_atomics+0x1dc/0x310
[   15.649888]  ? __pfx_kasan_atomics+0x10/0x10
[   15.649921]  ? __pfx_read_tsc+0x10/0x10
[   15.649944]  ? ktime_get_ts64+0x86/0x230
[   15.649971]  kunit_try_run_case+0x1a5/0x480
[   15.649996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.650021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.650047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.650073]  ? __kthread_parkme+0x82/0x180
[   15.650095]  ? preempt_count_sub+0x50/0x80
[   15.650121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.650146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.650172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.650199]  kthread+0x337/0x6f0
[   15.650218]  ? trace_preempt_on+0x20/0xc0
[   15.650244]  ? __pfx_kthread+0x10/0x10
[   15.650266]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.650288]  ? calculate_sigpending+0x7b/0xa0
[   15.650314]  ? __pfx_kthread+0x10/0x10
[   15.650336]  ret_from_fork+0x116/0x1d0
[   15.650355]  ? __pfx_kthread+0x10/0x10
[   15.650376]  ret_from_fork_asm+0x1a/0x30
[   15.650408]  </TASK>
[   15.650420] 
[   15.659781] Allocated by task 282:
[   15.660233]  kasan_save_stack+0x45/0x70
[   15.660441]  kasan_save_track+0x18/0x40
[   15.660625]  kasan_save_alloc_info+0x3b/0x50
[   15.661008]  __kasan_kmalloc+0xb7/0xc0
[   15.661188]  __kmalloc_cache_noprof+0x189/0x420
[   15.661464]  kasan_atomics+0x95/0x310
[   15.661615]  kunit_try_run_case+0x1a5/0x480
[   15.661828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662234]  kthread+0x337/0x6f0
[   15.662410]  ret_from_fork+0x116/0x1d0
[   15.662712]  ret_from_fork_asm+0x1a/0x30
[   15.662938] 
[   15.663037] The buggy address belongs to the object at ffff8881029cd380
[   15.663037]  which belongs to the cache kmalloc-64 of size 64
[   15.663493] The buggy address is located 0 bytes to the right of
[   15.663493]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.664297] 
[   15.664395] The buggy address belongs to the physical page:
[   15.664585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.665207] flags: 0x200000000000000(node=0|zone=2)
[   15.665492] page_type: f5(slab)
[   15.665681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.666160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.666548] page dumped because: kasan: bad access detected
[   15.666755] 
[   15.666940] Memory state around the buggy address:
[   15.667168]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667591]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.668005] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.668312]                                      ^
[   15.668646]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668972]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.669249] ==================================================================
[   15.376943] ==================================================================
[   15.377784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.378172] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.378502] 
[   15.378628] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.378697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.378710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.378753] Call Trace:
[   15.378771]  <TASK>
[   15.378802]  dump_stack_lvl+0x73/0xb0
[   15.378837]  print_report+0xd1/0x650
[   15.378860]  ? __virt_addr_valid+0x1db/0x2d0
[   15.378884]  ? kasan_atomics_helper+0x72f/0x5450
[   15.378906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.378931]  ? kasan_atomics_helper+0x72f/0x5450
[   15.378953]  kasan_report+0x141/0x180
[   15.378979]  ? kasan_atomics_helper+0x72f/0x5450
[   15.379005]  kasan_check_range+0x10c/0x1c0
[   15.379031]  __kasan_check_write+0x18/0x20
[   15.379051]  kasan_atomics_helper+0x72f/0x5450
[   15.379075]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.379098]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.379124]  ? kasan_atomics+0x152/0x310
[   15.379151]  kasan_atomics+0x1dc/0x310
[   15.379174]  ? __pfx_kasan_atomics+0x10/0x10
[   15.379199]  ? __pfx_read_tsc+0x10/0x10
[   15.379222]  ? ktime_get_ts64+0x86/0x230
[   15.379247]  kunit_try_run_case+0x1a5/0x480
[   15.379273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.379296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.379320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.379345]  ? __kthread_parkme+0x82/0x180
[   15.379366]  ? preempt_count_sub+0x50/0x80
[   15.379391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.379416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.379442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.379468]  kthread+0x337/0x6f0
[   15.379488]  ? trace_preempt_on+0x20/0xc0
[   15.379513]  ? __pfx_kthread+0x10/0x10
[   15.379534]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.379557]  ? calculate_sigpending+0x7b/0xa0
[   15.379582]  ? __pfx_kthread+0x10/0x10
[   15.379615]  ret_from_fork+0x116/0x1d0
[   15.379645]  ? __pfx_kthread+0x10/0x10
[   15.379667]  ret_from_fork_asm+0x1a/0x30
[   15.379699]  </TASK>
[   15.379722] 
[   15.391143] Allocated by task 282:
[   15.391288]  kasan_save_stack+0x45/0x70
[   15.391443]  kasan_save_track+0x18/0x40
[   15.391582]  kasan_save_alloc_info+0x3b/0x50
[   15.391751]  __kasan_kmalloc+0xb7/0xc0
[   15.392368]  __kmalloc_cache_noprof+0x189/0x420
[   15.392890]  kasan_atomics+0x95/0x310
[   15.393249]  kunit_try_run_case+0x1a5/0x480
[   15.393409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.393590]  kthread+0x337/0x6f0
[   15.393728]  ret_from_fork+0x116/0x1d0
[   15.394355]  ret_from_fork_asm+0x1a/0x30
[   15.394857] 
[   15.395022] The buggy address belongs to the object at ffff8881029cd380
[   15.395022]  which belongs to the cache kmalloc-64 of size 64
[   15.396408] The buggy address is located 0 bytes to the right of
[   15.396408]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.397509] 
[   15.397845] The buggy address belongs to the physical page:
[   15.398222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.398481] flags: 0x200000000000000(node=0|zone=2)
[   15.398670] page_type: f5(slab)
[   15.399112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.399424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.399857] page dumped because: kasan: bad access detected
[   15.400326] 
[   15.400430] Memory state around the buggy address:
[   15.400859]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.401272]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.401692] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.402086]                                      ^
[   15.402327]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402903]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.403341] ==================================================================
[   15.751678] ==================================================================
[   15.752246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.752610] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.753018] 
[   15.753107] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.753151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.753164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.753184] Call Trace:
[   15.753200]  <TASK>
[   15.753217]  dump_stack_lvl+0x73/0xb0
[   15.753245]  print_report+0xd1/0x650
[   15.753269]  ? __virt_addr_valid+0x1db/0x2d0
[   15.753292]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.753314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.753338]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.753361]  kasan_report+0x141/0x180
[   15.753383]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.753419]  __asan_report_load4_noabort+0x18/0x20
[   15.753450]  kasan_atomics_helper+0x4a1c/0x5450
[   15.753474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.753498]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.753523]  ? kasan_atomics+0x152/0x310
[   15.753550]  kasan_atomics+0x1dc/0x310
[   15.753573]  ? __pfx_kasan_atomics+0x10/0x10
[   15.753609]  ? __pfx_read_tsc+0x10/0x10
[   15.753632]  ? ktime_get_ts64+0x86/0x230
[   15.753656]  kunit_try_run_case+0x1a5/0x480
[   15.753681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.753705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.753730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.753755]  ? __kthread_parkme+0x82/0x180
[   15.753787]  ? preempt_count_sub+0x50/0x80
[   15.753813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.753838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.753865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.753892]  kthread+0x337/0x6f0
[   15.753913]  ? trace_preempt_on+0x20/0xc0
[   15.753938]  ? __pfx_kthread+0x10/0x10
[   15.753960]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.753982]  ? calculate_sigpending+0x7b/0xa0
[   15.754007]  ? __pfx_kthread+0x10/0x10
[   15.754029]  ret_from_fork+0x116/0x1d0
[   15.754049]  ? __pfx_kthread+0x10/0x10
[   15.754070]  ret_from_fork_asm+0x1a/0x30
[   15.754102]  </TASK>
[   15.754112] 
[   15.761591] Allocated by task 282:
[   15.761730]  kasan_save_stack+0x45/0x70
[   15.762155]  kasan_save_track+0x18/0x40
[   15.762352]  kasan_save_alloc_info+0x3b/0x50
[   15.762565]  __kasan_kmalloc+0xb7/0xc0
