Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.672836] ==================================================================
[   19.672961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.673015] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.673066] 
[   19.673112] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.673330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.673372] Hardware name: linux,dummy-virt (DT)
[   19.673591] Call trace:
[   19.673888]  show_stack+0x20/0x38 (C)
[   19.674039]  dump_stack_lvl+0x8c/0xd0
[   19.674090]  print_report+0x118/0x608
[   19.674140]  kasan_report+0xdc/0x128
[   19.674210]  kasan_check_range+0x100/0x1a8
[   19.674263]  __kasan_check_write+0x20/0x30
[   19.674319]  kasan_atomics_helper+0x11f8/0x4858
[   19.674384]  kasan_atomics+0x198/0x2e0
[   19.674432]  kunit_try_run_case+0x170/0x3f0
[   19.674899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.675015]  kthread+0x328/0x630
[   19.675214]  ret_from_fork+0x10/0x20
[   19.675265] 
[   19.675285] Allocated by task 265:
[   19.675363]  kasan_save_stack+0x3c/0x68
[   19.675414]  kasan_save_track+0x20/0x40
[   19.675456]  kasan_save_alloc_info+0x40/0x58
[   19.675545]  __kasan_kmalloc+0xd4/0xd8
[   19.675586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.675629]  kasan_atomics+0xb8/0x2e0
[   19.675666]  kunit_try_run_case+0x170/0x3f0
[   19.675707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.675754]  kthread+0x328/0x630
[   19.675833]  ret_from_fork+0x10/0x20
[   19.675971] 
[   19.675992] The buggy address belongs to the object at fff00000c5a01980
[   19.675992]  which belongs to the cache kmalloc-64 of size 64
[   19.676180] The buggy address is located 0 bytes to the right of
[   19.676180]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.676888] 
[   19.676991] The buggy address belongs to the physical page:
[   19.677028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.677567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.677645] page_type: f5(slab)
[   19.677954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.678116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.678162] page dumped because: kasan: bad access detected
[   19.678214] 
[   19.678234] Memory state around the buggy address:
[   19.678285]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.678332]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.678388] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.678429]                                      ^
[   19.678466]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678519]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678692] ==================================================================
[   19.687363] ==================================================================
[   19.687422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.687476] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.687643] 
[   19.687677] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.687966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.688001] Hardware name: linux,dummy-virt (DT)
[   19.688034] Call trace:
[   19.688058]  show_stack+0x20/0x38 (C)
[   19.688111]  dump_stack_lvl+0x8c/0xd0
[   19.688166]  print_report+0x118/0x608
[   19.688430]  kasan_report+0xdc/0x128
[   19.688478]  kasan_check_range+0x100/0x1a8
[   19.688529]  __kasan_check_write+0x20/0x30
[   19.688575]  kasan_atomics_helper+0x12d8/0x4858
[   19.688627]  kasan_atomics+0x198/0x2e0
[   19.688681]  kunit_try_run_case+0x170/0x3f0
[   19.688933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.689229]  kthread+0x328/0x630
[   19.689346]  ret_from_fork+0x10/0x20
[   19.689395] 
[   19.689415] Allocated by task 265:
[   19.689445]  kasan_save_stack+0x3c/0x68
[   19.689487]  kasan_save_track+0x20/0x40
[   19.689527]  kasan_save_alloc_info+0x40/0x58
[   19.689569]  __kasan_kmalloc+0xd4/0xd8
[   19.689608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.690036]  kasan_atomics+0xb8/0x2e0
[   19.690370]  kunit_try_run_case+0x170/0x3f0
[   19.690468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.690516]  kthread+0x328/0x630
[   19.690551]  ret_from_fork+0x10/0x20
[   19.690853] 
[   19.690894] The buggy address belongs to the object at fff00000c5a01980
[   19.690894]  which belongs to the cache kmalloc-64 of size 64
[   19.690964] The buggy address is located 0 bytes to the right of
[   19.690964]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.691030] 
[   19.691054] The buggy address belongs to the physical page:
[   19.691113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.691169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.691321] page_type: f5(slab)
[   19.691372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.691428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.691471] page dumped because: kasan: bad access detected
[   19.691506] 
[   19.691526] Memory state around the buggy address:
[   19.691634]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.691685]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.691736] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.691986]                                      ^
[   19.692069]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692111]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692225] ==================================================================
[   19.665646] ==================================================================
[   19.665702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.665766] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.666055] 
[   19.666279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.666401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.666431] Hardware name: linux,dummy-virt (DT)
[   19.666462] Call trace:
[   19.666688]  show_stack+0x20/0x38 (C)
[   19.666848]  dump_stack_lvl+0x8c/0xd0
[   19.666929]  print_report+0x118/0x608
[   19.666986]  kasan_report+0xdc/0x128
[   19.667236]  kasan_check_range+0x100/0x1a8
[   19.667434]  __kasan_check_write+0x20/0x30
[   19.667538]  kasan_atomics_helper+0x1190/0x4858
[   19.667631]  kasan_atomics+0x198/0x2e0
[   19.667698]  kunit_try_run_case+0x170/0x3f0
[   19.667857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667946]  kthread+0x328/0x630
[   19.668035]  ret_from_fork+0x10/0x20
[   19.668137] 
[   19.668196] Allocated by task 265:
[   19.668226]  kasan_save_stack+0x3c/0x68
[   19.668270]  kasan_save_track+0x20/0x40
[   19.668309]  kasan_save_alloc_info+0x40/0x58
[   19.668364]  __kasan_kmalloc+0xd4/0xd8
[   19.668402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.668444]  kasan_atomics+0xb8/0x2e0
[   19.668483]  kunit_try_run_case+0x170/0x3f0
[   19.668870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.669262]  kthread+0x328/0x630
[   19.669428]  ret_from_fork+0x10/0x20
[   19.669513] 
[   19.669676] The buggy address belongs to the object at fff00000c5a01980
[   19.669676]  which belongs to the cache kmalloc-64 of size 64
[   19.669807] The buggy address is located 0 bytes to the right of
[   19.669807]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.669874] 
[   19.669897] The buggy address belongs to the physical page:
[   19.670196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.670259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.670330] page_type: f5(slab)
[   19.670387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.670798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.670846] page dumped because: kasan: bad access detected
[   19.670881] 
[   19.670901] Memory state around the buggy address:
[   19.670936]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.670989]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.671035] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.671076]                                      ^
[   19.671113]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671156]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671278] ==================================================================
[   19.660375] ==================================================================
[   19.660430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.660483] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.660535] 
[   19.660565] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.660647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.660676] Hardware name: linux,dummy-virt (DT)
[   19.660708] Call trace:
[   19.660733]  show_stack+0x20/0x38 (C)
[   19.660783]  dump_stack_lvl+0x8c/0xd0
[   19.660831]  print_report+0x118/0x608
[   19.661243]  kasan_report+0xdc/0x128
[   19.661367]  kasan_check_range+0x100/0x1a8
[   19.661422]  __kasan_check_write+0x20/0x30
[   19.661469]  kasan_atomics_helper+0x1128/0x4858
[   19.661527]  kasan_atomics+0x198/0x2e0
[   19.661764]  kunit_try_run_case+0x170/0x3f0
[   19.661967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.662024]  kthread+0x328/0x630
[   19.662067]  ret_from_fork+0x10/0x20
[   19.662117] 
[   19.662137] Allocated by task 265:
[   19.662168]  kasan_save_stack+0x3c/0x68
[   19.662594]  kasan_save_track+0x20/0x40
[   19.662636]  kasan_save_alloc_info+0x40/0x58
[   19.662797]  __kasan_kmalloc+0xd4/0xd8
[   19.662877]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.662989]  kasan_atomics+0xb8/0x2e0
[   19.663083]  kunit_try_run_case+0x170/0x3f0
[   19.663170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.663215]  kthread+0x328/0x630
[   19.663252]  ret_from_fork+0x10/0x20
[   19.663469] 
[   19.663529] The buggy address belongs to the object at fff00000c5a01980
[   19.663529]  which belongs to the cache kmalloc-64 of size 64
[   19.663658] The buggy address is located 0 bytes to the right of
[   19.663658]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.663777] 
[   19.663853] The buggy address belongs to the physical page:
[   19.663888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.663941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.664266] page_type: f5(slab)
[   19.664362] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.664462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.664510] page dumped because: kasan: bad access detected
[   19.664544] 
[   19.664565] Memory state around the buggy address:
[   19.664658]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.664869]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.664966] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.665008]                                      ^
[   19.665045]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665096]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665171] ==================================================================
[   19.647457] ==================================================================
[   19.647586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.647640] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.647692] 
[   19.647737] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.647881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.647910] Hardware name: linux,dummy-virt (DT)
[   19.647943] Call trace:
[   19.647968]  show_stack+0x20/0x38 (C)
[   19.648240]  dump_stack_lvl+0x8c/0xd0
[   19.648493]  print_report+0x118/0x608
[   19.648625]  kasan_report+0xdc/0x128
[   19.648675]  kasan_check_range+0x100/0x1a8
[   19.648724]  __kasan_check_write+0x20/0x30
[   19.649102]  kasan_atomics_helper+0x1058/0x4858
[   19.649182]  kasan_atomics+0x198/0x2e0
[   19.649230]  kunit_try_run_case+0x170/0x3f0
[   19.649282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.649349]  kthread+0x328/0x630
[   19.649394]  ret_from_fork+0x10/0x20
[   19.649442] 
[   19.649657] Allocated by task 265:
[   19.649695]  kasan_save_stack+0x3c/0x68
[   19.649892]  kasan_save_track+0x20/0x40
[   19.650178]  kasan_save_alloc_info+0x40/0x58
[   19.650471]  __kasan_kmalloc+0xd4/0xd8
[   19.650513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.650595]  kasan_atomics+0xb8/0x2e0
[   19.650683]  kunit_try_run_case+0x170/0x3f0
[   19.650758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.651021]  kthread+0x328/0x630
[   19.651402]  ret_from_fork+0x10/0x20
[   19.651465] 
[   19.651489] The buggy address belongs to the object at fff00000c5a01980
[   19.651489]  which belongs to the cache kmalloc-64 of size 64
[   19.651585] The buggy address is located 0 bytes to the right of
[   19.651585]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.651672] 
[   19.651735] The buggy address belongs to the physical page:
[   19.651769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.651896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.652008] page_type: f5(slab)
[   19.652053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.652304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.652365] page dumped because: kasan: bad access detected
[   19.652399] 
[   19.652419] Memory state around the buggy address:
[   19.652578]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.652626]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.652706] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.652747]                                      ^
[   19.652780]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652858]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652922] ==================================================================
[   19.475559] ==================================================================
[   19.475611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   19.476809] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.476881] 
[   19.476917] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.477002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.477129] Hardware name: linux,dummy-virt (DT)
[   19.477169] Call trace:
[   19.477229]  show_stack+0x20/0x38 (C)
[   19.477313]  dump_stack_lvl+0x8c/0xd0
[   19.477391]  print_report+0x118/0x608
[   19.478335]  kasan_check_range+0x100/0x1a8
[   19.478549]  kasan_atomics_helper+0x7cc/0x4858
[   19.478632]  kasan_atomics+0x198/0x2e0
[   19.478959]  kunit_try_run_case+0x170/0x3f0
[   19.479093]  kthread+0x328/0x630
[   19.479776]  ret_from_fork+0x10/0x20
[   19.480109] 
[   19.480150] Allocated by task 265:
[   19.480205]  kasan_save_stack+0x3c/0x68
[   19.480396]  __kasan_kmalloc+0xd4/0xd8
[   19.480436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.480478]  kasan_atomics+0xb8/0x2e0
[   19.480521]  kunit_try_run_case+0x170/0x3f0
[   19.480681] 
[   19.480824] 
[   19.480848] The buggy address belongs to the physical page:
[   19.481088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.481203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.481815] page_type: f5(slab)
[   19.481859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.481923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.483358] page dumped because: kasan: bad access detected
[   19.483747] 
[   19.483798] Memory state around the buggy address:
[   19.483858]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.484607]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.486763]  kasan_check_range+0x100/0x1a8
[   19.488841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.489250] 
[   19.489274] The buggy address belongs to the physical page:
[   19.489307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.489371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.489419] page_type: f5(slab)
[   19.489467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.489729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.489787] page dumped because: kasan: bad access detected
[   19.489953] 
[   19.489973] Memory state around the buggy address:
[   19.490009]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.490052]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.490097] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.490137]                                      ^
[   19.491008]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.491063]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.491104] ==================================================================
[   19.840398] ==================================================================
[   19.840880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.841415] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.841551] 
[   19.841587] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.841716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.841830] Hardware name: linux,dummy-virt (DT)
[   19.841940] Call trace:
[   19.841988]  show_stack+0x20/0x38 (C)
[   19.842397]  dump_stack_lvl+0x8c/0xd0
[   19.842563]  print_report+0x118/0x608
[   19.842684]  kasan_report+0xdc/0x128
[   19.842734]  kasan_check_range+0x100/0x1a8
[   19.842787]  __kasan_check_write+0x20/0x30
[   19.842836]  kasan_atomics_helper+0x17ec/0x4858
[   19.842899]  kasan_atomics+0x198/0x2e0
[   19.842945]  kunit_try_run_case+0x170/0x3f0
[   19.843399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.843517]  kthread+0x328/0x630
[   19.843564]  ret_from_fork+0x10/0x20
[   19.843770] 
[   19.843814] Allocated by task 265:
[   19.843910]  kasan_save_stack+0x3c/0x68
[   19.843960]  kasan_save_track+0x20/0x40
[   19.844001]  kasan_save_alloc_info+0x40/0x58
[   19.844091]  __kasan_kmalloc+0xd4/0xd8
[   19.844151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.844304]  kasan_atomics+0xb8/0x2e0
[   19.844360]  kunit_try_run_case+0x170/0x3f0
[   19.844400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.844448]  kthread+0x328/0x630
[   19.844482]  ret_from_fork+0x10/0x20
[   19.844648] 
[   19.845024] The buggy address belongs to the object at fff00000c5a01980
[   19.845024]  which belongs to the cache kmalloc-64 of size 64
[   19.845176] The buggy address is located 0 bytes to the right of
[   19.845176]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.845308] 
[   19.845571] The buggy address belongs to the physical page:
[   19.845613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.845728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.845779] page_type: f5(slab)
[   19.845951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.846006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.846050] page dumped because: kasan: bad access detected
[   19.846334] 
[   19.846443] Memory state around the buggy address:
[   19.846484]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.846550]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.846595] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.846759]                                      ^
[   19.846832]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.847061]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.847102] ==================================================================
[   19.491971] ==================================================================
[   19.492025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.492079] Read of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.492146] 
[   19.492286] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.492392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.492473] Hardware name: linux,dummy-virt (DT)
[   19.492508] Call trace:
[   19.492571]  show_stack+0x20/0x38 (C)
[   19.492658]  dump_stack_lvl+0x8c/0xd0
[   19.492709]  print_report+0x118/0x608
[   19.492776]  kasan_report+0xdc/0x128
[   19.492826]  __asan_report_load4_noabort+0x20/0x30
[   19.492881]  kasan_atomics_helper+0x42d8/0x4858
[   19.493079]  kasan_atomics+0x198/0x2e0
[   19.493165]  kunit_try_run_case+0x170/0x3f0
[   19.493217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493282]  kthread+0x328/0x630
[   19.493363]  ret_from_fork+0x10/0x20
[   19.493416] 
[   19.493437] Allocated by task 265:
[   19.493498]  kasan_save_stack+0x3c/0x68
[   19.493599]  kasan_save_track+0x20/0x40
[   19.493641]  kasan_save_alloc_info+0x40/0x58
[   19.493682]  __kasan_kmalloc+0xd4/0xd8
[   19.493732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.493933]  kasan_atomics+0xb8/0x2e0
[   19.494382]  kthread+0x328/0x630
[   19.494875] 
[   19.495068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.495259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.495302] page dumped because: kasan: bad access detected
[   19.495335] 
[   19.495709]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.496116] ==================================================================
[   19.623982] ==================================================================
[   19.624030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.624080] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.624130] 
[   19.624182] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.624265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.624293] Hardware name: linux,dummy-virt (DT)
[   19.624325] Call trace:
[   19.624365]  show_stack+0x20/0x38 (C)
[   19.624629]  dump_stack_lvl+0x8c/0xd0
[   19.624678]  print_report+0x118/0x608
[   19.624728]  kasan_report+0xdc/0x128
[   19.624782]  __asan_report_store8_noabort+0x20/0x30
[   19.625103]  kasan_atomics_helper+0x3e5c/0x4858
[   19.625776]  kasan_atomics+0x198/0x2e0
[   19.625924]  kunit_try_run_case+0x170/0x3f0
[   19.625976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.626030]  kthread+0x328/0x630
[   19.626075]  ret_from_fork+0x10/0x20
[   19.626124] 
[   19.626143] Allocated by task 265:
[   19.626174]  kasan_save_stack+0x3c/0x68
[   19.626216]  kasan_save_track+0x20/0x40
[   19.626255]  kasan_save_alloc_info+0x40/0x58
[   19.626322]  __kasan_kmalloc+0xd4/0xd8
[   19.626376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.626418]  kasan_atomics+0xb8/0x2e0
[   19.626456]  kunit_try_run_case+0x170/0x3f0
[   19.626508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.626561]  kthread+0x328/0x630
[   19.626597]  ret_from_fork+0x10/0x20
[   19.626635] 
[   19.626655] The buggy address belongs to the object at fff00000c5a01980
[   19.626655]  which belongs to the cache kmalloc-64 of size 64
[   19.626713] The buggy address is located 0 bytes to the right of
[   19.626713]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.626779] 
[   19.626802] The buggy address belongs to the physical page:
[   19.626836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.626890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.626939] page_type: f5(slab)
[   19.626979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.627031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.627074] page dumped because: kasan: bad access detected
[   19.627106] 
[   19.627199] Memory state around the buggy address:
[   19.627235]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.627298]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.627353] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.627392]                                      ^
[   19.627441]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.627485]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.627536] ==================================================================
[   19.752614] ==================================================================
[   19.752671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.754025] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.754919] 