[   15.762764]  __kmalloc_cache_noprof+0x189/0x420
[   15.762954]  kasan_atomics+0x95/0x310
[   15.763089]  kunit_try_run_case+0x1a5/0x480
[   15.763242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.763428]  kthread+0x337/0x6f0
[   15.763552]  ret_from_fork+0x116/0x1d0
[   15.763750]  ret_from_fork_asm+0x1a/0x30
[   15.763962] 
[   15.764054] The buggy address belongs to the object at ffff8881029cd380
[   15.764054]  which belongs to the cache kmalloc-64 of size 64
[   15.764610] The buggy address is located 0 bytes to the right of
[   15.764610]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.765340] 
[   15.765414] The buggy address belongs to the physical page:
[   15.765589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.765838] flags: 0x200000000000000(node=0|zone=2)
[   15.766091] page_type: f5(slab)
[   15.766257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.766601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.767053] page dumped because: kasan: bad access detected
[   15.767225] 
[   15.767293] Memory state around the buggy address:
[   15.767448]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.767674]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.768290] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.768620]                                      ^
[   15.768854]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.769103]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.769321] ==================================================================
[   15.201609] ==================================================================
[   15.202056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.202410] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.202735] 
[   15.203085] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.203134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.203147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.203169] Call Trace:
[   15.203188]  <TASK>
[   15.203207]  dump_stack_lvl+0x73/0xb0
[   15.203238]  print_report+0xd1/0x650
[   15.203261]  ? __virt_addr_valid+0x1db/0x2d0
[   15.203286]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.203308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.203333]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.203356]  kasan_report+0x141/0x180
[   15.203379]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.203406]  __asan_report_store4_noabort+0x1b/0x30
[   15.203432]  kasan_atomics_helper+0x4b6e/0x5450
[   15.203456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.203479]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.203506]  ? kasan_atomics+0x152/0x310
[   15.203533]  kasan_atomics+0x1dc/0x310
[   15.203556]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203581]  ? __pfx_read_tsc+0x10/0x10
[   15.203618]  ? ktime_get_ts64+0x86/0x230
[   15.203645]  kunit_try_run_case+0x1a5/0x480
[   15.203672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.203722]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203746]  ? __kthread_parkme+0x82/0x180
[   15.203851]  ? preempt_count_sub+0x50/0x80
[   15.203882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.203963]  kthread+0x337/0x6f0
[   15.203983]  ? trace_preempt_on+0x20/0xc0
[   15.204009]  ? __pfx_kthread+0x10/0x10
[   15.204030]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.204053]  ? calculate_sigpending+0x7b/0xa0
[   15.204078]  ? __pfx_kthread+0x10/0x10
[   15.204102]  ret_from_fork+0x116/0x1d0
[   15.204122]  ? __pfx_kthread+0x10/0x10
[   15.204144]  ret_from_fork_asm+0x1a/0x30
[   15.204176]  </TASK>
[   15.204187] 
[   15.211988] Allocated by task 282:
[   15.212140]  kasan_save_stack+0x45/0x70
[   15.212299]  kasan_save_track+0x18/0x40
[   15.212477]  kasan_save_alloc_info+0x3b/0x50
[   15.212708]  __kasan_kmalloc+0xb7/0xc0
[   15.212971]  __kmalloc_cache_noprof+0x189/0x420
[   15.213203]  kasan_atomics+0x95/0x310
[   15.213402]  kunit_try_run_case+0x1a5/0x480
[   15.213627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.213947]  kthread+0x337/0x6f0
[   15.214077]  ret_from_fork+0x116/0x1d0
[   15.214211]  ret_from_fork_asm+0x1a/0x30
[   15.214374] 
[   15.214470] The buggy address belongs to the object at ffff8881029cd380
[   15.214470]  which belongs to the cache kmalloc-64 of size 64
[   15.215229] The buggy address is located 0 bytes to the right of
[   15.215229]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.215782] 
[   15.215881] The buggy address belongs to the physical page:
[   15.216183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.216488] flags: 0x200000000000000(node=0|zone=2)
[   15.216733] page_type: f5(slab)
[   15.216901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.217205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.217514] page dumped because: kasan: bad access detected
[   15.217881] 
[   15.217971] Memory state around the buggy address:
[   15.218202]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.218485]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.218757] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.219184]                                      ^
[   15.219422]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.219756]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.220159] ==================================================================
[   15.769805] ==================================================================
[   15.770340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.770705] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.771212] 
[   15.771300] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.771343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.771356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.771377] Call Trace:
[   15.771393]  <TASK>
[   15.771410]  dump_stack_lvl+0x73/0xb0
[   15.771439]  print_report+0xd1/0x650
[   15.771462]  ? __virt_addr_valid+0x1db/0x2d0
[   15.771485]  ? kasan_atomics_helper+0x1148/0x5450
[   15.771507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.771532]  ? kasan_atomics_helper+0x1148/0x5450
[   15.771554]  kasan_report+0x141/0x180
[   15.771577]  ? kasan_atomics_helper+0x1148/0x5450
[   15.771615]  kasan_check_range+0x10c/0x1c0
[   15.771640]  __kasan_check_write+0x18/0x20
[   15.771660]  kasan_atomics_helper+0x1148/0x5450
[   15.771684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.771708]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.771733]  ? kasan_atomics+0x152/0x310
[   15.771760]  kasan_atomics+0x1dc/0x310
[   15.771783]  ? __pfx_kasan_atomics+0x10/0x10
[   15.771808]  ? __pfx_read_tsc+0x10/0x10
[   15.771830]  ? ktime_get_ts64+0x86/0x230
[   15.771856]  kunit_try_run_case+0x1a5/0x480
[   15.771881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.771930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.771955]  ? __kthread_parkme+0x82/0x180
[   15.771975]  ? preempt_count_sub+0x50/0x80
[   15.772000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.772026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.772052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.772078]  kthread+0x337/0x6f0
[   15.772097]  ? trace_preempt_on+0x20/0xc0
[   15.772123]  ? __pfx_kthread+0x10/0x10
[   15.772144]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.772166]  ? calculate_sigpending+0x7b/0xa0
[   15.772191]  ? __pfx_kthread+0x10/0x10
[   15.772213]  ret_from_fork+0x116/0x1d0
[   15.772232]  ? __pfx_kthread+0x10/0x10
[   15.772253]  ret_from_fork_asm+0x1a/0x30
[   15.772285]  </TASK>
[   15.772296] 
[   15.785892] Allocated by task 282:
[   15.786636]  kasan_save_stack+0x45/0x70
[   15.787294]  kasan_save_track+0x18/0x40
[   15.787457]  kasan_save_alloc_info+0x3b/0x50
[   15.787622]  __kasan_kmalloc+0xb7/0xc0
[   15.787757]  __kmalloc_cache_noprof+0x189/0x420
[   15.788415]  kasan_atomics+0x95/0x310
[   15.788638]  kunit_try_run_case+0x1a5/0x480
[   15.788805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.789101]  kthread+0x337/0x6f0
[   15.789517]  ret_from_fork+0x116/0x1d0
[   15.789748]  ret_from_fork_asm+0x1a/0x30
[   15.790091] 
[   15.790203] The buggy address belongs to the object at ffff8881029cd380
[   15.790203]  which belongs to the cache kmalloc-64 of size 64
[   15.790677] The buggy address is located 0 bytes to the right of
[   15.790677]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.791222] 
[   15.791316] The buggy address belongs to the physical page:
[   15.791545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.792012] flags: 0x200000000000000(node=0|zone=2)
[   15.792221] page_type: f5(slab)
[   15.792383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.792671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.792971] page dumped because: kasan: bad access detected
[   15.793177] 
[   15.793713] Memory state around the buggy address:
[   15.793920]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.794198]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.794514] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.795122]                                      ^
[   15.795336]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.795720]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.796073] ==================================================================