[   19.755464] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.755822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.756172] Hardware name: linux,dummy-virt (DT)
[   19.756298] Call trace:
[   19.756763]  show_stack+0x20/0x38 (C)
[   19.757259]  dump_stack_lvl+0x8c/0xd0
[   19.757696]  print_report+0x118/0x608
[   19.757797]  kasan_report+0xdc/0x128
[   19.757845]  kasan_check_range+0x100/0x1a8
[   19.757897]  __kasan_check_write+0x20/0x30
[   19.757951]  kasan_atomics_helper+0x1644/0x4858
[   19.758003]  kasan_atomics+0x198/0x2e0
[   19.759662]  kunit_try_run_case+0x170/0x3f0
[   19.759737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.759797]  kthread+0x328/0x630
[   19.759844]  ret_from_fork+0x10/0x20
[   19.760681] 
[   19.760870] Allocated by task 265:
[   19.761210]  kasan_save_stack+0x3c/0x68
[   19.761269]  kasan_save_track+0x20/0x40
[   19.761312]  kasan_save_alloc_info+0x40/0x58
[   19.761365]  __kasan_kmalloc+0xd4/0xd8
[   19.762131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.762678]  kasan_atomics+0xb8/0x2e0
[   19.762725]  kunit_try_run_case+0x170/0x3f0
[   19.763159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.763564]  kthread+0x328/0x630
[   19.763851]  ret_from_fork+0x10/0x20
[   19.764241] 
[   19.764267] The buggy address belongs to the object at fff00000c5a01980
[   19.764267]  which belongs to the cache kmalloc-64 of size 64
[   19.765013] The buggy address is located 0 bytes to the right of
[   19.765013]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.765288] 
[   19.765374] The buggy address belongs to the physical page:
[   19.765451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.765684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.766109] page_type: f5(slab)
[   19.766158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.767120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.767253] page dumped because: kasan: bad access detected
[   19.769323] 
[   19.769562] Memory state around the buggy address:
[   19.769604]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.769912]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.770181] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.770559]                                      ^
[   19.770718]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.772282]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.772571] ==================================================================
[   19.741313] ==================================================================
[   19.741377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.742011] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.742275] 
[   19.742315] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.742580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.742623] Hardware name: linux,dummy-virt (DT)
[   19.742655] Call trace:
[   19.742679]  show_stack+0x20/0x38 (C)
[   19.742733]  dump_stack_lvl+0x8c/0xd0
[   19.742784]  print_report+0x118/0x608
[   19.743068]  kasan_report+0xdc/0x128
[   19.743163]  __asan_report_load8_noabort+0x20/0x30
[   19.743218]  kasan_atomics_helper+0x3db0/0x4858
[   19.743281]  kasan_atomics+0x198/0x2e0
[   19.743331]  kunit_try_run_case+0x170/0x3f0
[   19.743738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.743800]  kthread+0x328/0x630
[   19.743846]  ret_from_fork+0x10/0x20
[   19.743895] 
[   19.743915] Allocated by task 265:
[   19.743946]  kasan_save_stack+0x3c/0x68
[   19.744042]  kasan_save_track+0x20/0x40
[   19.744246]  kasan_save_alloc_info+0x40/0x58
[   19.744773]  __kasan_kmalloc+0xd4/0xd8
[   19.745015]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.745161]  kasan_atomics+0xb8/0x2e0
[   19.745200]  kunit_try_run_case+0x170/0x3f0
[   19.745241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.745288]  kthread+0x328/0x630
[   19.745333]  ret_from_fork+0x10/0x20
[   19.745382] 
[   19.745403] The buggy address belongs to the object at fff00000c5a01980
[   19.745403]  which belongs to the cache kmalloc-64 of size 64
[   19.745685] The buggy address is located 0 bytes to the right of
[   19.745685]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.746074] 
[   19.746101] The buggy address belongs to the physical page:
[   19.746136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.746194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.746249] page_type: f5(slab)
[   19.746446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.746618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.746665] page dumped because: kasan: bad access detected
[   19.746745] 
[   19.746877] Memory state around the buggy address:
[   19.746917]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.747562]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.747892] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.748120]                                      ^
[   19.748160]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.748413]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.749874] ==================================================================
[   19.817302] ==================================================================
[   19.817814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.818387] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.819179] 
[   19.819221] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.819306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.820620] Hardware name: linux,dummy-virt (DT)
[   19.821032] Call trace:
[   19.821136]  show_stack+0x20/0x38 (C)
[   19.821666]  dump_stack_lvl+0x8c/0xd0
[   19.822248]  print_report+0x118/0x608
[   19.822636]  kasan_report+0xdc/0x128
[   19.823016]  __asan_report_load8_noabort+0x20/0x30
[   19.823700]  kasan_atomics_helper+0x3e20/0x4858
[   19.824166]  kasan_atomics+0x198/0x2e0
[   19.824217]  kunit_try_run_case+0x170/0x3f0
[   19.824940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.825099]  kthread+0x328/0x630
[   19.825973]  ret_from_fork+0x10/0x20
[   19.826037] 
[   19.826228] Allocated by task 265:
[   19.826386]  kasan_save_stack+0x3c/0x68
[   19.826494]  kasan_save_track+0x20/0x40
[   19.826541]  kasan_save_alloc_info+0x40/0x58
[   19.827170]  __kasan_kmalloc+0xd4/0xd8
[   19.827509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.827557]  kasan_atomics+0xb8/0x2e0
[   19.828091]  kunit_try_run_case+0x170/0x3f0
[   19.828229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.828727]  kthread+0x328/0x630
[   19.829350]  ret_from_fork+0x10/0x20
[   19.829491] 
[   19.830230] The buggy address belongs to the object at fff00000c5a01980
[   19.830230]  which belongs to the cache kmalloc-64 of size 64
[   19.830500] The buggy address is located 0 bytes to the right of
[   19.830500]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.830573] 
[   19.830598] The buggy address belongs to the physical page:
[   19.831401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.831791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.832334] page_type: f5(slab)
[   19.832553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.833132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.833808] page dumped because: kasan: bad access detected
[   19.834260] 
[   19.834285] Memory state around the buggy address:
[   19.834482]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.835481]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.835778] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.835926]                                      ^
[   19.836130]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.836227]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.836360] ==================================================================
[   19.451179] ==================================================================
[   19.451230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   19.451281] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.451331] 
[   19.451570] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.451668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.451765] Hardware name: linux,dummy-virt (DT)
[   19.451802] Call trace:
[   19.451828]  show_stack+0x20/0x38 (C)
[   19.451880]  dump_stack_lvl+0x8c/0xd0
[   19.451931]  print_report+0x118/0x608
[   19.452219]  kasan_check_range+0x100/0x1a8
[   19.453422]  kasan_atomics+0x198/0x2e0
[   19.453600]  kthread+0x328/0x630
[   19.453851]  kasan_save_alloc_info+0x40/0x58
[   19.453893]  __kasan_kmalloc+0xd4/0xd8
[   19.453936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.453978]  kasan_atomics+0xb8/0x2e0
[   19.454496]  ret_from_fork+0x10/0x20
[   19.454535] 
[   19.454557] The buggy address belongs to the object at fff00000c5a01980
[   19.454557]  which belongs to the cache kmalloc-64 of size 64
[   19.454900] 
[   19.454958] The buggy address belongs to the physical page:
[   19.455046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.455134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.455250] page_type: f5(slab)
[   19.455358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.455423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.455465] page dumped because: kasan: bad access detected
[   19.455499] 
[   19.455666] Memory state around the buggy address:
[   19.455759]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.455808]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.455860] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.457556]                                      ^
[   19.457620]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.457667]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.458238] ==================================================================
[   19.729479] ==================================================================
[   19.729541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.729820] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.729936] 
[   19.729967] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.730050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.730126] Hardware name: linux,dummy-virt (DT)
[   19.730162] Call trace:
[   19.730187]  show_stack+0x20/0x38 (C)
[   19.730240]  dump_stack_lvl+0x8c/0xd0
[   19.730290]  print_report+0x118/0x608
[   19.730350]  kasan_report+0xdc/0x128
[   19.730898]  kasan_check_range+0x100/0x1a8
[   19.731280]  __kasan_check_write+0x20/0x30
[   19.731349]  kasan_atomics_helper+0x154c/0x4858
[   19.731403]  kasan_atomics+0x198/0x2e0
[   19.731457]  kunit_try_run_case+0x170/0x3f0
[   19.731591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.731822]  kthread+0x328/0x630
[   19.731932]  ret_from_fork+0x10/0x20
[   19.732057] 
[   19.732117] Allocated by task 265:
[   19.732432]  kasan_save_stack+0x3c/0x68
[   19.732497]  kasan_save_track+0x20/0x40
[   19.732536]  kasan_save_alloc_info+0x40/0x58
[   19.732599]  __kasan_kmalloc+0xd4/0xd8
[   19.732735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.732778]  kasan_atomics+0xb8/0x2e0
[   19.732901]  kunit_try_run_case+0x170/0x3f0
[   19.732942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.733020]  kthread+0x328/0x630
[   19.733057]  ret_from_fork+0x10/0x20
[   19.733095] 
[   19.733117] The buggy address belongs to the object at fff00000c5a01980
[   19.733117]  which belongs to the cache kmalloc-64 of size 64
[   19.733178] The buggy address is located 0 bytes to the right of
[   19.733178]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.733295] 
[   19.733320] The buggy address belongs to the physical page:
[   19.733364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.733419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.733468] page_type: f5(slab)
[   19.733508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.733561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.733717] page dumped because: kasan: bad access detected
[   19.733835] 
[   19.733855] Memory state around the buggy address:
[   19.733892]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.734091]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.734144] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.734185]                                      ^
[   19.734802]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.735079]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.735181] ==================================================================
[   19.653233] ==================================================================
[   19.653279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.653330] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.653394] 
[   19.653424] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.653506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.653533] Hardware name: linux,dummy-virt (DT)
[   19.653566] Call trace:
[   19.653589]  show_stack+0x20/0x38 (C)
[   19.653683]  dump_stack_lvl+0x8c/0xd0
[   19.653893]  print_report+0x118/0x608
[   19.654243]  kasan_report+0xdc/0x128
[   19.654813]  kasan_check_range+0x100/0x1a8
[   19.655062]  __kasan_check_write+0x20/0x30
[   19.655303]  kasan_atomics_helper+0x10c0/0x4858
[   19.655369]  kasan_atomics+0x198/0x2e0
[   19.655463]  kunit_try_run_case+0x170/0x3f0
[   19.655566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655709]  kthread+0x328/0x630
[   19.655754]  ret_from_fork+0x10/0x20
[   19.655802] 
[   19.655823] Allocated by task 265:
[   19.655853]  kasan_save_stack+0x3c/0x68
[   19.656053]  kasan_save_track+0x20/0x40
[   19.656129]  kasan_save_alloc_info+0x40/0x58
[   19.656172]  __kasan_kmalloc+0xd4/0xd8
[   19.656230]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.656271]  kasan_atomics+0xb8/0x2e0
[   19.656312]  kunit_try_run_case+0x170/0x3f0
[   19.656570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.656639]  kthread+0x328/0x630
[   19.656675]  ret_from_fork+0x10/0x20
[   19.656714] 
[   19.656787] The buggy address belongs to the object at fff00000c5a01980
[   19.656787]  which belongs to the cache kmalloc-64 of size 64
[   19.656898] The buggy address is located 0 bytes to the right of
[   19.656898]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.657103] 
[   19.657160] The buggy address belongs to the physical page:
[   19.657248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.657766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.657834] page_type: f5(slab)
[   19.657896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.658239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.658287] page dumped because: kasan: bad access detected
[   19.658516] 
[   19.658590] Memory state around the buggy address:
[   19.658626]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.658831]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.658892] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.659060]                                      ^
[   19.659105]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.659202]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.659318] ==================================================================
[   19.628043] ==================================================================
[   19.628095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.628157] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.628209] 
[   19.628260] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.628559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.628613] Hardware name: linux,dummy-virt (DT)
[   19.628750] Call trace:
[   19.628822]  show_stack+0x20/0x38 (C)
[   19.628872]  dump_stack_lvl+0x8c/0xd0
[   19.628928]  print_report+0x118/0x608
[   19.628985]  kasan_report+0xdc/0x128
[   19.629042]  kasan_check_range+0x100/0x1a8
[   19.629093]  __kasan_check_write+0x20/0x30
[   19.629228]  kasan_atomics_helper+0xeb8/0x4858
[   19.629280]  kasan_atomics+0x198/0x2e0
[   19.629333]  kunit_try_run_case+0x170/0x3f0
[   19.629599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.629797]  kthread+0x328/0x630
[   19.629840]  ret_from_fork+0x10/0x20
[   19.629958] 
[   19.629980] Allocated by task 265:
[   19.630009]  kasan_save_stack+0x3c/0x68
[   19.630053]  kasan_save_track+0x20/0x40
[   19.630094]  kasan_save_alloc_info+0x40/0x58
[   19.630147]  __kasan_kmalloc+0xd4/0xd8
[   19.630198]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.630241]  kasan_atomics+0xb8/0x2e0
[   19.630279]  kunit_try_run_case+0x170/0x3f0
[   19.630322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.630377]  kthread+0x328/0x630
[   19.630415]  ret_from_fork+0x10/0x20
[   19.630463] 
[   19.630485] The buggy address belongs to the object at fff00000c5a01980
[   19.630485]  which belongs to the cache kmalloc-64 of size 64
[   19.630544] The buggy address is located 0 bytes to the right of
[   19.630544]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.630618] 
[   19.630651] The buggy address belongs to the physical page:
[   19.630779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.630834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.630884] page_type: f5(slab)
[   19.630927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.630981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.631034] page dumped because: kasan: bad access detected
[   19.631187] 
[   19.631209] Memory state around the buggy address:
[   19.631249]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.631294]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.631371] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.631414]                                      ^
[   19.631450]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.631503]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.631542] ==================================================================
[   19.706971] ==================================================================
[   19.707026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.707079] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.707130] 
[   19.707163] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.707246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.707274] Hardware name: linux,dummy-virt (DT)
[   19.707306] Call trace:
[   19.707329]  show_stack+0x20/0x38 (C)
[   19.707392]  dump_stack_lvl+0x8c/0xd0
[   19.707445]  print_report+0x118/0x608
[   19.707506]  kasan_report+0xdc/0x128
[   19.707555]  kasan_check_range+0x100/0x1a8
[   19.707678]  __kasan_check_write+0x20/0x30
[   19.707933]  kasan_atomics_helper+0x1414/0x4858
[   19.708602]  kasan_atomics+0x198/0x2e0
[   19.708738]  kunit_try_run_case+0x170/0x3f0
[   19.710298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.710568]  kthread+0x328/0x630
[   19.710966]  ret_from_fork+0x10/0x20
[   19.711023] 
[   19.711043] Allocated by task 265:
[   19.711074]  kasan_save_stack+0x3c/0x68
[   19.711120]  kasan_save_track+0x20/0x40
[   19.711653]  kasan_save_alloc_info+0x40/0x58
[   19.712112]  __kasan_kmalloc+0xd4/0xd8
[   19.712178]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.712221]  kasan_atomics+0xb8/0x2e0
[   19.712259]  kunit_try_run_case+0x170/0x3f0
[   19.712300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.712722]  kthread+0x328/0x630
[   19.712776]  ret_from_fork+0x10/0x20
[   19.712818] 
[   19.712842] The buggy address belongs to the object at fff00000c5a01980
[   19.712842]  which belongs to the cache kmalloc-64 of size 64
[   19.712960] The buggy address is located 0 bytes to the right of
[   19.712960]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.713257] 
[   19.713279] The buggy address belongs to the physical page:
[   19.713313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.713638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.714139] page_type: f5(slab)
[   19.714245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.714309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.714364] page dumped because: kasan: bad access detected
[   19.714399] 
[   19.714526] Memory state around the buggy address:
[   19.714570]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.714617]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.714677] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.714880]                                      ^
[   19.714923]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.715039]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.715078] ==================================================================
[   19.795930] ==================================================================
[   19.796176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.796725] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.796815] 
[   19.797459] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.798442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.798484] Hardware name: linux,dummy-virt (DT)
[   19.798655] Call trace:
[   19.799030]  show_stack+0x20/0x38 (C)
[   19.799182]  dump_stack_lvl+0x8c/0xd0
[   19.799881]  print_report+0x118/0x608
[   19.799982]  kasan_report+0xdc/0x128
[   19.800032]  kasan_check_range+0x100/0x1a8
[   19.800082]  __kasan_check_write+0x20/0x30
[   19.800431]  kasan_atomics_helper+0x16d0/0x4858
[   19.801223]  kasan_atomics+0x198/0x2e0
[   19.801745]  kunit_try_run_case+0x170/0x3f0
[   19.802208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.802691]  kthread+0x328/0x630
[   19.803084]  ret_from_fork+0x10/0x20
[   19.803283] 
[   19.803323] Allocated by task 265:
[   19.803442]  kasan_save_stack+0x3c/0x68
[   19.803876]  kasan_save_track+0x20/0x40
[   19.804460]  kasan_save_alloc_info+0x40/0x58
[   19.805101]  __kasan_kmalloc+0xd4/0xd8
[   19.805565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.805633]  kasan_atomics+0xb8/0x2e0
[   19.805674]  kunit_try_run_case+0x170/0x3f0
[   19.805715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.805764]  kthread+0x328/0x630
[   19.806506]  ret_from_fork+0x10/0x20
[   19.806637] 
[   19.806661] The buggy address belongs to the object at fff00000c5a01980
[   19.806661]  which belongs to the cache kmalloc-64 of size 64
[   19.806723] The buggy address is located 0 bytes to the right of
[   19.806723]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.806790] 
[   19.806813] The buggy address belongs to the physical page:
[   19.808491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.808553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.808615] page_type: f5(slab)
[   19.808657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.808709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.808752] page dumped because: kasan: bad access detected
[   19.808787] 
[   19.808807] Memory state around the buggy address:
[   19.808843]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.808890]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.808937] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.808977]                                      ^
[   19.809013]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.809059]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.809099] ==================================================================
[   19.601960] ==================================================================
[   19.602405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.602544] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.602619] 