[   16.033732] ==================================================================
[   16.034311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.034539] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.035829] 
[   16.036059] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.036240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.036259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.036282] Call Trace:
[   16.036302]  <TASK>
[   16.036319]  dump_stack_lvl+0x73/0xb0
[   16.036352]  print_report+0xd1/0x650
[   16.036374]  ? __virt_addr_valid+0x1db/0x2d0
[   16.036445]  ? kasan_atomics_helper+0x164f/0x5450
[   16.036469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.036493]  ? kasan_atomics_helper+0x164f/0x5450
[   16.036516]  kasan_report+0x141/0x180
[   16.036538]  ? kasan_atomics_helper+0x164f/0x5450
[   16.036565]  kasan_check_range+0x10c/0x1c0
[   16.036589]  __kasan_check_write+0x18/0x20
[   16.036620]  kasan_atomics_helper+0x164f/0x5450
[   16.036644]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.036669]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.036695]  ? kasan_atomics+0x152/0x310
[   16.036722]  kasan_atomics+0x1dc/0x310
[   16.036745]  ? __pfx_kasan_atomics+0x10/0x10
[   16.036770]  ? __pfx_read_tsc+0x10/0x10
[   16.036802]  ? ktime_get_ts64+0x86/0x230
[   16.036827]  kunit_try_run_case+0x1a5/0x480
[   16.036852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.036901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.036926]  ? __kthread_parkme+0x82/0x180
[   16.036948]  ? preempt_count_sub+0x50/0x80
[   16.036973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.037023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.037050]  kthread+0x337/0x6f0
[   16.037070]  ? trace_preempt_on+0x20/0xc0
[   16.037097]  ? __pfx_kthread+0x10/0x10
[   16.037119]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.037142]  ? calculate_sigpending+0x7b/0xa0
[   16.037168]  ? __pfx_kthread+0x10/0x10
[   16.037190]  ret_from_fork+0x116/0x1d0
[   16.037209]  ? __pfx_kthread+0x10/0x10
[   16.037230]  ret_from_fork_asm+0x1a/0x30
[   16.037262]  </TASK>
[   16.037273] 
[   16.051462] Allocated by task 282:
[   16.051855]  kasan_save_stack+0x45/0x70
[   16.052311]  kasan_save_track+0x18/0x40
[   16.052538]  kasan_save_alloc_info+0x3b/0x50
[   16.052696]  __kasan_kmalloc+0xb7/0xc0
[   16.052890]  __kmalloc_cache_noprof+0x189/0x420
[   16.053396]  kasan_atomics+0x95/0x310
[   16.053771]  kunit_try_run_case+0x1a5/0x480
[   16.054181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.054695]  kthread+0x337/0x6f0
[   16.055075]  ret_from_fork+0x116/0x1d0
[   16.055429]  ret_from_fork_asm+0x1a/0x30
[   16.055703] 
[   16.055787] The buggy address belongs to the object at ffff8881029cd380
[   16.055787]  which belongs to the cache kmalloc-64 of size 64
[   16.056979] The buggy address is located 0 bytes to the right of
[   16.056979]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.057339] 
[   16.057414] The buggy address belongs to the physical page:
[   16.057583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.057952] flags: 0x200000000000000(node=0|zone=2)
[   16.058419] page_type: f5(slab)
[   16.058740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.059415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.060247] page dumped because: kasan: bad access detected
[   16.060922] 
[   16.061097] Memory state around the buggy address:
[   16.061611]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.062300]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.063037] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.063787]                                      ^
[   16.064232]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064491]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064711] ==================================================================
[   16.507200] ==================================================================
[   16.507512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.508004] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.508316] 
[   16.508406] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.508451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.508463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.508485] Call Trace:
[   16.508505]  <TASK>
[   16.508524]  dump_stack_lvl+0x73/0xb0
[   16.508555]  print_report+0xd1/0x650
[   16.508579]  ? __virt_addr_valid+0x1db/0x2d0
[   16.508616]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.508640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.508664]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.508688]  kasan_report+0x141/0x180
[   16.508710]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.508738]  __asan_report_load8_noabort+0x18/0x20
[   16.508765]  kasan_atomics_helper+0x4fa5/0x5450
[   16.508800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.508823]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.508851]  ? kasan_atomics+0x152/0x310
[   16.508877]  kasan_atomics+0x1dc/0x310
[   16.508901]  ? __pfx_kasan_atomics+0x10/0x10
[   16.508926]  ? __pfx_read_tsc+0x10/0x10
[   16.508948]  ? ktime_get_ts64+0x86/0x230
[   16.508975]  kunit_try_run_case+0x1a5/0x480
[   16.509001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.509025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.509051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.509077]  ? __kthread_parkme+0x82/0x180
[   16.509099]  ? preempt_count_sub+0x50/0x80
[   16.509125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.509150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.509176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.509203]  kthread+0x337/0x6f0
[   16.509222]  ? trace_preempt_on+0x20/0xc0
[   16.509247]  ? __pfx_kthread+0x10/0x10
[   16.509269]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.509291]  ? calculate_sigpending+0x7b/0xa0
[   16.509317]  ? __pfx_kthread+0x10/0x10
[   16.509339]  ret_from_fork+0x116/0x1d0
[   16.509358]  ? __pfx_kthread+0x10/0x10
[   16.509379]  ret_from_fork_asm+0x1a/0x30
[   16.509412]  </TASK>
[   16.509423] 
[   16.516876] Allocated by task 282:
[   16.517059]  kasan_save_stack+0x45/0x70
[   16.517218]  kasan_save_track+0x18/0x40
[   16.517413]  kasan_save_alloc_info+0x3b/0x50
[   16.517569]  __kasan_kmalloc+0xb7/0xc0
[   16.517784]  __kmalloc_cache_noprof+0x189/0x420
[   16.517998]  kasan_atomics+0x95/0x310
[   16.518189]  kunit_try_run_case+0x1a5/0x480
[   16.518374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.518638]  kthread+0x337/0x6f0
[   16.518774]  ret_from_fork+0x116/0x1d0
[   16.518984]  ret_from_fork_asm+0x1a/0x30
[   16.519145] 
[   16.519241] The buggy address belongs to the object at ffff8881029cd380
[   16.519241]  which belongs to the cache kmalloc-64 of size 64
[   16.519719] The buggy address is located 0 bytes to the right of
[   16.519719]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.520210] 
[   16.520307] The buggy address belongs to the physical page:
[   16.520482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.520734] flags: 0x200000000000000(node=0|zone=2)
[   16.520903] page_type: f5(slab)
[   16.521025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.521260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.521659] page dumped because: kasan: bad access detected
[   16.521942] 
[   16.522035] Memory state around the buggy address:
[   16.522258]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.522576]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.522895] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.523110]                                      ^
[   16.523266]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523484]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523708] ==================================================================
[   15.258010] ==================================================================
[   15.258348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.260110] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.260464] 
[   15.260583] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.261792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.261808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.261833] Call Trace:
[   15.261854]  <TASK>
[   15.261874]  dump_stack_lvl+0x73/0xb0
[   15.261910]  print_report+0xd1/0x650
[   15.261933]  ? __virt_addr_valid+0x1db/0x2d0
[   15.261958]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.261979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.262004]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.262027]  kasan_report+0x141/0x180
[   15.262049]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.262076]  kasan_check_range+0x10c/0x1c0
[   15.262100]  __kasan_check_write+0x18/0x20
[   15.262121]  kasan_atomics_helper+0x4a0/0x5450
[   15.262143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.262167]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.262194]  ? kasan_atomics+0x152/0x310
[   15.262220]  kasan_atomics+0x1dc/0x310
[   15.262243]  ? __pfx_kasan_atomics+0x10/0x10
[   15.262268]  ? __pfx_read_tsc+0x10/0x10
[   15.262290]  ? ktime_get_ts64+0x86/0x230
[   15.262315]  kunit_try_run_case+0x1a5/0x480
[   15.262340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.262393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.262418]  ? __kthread_parkme+0x82/0x180
[   15.262440]  ? preempt_count_sub+0x50/0x80
[   15.262465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.262515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.262541]  kthread+0x337/0x6f0
[   15.262560]  ? trace_preempt_on+0x20/0xc0
[   15.262586]  ? __pfx_kthread+0x10/0x10
[   15.262620]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.262642]  ? calculate_sigpending+0x7b/0xa0
[   15.262667]  ? __pfx_kthread+0x10/0x10
[   15.262689]  ret_from_fork+0x116/0x1d0
[   15.262708]  ? __pfx_kthread+0x10/0x10
[   15.262730]  ret_from_fork_asm+0x1a/0x30
[   15.262787]  </TASK>
[   15.262798] 
[   15.276058] Allocated by task 282:
[   15.276229]  kasan_save_stack+0x45/0x70
[   15.276449]  kasan_save_track+0x18/0x40
[   15.276663]  kasan_save_alloc_info+0x3b/0x50
[   15.276993]  __kasan_kmalloc+0xb7/0xc0
[   15.277158]  __kmalloc_cache_noprof+0x189/0x420
[   15.277438]  kasan_atomics+0x95/0x310
[   15.277633]  kunit_try_run_case+0x1a5/0x480
[   15.277906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.278368]  kthread+0x337/0x6f0
[   15.278622]  ret_from_fork+0x116/0x1d0
[   15.278778]  ret_from_fork_asm+0x1a/0x30
[   15.278929] 
[   15.279056] The buggy address belongs to the object at ffff8881029cd380
[   15.279056]  which belongs to the cache kmalloc-64 of size 64
[   15.280241] The buggy address is located 0 bytes to the right of
[   15.280241]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.280765] 
[   15.281665] The buggy address belongs to the physical page:
[   15.282396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.283009] flags: 0x200000000000000(node=0|zone=2)
[   15.283273] page_type: f5(slab)
[   15.283440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.283773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.284380] page dumped because: kasan: bad access detected
[   15.284623] 
[   15.284714] Memory state around the buggy address:
[   15.285580]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.286218]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.286927] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.287355]                                      ^
[   15.287562]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288182]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289196] ==================================================================
[   15.484223] ==================================================================
[   15.484584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.484944] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.485251] 
[   15.485363] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.485407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.485420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.485441] Call Trace:
[   15.485457]  <TASK>
[   15.485473]  dump_stack_lvl+0x73/0xb0
[   15.485500]  print_report+0xd1/0x650
[   15.485522]  ? __virt_addr_valid+0x1db/0x2d0
[   15.485545]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.485565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.485588]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.485642]  kasan_report+0x141/0x180
[   15.485665]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.485692]  kasan_check_range+0x10c/0x1c0
[   15.485716]  __kasan_check_write+0x18/0x20
[   15.485737]  kasan_atomics_helper+0xa2b/0x5450
[   15.485779]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.485804]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.485829]  ? kasan_atomics+0x152/0x310
[   15.485856]  kasan_atomics+0x1dc/0x310
[   15.485879]  ? __pfx_kasan_atomics+0x10/0x10
[   15.485904]  ? __pfx_read_tsc+0x10/0x10
[   15.485926]  ? ktime_get_ts64+0x86/0x230
[   15.485951]  kunit_try_run_case+0x1a5/0x480
[   15.485975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.485999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.486024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.486049]  ? __kthread_parkme+0x82/0x180
[   15.486071]  ? preempt_count_sub+0x50/0x80
[   15.486097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.486122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.486148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.486175]  kthread+0x337/0x6f0
[   15.486196]  ? trace_preempt_on+0x20/0xc0
[   15.486222]  ? __pfx_kthread+0x10/0x10
[   15.486243]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.486266]  ? calculate_sigpending+0x7b/0xa0
[   15.486292]  ? __pfx_kthread+0x10/0x10
[   15.486314]  ret_from_fork+0x116/0x1d0
[   15.486333]  ? __pfx_kthread+0x10/0x10
[   15.486355]  ret_from_fork_asm+0x1a/0x30
[   15.486386]  </TASK>
[   15.486398] 
[   15.493661] Allocated by task 282:
[   15.493839]  kasan_save_stack+0x45/0x70
[   15.493996]  kasan_save_track+0x18/0x40
[   15.494134]  kasan_save_alloc_info+0x3b/0x50
[   15.494285]  __kasan_kmalloc+0xb7/0xc0
[   15.494435]  __kmalloc_cache_noprof+0x189/0x420
[   15.494670]  kasan_atomics+0x95/0x310
[   15.494892]  kunit_try_run_case+0x1a5/0x480
[   15.495105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.495363]  kthread+0x337/0x6f0
[   15.495533]  ret_from_fork+0x116/0x1d0
[   15.495722]  ret_from_fork_asm+0x1a/0x30
[   15.495886] 
[   15.495957] The buggy address belongs to the object at ffff8881029cd380
[   15.495957]  which belongs to the cache kmalloc-64 of size 64
[   15.496353] The buggy address is located 0 bytes to the right of
[   15.496353]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.496937] 
[   15.497034] The buggy address belongs to the physical page:
[   15.497293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.497632] flags: 0x200000000000000(node=0|zone=2)
[   15.497825] page_type: f5(slab)
[   15.497962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.498311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.498641] page dumped because: kasan: bad access detected
[   15.498891] 
[   15.498984] Memory state around the buggy address:
[   15.499183]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.499451]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.499743] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.500038]                                      ^
[   15.500252]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.500488]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.500722] ==================================================================
[   15.715631] ==================================================================
[   15.715987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.716448] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.716771] 
[   15.717215] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.717259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.717273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.717293] Call Trace:
[   15.717307]  <TASK>
[   15.717323]  dump_stack_lvl+0x73/0xb0
[   15.717351]  print_report+0xd1/0x650
[   15.717374]  ? __virt_addr_valid+0x1db/0x2d0
[   15.717398]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.717419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.717443]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.717466]  kasan_report+0x141/0x180
[   15.717488]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.717516]  __asan_report_load4_noabort+0x18/0x20
[   15.717541]  kasan_atomics_helper+0x4a36/0x5450
[   15.717565]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.717589]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.717628]  ? kasan_atomics+0x152/0x310
[   15.717655]  kasan_atomics+0x1dc/0x310
[   15.717679]  ? __pfx_kasan_atomics+0x10/0x10
[   15.717704]  ? __pfx_read_tsc+0x10/0x10
[   15.717726]  ? ktime_get_ts64+0x86/0x230
[   15.717750]  kunit_try_run_case+0x1a5/0x480
[   15.717774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.717813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.717837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.717863]  ? __kthread_parkme+0x82/0x180
[   15.717884]  ? preempt_count_sub+0x50/0x80
[   15.717909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.717934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.717960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.717986]  kthread+0x337/0x6f0
[   15.718006]  ? trace_preempt_on+0x20/0xc0
[   15.718031]  ? __pfx_kthread+0x10/0x10
[   15.718052]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.718074]  ? calculate_sigpending+0x7b/0xa0
[   15.718099]  ? __pfx_kthread+0x10/0x10
[   15.718121]  ret_from_fork+0x116/0x1d0
[   15.718141]  ? __pfx_kthread+0x10/0x10
[   15.718162]  ret_from_fork_asm+0x1a/0x30
[   15.718194]  </TASK>
[   15.718204] 
[   15.725574] Allocated by task 282:
[   15.725778]  kasan_save_stack+0x45/0x70
[   15.725991]  kasan_save_track+0x18/0x40
[   15.726188]  kasan_save_alloc_info+0x3b/0x50
[   15.726408]  __kasan_kmalloc+0xb7/0xc0
[   15.726604]  __kmalloc_cache_noprof+0x189/0x420
[   15.726896]  kasan_atomics+0x95/0x310
[   15.727035]  kunit_try_run_case+0x1a5/0x480
[   15.727232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.727489]  kthread+0x337/0x6f0
[   15.727630]  ret_from_fork+0x116/0x1d0