[   19.602655] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.602739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.603096] Hardware name: linux,dummy-virt (DT)
[   19.603136] Call trace:
[   19.603200]  show_stack+0x20/0x38 (C)
[   19.603405]  dump_stack_lvl+0x8c/0xd0
[   19.603462]  print_report+0x118/0x608
[   19.603569]  kasan_report+0xdc/0x128
[   19.603621]  kasan_check_range+0x100/0x1a8
[   19.603672]  __kasan_check_read+0x20/0x30
[   19.603722]  kasan_atomics_helper+0xdd4/0x4858
[   19.603772]  kasan_atomics+0x198/0x2e0
[   19.603855]  kunit_try_run_case+0x170/0x3f0
[   19.603914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.604109]  kthread+0x328/0x630
[   19.604156]  ret_from_fork+0x10/0x20
[   19.604264] 
[   19.604314] Allocated by task 265:
[   19.604392]  kasan_save_stack+0x3c/0x68
[   19.604438]  kasan_save_track+0x20/0x40
[   19.604479]  kasan_save_alloc_info+0x40/0x58
[   19.605680]  __kasan_kmalloc+0xd4/0xd8
[   19.605736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.606044]  kasan_atomics+0xb8/0x2e0
[   19.606092]  kunit_try_run_case+0x170/0x3f0
[   19.606138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.606636]  kthread+0x328/0x630
[   19.606780]  ret_from_fork+0x10/0x20
[   19.606822] 
[   19.606845] The buggy address belongs to the object at fff00000c5a01980
[   19.606845]  which belongs to the cache kmalloc-64 of size 64
[   19.606908] The buggy address is located 0 bytes to the right of
[   19.606908]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.606976] 
[   19.607000] The buggy address belongs to the physical page:
[   19.607035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.607088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.607803] page_type: f5(slab)
[   19.608075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.608226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.608276] page dumped because: kasan: bad access detected
[   19.608409] 
[   19.608436] Memory state around the buggy address:
[   19.608473]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.608604]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.608699] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.608810]                                      ^
[   19.608846]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.608891]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.608932] ==================================================================
[   19.446714] ==================================================================
[   19.446766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   19.446819] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.446870] 
[   19.446903] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.446987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.447014] Hardware name: linux,dummy-virt (DT)
[   19.447047] Call trace:
[   19.447071]  show_stack+0x20/0x38 (C)
[   19.447121]  dump_stack_lvl+0x8c/0xd0
[   19.447219]  print_report+0x118/0x608
[   19.447272]  kasan_report+0xdc/0x128
[   19.447320]  kasan_check_range+0x100/0x1a8
[   19.447382]  __kasan_check_write+0x20/0x30
[   19.447435]  kasan_atomics_helper+0x5b4/0x4858
[   19.447484]  kasan_atomics+0x198/0x2e0
[   19.447532]  kunit_try_run_case+0x170/0x3f0
[   19.447582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.447752] 
[   19.447852] Allocated by task 265:
[   19.448012]  kasan_save_stack+0x3c/0x68
[   19.448057]  kasan_save_track+0x20/0x40
[   19.448104]  kasan_save_alloc_info+0x40/0x58
[   19.448288]  __kasan_kmalloc+0xd4/0xd8
[   19.448334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.448392]  kasan_atomics+0xb8/0x2e0
[   19.448431]  kunit_try_run_case+0x170/0x3f0
[   19.448611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.448721]  kthread+0x328/0x630
[   19.448802]  ret_from_fork+0x10/0x20
[   19.448873] 
[   19.448960] The buggy address is located 0 bytes to the right of
[   19.448960]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.449149] 
[   19.449197] The buggy address belongs to the physical page:
[   19.449295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.449356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.449405] page_type: f5(slab)
[   19.449445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.449497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.449539] page dumped because: kasan: bad access detected
[   19.449572] 
[   19.449592] Memory state around the buggy address:
[   19.449625]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.449670]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.449713] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.449753]                                      ^
[   19.449785]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450418]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450469] ==================================================================
[   19.503615] ==================================================================
[   19.503694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.503750] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.503802] 
[   19.504019] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.504130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.504161] Hardware name: linux,dummy-virt (DT)
[   19.504195] Call trace:
[   19.504218]  show_stack+0x20/0x38 (C)
[   19.504503]  dump_stack_lvl+0x8c/0xd0
[   19.504662]  print_report+0x118/0x608
[   19.504711]  kasan_report+0xdc/0x128
[   19.504760]  kasan_check_range+0x100/0x1a8
[   19.504922]  __kasan_check_write+0x20/0x30
[   19.505565]  kthread+0x328/0x630
[   19.505770]  kasan_save_track+0x20/0x40
[   19.506883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.509307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.512609]  ret_from_fork+0x10/0x20
[   19.512720] 
[   19.512780] Allocated by task 265:
[   19.512816]  kasan_save_stack+0x3c/0x68
[   19.512893]  kasan_save_track+0x20/0x40
[   19.512936]  kasan_save_alloc_info+0x40/0x58
[   19.512978]  __kasan_kmalloc+0xd4/0xd8
[   19.513056]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.513170]  kasan_atomics+0xb8/0x2e0
[   19.513264]  kunit_try_run_case+0x170/0x3f0
[   19.513305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.513361]  kthread+0x328/0x630
[   19.513435]  ret_from_fork+0x10/0x20
[   19.513569] 
[   19.513590] The buggy address belongs to the object at fff00000c5a01980
[   19.513590]  which belongs to the cache kmalloc-64 of size 64
[   19.514669] The buggy address is located 0 bytes to the right of
[   19.514669]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.514748] 
[   19.514782] The buggy address belongs to the physical page:
[   19.514818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.514874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.514924] page_type: f5(slab)
[   19.514965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.515016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.515059] page dumped because: kasan: bad access detected
[   19.515148]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516401]  show_stack+0x20/0x38 (C)
[   19.517130]  kasan_save_track+0x20/0x40
[   19.517170]  kasan_save_alloc_info+0x40/0x58
[   19.517213]  __kasan_kmalloc+0xd4/0xd8
[   19.517254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.517297]  kasan_atomics+0xb8/0x2e0
[   19.517334]  kunit_try_run_case+0x170/0x3f0
[   19.517869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.517995]  kthread+0x328/0x630
[   19.518225]  ret_from_fork+0x10/0x20
[   19.518335] 
[   19.518410] The buggy address belongs to the object at fff00000c5a01980
[   19.518410]  which belongs to the cache kmalloc-64 of size 64
[   19.518622] The buggy address is located 0 bytes to the right of
[   19.518622]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.519023] page dumped because: kasan: bad access detected
[   19.519794] ==================================================================
[   19.564220] ==================================================================
[   19.564297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.564378] Read of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.564431] 
[   19.564470] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.564576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.564627] Hardware name: linux,dummy-virt (DT)
[   19.564662] Call trace:
[   19.565309]  show_stack+0x20/0x38 (C)
[   19.565438]  dump_stack_lvl+0x8c/0xd0
[   19.565533]  print_report+0x118/0x608
[   19.565599]  kasan_report+0xdc/0x128
[   19.565676]  __asan_report_load4_noabort+0x20/0x30
[   19.565758]  kasan_atomics_helper+0x3dd8/0x4858
[   19.565812]  kasan_atomics+0x198/0x2e0
[   19.565883]  kunit_try_run_case+0x170/0x3f0
[   19.565991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.566059]  kthread+0x328/0x630
[   19.566103]  ret_from_fork+0x10/0x20
[   19.566384] 
[   19.566408] Allocated by task 265:
[   19.566496]  kasan_save_stack+0x3c/0x68
[   19.566592]  kasan_save_track+0x20/0x40
[   19.566702]  kasan_save_alloc_info+0x40/0x58
[   19.566863]  __kasan_kmalloc+0xd4/0xd8
[   19.566939]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.567199]  kasan_atomics+0xb8/0x2e0
[   19.567294]  kunit_try_run_case+0x170/0x3f0
[   19.567428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.567502]  kthread+0x328/0x630
[   19.567538]  ret_from_fork+0x10/0x20
[   19.567577] 
[   19.569057] The buggy address belongs to the object at fff00000c5a01980
[   19.569057]  which belongs to the cache kmalloc-64 of size 64
[   19.569131] The buggy address is located 0 bytes to the right of
[   19.569131]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.569197] 
[   19.569221] The buggy address belongs to the physical page:
[   19.569268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.570185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.570277] page_type: f5(slab)
[   19.570350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.570422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.570678] page dumped because: kasan: bad access detected
[   19.570759] 
[   19.570848] Memory state around the buggy address:
[   19.570889]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.571491]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.571553] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.571616]                                      ^
[   19.571738]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.571803]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.571845] ==================================================================
[   19.716214] ==================================================================
[   19.716410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.716486] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.716594] 
[   19.716626] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.716708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.716743] Hardware name: linux,dummy-virt (DT)
[   19.716873] Call trace:
[   19.716898]  show_stack+0x20/0x38 (C)
[   19.717090]  dump_stack_lvl+0x8c/0xd0
[   19.717141]  print_report+0x118/0x608
[   19.717190]  kasan_report+0xdc/0x128
[   19.717240]  kasan_check_range+0x100/0x1a8
[   19.717290]  __kasan_check_write+0x20/0x30
[   19.717347]  kasan_atomics_helper+0x147c/0x4858
[   19.717398]  kasan_atomics+0x198/0x2e0
[   19.717445]  kunit_try_run_case+0x170/0x3f0
[   19.717495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.717550]  kthread+0x328/0x630
[   19.717769]  ret_from_fork+0x10/0x20
[   19.717841] 
[   19.717861] Allocated by task 265:
[   19.717889]  kasan_save_stack+0x3c/0x68
[   19.717942]  kasan_save_track+0x20/0x40
[   19.717981]  kasan_save_alloc_info+0x40/0x58
[   19.718766]  __kasan_kmalloc+0xd4/0xd8
[   19.719205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.719481]  kasan_atomics+0xb8/0x2e0
[   19.719529]  kunit_try_run_case+0x170/0x3f0
[   19.719571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.719617]  kthread+0x328/0x630
[   19.719653]  ret_from_fork+0x10/0x20
[   19.719692] 
[   19.720154] The buggy address belongs to the object at fff00000c5a01980
[   19.720154]  which belongs to the cache kmalloc-64 of size 64
[   19.720327] The buggy address is located 0 bytes to the right of
[   19.720327]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.720443] 
[   19.720549] The buggy address belongs to the physical page:
[   19.720617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.720715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.720895] page_type: f5(slab)
[   19.720954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.721008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.721074] page dumped because: kasan: bad access detected
[   19.721116] 
[   19.721143] Memory state around the buggy address:
[   19.721183]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.721229]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.721275] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.721351]                                      ^
[   19.721386]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721430]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721468] ==================================================================
[   19.631860] ==================================================================
[   19.631983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.632118] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.632168] 
[   19.632215] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.632403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.632440] Hardware name: linux,dummy-virt (DT)
[   19.632471] Call trace:
[   19.632495]  show_stack+0x20/0x38 (C)
[   19.632546]  dump_stack_lvl+0x8c/0xd0
[   19.632602]  print_report+0x118/0x608
[   19.632838]  kasan_report+0xdc/0x128
[   19.632888]  kasan_check_range+0x100/0x1a8
[   19.633033]  __kasan_check_write+0x20/0x30
[   19.633176]  kasan_atomics_helper+0xf20/0x4858
[   19.633228]  kasan_atomics+0x198/0x2e0
[   19.633275]  kunit_try_run_case+0x170/0x3f0
[   19.633326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.633390]  kthread+0x328/0x630
[   19.633435]  ret_from_fork+0x10/0x20
[   19.633482] 
[   19.633502] Allocated by task 265:
[   19.633548]  kasan_save_stack+0x3c/0x68
[   19.633591]  kasan_save_track+0x20/0x40
[   19.633644]  kasan_save_alloc_info+0x40/0x58
[   19.633686]  __kasan_kmalloc+0xd4/0xd8
[   19.633751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.633995]  kasan_atomics+0xb8/0x2e0
[   19.634067]  kunit_try_run_case+0x170/0x3f0
[   19.634137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.634185]  kthread+0x328/0x630
[   19.634236]  ret_from_fork+0x10/0x20
[   19.634275] 
[   19.634296] The buggy address belongs to the object at fff00000c5a01980
[   19.634296]  which belongs to the cache kmalloc-64 of size 64
[   19.634365] The buggy address is located 0 bytes to the right of
[   19.634365]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.634439] 
[   19.634462] The buggy address belongs to the physical page:
[   19.634506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.634559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.634608] page_type: f5(slab)
[   19.634685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.634804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.634854] page dumped because: kasan: bad access detected
[   19.634896] 
[   19.634916] Memory state around the buggy address:
[   19.634949]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.635006]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.635050] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.635110]                                      ^
[   19.635256]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635358]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635400] ==================================================================
[   19.610465] ==================================================================
[   19.610527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.612288] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.612592] 
[   19.612778] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.612921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.612951] Hardware name: linux,dummy-virt (DT)
[   19.612984] Call trace:
[   19.613007]  show_stack+0x20/0x38 (C)
[   19.613742]  dump_stack_lvl+0x8c/0xd0
[   19.613806]  print_report+0x118/0x608
[   19.614443]  kasan_report+0xdc/0x128
[   19.615054]  __asan_report_load8_noabort+0x20/0x30
[   19.615115]  kasan_atomics_helper+0x3f58/0x4858
[   19.615190]  kasan_atomics+0x198/0x2e0
[   19.615363]  kunit_try_run_case+0x170/0x3f0
[   19.615603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.615784]  kthread+0x328/0x630
[   19.615989]  ret_from_fork+0x10/0x20
[   19.616078] 
[   19.616110] Allocated by task 265:
[   19.616185]  kasan_save_stack+0x3c/0x68
[   19.616269]  kasan_save_track+0x20/0x40
[   19.616348]  kasan_save_alloc_info+0x40/0x58
[   19.616394]  __kasan_kmalloc+0xd4/0xd8
[   19.616434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.616477]  kasan_atomics+0xb8/0x2e0
[   19.616537]  kunit_try_run_case+0x170/0x3f0
[   19.616683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.616731]  kthread+0x328/0x630
[   19.616884]  ret_from_fork+0x10/0x20
[   19.616955] 
[   19.617050] The buggy address belongs to the object at fff00000c5a01980
[   19.617050]  which belongs to the cache kmalloc-64 of size 64
[   19.617109] The buggy address is located 0 bytes to the right of
[   19.617109]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.617183] 
[   19.617209] The buggy address belongs to the physical page:
[   19.617242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.617304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.617689] page_type: f5(slab)
[   19.617967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.618026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.618475] page dumped because: kasan: bad access detected
[   19.618753] 
[   19.618776] Memory state around the buggy address:
[   19.618811]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.618900]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.619054] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.619097]                                      ^
[   19.619133]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619178]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619247] ==================================================================
[   19.693533] ==================================================================
[   19.693590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.693885] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.694065] 
[   19.694100] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.694185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.694238] Hardware name: linux,dummy-virt (DT)
[   19.694272] Call trace:
[   19.694295]  show_stack+0x20/0x38 (C)
[   19.694376]  dump_stack_lvl+0x8c/0xd0
[   19.694645]  print_report+0x118/0x608
[   19.694755]  kasan_report+0xdc/0x128
[   19.694859]  kasan_check_range+0x100/0x1a8
[   19.695000]  __kasan_check_write+0x20/0x30
[   19.695096]  kasan_atomics_helper+0x1384/0x4858
[   19.695168]  kasan_atomics+0x198/0x2e0
[   19.695450]  kunit_try_run_case+0x170/0x3f0
[   19.695502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.695558]  kthread+0x328/0x630
[   19.695605]  ret_from_fork+0x10/0x20
[   19.695659] 
[   19.695771] Allocated by task 265:
[   19.695926]  kasan_save_stack+0x3c/0x68
[   19.696113]  kasan_save_track+0x20/0x40
[   19.696155]  kasan_save_alloc_info+0x40/0x58
[   19.696216]  __kasan_kmalloc+0xd4/0xd8
[   19.696982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.697357]  kasan_atomics+0xb8/0x2e0
[   19.697401]  kunit_try_run_case+0x170/0x3f0
[   19.697443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.697688]  kthread+0x328/0x630
[   19.697782]  ret_from_fork+0x10/0x20
[   19.697840] 
[   19.697862] The buggy address belongs to the object at fff00000c5a01980
[   19.697862]  which belongs to the cache kmalloc-64 of size 64
[   19.698033] The buggy address is located 0 bytes to the right of
[   19.698033]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.698110] 
[   19.698164] The buggy address belongs to the physical page:
[   19.698206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.698261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.698311] page_type: f5(slab)
[   19.698360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.698414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.698457] page dumped because: kasan: bad access detected
[   19.698491] 
[   19.698511] Memory state around the buggy address:
[   19.698901]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.699051]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.699098] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.699140]                                      ^
[   19.699543]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.699593]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.699632] ==================================================================
[   19.641063] ==================================================================
[   19.641112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.641177] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.641239] 
[   19.641269] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.641363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.641392] Hardware name: linux,dummy-virt (DT)
[   19.641423] Call trace:
[   19.641446]  show_stack+0x20/0x38 (C)
[   19.641589]  dump_stack_lvl+0x8c/0xd0
[   19.641695]  print_report+0x118/0x608
[   19.641745]  kasan_report+0xdc/0x128
[   19.641798]  kasan_check_range+0x100/0x1a8
[   19.642028]  __kasan_check_write+0x20/0x30
[   19.642290]  kasan_atomics_helper+0xff0/0x4858
[   19.642352]  kasan_atomics+0x198/0x2e0
[   19.642401]  kunit_try_run_case+0x170/0x3f0
[   19.642453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.642507]  kthread+0x328/0x630
[   19.642552]  ret_from_fork+0x10/0x20
[   19.642601] 
[   19.642621] Allocated by task 265:
[   19.642997]  kasan_save_stack+0x3c/0x68
[   19.643082]  kasan_save_track+0x20/0x40
[   19.643210]  kasan_save_alloc_info+0x40/0x58
[   19.643252]  __kasan_kmalloc+0xd4/0xd8
[   19.643294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.643392]  kasan_atomics+0xb8/0x2e0
[   19.643581]  kunit_try_run_case+0x170/0x3f0
[   19.643654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.643741]  kthread+0x328/0x630
[   19.643884]  ret_from_fork+0x10/0x20
[   19.643923] 
[   19.643990] The buggy address belongs to the object at fff00000c5a01980
[   19.643990]  which belongs to the cache kmalloc-64 of size 64
[   19.644175] The buggy address is located 0 bytes to the right of
[   19.644175]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.644257] 
[   19.644279] The buggy address belongs to the physical page:
[   19.644313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.644402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.644557] page_type: f5(slab)