[   15.727765]  ret_from_fork_asm+0x1a/0x30
[   15.727974] 
[   15.728074] The buggy address belongs to the object at ffff8881029cd380
[   15.728074]  which belongs to the cache kmalloc-64 of size 64
[   15.728543] The buggy address is located 0 bytes to the right of
[   15.728543]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.729066] 
[   15.729171] The buggy address belongs to the physical page:
[   15.729387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.729658] flags: 0x200000000000000(node=0|zone=2)
[   15.729991] page_type: f5(slab)
[   15.730157] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.730477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.730817] page dumped because: kasan: bad access detected
[   15.731005] 
[   15.731103] Memory state around the buggy address:
[   15.731331]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.731614]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.731832] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.732045]                                      ^
[   15.732201]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.732518]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.733000] ==================================================================
[   15.796863] ==================================================================
[   15.798011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.798447] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.798779] 
[   15.799040] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.799090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.799103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.799126] Call Trace:
[   15.799212]  <TASK>
[   15.799286]  dump_stack_lvl+0x73/0xb0
[   15.799321]  print_report+0xd1/0x650
[   15.799345]  ? __virt_addr_valid+0x1db/0x2d0
[   15.799369]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.799391]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.799416]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.799438]  kasan_report+0x141/0x180
[   15.799461]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.799488]  __asan_report_load4_noabort+0x18/0x20
[   15.799515]  kasan_atomics_helper+0x4a02/0x5450
[   15.799538]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.799561]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.799588]  ? kasan_atomics+0x152/0x310
[   15.799626]  kasan_atomics+0x1dc/0x310
[   15.799649]  ? __pfx_kasan_atomics+0x10/0x10
[   15.799674]  ? __pfx_read_tsc+0x10/0x10
[   15.799696]  ? ktime_get_ts64+0x86/0x230
[   15.799722]  kunit_try_run_case+0x1a5/0x480
[   15.799748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.799771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.799863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.799888]  ? __kthread_parkme+0x82/0x180
[   15.799910]  ? preempt_count_sub+0x50/0x80
[   15.799936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.799961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.799986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.800013]  kthread+0x337/0x6f0
[   15.800032]  ? trace_preempt_on+0x20/0xc0
[   15.800058]  ? __pfx_kthread+0x10/0x10
[   15.800080]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.800102]  ? calculate_sigpending+0x7b/0xa0
[   15.800128]  ? __pfx_kthread+0x10/0x10
[   15.800150]  ret_from_fork+0x116/0x1d0
[   15.800169]  ? __pfx_kthread+0x10/0x10
[   15.800191]  ret_from_fork_asm+0x1a/0x30
[   15.800223]  </TASK>
[   15.800234] 
[   15.809770] Allocated by task 282:
[   15.810120]  kasan_save_stack+0x45/0x70
[   15.810280]  kasan_save_track+0x18/0x40
[   15.810474]  kasan_save_alloc_info+0x3b/0x50
[   15.810679]  __kasan_kmalloc+0xb7/0xc0
[   15.810858]  __kmalloc_cache_noprof+0x189/0x420
[   15.811302]  kasan_atomics+0x95/0x310
[   15.811548]  kunit_try_run_case+0x1a5/0x480
[   15.811723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.812174]  kthread+0x337/0x6f0
[   15.812422]  ret_from_fork+0x116/0x1d0
[   15.812613]  ret_from_fork_asm+0x1a/0x30
[   15.812818] 
[   15.813079] The buggy address belongs to the object at ffff8881029cd380
[   15.813079]  which belongs to the cache kmalloc-64 of size 64
[   15.813588] The buggy address is located 0 bytes to the right of
[   15.813588]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.814429] 
[   15.814522] The buggy address belongs to the physical page:
[   15.814731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.815306] flags: 0x200000000000000(node=0|zone=2)
[   15.815620] page_type: f5(slab)
[   15.815791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.816233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.816550] page dumped because: kasan: bad access detected
[   15.816811] 
[   15.816887] Memory state around the buggy address:
[   15.817287]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.817666]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.818101] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.818359]                                      ^
[   15.818689]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819123]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819484] ==================================================================
[   16.287454] ==================================================================
[   16.288096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.288515] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.289126] 
[   16.289239] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.289282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.289379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.289404] Call Trace:
[   16.289420]  <TASK>
[   16.289435]  dump_stack_lvl+0x73/0xb0
[   16.289466]  print_report+0xd1/0x650
[   16.289488]  ? __virt_addr_valid+0x1db/0x2d0
[   16.289511]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.289534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.289559]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.289581]  kasan_report+0x141/0x180
[   16.289616]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.289643]  kasan_check_range+0x10c/0x1c0
[   16.289668]  __kasan_check_write+0x18/0x20
[   16.289688]  kasan_atomics_helper+0x1d7a/0x5450
[   16.289712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.289736]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.289765]  ? kasan_atomics+0x152/0x310
[   16.289804]  kasan_atomics+0x1dc/0x310
[   16.289828]  ? __pfx_kasan_atomics+0x10/0x10
[   16.289854]  ? __pfx_read_tsc+0x10/0x10
[   16.289877]  ? ktime_get_ts64+0x86/0x230
[   16.289904]  kunit_try_run_case+0x1a5/0x480
[   16.289929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.289954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.289980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.290005]  ? __kthread_parkme+0x82/0x180
[   16.290026]  ? preempt_count_sub+0x50/0x80
[   16.290051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.290077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.290103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.290130]  kthread+0x337/0x6f0
[   16.290151]  ? trace_preempt_on+0x20/0xc0
[   16.290174]  ? __pfx_kthread+0x10/0x10
[   16.290196]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.290218]  ? calculate_sigpending+0x7b/0xa0
[   16.290244]  ? __pfx_kthread+0x10/0x10
[   16.290266]  ret_from_fork+0x116/0x1d0
[   16.290286]  ? __pfx_kthread+0x10/0x10
[   16.290307]  ret_from_fork_asm+0x1a/0x30
[   16.290338]  </TASK>
[   16.290350] 
[   16.300475] Allocated by task 282:
[   16.300636]  kasan_save_stack+0x45/0x70
[   16.300800]  kasan_save_track+0x18/0x40
[   16.300938]  kasan_save_alloc_info+0x3b/0x50
[   16.301089]  __kasan_kmalloc+0xb7/0xc0
[   16.301223]  __kmalloc_cache_noprof+0x189/0x420
[   16.301382]  kasan_atomics+0x95/0x310
[   16.301518]  kunit_try_run_case+0x1a5/0x480
[   16.302499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.304157]  kthread+0x337/0x6f0
[   16.304460]  ret_from_fork+0x116/0x1d0
[   16.304822]  ret_from_fork_asm+0x1a/0x30
[   16.305182] 
[   16.305339] The buggy address belongs to the object at ffff8881029cd380
[   16.305339]  which belongs to the cache kmalloc-64 of size 64
[   16.306994] The buggy address is located 0 bytes to the right of
[   16.306994]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.308089] 
[   16.308252] The buggy address belongs to the physical page:
[   16.308854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.309549] flags: 0x200000000000000(node=0|zone=2)
[   16.310037] page_type: f5(slab)
[   16.310359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.311071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.311329] page dumped because: kasan: bad access detected
[   16.311502] 
[   16.311572] Memory state around the buggy address:
[   16.312027]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.312642]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.313255] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.313884]                                      ^
[   16.314282]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314492]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314710] ==================================================================
[   15.289956] ==================================================================
[   15.290274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.290584] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.290822] 
[   15.291197] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.291262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.291275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.291297] Call Trace:
[   15.291315]  <TASK>
[   15.291335]  dump_stack_lvl+0x73/0xb0
[   15.291367]  print_report+0xd1/0x650
[   15.291390]  ? __virt_addr_valid+0x1db/0x2d0
[   15.291414]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.291436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.291461]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.291484]  kasan_report+0x141/0x180
[   15.291508]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.291535]  __asan_report_store4_noabort+0x1b/0x30
[   15.291609]  kasan_atomics_helper+0x4b3a/0x5450
[   15.291659]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.291741]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.291777]  ? kasan_atomics+0x152/0x310
[   15.292036]  kasan_atomics+0x1dc/0x310
[   15.292063]  ? __pfx_kasan_atomics+0x10/0x10
[   15.292102]  ? __pfx_read_tsc+0x10/0x10
[   15.292127]  ? ktime_get_ts64+0x86/0x230
[   15.292152]  kunit_try_run_case+0x1a5/0x480
[   15.292178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.292227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.292252]  ? __kthread_parkme+0x82/0x180
[   15.292274]  ? preempt_count_sub+0x50/0x80
[   15.292300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.292376]  kthread+0x337/0x6f0
[   15.292396]  ? trace_preempt_on+0x20/0xc0
[   15.292420]  ? __pfx_kthread+0x10/0x10
[   15.292442]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.292465]  ? calculate_sigpending+0x7b/0xa0
[   15.292490]  ? __pfx_kthread+0x10/0x10
[   15.292512]  ret_from_fork+0x116/0x1d0
[   15.292531]  ? __pfx_kthread+0x10/0x10
[   15.292553]  ret_from_fork_asm+0x1a/0x30
[   15.292585]  </TASK>
[   15.292606] 
[   15.301605] Allocated by task 282:
[   15.301758]  kasan_save_stack+0x45/0x70
[   15.301913]  kasan_save_track+0x18/0x40
[   15.302179]  kasan_save_alloc_info+0x3b/0x50
[   15.302572]  __kasan_kmalloc+0xb7/0xc0
[   15.303292]  __kmalloc_cache_noprof+0x189/0x420
[   15.303523]  kasan_atomics+0x95/0x310
[   15.303765]  kunit_try_run_case+0x1a5/0x480
[   15.303995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.304301]  kthread+0x337/0x6f0
[   15.304473]  ret_from_fork+0x116/0x1d0
[   15.304685]  ret_from_fork_asm+0x1a/0x30
[   15.304914] 
[   15.305014] The buggy address belongs to the object at ffff8881029cd380
[   15.305014]  which belongs to the cache kmalloc-64 of size 64
[   15.305575] The buggy address is located 0 bytes to the right of
[   15.305575]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.306133] 
[   15.306271] The buggy address belongs to the physical page:
[   15.306518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.306890] flags: 0x200000000000000(node=0|zone=2)
[   15.307246] page_type: f5(slab)
[   15.307378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.307840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.308098] page dumped because: kasan: bad access detected
[   15.308352] 
[   15.308446] Memory state around the buggy address:
[   15.308659]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.309033]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.309283] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.309611]                                      ^
[   15.310000]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310228]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310646] ==================================================================
[   15.579518] ==================================================================
[   15.580005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.580314] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.580631] 
[   15.580731] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.580775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.580789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.580813] Call Trace:
[   15.580832]  <TASK>
[   15.580852]  dump_stack_lvl+0x73/0xb0
[   15.580881]  print_report+0xd1/0x650
[   15.580904]  ? __virt_addr_valid+0x1db/0x2d0
[   15.580942]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.580965]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.580991]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.581014]  kasan_report+0x141/0x180
[   15.581037]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.581065]  __asan_report_load4_noabort+0x18/0x20
[   15.581092]  kasan_atomics_helper+0x4a84/0x5450
[   15.581118]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.581143]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.581170]  ? kasan_atomics+0x152/0x310
[   15.581197]  kasan_atomics+0x1dc/0x310
[   15.581221]  ? __pfx_kasan_atomics+0x10/0x10
[   15.581248]  ? __pfx_read_tsc+0x10/0x10
[   15.581271]  ? ktime_get_ts64+0x86/0x230
[   15.581297]  kunit_try_run_case+0x1a5/0x480
[   15.581322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.581347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.581373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.581398]  ? __kthread_parkme+0x82/0x180
[   15.581421]  ? preempt_count_sub+0x50/0x80
[   15.581446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.581471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.581496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.581522]  kthread+0x337/0x6f0
[   15.581542]  ? trace_preempt_on+0x20/0xc0
[   15.581566]  ? __pfx_kthread+0x10/0x10
[   15.581588]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.581621]  ? calculate_sigpending+0x7b/0xa0
[   15.581647]  ? __pfx_kthread+0x10/0x10
[   15.581670]  ret_from_fork+0x116/0x1d0
[   15.581689]  ? __pfx_kthread+0x10/0x10
[   15.581710]  ret_from_fork_asm+0x1a/0x30
[   15.581742]  </TASK>
[   15.581753] 
[   15.590022] Allocated by task 282:
[   15.590522]  kasan_save_stack+0x45/0x70
[   15.590734]  kasan_save_track+0x18/0x40
[   15.591092]  kasan_save_alloc_info+0x3b/0x50
[   15.591304]  __kasan_kmalloc+0xb7/0xc0
[   15.591481]  __kmalloc_cache_noprof+0x189/0x420
[   15.591704]  kasan_atomics+0x95/0x310
[   15.592200]  kunit_try_run_case+0x1a5/0x480
[   15.592372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.592653]  kthread+0x337/0x6f0
[   15.593001]  ret_from_fork+0x116/0x1d0
[   15.593158]  ret_from_fork_asm+0x1a/0x30
[   15.593483] 
[   15.593652] The buggy address belongs to the object at ffff8881029cd380
[   15.593652]  which belongs to the cache kmalloc-64 of size 64
[   15.594339] The buggy address is located 0 bytes to the right of
[   15.594339]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.594991] 
[   15.595096] The buggy address belongs to the physical page:
[   15.595494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.595862] flags: 0x200000000000000(node=0|zone=2)
[   15.596170] page_type: f5(slab)
[   15.596315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.596742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.597196] page dumped because: kasan: bad access detected
[   15.597482] 
[   15.597581] Memory state around the buggy address:
[   15.597800]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.598074]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.598360] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.598654]                                      ^
[   15.598878]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599502]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599953] ==================================================================
[   15.820314] ==================================================================
[   15.820641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.821206] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.821677] 
[   15.821785] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.821828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.821841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.821984] Call Trace:
[   15.822002]  <TASK>
[   15.822021]  dump_stack_lvl+0x73/0xb0
[   15.822052]  print_report+0xd1/0x650
[   15.822074]  ? __virt_addr_valid+0x1db/0x2d0
[   15.822098]  ? kasan_atomics_helper+0x1217/0x5450
[   15.822120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.822145]  ? kasan_atomics_helper+0x1217/0x5450
[   15.822169]  kasan_report+0x141/0x180
[   15.822192]  ? kasan_atomics_helper+0x1217/0x5450
[   15.822220]  kasan_check_range+0x10c/0x1c0
[   15.822244]  __kasan_check_write+0x18/0x20
[   15.822263]  kasan_atomics_helper+0x1217/0x5450
[   15.822287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.822310]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.822337]  ? kasan_atomics+0x152/0x310
[   15.822363]  kasan_atomics+0x1dc/0x310
[   15.822386]  ? __pfx_kasan_atomics+0x10/0x10
[   15.822411]  ? __pfx_read_tsc+0x10/0x10
[   15.822433]  ? ktime_get_ts64+0x86/0x230
[   15.822458]  kunit_try_run_case+0x1a5/0x480
[   15.822483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.822507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.822531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.822556]  ? __kthread_parkme+0x82/0x180