[   19.644603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.644827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.644903] page dumped because: kasan: bad access detected
[   19.644949] 
[   19.644971] Memory state around the buggy address:
[   19.645005]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645112]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645212] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.645332]                                      ^
[   19.645375]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.645419]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.645460] ==================================================================
[   19.809605] ==================================================================
[   19.809658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.809722] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.809774] 
[   19.809808] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.809891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.809927] Hardware name: linux,dummy-virt (DT)
[   19.809958] Call trace:
[   19.809982]  show_stack+0x20/0x38 (C)
[   19.810033]  dump_stack_lvl+0x8c/0xd0
[   19.810084]  print_report+0x118/0x608
[   19.810133]  kasan_report+0xdc/0x128
[   19.810182]  __asan_report_load8_noabort+0x20/0x30
[   19.810235]  kasan_atomics_helper+0x3e10/0x4858
[   19.810286]  kasan_atomics+0x198/0x2e0
[   19.810335]  kunit_try_run_case+0x170/0x3f0
[   19.810501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810559]  kthread+0x328/0x630
[   19.810604]  ret_from_fork+0x10/0x20
[   19.810653] 
[   19.810673] Allocated by task 265:
[   19.810703]  kasan_save_stack+0x3c/0x68
[   19.810745]  kasan_save_track+0x20/0x40
[   19.810786]  kasan_save_alloc_info+0x40/0x58
[   19.810827]  __kasan_kmalloc+0xd4/0xd8
[   19.810866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.811035]  kasan_atomics+0xb8/0x2e0
[   19.811093]  kunit_try_run_case+0x170/0x3f0
[   19.811298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.811374]  kthread+0x328/0x630
[   19.811418]  ret_from_fork+0x10/0x20
[   19.811456] 
[   19.811480] The buggy address belongs to the object at fff00000c5a01980
[   19.811480]  which belongs to the cache kmalloc-64 of size 64
[   19.811539] The buggy address is located 0 bytes to the right of
[   19.811539]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.811607] 
[   19.811629] The buggy address belongs to the physical page:
[   19.811663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.812407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.813365] page_type: f5(slab)
[   19.813412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.813465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.813510] page dumped because: kasan: bad access detected
[   19.813545] 
[   19.813565] Memory state around the buggy address:
[   19.813602]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.813648]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.813694] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.813736]                                      ^
[   19.813772]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.813818]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.813857] ==================================================================
[   19.459573] ==================================================================
[   19.459625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   19.459679] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.459732] 
[   19.459764] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.460153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.460184] Hardware name: linux,dummy-virt (DT)
[   19.460217] Call trace:
[   19.460242]  show_stack+0x20/0x38 (C)
[   19.460292]  dump_stack_lvl+0x8c/0xd0
[   19.460474]  print_report+0x118/0x608
[   19.460526]  kasan_report+0xdc/0x128
[   19.460597]  kasan_check_range+0x100/0x1a8
[   19.460650]  __kasan_check_write+0x20/0x30
[   19.460707]  kasan_atomics_helper+0x684/0x4858
[   19.464913]  __kasan_check_write+0x20/0x30
[   19.464982]  kasan_atomics_helper+0x6ec/0x4858
[   19.472713] 
[   19.472763] The buggy address belongs to the physical page:
[   19.472940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.473151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.473192] page dumped because: kasan: bad access detected
[   19.474022] 
[   19.474109] Memory state around the buggy address:
[   19.474217]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.474270]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.474329] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.474541]                                      ^
[   19.474720]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474829]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474913] ==================================================================
[   19.583766] ==================================================================
[   19.585950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.586022] Read of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.587628] 
[   19.587666] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.588217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.588306] Hardware name: linux,dummy-virt (DT)
[   19.588810] Call trace:
[   19.590133]  show_stack+0x20/0x38 (C)
[   19.590194]  dump_stack_lvl+0x8c/0xd0
[   19.590353]  print_report+0x118/0x608
[   19.590461]  kasan_report+0xdc/0x128
[   19.590538]  __asan_report_load4_noabort+0x20/0x30
[   19.591051]  kasan_atomics_helper+0x3e04/0x4858
[   19.591306]  kasan_atomics+0x198/0x2e0
[   19.591370]  kunit_try_run_case+0x170/0x3f0
[   19.591457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.591514]  kthread+0x328/0x630
[   19.591560]  ret_from_fork+0x10/0x20
[   19.591613] 
[   19.591633] Allocated by task 265:
[   19.591664]  kasan_save_stack+0x3c/0x68
[   19.591709]  kasan_save_track+0x20/0x40
[   19.592439]  kasan_save_alloc_info+0x40/0x58
[   19.592544]  __kasan_kmalloc+0xd4/0xd8
[   19.592913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.593018]  kasan_atomics+0xb8/0x2e0
[   19.593676]  kunit_try_run_case+0x170/0x3f0
[   19.593854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594118]  kthread+0x328/0x630
[   19.595388]  ret_from_fork+0x10/0x20
[   19.595441] 
[   19.595787] The buggy address belongs to the object at fff00000c5a01980
[   19.595787]  which belongs to the cache kmalloc-64 of size 64
[   19.596060] The buggy address is located 0 bytes to the right of
[   19.596060]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.596134] 
[   19.596195] The buggy address belongs to the physical page:
[   19.596293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.596456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.596615] page_type: f5(slab)
[   19.596657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.596712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.596754] page dumped because: kasan: bad access detected
[   19.596788] 
[   19.596849] Memory state around the buggy address:
[   19.596960]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.597007]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.597071] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.597113]                                      ^
[   19.597211]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.597293]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.598100] ==================================================================
[   19.574053] ==================================================================
[   19.574182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.574245] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.574314] 
[   19.574624] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.574960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.575070] Hardware name: linux,dummy-virt (DT)
[   19.575173] Call trace:
[   19.575296]  show_stack+0x20/0x38 (C)
[   19.575511]  dump_stack_lvl+0x8c/0xd0
[   19.575676]  print_report+0x118/0x608
[   19.575731]  kasan_report+0xdc/0x128
[   19.576012]  kasan_check_range+0x100/0x1a8
[   19.576216]  __kasan_check_write+0x20/0x30
[   19.576286]  kasan_atomics_helper+0xd3c/0x4858
[   19.576478]  kasan_atomics+0x198/0x2e0
[   19.576614]  kunit_try_run_case+0x170/0x3f0
[   19.576784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.576889]  kthread+0x328/0x630
[   19.576962]  ret_from_fork+0x10/0x20
[   19.577066] 
[   19.577360] Allocated by task 265:
[   19.577400]  kasan_save_stack+0x3c/0x68
[   19.577450]  kasan_save_track+0x20/0x40
[   19.577491]  kasan_save_alloc_info+0x40/0x58
[   19.577535]  __kasan_kmalloc+0xd4/0xd8
[   19.577622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.577667]  kasan_atomics+0xb8/0x2e0
[   19.577726]  kunit_try_run_case+0x170/0x3f0
[   19.577780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577833]  kthread+0x328/0x630
[   19.577868]  ret_from_fork+0x10/0x20
[   19.578377] 
[   19.578439] The buggy address belongs to the object at fff00000c5a01980
[   19.578439]  which belongs to the cache kmalloc-64 of size 64
[   19.578504] The buggy address is located 0 bytes to the right of
[   19.578504]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.578572] 
[   19.578595] The buggy address belongs to the physical page:
[   19.578630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.579114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.580517] page_type: f5(slab)
[   19.580580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.580634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.580722] page dumped because: kasan: bad access detected
[   19.580756] 
[   19.580777] Memory state around the buggy address:
[   19.580825]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.580930]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.580985] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.581026]                                      ^
[   19.581517]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.581774]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.581939] ==================================================================
[   19.679672] ==================================================================
[   19.679728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.679792] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.679993] 
[   19.680029] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.680311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.680462] Hardware name: linux,dummy-virt (DT)
[   19.680630] Call trace:
[   19.680756]  show_stack+0x20/0x38 (C)
[   19.680942]  dump_stack_lvl+0x8c/0xd0
[   19.681061]  print_report+0x118/0x608
[   19.681298]  kasan_report+0xdc/0x128
[   19.681682]  kasan_check_range+0x100/0x1a8
[   19.681815]  __kasan_check_write+0x20/0x30
[   19.682253]  kasan_atomics_helper+0x126c/0x4858
[   19.682320]  kasan_atomics+0x198/0x2e0
[   19.682660]  kunit_try_run_case+0x170/0x3f0
[   19.682717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.682775]  kthread+0x328/0x630
[   19.683092]  ret_from_fork+0x10/0x20
[   19.683154] 
[   19.683175] Allocated by task 265:
[   19.683206]  kasan_save_stack+0x3c/0x68
[   19.683250]  kasan_save_track+0x20/0x40
[   19.683291]  kasan_save_alloc_info+0x40/0x58
[   19.683332]  __kasan_kmalloc+0xd4/0xd8
[   19.683384]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.683431]  kasan_atomics+0xb8/0x2e0
[   19.683468]  kunit_try_run_case+0x170/0x3f0
[   19.683510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.683568]  kthread+0x328/0x630
[   19.683602]  ret_from_fork+0x10/0x20
[   19.683641] 
[   19.683662] The buggy address belongs to the object at fff00000c5a01980
[   19.683662]  which belongs to the cache kmalloc-64 of size 64
[   19.683932] The buggy address is located 0 bytes to the right of
[   19.683932]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.684039] 
[   19.684062] The buggy address belongs to the physical page:
[   19.684096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.684150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.684355] page_type: f5(slab)
[   19.684500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.684638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.684700] page dumped because: kasan: bad access detected
[   19.684787] 
[   19.684840] Memory state around the buggy address:
[   19.684885]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.684931]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.684977] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.685979]                                      ^
[   19.686020]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686064]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686104] ==================================================================
[   19.619890] ==================================================================
[   19.619942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.619995] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.620047] 
[   19.620080] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.620405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.620439] Hardware name: linux,dummy-virt (DT)
[   19.620477] Call trace:
[   19.620515]  show_stack+0x20/0x38 (C)
[   19.620566]  dump_stack_lvl+0x8c/0xd0
[   19.620616]  print_report+0x118/0x608
[   19.620663]  kasan_report+0xdc/0x128
[   19.620712]  kasan_check_range+0x100/0x1a8
[   19.620761]  __kasan_check_write+0x20/0x30
[   19.620809]  kasan_atomics_helper+0xe44/0x4858
[   19.620858]  kasan_atomics+0x198/0x2e0
[   19.621960]  kunit_try_run_case+0x170/0x3f0
[   19.622015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.622071]  kthread+0x328/0x630
[   19.622115]  ret_from_fork+0x10/0x20
[   19.622177] 
[   19.622197] Allocated by task 265:
[   19.622237]  kasan_save_stack+0x3c/0x68
[   19.622282]  kasan_save_track+0x20/0x40
[   19.622321]  kasan_save_alloc_info+0x40/0x58
[   19.622372]  __kasan_kmalloc+0xd4/0xd8
[   19.622413]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.622455]  kasan_atomics+0xb8/0x2e0
[   19.622503]  kunit_try_run_case+0x170/0x3f0
[   19.622544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.622602]  kthread+0x328/0x630
[   19.622652]  ret_from_fork+0x10/0x20
[   19.622690] 
[   19.622714] The buggy address belongs to the object at fff00000c5a01980
[   19.622714]  which belongs to the cache kmalloc-64 of size 64
[   19.622796] The buggy address is located 0 bytes to the right of
[   19.622796]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.622862] 
[   19.622884] The buggy address belongs to the physical page:
[   19.622918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.622980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.623039] page_type: f5(slab)
[   19.623084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.623161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.623204] page dumped because: kasan: bad access detected
[   19.623238] 
[   19.623258] Memory state around the buggy address:
[   19.623290]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.623375]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.623430] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.623541]                                      ^
[   19.623580]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.623696]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.623736] ==================================================================
[   19.773820] ==================================================================
[   19.773877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.776036] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.776130] 
[   19.776171] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.776257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.776285] Hardware name: linux,dummy-virt (DT)
[   19.777304] Call trace:
[   19.777713]  show_stack+0x20/0x38 (C)
[   19.777779]  dump_stack_lvl+0x8c/0xd0
[   19.777833]  print_report+0x118/0x608
[   19.778913]  kasan_report+0xdc/0x128
[   19.779003]  __asan_report_load8_noabort+0x20/0x30
[   19.779427]  kasan_atomics_helper+0x3df4/0x4858
[   19.779861]  kasan_atomics+0x198/0x2e0
[   19.780115]  kunit_try_run_case+0x170/0x3f0
[   19.780298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.780494]  kthread+0x328/0x630
[   19.780706]  ret_from_fork+0x10/0x20
[   19.781278] 
[   19.781302] Allocated by task 265:
[   19.781333]  kasan_save_stack+0x3c/0x68
[   19.781392]  kasan_save_track+0x20/0x40
[   19.781432]  kasan_save_alloc_info+0x40/0x58
[   19.781475]  __kasan_kmalloc+0xd4/0xd8
[   19.781973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.782849]  kasan_atomics+0xb8/0x2e0
[   19.783024]  kunit_try_run_case+0x170/0x3f0
[   19.783265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.783319]  kthread+0x328/0x630
[   19.784005]  ret_from_fork+0x10/0x20
[   19.785155] 
[   19.785354] The buggy address belongs to the object at fff00000c5a01980
[   19.785354]  which belongs to the cache kmalloc-64 of size 64
[   19.785896] The buggy address is located 0 bytes to the right of
[   19.785896]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.786054] 
[   19.786079] The buggy address belongs to the physical page:
[   19.786516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.786763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.786835] page_type: f5(slab)
[   19.787253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.787543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.787591] page dumped because: kasan: bad access detected
[   19.787628] 
[   19.788625] Memory state around the buggy address:
[   19.789028]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.789488]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.789542] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.789584]                                      ^
[   19.790270]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.790724]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791258] ==================================================================
[   19.814331] ==================================================================
[   19.814396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.814450] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.814501] 
[   19.814535] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.814619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.814646] Hardware name: linux,dummy-virt (DT)
[   19.814679] Call trace:
[   19.814702]  show_stack+0x20/0x38 (C)
[   19.814751]  dump_stack_lvl+0x8c/0xd0
[   19.814801]  print_report+0x118/0x608
[   19.814851]  kasan_report+0xdc/0x128
[   19.814913]  kasan_check_range+0x100/0x1a8
[   19.814964]  __kasan_check_write+0x20/0x30
[   19.815012]  kasan_atomics_helper+0x175c/0x4858
[   19.815064]  kasan_atomics+0x198/0x2e0
[   19.815114]  kunit_try_run_case+0x170/0x3f0
[   19.815163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815218]  kthread+0x328/0x630
[   19.815263]  ret_from_fork+0x10/0x20
[   19.815311] 
[   19.815331] Allocated by task 265:
[   19.815415]  kasan_save_stack+0x3c/0x68
[   19.815458]  kasan_save_track+0x20/0x40
[   19.815499]  kasan_save_alloc_info+0x40/0x58
[   19.815540]  __kasan_kmalloc+0xd4/0xd8
[   19.815580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.815624]  kasan_atomics+0xb8/0x2e0
[   19.815661]  kunit_try_run_case+0x170/0x3f0
[   19.815702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815747]  kthread+0x328/0x630
[   19.815783]  ret_from_fork+0x10/0x20
[   19.815820] 
[   19.815841] The buggy address belongs to the object at fff00000c5a01980
[   19.815841]  which belongs to the cache kmalloc-64 of size 64
[   19.815900] The buggy address is located 0 bytes to the right of
[   19.815900]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.815965] 
[   19.815987] The buggy address belongs to the physical page:
[   19.816021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.816073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.816123] page_type: f5(slab)
[   19.816162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.816213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.816257] page dumped because: kasan: bad access detected
[   19.816291] 
[   19.816310] Memory state around the buggy address:
[   19.816355]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.816400]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.816444] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.816484]                                      ^
[   19.816951]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817009]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817049] ==================================================================
[   19.721662] ==================================================================
[   19.721709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.721759] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.722327] 
[   19.722443] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.722861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.722894] Hardware name: linux,dummy-virt (DT)
[   19.722926] Call trace:
[   19.723053]  show_stack+0x20/0x38 (C)
[   19.723237]  dump_stack_lvl+0x8c/0xd0
[   19.723888]  print_report+0x118/0x608
[   19.724022]  kasan_report+0xdc/0x128
[   19.724103]  kasan_check_range+0x100/0x1a8
[   19.724331]  __kasan_check_write+0x20/0x30
[   19.724581]  kasan_atomics_helper+0x14e4/0x4858
[   19.724819]  kasan_atomics+0x198/0x2e0
[   19.724884]  kunit_try_run_case+0x170/0x3f0
[   19.724936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.725125]  kthread+0x328/0x630
[   19.725169]  ret_from_fork+0x10/0x20
[   19.725220] 
[   19.725301] Allocated by task 265:
[   19.725349]  kasan_save_stack+0x3c/0x68
[   19.725394]  kasan_save_track+0x20/0x40
[   19.725433]  kasan_save_alloc_info+0x40/0x58
[   19.725476]  __kasan_kmalloc+0xd4/0xd8
[   19.725514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.725556]  kasan_atomics+0xb8/0x2e0
[   19.726048]  kunit_try_run_case+0x170/0x3f0
[   19.726095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.726141]  kthread+0x328/0x630
[   19.726176]  ret_from_fork+0x10/0x20
[   19.726216] 
[   19.726238] The buggy address belongs to the object at fff00000c5a01980
[   19.726238]  which belongs to the cache kmalloc-64 of size 64
[   19.726298] The buggy address is located 0 bytes to the right of
[   19.726298]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.726843] 
[   19.726873] The buggy address belongs to the physical page:
[   19.726908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.727189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.727242] page_type: f5(slab)
[   19.727283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.727358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.727597] page dumped because: kasan: bad access detected
[   19.727641] 
[   19.727689] Memory state around the buggy address:
[   19.727727]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727773]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727818] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.727859]                                      ^