[   15.822577]  ? preempt_count_sub+0x50/0x80
[   15.822617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.822643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.822694]  kthread+0x337/0x6f0
[   15.822714]  ? trace_preempt_on+0x20/0xc0
[   15.822738]  ? __pfx_kthread+0x10/0x10
[   15.822759]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.822795]  ? calculate_sigpending+0x7b/0xa0
[   15.822821]  ? __pfx_kthread+0x10/0x10
[   15.822847]  ret_from_fork+0x116/0x1d0
[   15.822867]  ? __pfx_kthread+0x10/0x10
[   15.822888]  ret_from_fork_asm+0x1a/0x30
[   15.822921]  </TASK>
[   15.822933] 
[   15.832334] Allocated by task 282:
[   15.832660]  kasan_save_stack+0x45/0x70
[   15.832873]  kasan_save_track+0x18/0x40
[   15.833049]  kasan_save_alloc_info+0x3b/0x50
[   15.833235]  __kasan_kmalloc+0xb7/0xc0
[   15.833413]  __kmalloc_cache_noprof+0x189/0x420
[   15.833625]  kasan_atomics+0x95/0x310
[   15.833794]  kunit_try_run_case+0x1a5/0x480
[   15.834306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.834507]  kthread+0x337/0x6f0
[   15.834759]  ret_from_fork+0x116/0x1d0
[   15.835073]  ret_from_fork_asm+0x1a/0x30
[   15.835231] 
[   15.835329] The buggy address belongs to the object at ffff8881029cd380
[   15.835329]  which belongs to the cache kmalloc-64 of size 64
[   15.836037] The buggy address is located 0 bytes to the right of
[   15.836037]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.836716] 
[   15.836874] The buggy address belongs to the physical page:
[   15.837101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.837533] flags: 0x200000000000000(node=0|zone=2)
[   15.837758] page_type: f5(slab)
[   15.837940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.838250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.838549] page dumped because: kasan: bad access detected
[   15.839077] 
[   15.839171] Memory state around the buggy address:
[   15.839358]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.839660]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840113] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.840469]                                      ^
[   15.840646]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841137]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841435] ==================================================================
[   16.340606] ==================================================================
[   16.340982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.341416] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.341884] 
[   16.342001] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.342048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.342060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.342083] Call Trace:
[   16.342102]  <TASK>
[   16.342121]  dump_stack_lvl+0x73/0xb0
[   16.342155]  print_report+0xd1/0x650
[   16.342179]  ? __virt_addr_valid+0x1db/0x2d0
[   16.342203]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.342226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.342251]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.342274]  kasan_report+0x141/0x180
[   16.342297]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.342325]  kasan_check_range+0x10c/0x1c0
[   16.342349]  __kasan_check_write+0x18/0x20
[   16.342370]  kasan_atomics_helper+0x1eaa/0x5450
[   16.342394]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.342418]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.342444]  ? kasan_atomics+0x152/0x310
[   16.342471]  kasan_atomics+0x1dc/0x310
[   16.342494]  ? __pfx_kasan_atomics+0x10/0x10
[   16.342520]  ? __pfx_read_tsc+0x10/0x10
[   16.342542]  ? ktime_get_ts64+0x86/0x230
[   16.342569]  kunit_try_run_case+0x1a5/0x480
[   16.342606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.342631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.342656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.342681]  ? __kthread_parkme+0x82/0x180
[   16.342704]  ? preempt_count_sub+0x50/0x80
[   16.342729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.342756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.342782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.342809]  kthread+0x337/0x6f0
[   16.342834]  ? trace_preempt_on+0x20/0xc0
[   16.342860]  ? __pfx_kthread+0x10/0x10
[   16.342881]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.342903]  ? calculate_sigpending+0x7b/0xa0
[   16.342929]  ? __pfx_kthread+0x10/0x10
[   16.342951]  ret_from_fork+0x116/0x1d0
[   16.342969]  ? __pfx_kthread+0x10/0x10
[   16.342991]  ret_from_fork_asm+0x1a/0x30
[   16.343023]  </TASK>
[   16.343034] 
[   16.350361] Allocated by task 282:
[   16.350552]  kasan_save_stack+0x45/0x70
[   16.350754]  kasan_save_track+0x18/0x40
[   16.350943]  kasan_save_alloc_info+0x3b/0x50
[   16.351097]  __kasan_kmalloc+0xb7/0xc0
[   16.351281]  __kmalloc_cache_noprof+0x189/0x420
[   16.351523]  kasan_atomics+0x95/0x310
[   16.351758]  kunit_try_run_case+0x1a5/0x480
[   16.351945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.352202]  kthread+0x337/0x6f0
[   16.352326]  ret_from_fork+0x116/0x1d0
[   16.352464]  ret_from_fork_asm+0x1a/0x30
[   16.352617] 
[   16.352713] The buggy address belongs to the object at ffff8881029cd380
[   16.352713]  which belongs to the cache kmalloc-64 of size 64
[   16.353223] The buggy address is located 0 bytes to the right of
[   16.353223]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.353668] 
[   16.353742] The buggy address belongs to the physical page:
[   16.353917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.354297] flags: 0x200000000000000(node=0|zone=2)
[   16.354550] page_type: f5(slab)
[   16.354753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.355134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.355413] page dumped because: kasan: bad access detected
[   16.355587] 
[   16.355690] Memory state around the buggy address:
[   16.355911]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.356252]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.356516] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.356754]                                      ^
[   16.357019]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.357350]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.357603] ==================================================================
[   16.488514] ==================================================================
[   16.489339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.489682] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.490012] 
[   16.490122] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.490164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.490176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.490198] Call Trace:
[   16.490215]  <TASK>
[   16.490231]  dump_stack_lvl+0x73/0xb0
[   16.490260]  print_report+0xd1/0x650
[   16.490283]  ? __virt_addr_valid+0x1db/0x2d0
[   16.490307]  ? kasan_atomics_helper+0x218a/0x5450
[   16.490330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.490354]  ? kasan_atomics_helper+0x218a/0x5450
[   16.490377]  kasan_report+0x141/0x180
[   16.490400]  ? kasan_atomics_helper+0x218a/0x5450
[   16.490427]  kasan_check_range+0x10c/0x1c0
[   16.490465]  __kasan_check_write+0x18/0x20
[   16.490486]  kasan_atomics_helper+0x218a/0x5450
[   16.490509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.490533]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.490559]  ? kasan_atomics+0x152/0x310
[   16.490586]  kasan_atomics+0x1dc/0x310
[   16.490620]  ? __pfx_kasan_atomics+0x10/0x10
[   16.490646]  ? __pfx_read_tsc+0x10/0x10
[   16.490668]  ? ktime_get_ts64+0x86/0x230
[   16.490693]  kunit_try_run_case+0x1a5/0x480
[   16.490718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.490741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.490766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.490792]  ? __kthread_parkme+0x82/0x180
[   16.490813]  ? preempt_count_sub+0x50/0x80
[   16.490846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.490871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.490897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.490934]  kthread+0x337/0x6f0
[   16.490953]  ? trace_preempt_on+0x20/0xc0
[   16.490979]  ? __pfx_kthread+0x10/0x10
[   16.491001]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.491023]  ? calculate_sigpending+0x7b/0xa0
[   16.491049]  ? __pfx_kthread+0x10/0x10
[   16.491072]  ret_from_fork+0x116/0x1d0
[   16.491091]  ? __pfx_kthread+0x10/0x10
[   16.491114]  ret_from_fork_asm+0x1a/0x30
[   16.491146]  </TASK>
[   16.491156] 
[   16.498739] Allocated by task 282:
[   16.498969]  kasan_save_stack+0x45/0x70
[   16.499139]  kasan_save_track+0x18/0x40
[   16.499303]  kasan_save_alloc_info+0x3b/0x50
[   16.499464]  __kasan_kmalloc+0xb7/0xc0
[   16.499667]  __kmalloc_cache_noprof+0x189/0x420
[   16.499980]  kasan_atomics+0x95/0x310
[   16.500115]  kunit_try_run_case+0x1a5/0x480
[   16.500266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.500520]  kthread+0x337/0x6f0
[   16.500698]  ret_from_fork+0x116/0x1d0
[   16.501035]  ret_from_fork_asm+0x1a/0x30