[   19.727894]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727938]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.728022] ==================================================================
[   19.735925] ==================================================================
[   19.735977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.736028] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.736382] 
[   19.736426] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.736725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.736773] Hardware name: linux,dummy-virt (DT)
[   19.736999] Call trace:
[   19.737098]  show_stack+0x20/0x38 (C)
[   19.737160]  dump_stack_lvl+0x8c/0xd0
[   19.737216]  print_report+0x118/0x608
[   19.737331]  kasan_report+0xdc/0x128
[   19.737483]  kasan_check_range+0x100/0x1a8
[   19.737578]  __kasan_check_write+0x20/0x30
[   19.737678]  kasan_atomics_helper+0x15b4/0x4858
[   19.737729]  kasan_atomics+0x198/0x2e0
[   19.737776]  kunit_try_run_case+0x170/0x3f0
[   19.737827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.738407]  kthread+0x328/0x630
[   19.738489]  ret_from_fork+0x10/0x20
[   19.738588] 
[   19.738622] Allocated by task 265:
[   19.738650]  kasan_save_stack+0x3c/0x68
[   19.738696]  kasan_save_track+0x20/0x40
[   19.738755]  kasan_save_alloc_info+0x40/0x58
[   19.738864]  __kasan_kmalloc+0xd4/0xd8
[   19.738902]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.738966]  kasan_atomics+0xb8/0x2e0
[   19.739012]  kunit_try_run_case+0x170/0x3f0
[   19.739053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.739108]  kthread+0x328/0x630
[   19.739150]  ret_from_fork+0x10/0x20
[   19.739189] 
[   19.739211] The buggy address belongs to the object at fff00000c5a01980
[   19.739211]  which belongs to the cache kmalloc-64 of size 64
[   19.739271] The buggy address is located 0 bytes to the right of
[   19.739271]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.739638] 
[   19.739973] The buggy address belongs to the physical page:
[   19.740011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.740098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.740147] page_type: f5(slab)
[   19.740193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.740400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.740469] page dumped because: kasan: bad access detected
[   19.740553] 
[   19.740573] Memory state around the buggy address:
[   19.740627]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.740673]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.740720] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.740762]                                      ^
[   19.740797]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.740877]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.741052] ==================================================================
[   19.636163] ==================================================================
[   19.636367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.636417] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.636467] 
[   19.636499] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.636594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.636634] Hardware name: linux,dummy-virt (DT)
[   19.636665] Call trace:
[   19.636689]  show_stack+0x20/0x38 (C)
[   19.636738]  dump_stack_lvl+0x8c/0xd0
[   19.636812]  print_report+0x118/0x608
[   19.636866]  kasan_report+0xdc/0x128
[   19.636959]  kasan_check_range+0x100/0x1a8
[   19.637009]  __kasan_check_write+0x20/0x30
[   19.637056]  kasan_atomics_helper+0xf88/0x4858
[   19.637106]  kasan_atomics+0x198/0x2e0
[   19.637153]  kunit_try_run_case+0x170/0x3f0
[   19.637203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637258]  kthread+0x328/0x630
[   19.637301]  ret_from_fork+0x10/0x20
[   19.637361] 
[   19.638711] Allocated by task 265:
[   19.638756]  kasan_save_stack+0x3c/0x68
[   19.638828]  kasan_save_track+0x20/0x40
[   19.638939]  kasan_save_alloc_info+0x40/0x58
[   19.639004]  __kasan_kmalloc+0xd4/0xd8
[   19.639066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.639108]  kasan_atomics+0xb8/0x2e0
[   19.639147]  kunit_try_run_case+0x170/0x3f0
[   19.639199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.639258]  kthread+0x328/0x630
[   19.639294]  ret_from_fork+0x10/0x20
[   19.639333] 
[   19.639364] The buggy address belongs to the object at fff00000c5a01980
[   19.639364]  which belongs to the cache kmalloc-64 of size 64
[   19.639426] The buggy address is located 0 bytes to the right of
[   19.639426]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.639501] 
[   19.639536] The buggy address belongs to the physical page:
[   19.639569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.639659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.639709] page_type: f5(slab)
[   19.639754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.640007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.640110] page dumped because: kasan: bad access detected
[   19.640145] 
[   19.640173] Memory state around the buggy address:
[   19.640319]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.640377]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.640459] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.640639]                                      ^
[   19.640675]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640780]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640839] ==================================================================
[   19.700762] ==================================================================
[   19.700815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.700868] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265
[   19.700927] 
[   19.701001] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.701202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.701589] Hardware name: linux,dummy-virt (DT)
[   19.701862] Call trace:
[   19.701890]  show_stack+0x20/0x38 (C)
[   19.702142]  dump_stack_lvl+0x8c/0xd0
[   19.702194]  print_report+0x118/0x608
[   19.702243]  kasan_report+0xdc/0x128
[   19.702400]  __asan_report_load8_noabort+0x20/0x30
[   19.702474]  kasan_atomics_helper+0x3f04/0x4858
[   19.702528]  kasan_atomics+0x198/0x2e0
[   19.702588]  kunit_try_run_case+0x170/0x3f0
[   19.702721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.702778]  kthread+0x328/0x630
[   19.702878]  ret_from_fork+0x10/0x20
[   19.703094] 
[   19.703133] Allocated by task 265:
[   19.703249]  kasan_save_stack+0x3c/0x68
[   19.703304]  kasan_save_track+0x20/0x40
[   19.703354]  kasan_save_alloc_info+0x40/0x58
[   19.703396]  __kasan_kmalloc+0xd4/0xd8
[   19.703441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.703483]  kasan_atomics+0xb8/0x2e0
[   19.703520]  kunit_try_run_case+0x170/0x3f0
[   19.703562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.703608]  kthread+0x328/0x630
[   19.703663]  ret_from_fork+0x10/0x20
[   19.703863] 
[   19.703968] The buggy address belongs to the object at fff00000c5a01980
[   19.703968]  which belongs to the cache kmalloc-64 of size 64
[   19.704189] The buggy address is located 0 bytes to the right of
[   19.704189]  allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0)
[   19.704312] 
[   19.704350] The buggy address belongs to the physical page:
[   19.704384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01
[   19.704440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.704489] page_type: f5(slab)
[   19.704527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.704705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.704755] page dumped because: kasan: bad access detected
[   19.704793] 
[   19.704813] Memory state around the buggy address:
[   19.704847]  fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.704894]  fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.705365] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.705419]                                      ^
[   19.705459]  fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.705503]  fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.705543] ==================================================================

[   16.261944] ==================================================================
[   16.262424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.262871] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.263232] 
[   16.263316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.263357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.263369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.263390] Call Trace:
[   16.263407]  <TASK>
[   16.263422]  dump_stack_lvl+0x73/0xb0
[   16.263449]  print_report+0xd1/0x650
[   16.263473]  ? __virt_addr_valid+0x1db/0x2d0
[   16.263497]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.263519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.263543]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.263566]  kasan_report+0x141/0x180
[   16.263589]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.263616]  __asan_report_load8_noabort+0x18/0x20
[   16.263642]  kasan_atomics_helper+0x4f98/0x5450
[   16.263666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.263690]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.263716]  ? kasan_atomics+0x152/0x310
[   16.263744]  kasan_atomics+0x1dc/0x310
[   16.263768]  ? __pfx_kasan_atomics+0x10/0x10
[   16.263792]  ? trace_hardirqs_on+0x37/0xe0
[   16.263815]  ? __pfx_read_tsc+0x10/0x10
[   16.263837]  ? ktime_get_ts64+0x86/0x230
[   16.263862]  kunit_try_run_case+0x1a5/0x480
[   16.263887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.263913]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.263966]  ? __kthread_parkme+0x82/0x180
[   16.263986]  ? preempt_count_sub+0x50/0x80
[   16.264011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.264062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.264088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.264115]  kthread+0x337/0x6f0
[   16.264134]  ? trace_preempt_on+0x20/0xc0
[   16.264159]  ? __pfx_kthread+0x10/0x10
[   16.264181]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.264204]  ? calculate_sigpending+0x7b/0xa0
[   16.264230]  ? __pfx_kthread+0x10/0x10
[   16.264253]  ret_from_fork+0x116/0x1d0
[   16.264273]  ? __pfx_kthread+0x10/0x10
[   16.264295]  ret_from_fork_asm+0x1a/0x30
[   16.264326]  </TASK>
[   16.264338] 
[   16.272059] Allocated by task 282:
[   16.272278]  kasan_save_stack+0x45/0x70
[   16.272459]  kasan_save_track+0x18/0x40
[   16.272655]  kasan_save_alloc_info+0x3b/0x50
[   16.272862]  __kasan_kmalloc+0xb7/0xc0
[   16.273065]  __kmalloc_cache_noprof+0x189/0x420
[   16.273250]  kasan_atomics+0x95/0x310
[   16.273431]  kunit_try_run_case+0x1a5/0x480
[   16.273600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.273776]  kthread+0x337/0x6f0
[   16.273938]  ret_from_fork+0x116/0x1d0
[   16.274161]  ret_from_fork_asm+0x1a/0x30
[   16.274362] 
[   16.274457] The buggy address belongs to the object at ffff8881027b3900
[   16.274457]  which belongs to the cache kmalloc-64 of size 64
[   16.274964] The buggy address is located 0 bytes to the right of
[   16.274964]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.275501] 
[   16.275586] The buggy address belongs to the physical page:
[   16.275758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.276011] flags: 0x200000000000000(node=0|zone=2)
[   16.276181] page_type: f5(slab)
[   16.276321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.276660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.276995] page dumped because: kasan: bad access detected
[   16.277285] 
[   16.277379] Memory state around the buggy address:
[   16.277558]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.277837]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.278181] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.278451]                                      ^
[   16.278636]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279050]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279339] ==================================================================
[   15.495339] ==================================================================
[   15.495732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.496003] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.496588] 
[   15.496683] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.496725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.496738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.496757] Call Trace:
[   15.496773]  <TASK>
[   15.496786]  dump_stack_lvl+0x73/0xb0
[   15.496816]  print_report+0xd1/0x650
[   15.496839]  ? __virt_addr_valid+0x1db/0x2d0
[   15.496862]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.496885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.496970]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.497003]  kasan_report+0x141/0x180
[   15.497027]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.497066]  kasan_check_range+0x10c/0x1c0
[   15.497092]  __kasan_check_write+0x18/0x20
[   15.497135]  kasan_atomics_helper+0xfa9/0x5450
[   15.497159]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.497182]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.497208]  ? kasan_atomics+0x152/0x310
[   15.497236]  kasan_atomics+0x1dc/0x310
[   15.497259]  ? __pfx_kasan_atomics+0x10/0x10
[   15.497301]  ? trace_hardirqs_on+0x37/0xe0
[   15.497325]  ? __pfx_read_tsc+0x10/0x10
[   15.497347]  ? ktime_get_ts64+0x86/0x230
[   15.497371]  kunit_try_run_case+0x1a5/0x480
[   15.497395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.497421]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.497447]  ? __kthread_parkme+0x82/0x180
[   15.497468]  ? preempt_count_sub+0x50/0x80
[   15.497492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.497518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.497544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.497589]  kthread+0x337/0x6f0
[   15.497609]  ? trace_preempt_on+0x20/0xc0
[   15.497633]  ? __pfx_kthread+0x10/0x10
[   15.497655]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.497678]  ? calculate_sigpending+0x7b/0xa0
[   15.497704]  ? __pfx_kthread+0x10/0x10
[   15.497726]  ret_from_fork+0x116/0x1d0
[   15.497746]  ? __pfx_kthread+0x10/0x10
[   15.497767]  ret_from_fork_asm+0x1a/0x30
[   15.497800]  </TASK>
[   15.497853] 
[   15.506642] Allocated by task 282:
[   15.506777]  kasan_save_stack+0x45/0x70
[   15.507099]  kasan_save_track+0x18/0x40
[   15.507299]  kasan_save_alloc_info+0x3b/0x50
[   15.507513]  __kasan_kmalloc+0xb7/0xc0
[   15.507702]  __kmalloc_cache_noprof+0x189/0x420
[   15.507997]  kasan_atomics+0x95/0x310
[   15.508226]  kunit_try_run_case+0x1a5/0x480
[   15.508398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.508658]  kthread+0x337/0x6f0
[   15.508782]  ret_from_fork+0x116/0x1d0
[   15.509101]  ret_from_fork_asm+0x1a/0x30
[   15.509309] 
[   15.509423] The buggy address belongs to the object at ffff8881027b3900
[   15.509423]  which belongs to the cache kmalloc-64 of size 64
[   15.510222] The buggy address is located 0 bytes to the right of
[   15.510222]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.510757] 
[   15.510929] The buggy address belongs to the physical page:
[   15.511116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.511458] flags: 0x200000000000000(node=0|zone=2)
[   15.511693] page_type: f5(slab)
[   15.511951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.512293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.512549] page dumped because: kasan: bad access detected
[   15.512847] 
[   15.512998] Memory state around the buggy address:
[   15.513189]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.513412]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.513691] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.514148]                                      ^
[   15.514397]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.514720]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.515196] ==================================================================
[   16.131053] ==================================================================
[   16.131398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.131670] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.132015] 
[   16.133082] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.134063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.134088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.134112] Call Trace:
[   16.134136]  <TASK>
[   16.134154]  dump_stack_lvl+0x73/0xb0
[   16.134188]  print_report+0xd1/0x650
[   16.134211]  ? __virt_addr_valid+0x1db/0x2d0
[   16.134236]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.134259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.134284]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.134307]  kasan_report+0x141/0x180
[   16.134330]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.134357]  kasan_check_range+0x10c/0x1c0
[   16.134382]  __kasan_check_write+0x18/0x20
[   16.134403]  kasan_atomics_helper+0x1d7a/0x5450
[   16.134427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.134450]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.134476]  ? kasan_atomics+0x152/0x310
[   16.134504]  kasan_atomics+0x1dc/0x310
[   16.134526]  ? __pfx_kasan_atomics+0x10/0x10
[   16.134550]  ? trace_hardirqs_on+0x37/0xe0
[   16.134575]  ? __pfx_read_tsc+0x10/0x10
[   16.134595]  ? ktime_get_ts64+0x86/0x230
[   16.134620]  kunit_try_run_case+0x1a5/0x480
[   16.134647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.134674]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.134701]  ? __kthread_parkme+0x82/0x180
[   16.134723]  ? preempt_count_sub+0x50/0x80
[   16.134747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.134773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.134799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.134910]  kthread+0x337/0x6f0
[   16.134932]  ? trace_preempt_on+0x20/0xc0
[   16.134957]  ? __pfx_kthread+0x10/0x10
[   16.134978]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.135002]  ? calculate_sigpending+0x7b/0xa0
[   16.135027]  ? __pfx_kthread+0x10/0x10
[   16.135062]  ret_from_fork+0x116/0x1d0
[   16.135081]  ? __pfx_kthread+0x10/0x10
[   16.135102]  ret_from_fork_asm+0x1a/0x30
[   16.135133]  </TASK>
[   16.135144] 
[   16.143709] Allocated by task 282:
[   16.144016]  kasan_save_stack+0x45/0x70
[   16.144463]  kasan_save_track+0x18/0x40
[   16.144661]  kasan_save_alloc_info+0x3b/0x50
[   16.144938]  __kasan_kmalloc+0xb7/0xc0
[   16.145149]  __kmalloc_cache_noprof+0x189/0x420
[   16.145359]  kasan_atomics+0x95/0x310
[   16.145527]  kunit_try_run_case+0x1a5/0x480
[   16.145697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.146094]  kthread+0x337/0x6f0
[   16.146263]  ret_from_fork+0x116/0x1d0
[   16.146428]  ret_from_fork_asm+0x1a/0x30
[   16.146597] 
[   16.146676] The buggy address belongs to the object at ffff8881027b3900
[   16.146676]  which belongs to the cache kmalloc-64 of size 64
[   16.147267] The buggy address is located 0 bytes to the right of
[   16.147267]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.147640] 
[   16.147712] The buggy address belongs to the physical page:
[   16.147899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.148578] flags: 0x200000000000000(node=0|zone=2)
[   16.148814] page_type: f5(slab)
[   16.148981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.149309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.149697] page dumped because: kasan: bad access detected
[   16.149868] 
[   16.149938] Memory state around the buggy address:
[   16.150103]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.150330]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.150864] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.151411]                                      ^
[   16.151775]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152059]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152325] ==================================================================
[   15.956394] ==================================================================
[   15.956776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.957542] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.958005] 
[   15.958115] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.958157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.958170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.958191] Call Trace:
[   15.958205]  <TASK>
[   15.958221]  dump_stack_lvl+0x73/0xb0
[   15.958249]  print_report+0xd1/0x650
[   15.958271]  ? __virt_addr_valid+0x1db/0x2d0
[   15.958295]  ? kasan_atomics_helper+0x194a/0x5450
[   15.958318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.958342]  ? kasan_atomics_helper+0x194a/0x5450
[   15.958366]  kasan_report+0x141/0x180
[   15.958389]  ? kasan_atomics_helper+0x194a/0x5450
[   15.958417]  kasan_check_range+0x10c/0x1c0
[   15.958441]  __kasan_check_write+0x18/0x20
[   15.958462]  kasan_atomics_helper+0x194a/0x5450
[   15.958486]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.958511]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.958538]  ? kasan_atomics+0x152/0x310
[   15.958567]  kasan_atomics+0x1dc/0x310
[   15.958591]  ? __pfx_kasan_atomics+0x10/0x10
[   15.958615]  ? trace_hardirqs_on+0x37/0xe0
[   15.958640]  ? __pfx_read_tsc+0x10/0x10
[   15.958662]  ? ktime_get_ts64+0x86/0x230
[   15.958688]  kunit_try_run_case+0x1a5/0x480
[   15.958713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.958740]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.958766]  ? __kthread_parkme+0x82/0x180
[   15.958787]  ? preempt_count_sub+0x50/0x80
[   15.958812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.958848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.958875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.958901]  kthread+0x337/0x6f0
[   15.958934]  ? trace_preempt_on+0x20/0xc0
[   15.958963]  ? __pfx_kthread+0x10/0x10
[   15.958985]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.959019]  ? calculate_sigpending+0x7b/0xa0
[   15.959054]  ? __pfx_kthread+0x10/0x10
[   15.959077]  ret_from_fork+0x116/0x1d0
[   15.959097]  ? __pfx_kthread+0x10/0x10
[   15.959119]  ret_from_fork_asm+0x1a/0x30
[   15.959151]  </TASK>
[   15.959161] 
[   15.967785] Allocated by task 282:
[   15.968254]  kasan_save_stack+0x45/0x70
[   15.968503]  kasan_save_track+0x18/0x40
[   15.968698]  kasan_save_alloc_info+0x3b/0x50
[   15.969007]  __kasan_kmalloc+0xb7/0xc0
[   15.969219]  __kmalloc_cache_noprof+0x189/0x420
[   15.969417]  kasan_atomics+0x95/0x310
[   15.969552]  kunit_try_run_case+0x1a5/0x480
[   15.969699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.969914]  kthread+0x337/0x6f0
[   15.970288]  ret_from_fork+0x116/0x1d0
[   15.970482]  ret_from_fork_asm+0x1a/0x30
[   15.970677] 
[   15.970772] The buggy address belongs to the object at ffff8881027b3900
[   15.970772]  which belongs to the cache kmalloc-64 of size 64
[   15.971498] The buggy address is located 0 bytes to the right of
[   15.971498]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.972072] 
[   15.972185] The buggy address belongs to the physical page:
[   15.972446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.972793] flags: 0x200000000000000(node=0|zone=2)
[   15.974885] page_type: f5(slab)
[   15.975087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.975327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.975667] page dumped because: kasan: bad access detected
[   15.976065] 
[   15.976250] Memory state around the buggy address:
[   15.976482]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.976786]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.977178] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.977499]                                      ^
[   15.977745]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978218]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978541] ==================================================================
[   15.643321] ==================================================================
[   15.643663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.644342] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.644608] 
[   15.644695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.644740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.644753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.644774] Call Trace:
[   15.644788]  <TASK>
[   15.644802]  dump_stack_lvl+0x73/0xb0
[   15.644833]  print_report+0xd1/0x650
[   15.644855]  ? __virt_addr_valid+0x1db/0x2d0
[   15.644878]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.644901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.644927]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.644951]  kasan_report+0x141/0x180
[   15.644974]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.645001]  __asan_report_load4_noabort+0x18/0x20
[   15.645108]  kasan_atomics_helper+0x49e8/0x5450
[   15.645136]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.645162]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.645189]  ? kasan_atomics+0x152/0x310
[   15.645216]  kasan_atomics+0x1dc/0x310
[   15.645240]  ? __pfx_kasan_atomics+0x10/0x10
[   15.645264]  ? trace_hardirqs_on+0x37/0xe0
[   15.645287]  ? __pfx_read_tsc+0x10/0x10
[   15.645309]  ? ktime_get_ts64+0x86/0x230
[   15.645333]  kunit_try_run_case+0x1a5/0x480
[   15.645359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.645385]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.645414]  ? __kthread_parkme+0x82/0x180
[   15.645436]  ? preempt_count_sub+0x50/0x80
[   15.645460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.645485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.645512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.645539]  kthread+0x337/0x6f0
[   15.645560]  ? trace_preempt_on+0x20/0xc0
[   15.645583]  ? __pfx_kthread+0x10/0x10
[   15.645604]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.645626]  ? calculate_sigpending+0x7b/0xa0
[   15.645651]  ? __pfx_kthread+0x10/0x10
[   15.645675]  ret_from_fork+0x116/0x1d0
[   15.645694]  ? __pfx_kthread+0x10/0x10
[   15.645715]  ret_from_fork_asm+0x1a/0x30
[   15.645746]  </TASK>
[   15.645757] 
[   15.655040] Allocated by task 282:
[   15.655227]  kasan_save_stack+0x45/0x70
[   15.655447]  kasan_save_track+0x18/0x40
[   15.655635]  kasan_save_alloc_info+0x3b/0x50
[   15.655789]  __kasan_kmalloc+0xb7/0xc0
[   15.655923]  __kmalloc_cache_noprof+0x189/0x420
[   15.656097]  kasan_atomics+0x95/0x310
[   15.656234]  kunit_try_run_case+0x1a5/0x480
[   15.656380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.656898]  kthread+0x337/0x6f0
[   15.657156]  ret_from_fork+0x116/0x1d0
[   15.657380]  ret_from_fork_asm+0x1a/0x30
[   15.657778] 
[   15.657947] The buggy address belongs to the object at ffff8881027b3900
[   15.657947]  which belongs to the cache kmalloc-64 of size 64
[   15.660345] The buggy address is located 0 bytes to the right of
[   15.660345]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.661250] 
[   15.661359] The buggy address belongs to the physical page:
[   15.661613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.661933] flags: 0x200000000000000(node=0|zone=2)
[   15.662233] page_type: f5(slab)
[   15.662426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.662767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.663148] page dumped because: kasan: bad access detected
[   15.663333] 
[   15.663487] Memory state around the buggy address:
[   15.663758]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.664207]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.664520] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.664769]                                      ^
[   15.665131]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.665492]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.665823] ==================================================================
[   15.553775] ==================================================================
[   15.554184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.554504] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.554887] 
[   15.555046] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.555091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.555104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.555125] Call Trace:
[   15.555139]  <TASK>
[   15.555175]  dump_stack_lvl+0x73/0xb0
[   15.555205]  print_report+0xd1/0x650
[   15.555229]  ? __virt_addr_valid+0x1db/0x2d0
[   15.555252]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.555274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.555299]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.555322]  kasan_report+0x141/0x180
[   15.555344]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.555372]  __asan_report_load4_noabort+0x18/0x20
[   15.555398]  kasan_atomics_helper+0x4a1c/0x5450
[   15.555422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.555445]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.555471]  ? kasan_atomics+0x152/0x310
[   15.555498]  kasan_atomics+0x1dc/0x310
[   15.555545]  ? __pfx_kasan_atomics+0x10/0x10
[   15.555569]  ? trace_hardirqs_on+0x37/0xe0
[   15.555593]  ? __pfx_read_tsc+0x10/0x10
[   15.555614]  ? ktime_get_ts64+0x86/0x230
[   15.555638]  kunit_try_run_case+0x1a5/0x480
[   15.555663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.555689]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.555716]  ? __kthread_parkme+0x82/0x180
[   15.555738]  ? preempt_count_sub+0x50/0x80
[   15.555762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.555788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.555883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.555910]  kthread+0x337/0x6f0
[   15.555930]  ? trace_preempt_on+0x20/0xc0
[   15.555990]  ? __pfx_kthread+0x10/0x10
[   15.556013]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.556044]  ? calculate_sigpending+0x7b/0xa0
[   15.556070]  ? __pfx_kthread+0x10/0x10
[   15.556092]  ret_from_fork+0x116/0x1d0
[   15.556112]  ? __pfx_kthread+0x10/0x10
[   15.556134]  ret_from_fork_asm+0x1a/0x30
[   15.556165]  </TASK>
[   15.556177] 
[   15.564054] Allocated by task 282:
[   15.564236]  kasan_save_stack+0x45/0x70
[   15.564445]  kasan_save_track+0x18/0x40
[   15.564637]  kasan_save_alloc_info+0x3b/0x50
[   15.565113]  __kasan_kmalloc+0xb7/0xc0
[   15.565372]  __kmalloc_cache_noprof+0x189/0x420
[   15.565614]  kasan_atomics+0x95/0x310
[   15.565877]  kunit_try_run_case+0x1a5/0x480
[   15.566071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.566334]  kthread+0x337/0x6f0
[   15.566485]  ret_from_fork+0x116/0x1d0
[   15.566675]  ret_from_fork_asm+0x1a/0x30
[   15.566885] 
[   15.566984] The buggy address belongs to the object at ffff8881027b3900
[   15.566984]  which belongs to the cache kmalloc-64 of size 64
[   15.567540] The buggy address is located 0 bytes to the right of
[   15.567540]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.568057] 
[   15.568133] The buggy address belongs to the physical page:
[   15.568360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.568731] flags: 0x200000000000000(node=0|zone=2)
[   15.569121] page_type: f5(slab)
[   15.569291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.569630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.570134] page dumped because: kasan: bad access detected
[   15.570390] 
[   15.570484] Memory state around the buggy address:
[   15.570686]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.571057]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.571391] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.571600]                                      ^
[   15.571909]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.572273]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.572508] ==================================================================
[   15.860426] ==================================================================
[   15.861336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.861652] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.862340] 
[   15.862653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.862763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.862777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.862798] Call Trace:
[   15.862813]  <TASK>
[   15.862867]  dump_stack_lvl+0x73/0xb0
[   15.862899]  print_report+0xd1/0x650
[   15.862922]  ? __virt_addr_valid+0x1db/0x2d0
[   15.862944]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.862968]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.862999]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.863023]  kasan_report+0x141/0x180
[   15.863058]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.863085]  kasan_check_range+0x10c/0x1c0
[   15.863109]  __kasan_check_write+0x18/0x20
[   15.863130]  kasan_atomics_helper+0x16e7/0x5450
[   15.863154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.863178]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.863205]  ? kasan_atomics+0x152/0x310
[   15.863232]  kasan_atomics+0x1dc/0x310
[   15.863255]  ? __pfx_kasan_atomics+0x10/0x10
[   15.863278]  ? trace_hardirqs_on+0x37/0xe0
[   15.863303]  ? __pfx_read_tsc+0x10/0x10
[   15.863325]  ? ktime_get_ts64+0x86/0x230
[   15.863349]  kunit_try_run_case+0x1a5/0x480
[   15.863374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.863399]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.863425]  ? __kthread_parkme+0x82/0x180
[   15.863446]  ? preempt_count_sub+0x50/0x80
[   15.863471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.863496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.863521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.863548]  kthread+0x337/0x6f0
[   15.863567]  ? trace_preempt_on+0x20/0xc0
[   15.863590]  ? __pfx_kthread+0x10/0x10
[   15.863611]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.863634]  ? calculate_sigpending+0x7b/0xa0
[   15.863659]  ? __pfx_kthread+0x10/0x10
[   15.863681]  ret_from_fork+0x116/0x1d0
[   15.863701]  ? __pfx_kthread+0x10/0x10
[   15.863722]  ret_from_fork_asm+0x1a/0x30
[   15.863753]  </TASK>
[   15.863764] 
[   15.877385] Allocated by task 282:
[   15.878290]  kasan_save_stack+0x45/0x70
[   15.879110]  kasan_save_track+0x18/0x40
[   15.879448]  kasan_save_alloc_info+0x3b/0x50
[   15.879656]  __kasan_kmalloc+0xb7/0xc0
[   15.880233]  __kmalloc_cache_noprof+0x189/0x420
[   15.880453]  kasan_atomics+0x95/0x310
[   15.880629]  kunit_try_run_case+0x1a5/0x480
[   15.881083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.881330]  kthread+0x337/0x6f0
[   15.881484]  ret_from_fork+0x116/0x1d0
[   15.881650]  ret_from_fork_asm+0x1a/0x30
[   15.882175] 
[   15.882277] The buggy address belongs to the object at ffff8881027b3900
[   15.882277]  which belongs to the cache kmalloc-64 of size 64
[   15.883257] The buggy address is located 0 bytes to the right of
[   15.883257]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.883769] 
[   15.884201] The buggy address belongs to the physical page:
[   15.884451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.884786] flags: 0x200000000000000(node=0|zone=2)
[   15.885313] page_type: f5(slab)
[   15.885477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.885776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.886395] page dumped because: kasan: bad access detected
[   15.886634] 
[   15.886724] Memory state around the buggy address:
[   15.887250]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.887531]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.887805] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.888559]                                      ^
[   15.888786]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889168]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889468] ==================================================================
[   16.279956] ==================================================================
[   16.280317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.280656] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.281070] 
[   16.281171] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.281215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.281228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.281257] Call Trace:
[   16.281270]  <TASK>
[   16.281311]  dump_stack_lvl+0x73/0xb0
[   16.281341]  print_report+0xd1/0x650
[   16.281366]  ? __virt_addr_valid+0x1db/0x2d0
[   16.281390]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.281412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.281437]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.281460]  kasan_report+0x141/0x180
[   16.281483]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.281510]  kasan_check_range+0x10c/0x1c0
[   16.281536]  __kasan_check_write+0x18/0x20
[   16.281556]  kasan_atomics_helper+0x20c8/0x5450
[   16.281580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.281604]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.281630]  ? kasan_atomics+0x152/0x310
[   16.281658]  kasan_atomics+0x1dc/0x310
[   16.281681]  ? __pfx_kasan_atomics+0x10/0x10
[   16.281704]  ? trace_hardirqs_on+0x37/0xe0
[   16.281729]  ? __pfx_read_tsc+0x10/0x10
[   16.281751]  ? ktime_get_ts64+0x86/0x230
[   16.281776]  kunit_try_run_case+0x1a5/0x480
[   16.281807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.281834]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.281859]  ? __kthread_parkme+0x82/0x180
[   16.281881]  ? preempt_count_sub+0x50/0x80
[   16.281905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.281931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.281957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.281983]  kthread+0x337/0x6f0
[   16.282004]  ? trace_preempt_on+0x20/0xc0
[   16.282026]  ? __pfx_kthread+0x10/0x10
[   16.282059]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.282082]  ? calculate_sigpending+0x7b/0xa0
[   16.282106]  ? __pfx_kthread+0x10/0x10
[   16.282129]  ret_from_fork+0x116/0x1d0
[   16.282149]  ? __pfx_kthread+0x10/0x10
[   16.282170]  ret_from_fork_asm+0x1a/0x30
[   16.282202]  </TASK>
[   16.282213] 
[   16.294163] Allocated by task 282:
[   16.294343]  kasan_save_stack+0x45/0x70
[   16.294538]  kasan_save_track+0x18/0x40
[   16.294717]  kasan_save_alloc_info+0x3b/0x50
[   16.295203]  __kasan_kmalloc+0xb7/0xc0
[   16.295514]  __kmalloc_cache_noprof+0x189/0x420
[   16.295730]  kasan_atomics+0x95/0x310
[   16.296303]  kunit_try_run_case+0x1a5/0x480
[   16.296508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.296744]  kthread+0x337/0x6f0
[   16.297104]  ret_from_fork+0x116/0x1d0
[   16.297288]  ret_from_fork_asm+0x1a/0x30
[   16.297473] 
[   16.297566] The buggy address belongs to the object at ffff8881027b3900
[   16.297566]  which belongs to the cache kmalloc-64 of size 64
[   16.298709] The buggy address is located 0 bytes to the right of
[   16.298709]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.299771] 
[   16.299862] The buggy address belongs to the physical page:
[   16.300378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.301059] flags: 0x200000000000000(node=0|zone=2)
[   16.301428] page_type: f5(slab)
[   16.301586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.302051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.302365] page dumped because: kasan: bad access detected
[   16.302596] 
[   16.302686] Memory state around the buggy address:
[   16.303092]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303393]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303691] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.304557]                                      ^
[   16.305164]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.305472]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.305756] ==================================================================
[   15.382247] ==================================================================
[   15.382858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.383465] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.383775] 
[   15.384730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.384783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.384798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.385068] Call Trace:
[   15.385091]  <TASK>
[   15.385107]  dump_stack_lvl+0x73/0xb0
[   15.385246]  print_report+0xd1/0x650
[   15.385271]  ? __virt_addr_valid+0x1db/0x2d0
[   15.385400]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.385425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.385477]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.385503]  kasan_report+0x141/0x180
[   15.385527]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.385555]  __asan_report_load4_noabort+0x18/0x20
[   15.385582]  kasan_atomics_helper+0x4a84/0x5450
[   15.385606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.385636]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.385663]  ? kasan_atomics+0x152/0x310
[   15.385691]  kasan_atomics+0x1dc/0x310
[   15.385715]  ? __pfx_kasan_atomics+0x10/0x10
[   15.385740]  ? trace_hardirqs_on+0x37/0xe0
[   15.385764]  ? __pfx_read_tsc+0x10/0x10
[   15.385806]  ? ktime_get_ts64+0x86/0x230
[   15.385831]  kunit_try_run_case+0x1a5/0x480
[   15.385872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.385912]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.385953]  ? __kthread_parkme+0x82/0x180
[   15.385976]  ? preempt_count_sub+0x50/0x80
[   15.386014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.386049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.386090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.386198]  kthread+0x337/0x6f0
[   15.386224]  ? trace_preempt_on+0x20/0xc0
[   15.386249]  ? __pfx_kthread+0x10/0x10
[   15.386271]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.386295]  ? calculate_sigpending+0x7b/0xa0
[   15.386320]  ? __pfx_kthread+0x10/0x10
[   15.386343]  ret_from_fork+0x116/0x1d0
[   15.386364]  ? __pfx_kthread+0x10/0x10
[   15.386385]  ret_from_fork_asm+0x1a/0x30
[   15.386416]  </TASK>
[   15.386440] 
[   15.395536] Allocated by task 282:
[   15.395679]  kasan_save_stack+0x45/0x70
[   15.395882]  kasan_save_track+0x18/0x40
[   15.396166]  kasan_save_alloc_info+0x3b/0x50
[   15.396550]  __kasan_kmalloc+0xb7/0xc0
[   15.396766]  __kmalloc_cache_noprof+0x189/0x420
[   15.397121]  kasan_atomics+0x95/0x310
[   15.397340]  kunit_try_run_case+0x1a5/0x480
[   15.397545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.397728]  kthread+0x337/0x6f0
[   15.397854]  ret_from_fork+0x116/0x1d0
[   15.397990]  ret_from_fork_asm+0x1a/0x30
[   15.398193] 
[   15.398311] The buggy address belongs to the object at ffff8881027b3900
[   15.398311]  which belongs to the cache kmalloc-64 of size 64
[   15.398907] The buggy address is located 0 bytes to the right of
[   15.398907]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.401079] 
[   15.401172] The buggy address belongs to the physical page:
[   15.401344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.401584] flags: 0x200000000000000(node=0|zone=2)
[   15.401745] page_type: f5(slab)
[   15.401870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.402668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.403716] page dumped because: kasan: bad access detected
[   15.404586] 
[   15.404849] Memory state around the buggy address:
[   15.405269]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.405508]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.405728] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.406324]                                      ^
[   15.406800]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.407319]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.407615] ==================================================================
[   15.624146] ==================================================================
[   15.624544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.624897] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.625224] 
[   15.625340] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.625385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.625397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.625418] Call Trace:
[   15.625432]  <TASK>
[   15.625447]  dump_stack_lvl+0x73/0xb0
[   15.625476]  print_report+0xd1/0x650
[   15.625501]  ? __virt_addr_valid+0x1db/0x2d0
[   15.625525]  ? kasan_atomics_helper+0x1217/0x5450
[   15.625548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.625572]  ? kasan_atomics_helper+0x1217/0x5450
[   15.625595]  kasan_report+0x141/0x180
[   15.625618]  ? kasan_atomics_helper+0x1217/0x5450
[   15.625645]  kasan_check_range+0x10c/0x1c0
[   15.625670]  __kasan_check_write+0x18/0x20
[   15.625690]  kasan_atomics_helper+0x1217/0x5450
[   15.625714]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.625738]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.625765]  ? kasan_atomics+0x152/0x310
[   15.625794]  kasan_atomics+0x1dc/0x310
[   15.625838]  ? __pfx_kasan_atomics+0x10/0x10
[   15.625862]  ? trace_hardirqs_on+0x37/0xe0
[   15.625887]  ? __pfx_read_tsc+0x10/0x10
[   15.625908]  ? ktime_get_ts64+0x86/0x230
[   15.625979]  kunit_try_run_case+0x1a5/0x480
[   15.626009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.626048]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.626075]  ? __kthread_parkme+0x82/0x180
[   15.626096]  ? preempt_count_sub+0x50/0x80
[   15.626120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.626146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.626172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.626199]  kthread+0x337/0x6f0
[   15.626218]  ? trace_preempt_on+0x20/0xc0
[   15.626241]  ? __pfx_kthread+0x10/0x10
[   15.626262]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.626284]  ? calculate_sigpending+0x7b/0xa0
[   15.626311]  ? __pfx_kthread+0x10/0x10
[   15.626334]  ret_from_fork+0x116/0x1d0
[   15.626354]  ? __pfx_kthread+0x10/0x10
[   15.626374]  ret_from_fork_asm+0x1a/0x30
[   15.626406]  </TASK>
[   15.626417] 
[   15.634305] Allocated by task 282:
[   15.634494]  kasan_save_stack+0x45/0x70
[   15.634717]  kasan_save_track+0x18/0x40
[   15.634943]  kasan_save_alloc_info+0x3b/0x50
[   15.635212]  __kasan_kmalloc+0xb7/0xc0
[   15.635391]  __kmalloc_cache_noprof+0x189/0x420
[   15.635607]  kasan_atomics+0x95/0x310