[   16.501189] 
[   16.501259] The buggy address belongs to the object at ffff8881029cd380
[   16.501259]  which belongs to the cache kmalloc-64 of size 64
[   16.501738] The buggy address is located 0 bytes to the right of
[   16.501738]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.502291] 
[   16.502365] The buggy address belongs to the physical page:
[   16.502538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.502784] flags: 0x200000000000000(node=0|zone=2)
[   16.503544] page_type: f5(slab)
[   16.503749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.504078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.504312] page dumped because: kasan: bad access detected
[   16.504484] 
[   16.504579] Memory state around the buggy address:
[   16.504846]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.505169]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.505490] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.505843]                                      ^
[   16.506032]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506327]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506627] ==================================================================
[   16.315318] ==================================================================
[   16.315553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.316197] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   16.316544] 
[   16.316676] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.316723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.316735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.316758] Call Trace:
[   16.316777]  <TASK>
[   16.316796]  dump_stack_lvl+0x73/0xb0
[   16.316826]  print_report+0xd1/0x650
[   16.316850]  ? __virt_addr_valid+0x1db/0x2d0
[   16.316874]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.316897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.316921]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.316944]  kasan_report+0x141/0x180
[   16.316966]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.316994]  kasan_check_range+0x10c/0x1c0
[   16.317018]  __kasan_check_write+0x18/0x20
[   16.317039]  kasan_atomics_helper+0x1e12/0x5450
[   16.317063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.317087]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.317113]  ? kasan_atomics+0x152/0x310
[   16.317160]  kasan_atomics+0x1dc/0x310
[   16.317184]  ? __pfx_kasan_atomics+0x10/0x10
[   16.317210]  ? __pfx_read_tsc+0x10/0x10
[   16.317240]  ? ktime_get_ts64+0x86/0x230
[   16.317265]  kunit_try_run_case+0x1a5/0x480
[   16.317291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.317315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.317341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.317366]  ? __kthread_parkme+0x82/0x180
[   16.317388]  ? preempt_count_sub+0x50/0x80
[   16.317413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.317439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.317465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.317492]  kthread+0x337/0x6f0
[   16.317514]  ? trace_preempt_on+0x20/0xc0
[   16.317539]  ? __pfx_kthread+0x10/0x10
[   16.317560]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.317583]  ? calculate_sigpending+0x7b/0xa0
[   16.317619]  ? __pfx_kthread+0x10/0x10
[   16.317641]  ret_from_fork+0x116/0x1d0
[   16.317660]  ? __pfx_kthread+0x10/0x10
[   16.317681]  ret_from_fork_asm+0x1a/0x30
[   16.317713]  </TASK>
[   16.317725] 
[   16.328782] Allocated by task 282:
[   16.329346]  kasan_save_stack+0x45/0x70
[   16.329812]  kasan_save_track+0x18/0x40
[   16.330241]  kasan_save_alloc_info+0x3b/0x50
[   16.330707]  __kasan_kmalloc+0xb7/0xc0
[   16.331194]  __kmalloc_cache_noprof+0x189/0x420
[   16.331567]  kasan_atomics+0x95/0x310
[   16.332038]  kunit_try_run_case+0x1a5/0x480
[   16.332369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.332548]  kthread+0x337/0x6f0
[   16.332682]  ret_from_fork+0x116/0x1d0
[   16.332834]  ret_from_fork_asm+0x1a/0x30
[   16.332982] 
[   16.333057] The buggy address belongs to the object at ffff8881029cd380
[   16.333057]  which belongs to the cache kmalloc-64 of size 64
[   16.333889] The buggy address is located 0 bytes to the right of
[   16.333889]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   16.334379] 
[   16.334462] The buggy address belongs to the physical page:
[   16.334689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   16.335305] flags: 0x200000000000000(node=0|zone=2)
[   16.335522] page_type: f5(slab)
[   16.335857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.336252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.336632] page dumped because: kasan: bad access detected
[   16.336926] 
[   16.337026] Memory state around the buggy address:
[   16.337331]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.337711]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.338153] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.338425]                                      ^
[   16.338652]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.339102]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.339489] ==================================================================
[   15.356007] ==================================================================
[   15.356369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.356737] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282
[   15.357633] 
[   15.357839] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.357898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.357910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.357932] Call Trace:
[   15.357950]  <TASK>
[   15.357968]  dump_stack_lvl+0x73/0xb0
[   15.357999]  print_report+0xd1/0x650
[   15.358022]  ? __virt_addr_valid+0x1db/0x2d0
[   15.358047]  ? kasan_atomics_helper+0x697/0x5450
[   15.358070]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.358094]  ? kasan_atomics_helper+0x697/0x5450
[   15.358117]  kasan_report+0x141/0x180
[   15.358139]  ? kasan_atomics_helper+0x697/0x5450
[   15.358167]  kasan_check_range+0x10c/0x1c0
[   15.358193]  __kasan_check_write+0x18/0x20
[   15.358214]  kasan_atomics_helper+0x697/0x5450
[   15.358238]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.358294]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.358321]  ? kasan_atomics+0x152/0x310
[   15.358358]  kasan_atomics+0x1dc/0x310
[   15.358381]  ? __pfx_kasan_atomics+0x10/0x10
[   15.358406]  ? __pfx_read_tsc+0x10/0x10
[   15.358429]  ? ktime_get_ts64+0x86/0x230
[   15.358455]  kunit_try_run_case+0x1a5/0x480
[   15.358480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.358504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.358557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.358610]  ? __kthread_parkme+0x82/0x180
[   15.358632]  ? preempt_count_sub+0x50/0x80
[   15.358657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.358683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.358708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.358734]  kthread+0x337/0x6f0
[   15.358753]  ? trace_preempt_on+0x20/0xc0
[   15.358788]  ? __pfx_kthread+0x10/0x10
[   15.358810]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.358836]  ? calculate_sigpending+0x7b/0xa0
[   15.358862]  ? __pfx_kthread+0x10/0x10
[   15.358884]  ret_from_fork+0x116/0x1d0
[   15.358903]  ? __pfx_kthread+0x10/0x10
[   15.358925]  ret_from_fork_asm+0x1a/0x30
[   15.358957]  </TASK>
[   15.358969] 
[   15.366707] Allocated by task 282:
[   15.367059]  kasan_save_stack+0x45/0x70
[   15.367297]  kasan_save_track+0x18/0x40
[   15.367442]  kasan_save_alloc_info+0x3b/0x50
[   15.367602]  __kasan_kmalloc+0xb7/0xc0
[   15.367736]  __kmalloc_cache_noprof+0x189/0x420
[   15.367894]  kasan_atomics+0x95/0x310
[   15.368112]  kunit_try_run_case+0x1a5/0x480
[   15.368340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.368609]  kthread+0x337/0x6f0
[   15.368826]  ret_from_fork+0x116/0x1d0
[   15.369155]  ret_from_fork_asm+0x1a/0x30
[   15.369402] 
[   15.369544] The buggy address belongs to the object at ffff8881029cd380
[   15.369544]  which belongs to the cache kmalloc-64 of size 64
[   15.370062] The buggy address is located 0 bytes to the right of
[   15.370062]  allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0)
[   15.370613] 
[   15.370689] The buggy address belongs to the physical page:
[   15.370867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd
[   15.371481] flags: 0x200000000000000(node=0|zone=2)
[   15.371731] page_type: f5(slab)
[   15.371947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.372305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.372580] page dumped because: kasan: bad access detected
[   15.372900] 
[   15.372994] Memory state around the buggy address:
[   15.373243]  ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.373548]  ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.373897] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.374112]                                      ^
[   15.374272]  ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.374547]  ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.375062] ==================================================================