[   15.635799]  kunit_try_run_case+0x1a5/0x480
[   15.636110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.636324]  kthread+0x337/0x6f0
[   15.636523]  ret_from_fork+0x116/0x1d0
[   15.636701]  ret_from_fork_asm+0x1a/0x30
[   15.636979] 
[   15.637064] The buggy address belongs to the object at ffff8881027b3900
[   15.637064]  which belongs to the cache kmalloc-64 of size 64
[   15.637650] The buggy address is located 0 bytes to the right of
[   15.637650]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.638149] 
[   15.638223] The buggy address belongs to the physical page:
[   15.638393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.638671] flags: 0x200000000000000(node=0|zone=2)
[   15.639297] page_type: f5(slab)
[   15.639476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.639954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.640338] page dumped because: kasan: bad access detected
[   15.640612] 
[   15.640696] Memory state around the buggy address:
[   15.641091]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.641333]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.641552] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.641767]                                      ^
[   15.641989]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.642322]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.642645] ==================================================================
[   15.750936] ==================================================================
[   15.751321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.751648] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.752049] 
[   15.752133] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.752175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.752187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.752259] Call Trace:
[   15.752277]  <TASK>
[   15.752293]  dump_stack_lvl+0x73/0xb0
[   15.752361]  print_report+0xd1/0x650
[   15.752386]  ? __virt_addr_valid+0x1db/0x2d0
[   15.752410]  ? kasan_atomics_helper+0x1467/0x5450
[   15.752444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.752496]  ? kasan_atomics_helper+0x1467/0x5450
[   15.752520]  kasan_report+0x141/0x180
[   15.752553]  ? kasan_atomics_helper+0x1467/0x5450
[   15.752581]  kasan_check_range+0x10c/0x1c0
[   15.752606]  __kasan_check_write+0x18/0x20
[   15.752626]  kasan_atomics_helper+0x1467/0x5450
[   15.752651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.752675]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.752722]  ? kasan_atomics+0x152/0x310
[   15.752750]  kasan_atomics+0x1dc/0x310
[   15.752773]  ? __pfx_kasan_atomics+0x10/0x10
[   15.752819]  ? trace_hardirqs_on+0x37/0xe0
[   15.752842]  ? __pfx_read_tsc+0x10/0x10
[   15.752875]  ? ktime_get_ts64+0x86/0x230
[   15.752899]  kunit_try_run_case+0x1a5/0x480
[   15.752990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.753019]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.753056]  ? __kthread_parkme+0x82/0x180
[   15.753077]  ? preempt_count_sub+0x50/0x80
[   15.753102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.753128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.753154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.753181]  kthread+0x337/0x6f0
[   15.753200]  ? trace_preempt_on+0x20/0xc0
[   15.753224]  ? __pfx_kthread+0x10/0x10
[   15.753245]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.753268]  ? calculate_sigpending+0x7b/0xa0
[   15.753293]  ? __pfx_kthread+0x10/0x10
[   15.753315]  ret_from_fork+0x116/0x1d0
[   15.753335]  ? __pfx_kthread+0x10/0x10
[   15.753356]  ret_from_fork_asm+0x1a/0x30
[   15.753389]  </TASK>
[   15.753401] 
[   15.762516] Allocated by task 282:
[   15.762783]  kasan_save_stack+0x45/0x70
[   15.763054]  kasan_save_track+0x18/0x40
[   15.763299]  kasan_save_alloc_info+0x3b/0x50
[   15.763539]  __kasan_kmalloc+0xb7/0xc0
[   15.763676]  __kmalloc_cache_noprof+0x189/0x420
[   15.763981]  kasan_atomics+0x95/0x310
[   15.764243]  kunit_try_run_case+0x1a5/0x480
[   15.764460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.764741]  kthread+0x337/0x6f0
[   15.765042]  ret_from_fork+0x116/0x1d0
[   15.765184]  ret_from_fork_asm+0x1a/0x30
[   15.765326] 
[   15.765469] The buggy address belongs to the object at ffff8881027b3900
[   15.765469]  which belongs to the cache kmalloc-64 of size 64
[   15.766012] The buggy address is located 0 bytes to the right of
[   15.766012]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.766792] 
[   15.766957] The buggy address belongs to the physical page:
[   15.767164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.767434] flags: 0x200000000000000(node=0|zone=2)
[   15.767727] page_type: f5(slab)
[   15.767986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.768456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.768749] page dumped because: kasan: bad access detected
[   15.769132] 
[   15.769262] Memory state around the buggy address:
[   15.769509]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.769759]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.770376] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.770709]                                      ^
[   15.771208]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.771511]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.771881] ==================================================================
[   16.152707] ==================================================================
[   16.153064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.153412] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.153849] 
[   16.153968] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.154011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.154024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.154056] Call Trace:
[   16.154071]  <TASK>
[   16.154086]  dump_stack_lvl+0x73/0xb0
[   16.154115]  print_report+0xd1/0x650
[   16.154138]  ? __virt_addr_valid+0x1db/0x2d0
[   16.154161]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.154183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.154208]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.154232]  kasan_report+0x141/0x180
[   16.154255]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.154283]  kasan_check_range+0x10c/0x1c0
[   16.154307]  __kasan_check_write+0x18/0x20
[   16.154328]  kasan_atomics_helper+0x1e12/0x5450
[   16.154352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.154376]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.154403]  ? kasan_atomics+0x152/0x310
[   16.154430]  kasan_atomics+0x1dc/0x310
[   16.154453]  ? __pfx_kasan_atomics+0x10/0x10
[   16.154477]  ? trace_hardirqs_on+0x37/0xe0
[   16.154500]  ? __pfx_read_tsc+0x10/0x10
[   16.154522]  ? ktime_get_ts64+0x86/0x230
[   16.154547]  kunit_try_run_case+0x1a5/0x480
[   16.154582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.154608]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.154635]  ? __kthread_parkme+0x82/0x180
[   16.154657]  ? preempt_count_sub+0x50/0x80
[   16.154682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.154707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.154733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.154760]  kthread+0x337/0x6f0
[   16.154780]  ? trace_preempt_on+0x20/0xc0
[   16.154803]  ? __pfx_kthread+0x10/0x10
[   16.154824]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.154847]  ? calculate_sigpending+0x7b/0xa0
[   16.154883]  ? __pfx_kthread+0x10/0x10
[   16.154905]  ret_from_fork+0x116/0x1d0
[   16.154924]  ? __pfx_kthread+0x10/0x10
[   16.154947]  ret_from_fork_asm+0x1a/0x30
[   16.154978]  </TASK>
[   16.154989] 
[   16.169154] Allocated by task 282:
[   16.169295]  kasan_save_stack+0x45/0x70
[   16.169446]  kasan_save_track+0x18/0x40
[   16.169583]  kasan_save_alloc_info+0x3b/0x50
[   16.169733]  __kasan_kmalloc+0xb7/0xc0
[   16.169874]  __kmalloc_cache_noprof+0x189/0x420
[   16.170041]  kasan_atomics+0x95/0x310
[   16.170314]  kunit_try_run_case+0x1a5/0x480
[   16.170698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.171293]  kthread+0x337/0x6f0
[   16.171611]  ret_from_fork+0x116/0x1d0
[   16.172191]  ret_from_fork_asm+0x1a/0x30
[   16.172572] 
[   16.172731] The buggy address belongs to the object at ffff8881027b3900
[   16.172731]  which belongs to the cache kmalloc-64 of size 64
[   16.173937] The buggy address is located 0 bytes to the right of
[   16.173937]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.175070] 
[   16.175148] The buggy address belongs to the physical page:
[   16.175322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.175563] flags: 0x200000000000000(node=0|zone=2)
[   16.175726] page_type: f5(slab)
[   16.176019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.176685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.177562] page dumped because: kasan: bad access detected
[   16.178130] 
[   16.178291] Memory state around the buggy address:
[   16.178715]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.179444]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.180169] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.180427]                                      ^
[   16.180582]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180804]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.181019] ==================================================================
[   15.730010] ==================================================================
[   15.730297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.730618] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.730954] 
[   15.731095] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.731172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.731185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.731206] Call Trace:
[   15.731232]  <TASK>
[   15.731248]  dump_stack_lvl+0x73/0xb0
[   15.731279]  print_report+0xd1/0x650
[   15.731302]  ? __virt_addr_valid+0x1db/0x2d0
[   15.731325]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.731348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.731373]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.731396]  kasan_report+0x141/0x180
[   15.731419]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.731447]  __asan_report_load8_noabort+0x18/0x20
[   15.731474]  kasan_atomics_helper+0x4eae/0x5450
[   15.731498]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.731554]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.731580]  ? kasan_atomics+0x152/0x310
[   15.731620]  kasan_atomics+0x1dc/0x310
[   15.731671]  ? __pfx_kasan_atomics+0x10/0x10
[   15.731695]  ? trace_hardirqs_on+0x37/0xe0
[   15.731718]  ? __pfx_read_tsc+0x10/0x10
[   15.731750]  ? ktime_get_ts64+0x86/0x230
[   15.731774]  kunit_try_run_case+0x1a5/0x480
[   15.731799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.731825]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.731852]  ? __kthread_parkme+0x82/0x180
[   15.731874]  ? preempt_count_sub+0x50/0x80
[   15.731925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.731959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.732065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.732092]  kthread+0x337/0x6f0
[   15.732163]  ? trace_preempt_on+0x20/0xc0
[   15.732188]  ? __pfx_kthread+0x10/0x10
[   15.732211]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.732234]  ? calculate_sigpending+0x7b/0xa0
[   15.732259]  ? __pfx_kthread+0x10/0x10
[   15.732282]  ret_from_fork+0x116/0x1d0
[   15.732301]  ? __pfx_kthread+0x10/0x10
[   15.732323]  ret_from_fork_asm+0x1a/0x30
[   15.732354]  </TASK>
[   15.732365] 
[   15.741159] Allocated by task 282:
[   15.741295]  kasan_save_stack+0x45/0x70
[   15.741500]  kasan_save_track+0x18/0x40
[   15.741696]  kasan_save_alloc_info+0x3b/0x50
[   15.741911]  __kasan_kmalloc+0xb7/0xc0
[   15.742159]  __kmalloc_cache_noprof+0x189/0x420
[   15.742401]  kasan_atomics+0x95/0x310
[   15.742677]  kunit_try_run_case+0x1a5/0x480
[   15.743107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743387]  kthread+0x337/0x6f0
[   15.743513]  ret_from_fork+0x116/0x1d0
[   15.743647]  ret_from_fork_asm+0x1a/0x30
[   15.743796] 
[   15.743959] The buggy address belongs to the object at ffff8881027b3900
[   15.743959]  which belongs to the cache kmalloc-64 of size 64
[   15.744554] The buggy address is located 0 bytes to the right of
[   15.744554]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.745377] 
[   15.745505] The buggy address belongs to the physical page:
[   15.745694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.746007] flags: 0x200000000000000(node=0|zone=2)
[   15.746251] page_type: f5(slab)
[   15.746580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.747018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.747268] page dumped because: kasan: bad access detected
[   15.747570] 
[   15.747668] Memory state around the buggy address:
[   15.747971]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.748480]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.749003] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.749321]                                      ^
[   15.749580]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749938]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750423] ==================================================================
[   15.798777] ==================================================================
[   15.799388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.799716] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.800409] 
[   15.800649] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.800773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.800787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.800829] Call Trace:
[   15.800844]  <TASK>
[   15.800861]  dump_stack_lvl+0x73/0xb0
[   15.800925]  print_report+0xd1/0x650
[   15.800960]  ? __virt_addr_valid+0x1db/0x2d0
[   15.800984]  ? kasan_atomics_helper+0x151d/0x5450
[   15.801007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.801042]  ? kasan_atomics_helper+0x151d/0x5450
[   15.801065]  kasan_report+0x141/0x180
[   15.801087]  ? kasan_atomics_helper+0x151d/0x5450
[   15.801115]  kasan_check_range+0x10c/0x1c0
[   15.801140]  __kasan_check_write+0x18/0x20
[   15.801160]  kasan_atomics_helper+0x151d/0x5450
[   15.801184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.801209]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.801235]  ? kasan_atomics+0x152/0x310
[   15.801262]  kasan_atomics+0x1dc/0x310
[   15.801286]  ? __pfx_kasan_atomics+0x10/0x10
[   15.801310]  ? trace_hardirqs_on+0x37/0xe0
[   15.801333]  ? __pfx_read_tsc+0x10/0x10
[   15.801355]  ? ktime_get_ts64+0x86/0x230
[   15.801380]  kunit_try_run_case+0x1a5/0x480
[   15.801405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.801431]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.801457]  ? __kthread_parkme+0x82/0x180
[   15.801478]  ? preempt_count_sub+0x50/0x80
[   15.801503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.801529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.801555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.801582]  kthread+0x337/0x6f0
[   15.801601]  ? trace_preempt_on+0x20/0xc0
[   15.801624]  ? __pfx_kthread+0x10/0x10
[   15.801646]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.801668]  ? calculate_sigpending+0x7b/0xa0
[   15.801693]  ? __pfx_kthread+0x10/0x10
[   15.801715]  ret_from_fork+0x116/0x1d0
[   15.801735]  ? __pfx_kthread+0x10/0x10
[   15.801756]  ret_from_fork_asm+0x1a/0x30
[   15.801788]  </TASK>
[   15.801800] 
[   15.810047] Allocated by task 282:
[   15.810250]  kasan_save_stack+0x45/0x70
[   15.810455]  kasan_save_track+0x18/0x40
[   15.810650]  kasan_save_alloc_info+0x3b/0x50
[   15.810939]  __kasan_kmalloc+0xb7/0xc0
[   15.811104]  __kmalloc_cache_noprof+0x189/0x420
[   15.811380]  kasan_atomics+0x95/0x310
[   15.811650]  kunit_try_run_case+0x1a5/0x480
[   15.811866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.812221]  kthread+0x337/0x6f0
[   15.812385]  ret_from_fork+0x116/0x1d0
[   15.812568]  ret_from_fork_asm+0x1a/0x30
[   15.812713] 
[   15.812810] The buggy address belongs to the object at ffff8881027b3900
[   15.812810]  which belongs to the cache kmalloc-64 of size 64
[   15.813393] The buggy address is located 0 bytes to the right of
[   15.813393]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.813826] 
[   15.813899] The buggy address belongs to the physical page:
[   15.814155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.814532] flags: 0x200000000000000(node=0|zone=2)
[   15.814809] page_type: f5(slab)
[   15.815147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.815389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.815621] page dumped because: kasan: bad access detected
[   15.816151] 
[   15.816247] Memory state around the buggy address:
[   15.816543]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.816820]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.817143] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.817358]                                      ^
[   15.817513]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817729]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.818100] ==================================================================
[   15.092123] ==================================================================
[   15.093739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.095151] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.095577] 
[   15.095671] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.095715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.095728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.095750] Call Trace:
[   15.095767]  <TASK>
[   15.095782]  dump_stack_lvl+0x73/0xb0
[   15.096006]  print_report+0xd1/0x650
[   15.096043]  ? __virt_addr_valid+0x1db/0x2d0
[   15.096067]  ? kasan_atomics_helper+0x565/0x5450
[   15.096090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.096115]  ? kasan_atomics_helper+0x565/0x5450
[   15.096138]  kasan_report+0x141/0x180
[   15.096161]  ? kasan_atomics_helper+0x565/0x5450
[   15.096188]  kasan_check_range+0x10c/0x1c0
[   15.096213]  __kasan_check_write+0x18/0x20
[   15.096233]  kasan_atomics_helper+0x565/0x5450
[   15.096258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.096283]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.096309]  ? kasan_atomics+0x152/0x310
[   15.096338]  kasan_atomics+0x1dc/0x310
[   15.096361]  ? __pfx_kasan_atomics+0x10/0x10
[   15.096386]  ? trace_hardirqs_on+0x37/0xe0
[   15.096410]  ? __pfx_read_tsc+0x10/0x10
[   15.096432]  ? ktime_get_ts64+0x86/0x230
[   15.096457]  kunit_try_run_case+0x1a5/0x480
[   15.096482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096508]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.096533]  ? __kthread_parkme+0x82/0x180
[   15.096554]  ? preempt_count_sub+0x50/0x80
[   15.096579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.096631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.096657]  kthread+0x337/0x6f0
[   15.096677]  ? trace_preempt_on+0x20/0xc0
[   15.096701]  ? __pfx_kthread+0x10/0x10
[   15.096723]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.096745]  ? calculate_sigpending+0x7b/0xa0
[   15.096770]  ? __pfx_kthread+0x10/0x10
[   15.096851]  ret_from_fork+0x116/0x1d0
[   15.096875]  ? __pfx_kthread+0x10/0x10
[   15.096898]  ret_from_fork_asm+0x1a/0x30
[   15.096929]  </TASK>
[   15.096940] 
[   15.110555] Allocated by task 282:
[   15.110913]  kasan_save_stack+0x45/0x70
[   15.111131]  kasan_save_track+0x18/0x40
[   15.111273]  kasan_save_alloc_info+0x3b/0x50
[   15.111425]  __kasan_kmalloc+0xb7/0xc0
[   15.111560]  __kmalloc_cache_noprof+0x189/0x420
[   15.111718]  kasan_atomics+0x95/0x310
[   15.111860]  kunit_try_run_case+0x1a5/0x480
[   15.112014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.112201]  kthread+0x337/0x6f0
[   15.112323]  ret_from_fork+0x116/0x1d0
[   15.112707]  ret_from_fork_asm+0x1a/0x30
[   15.113221] 
[   15.113302] The buggy address belongs to the object at ffff8881027b3900
[   15.113302]  which belongs to the cache kmalloc-64 of size 64
[   15.113657] The buggy address is located 0 bytes to the right of
[   15.113657]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.114598] 
[   15.114760] The buggy address belongs to the physical page:
[   15.115312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.116078] flags: 0x200000000000000(node=0|zone=2)
[   15.116517] page_type: f5(slab)
[   15.116888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.117561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.118169] page dumped because: kasan: bad access detected
[   15.118349] 
[   15.118420] Memory state around the buggy address:
[   15.118575]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.118791]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.119003] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.119696]                                      ^
[   15.120203]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.120843]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121459] ==================================================================
[   15.818586] ==================================================================
[   15.818904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.819151] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.819374] 
[   15.819456] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.819496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.819523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.819544] Call Trace:
[   15.819571]  <TASK>
[   15.819586]  dump_stack_lvl+0x73/0xb0
[   15.819613]  print_report+0xd1/0x650
[   15.819635]  ? __virt_addr_valid+0x1db/0x2d0
[   15.819658]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.819680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.819704]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.819727]  kasan_report+0x141/0x180
[   15.819750]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.819777]  kasan_check_range+0x10c/0x1c0
[   15.819801]  __kasan_check_write+0x18/0x20
[   15.819828]  kasan_atomics_helper+0x15b6/0x5450
[   15.819852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.819876]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.819902]  ? kasan_atomics+0x152/0x310
[   15.819929]  kasan_atomics+0x1dc/0x310
[   15.819959]  ? __pfx_kasan_atomics+0x10/0x10
[   15.819982]  ? trace_hardirqs_on+0x37/0xe0
[   15.820013]  ? __pfx_read_tsc+0x10/0x10
[   15.820053]  ? ktime_get_ts64+0x86/0x230
[   15.820078]  kunit_try_run_case+0x1a5/0x480
[   15.820102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820128]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.820155]  ? __kthread_parkme+0x82/0x180
[   15.820177]  ? preempt_count_sub+0x50/0x80
[   15.820202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.820254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.820281]  kthread+0x337/0x6f0
[   15.820302]  ? trace_preempt_on+0x20/0xc0
[   15.820325]  ? __pfx_kthread+0x10/0x10
[   15.820347]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.820379]  ? calculate_sigpending+0x7b/0xa0
[   15.820404]  ? __pfx_kthread+0x10/0x10
[   15.820427]  ret_from_fork+0x116/0x1d0
[   15.820457]  ? __pfx_kthread+0x10/0x10
[   15.820479]  ret_from_fork_asm+0x1a/0x30
[   15.820511]  </TASK>
[   15.820522] 
[   15.829362] Allocated by task 282:
[   15.829565]  kasan_save_stack+0x45/0x70
[   15.829742]  kasan_save_track+0x18/0x40
[   15.830015]  kasan_save_alloc_info+0x3b/0x50
[   15.830233]  __kasan_kmalloc+0xb7/0xc0
[   15.830403]  __kmalloc_cache_noprof+0x189/0x420
[   15.830561]  kasan_atomics+0x95/0x310
[   15.830697]  kunit_try_run_case+0x1a5/0x480
[   15.830878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.831272]  kthread+0x337/0x6f0
[   15.831455]  ret_from_fork+0x116/0x1d0
[   15.831643]  ret_from_fork_asm+0x1a/0x30
[   15.831968] 
[   15.832056] The buggy address belongs to the object at ffff8881027b3900
[   15.832056]  which belongs to the cache kmalloc-64 of size 64
[   15.832715] The buggy address is located 0 bytes to the right of
[   15.832715]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.833369] 
[   15.833503] The buggy address belongs to the physical page:
[   15.833721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.834009] flags: 0x200000000000000(node=0|zone=2)
[   15.834489] page_type: f5(slab)
[   15.834653] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.835141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.835384] page dumped because: kasan: bad access detected
[   15.835571] 
[   15.835663] Memory state around the buggy address:
[   15.835921]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.836394]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.836692] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.837019]                                      ^
[   15.837202]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837422]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837638] ==================================================================
[   15.047683] ==================================================================
[   15.048406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.048876] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.049280] 
[   15.049395] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.049439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.049452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.049506] Call Trace:
[   15.049522]  <TASK>
[   15.049539]  dump_stack_lvl+0x73/0xb0
[   15.049569]  print_report+0xd1/0x650
[   15.049591]  ? __virt_addr_valid+0x1db/0x2d0
[   15.049645]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.049669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.049694]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.049717]  kasan_report+0x141/0x180
[   15.049740]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.049767]  kasan_check_range+0x10c/0x1c0
[   15.049853]  __kasan_check_write+0x18/0x20
[   15.049935]  kasan_atomics_helper+0x4a0/0x5450
[   15.049961]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.049986]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.050055]  ? kasan_atomics+0x152/0x310
[   15.050085]  kasan_atomics+0x1dc/0x310
[   15.050109]  ? __pfx_kasan_atomics+0x10/0x10
[   15.050132]  ? trace_hardirqs_on+0x37/0xe0
[   15.050156]  ? __pfx_read_tsc+0x10/0x10
[   15.050177]  ? ktime_get_ts64+0x86/0x230
[   15.050202]  kunit_try_run_case+0x1a5/0x480
[   15.050226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.050253]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.050279]  ? __kthread_parkme+0x82/0x180
[   15.050300]  ? preempt_count_sub+0x50/0x80
[   15.050325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.050350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.050376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.050402]  kthread+0x337/0x6f0
[   15.050422]  ? trace_preempt_on+0x20/0xc0
[   15.050445]  ? __pfx_kthread+0x10/0x10
[   15.050466]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.050489]  ? calculate_sigpending+0x7b/0xa0
[   15.050516]  ? __pfx_kthread+0x10/0x10
[   15.050538]  ret_from_fork+0x116/0x1d0
[   15.050557]  ? __pfx_kthread+0x10/0x10
[   15.050579]  ret_from_fork_asm+0x1a/0x30
[   15.050610]  </TASK>
[   15.050621] 
[   15.059445] Allocated by task 282:
[   15.059631]  kasan_save_stack+0x45/0x70
[   15.059960]  kasan_save_track+0x18/0x40
[   15.060198]  kasan_save_alloc_info+0x3b/0x50
[   15.060413]  __kasan_kmalloc+0xb7/0xc0
[   15.060551]  __kmalloc_cache_noprof+0x189/0x420
[   15.060769]  kasan_atomics+0x95/0x310
[   15.061137]  kunit_try_run_case+0x1a5/0x480
[   15.061357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.061632]  kthread+0x337/0x6f0
[   15.061757]  ret_from_fork+0x116/0x1d0
[   15.062070]  ret_from_fork_asm+0x1a/0x30
[   15.062317] 
[   15.062448] The buggy address belongs to the object at ffff8881027b3900
[   15.062448]  which belongs to the cache kmalloc-64 of size 64
[   15.063021] The buggy address is located 0 bytes to the right of
[   15.063021]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.063562] 
[   15.063639] The buggy address belongs to the physical page:
[   15.063890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.064272] flags: 0x200000000000000(node=0|zone=2)
[   15.064506] page_type: f5(slab)
[   15.064662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.064951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.065541] page dumped because: kasan: bad access detected
[   15.065748] 
[   15.065885] Memory state around the buggy address:
[   15.066133]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.066545]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.066985] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.067299]                                      ^
[   15.067503]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067941]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.068281] ==================================================================
[   15.202862] ==================================================================
[   15.203345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.203842] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.204248] 
[   15.204353] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.204396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.204409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.204430] Call Trace:
[   15.204445]  <TASK>
[   15.204461]  dump_stack_lvl+0x73/0xb0
[   15.204491]  print_report+0xd1/0x650
[   15.204514]  ? __virt_addr_valid+0x1db/0x2d0
[   15.204538]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.204560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.204585]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.204608]  kasan_report+0x141/0x180
[   15.204631]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.204658]  kasan_check_range+0x10c/0x1c0
[   15.204683]  __kasan_check_write+0x18/0x20
[   15.204703]  kasan_atomics_helper+0x7c7/0x5450
[   15.204727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.204751]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.204778]  ? kasan_atomics+0x152/0x310
[   15.204805]  kasan_atomics+0x1dc/0x310
[   15.204830]  ? __pfx_kasan_atomics+0x10/0x10
[   15.204854]  ? trace_hardirqs_on+0x37/0xe0
[   15.204878]  ? __pfx_read_tsc+0x10/0x10
[   15.204900]  ? ktime_get_ts64+0x86/0x230
[   15.204925]  kunit_try_run_case+0x1a5/0x480
[   15.204950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.204977]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.205003]  ? __kthread_parkme+0x82/0x180
[   15.205024]  ? preempt_count_sub+0x50/0x80
[   15.205059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.205085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.205111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.205138]  kthread+0x337/0x6f0
[   15.205158]  ? trace_preempt_on+0x20/0xc0
[   15.205180]  ? __pfx_kthread+0x10/0x10
[   15.205202]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.205275]  ? calculate_sigpending+0x7b/0xa0
[   15.205305]  ? __pfx_kthread+0x10/0x10
[   15.205327]  ret_from_fork+0x116/0x1d0
[   15.205347]  ? __pfx_kthread+0x10/0x10
[   15.205369]  ret_from_fork_asm+0x1a/0x30
[   15.205400]  </TASK>
[   15.205411] 
[   15.213538] Allocated by task 282:
[   15.213798]  kasan_save_stack+0x45/0x70
[   15.214172]  kasan_save_track+0x18/0x40
[   15.214342]  kasan_save_alloc_info+0x3b/0x50
[   15.214496]  __kasan_kmalloc+0xb7/0xc0
[   15.214681]  __kmalloc_cache_noprof+0x189/0x420
[   15.214898]  kasan_atomics+0x95/0x310
[   15.215097]  kunit_try_run_case+0x1a5/0x480
[   15.215351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.215535]  kthread+0x337/0x6f0
[   15.215667]  ret_from_fork+0x116/0x1d0
[   15.215901]  ret_from_fork_asm+0x1a/0x30
[   15.216160] 
[   15.216258] The buggy address belongs to the object at ffff8881027b3900
[   15.216258]  which belongs to the cache kmalloc-64 of size 64
[   15.216749] The buggy address is located 0 bytes to the right of
[   15.216749]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.217397] 
[   15.217499] The buggy address belongs to the physical page:
[   15.217700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.218062] flags: 0x200000000000000(node=0|zone=2)
[   15.218344] page_type: f5(slab)
[   15.218467] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.218793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.219290] page dumped because: kasan: bad access detected
[   15.219469] 
[   15.219539] Memory state around the buggy address:
[   15.219696]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.219987]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.220309] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.220556]                                      ^
[   15.220714]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.220929]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221528] ==================================================================
[   16.028299] ==================================================================
[   16.028614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.029120] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.029686] 
[   16.030089] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.030138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.030152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.030174] Call Trace:
[   16.030189]  <TASK>
[   16.030204]  dump_stack_lvl+0x73/0xb0
[   16.030235]  print_report+0xd1/0x650
[   16.030258]  ? __virt_addr_valid+0x1db/0x2d0
[   16.030282]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.030305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.030329]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.030352]  kasan_report+0x141/0x180
[   16.030375]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.030402]  kasan_check_range+0x10c/0x1c0
[   16.030427]  __kasan_check_write+0x18/0x20
[   16.030448]  kasan_atomics_helper+0x1b22/0x5450
[   16.030472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.030496]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.030522]  ? kasan_atomics+0x152/0x310
[   16.030550]  kasan_atomics+0x1dc/0x310
[   16.030573]  ? __pfx_kasan_atomics+0x10/0x10
[   16.030597]  ? trace_hardirqs_on+0x37/0xe0
[   16.030622]  ? __pfx_read_tsc+0x10/0x10
[   16.030644]  ? ktime_get_ts64+0x86/0x230
[   16.030669]  kunit_try_run_case+0x1a5/0x480
[   16.030694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.030720]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.030746]  ? __kthread_parkme+0x82/0x180
[   16.030767]  ? preempt_count_sub+0x50/0x80
[   16.030792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.030906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.030948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.030975]  kthread+0x337/0x6f0
[   16.030995]  ? trace_preempt_on+0x20/0xc0
[   16.031018]  ? __pfx_kthread+0x10/0x10
[   16.031052]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.031075]  ? calculate_sigpending+0x7b/0xa0
[   16.031100]  ? __pfx_kthread+0x10/0x10
[   16.031122]  ret_from_fork+0x116/0x1d0
[   16.031142]  ? __pfx_kthread+0x10/0x10
[   16.031163]  ret_from_fork_asm+0x1a/0x30
[   16.031195]  </TASK>
[   16.031205] 
[   16.043337] Allocated by task 282:
[   16.043505]  kasan_save_stack+0x45/0x70
[   16.044182]  kasan_save_track+0x18/0x40
[   16.044378]  kasan_save_alloc_info+0x3b/0x50
[   16.044548]  __kasan_kmalloc+0xb7/0xc0
[   16.044749]  __kmalloc_cache_noprof+0x189/0x420
[   16.045250]  kasan_atomics+0x95/0x310
[   16.045436]  kunit_try_run_case+0x1a5/0x480
[   16.045790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.046296]  kthread+0x337/0x6f0
[   16.046545]  ret_from_fork+0x116/0x1d0
[   16.046802]  ret_from_fork_asm+0x1a/0x30
[   16.047204] 
[   16.047341] The buggy address belongs to the object at ffff8881027b3900
[   16.047341]  which belongs to the cache kmalloc-64 of size 64
[   16.047843] The buggy address is located 0 bytes to the right of
[   16.047843]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.048702] 
[   16.048797] The buggy address belongs to the physical page:
[   16.049288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.049763] flags: 0x200000000000000(node=0|zone=2)
[   16.050176] page_type: f5(slab)
[   16.050409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.050812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.051289] page dumped because: kasan: bad access detected
[   16.051734] 
[   16.052097] Memory state around the buggy address:
[   16.052404]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.052986]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.053457] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.053782]                                      ^
[   16.054183]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.054600]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.055227] ==================================================================
[   15.316083] ==================================================================
[   15.316342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.316677] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.317009] 
[   15.317236] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.317280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.317293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.317314] Call Trace:
[   15.317330]  <TASK>
[   15.317346]  dump_stack_lvl+0x73/0xb0
[   15.317375]  print_report+0xd1/0x650
[   15.317398]  ? __virt_addr_valid+0x1db/0x2d0
[   15.317421]  ? kasan_atomics_helper+0xac7/0x5450
[   15.317443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.317468]  ? kasan_atomics_helper+0xac7/0x5450
[   15.317492]  kasan_report+0x141/0x180
[   15.317514]  ? kasan_atomics_helper+0xac7/0x5450
[   15.317542]  kasan_check_range+0x10c/0x1c0
[   15.317567]  __kasan_check_write+0x18/0x20
[   15.317588]  kasan_atomics_helper+0xac7/0x5450
[   15.317612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.317636]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.317662]  ? kasan_atomics+0x152/0x310
[   15.317690]  kasan_atomics+0x1dc/0x310
[   15.317713]  ? __pfx_kasan_atomics+0x10/0x10
[   15.317738]  ? trace_hardirqs_on+0x37/0xe0
[   15.317762]  ? __pfx_read_tsc+0x10/0x10
[   15.317784]  ? ktime_get_ts64+0x86/0x230
[   15.317808]  kunit_try_run_case+0x1a5/0x480
[   15.317832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.317858]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.317885]  ? __kthread_parkme+0x82/0x180
[   15.317905]  ? preempt_count_sub+0x50/0x80
[   15.317930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.318114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.318151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.318192]  kthread+0x337/0x6f0
[   15.318212]  ? trace_preempt_on+0x20/0xc0
[   15.318236]  ? __pfx_kthread+0x10/0x10
[   15.318257]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.318280]  ? calculate_sigpending+0x7b/0xa0
[   15.318306]  ? __pfx_kthread+0x10/0x10
[   15.318339]  ret_from_fork+0x116/0x1d0
[   15.318359]  ? __pfx_kthread+0x10/0x10
[   15.318383]  ret_from_fork_asm+0x1a/0x30
[   15.318426]  </TASK>
[   15.318437] 
[   15.326853] Allocated by task 282:
[   15.327101]  kasan_save_stack+0x45/0x70
[   15.327286]  kasan_save_track+0x18/0x40
[   15.327465]  kasan_save_alloc_info+0x3b/0x50
[   15.327687]  __kasan_kmalloc+0xb7/0xc0
[   15.327949]  __kmalloc_cache_noprof+0x189/0x420
[   15.328182]  kasan_atomics+0x95/0x310
[   15.328353]  kunit_try_run_case+0x1a5/0x480
[   15.328582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328988]  kthread+0x337/0x6f0
[   15.329189]  ret_from_fork+0x116/0x1d0
[   15.329398]  ret_from_fork_asm+0x1a/0x30
[   15.329586] 
[   15.329660] The buggy address belongs to the object at ffff8881027b3900
[   15.329660]  which belongs to the cache kmalloc-64 of size 64
[   15.330015] The buggy address is located 0 bytes to the right of
[   15.330015]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.330581] 
[   15.330677] The buggy address belongs to the physical page:
[   15.330923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.331505] flags: 0x200000000000000(node=0|zone=2)
[   15.331897] page_type: f5(slab)
[   15.332146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.332465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.332693] page dumped because: kasan: bad access detected
[   15.332884] 
[   15.332977] Memory state around the buggy address:
[   15.333242]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.333641]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334080] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.334373]                                      ^
[   15.334612]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.334915]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335294] ==================================================================
[   15.688515] ==================================================================
[   15.688975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.689438] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.689774] 
[   15.690006] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.690064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.690077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.690098] Call Trace:
[   15.690112]  <TASK>
[   15.690127]  dump_stack_lvl+0x73/0xb0
[   15.690156]  print_report+0xd1/0x650
[   15.690179]  ? __virt_addr_valid+0x1db/0x2d0
[   15.690203]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.690226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.690250]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.690274]  kasan_report+0x141/0x180
[   15.690297]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.690326]  __asan_report_load4_noabort+0x18/0x20
[   15.690352]  kasan_atomics_helper+0x49ce/0x5450
[   15.690376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.690401]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.690427]  ? kasan_atomics+0x152/0x310
[   15.690491]  kasan_atomics+0x1dc/0x310
[   15.690517]  ? __pfx_kasan_atomics+0x10/0x10
[   15.690541]  ? trace_hardirqs_on+0x37/0xe0
[   15.690577]  ? __pfx_read_tsc+0x10/0x10
[   15.690598]  ? ktime_get_ts64+0x86/0x230
[   15.690623]  kunit_try_run_case+0x1a5/0x480
[   15.690648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.690674]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.690700]  ? __kthread_parkme+0x82/0x180
[   15.690722]  ? preempt_count_sub+0x50/0x80
[   15.690747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.690772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.690797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.690872]  kthread+0x337/0x6f0
[   15.690894]  ? trace_preempt_on+0x20/0xc0
[   15.690920]  ? __pfx_kthread+0x10/0x10
[   15.690948]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.690971]  ? calculate_sigpending+0x7b/0xa0
[   15.690996]  ? __pfx_kthread+0x10/0x10
[   15.691019]  ret_from_fork+0x116/0x1d0
[   15.691051]  ? __pfx_kthread+0x10/0x10
[   15.691073]  ret_from_fork_asm+0x1a/0x30
[   15.691104]  </TASK>
[   15.691116] 
[   15.699646] Allocated by task 282:
[   15.699833]  kasan_save_stack+0x45/0x70
[   15.700070]  kasan_save_track+0x18/0x40
[   15.700389]  kasan_save_alloc_info+0x3b/0x50
[   15.700548]  __kasan_kmalloc+0xb7/0xc0
[   15.700686]  __kmalloc_cache_noprof+0x189/0x420
[   15.701092]  kasan_atomics+0x95/0x310
[   15.701321]  kunit_try_run_case+0x1a5/0x480
[   15.701537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701894]  kthread+0x337/0x6f0
[   15.702119]  ret_from_fork+0x116/0x1d0
[   15.702312]  ret_from_fork_asm+0x1a/0x30
[   15.702519] 
[   15.702596] The buggy address belongs to the object at ffff8881027b3900
[   15.702596]  which belongs to the cache kmalloc-64 of size 64
[   15.702994] The buggy address is located 0 bytes to the right of
[   15.702994]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.703691] 
[   15.703796] The buggy address belongs to the physical page:
[   15.704382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.704728] flags: 0x200000000000000(node=0|zone=2)
[   15.704894] page_type: f5(slab)
[   15.705082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.705431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.705773] page dumped because: kasan: bad access detected
[   15.706135] 
[   15.706238] Memory state around the buggy address:
[   15.706503]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.706865]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.707207] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.707427]                                      ^
[   15.707645]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.708191]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.708569] ==================================================================
[   15.335755] ==================================================================
[   15.336314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.336649] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.337118] 
[   15.337206] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.337254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.337278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.337298] Call Trace:
[   15.337314]  <TASK>
[   15.337329]  dump_stack_lvl+0x73/0xb0
[   15.337371]  print_report+0xd1/0x650
[   15.337395]  ? __virt_addr_valid+0x1db/0x2d0
[   15.337418]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.337441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.337465]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.337489]  kasan_report+0x141/0x180
[   15.337512]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.337539]  kasan_check_range+0x10c/0x1c0
[   15.337564]  __kasan_check_write+0x18/0x20
[   15.337586]  kasan_atomics_helper+0xb6a/0x5450
[   15.337609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.337634]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.337660]  ? kasan_atomics+0x152/0x310
[   15.337688]  kasan_atomics+0x1dc/0x310
[   15.337711]  ? __pfx_kasan_atomics+0x10/0x10
[   15.337735]  ? trace_hardirqs_on+0x37/0xe0
[   15.337760]  ? __pfx_read_tsc+0x10/0x10
[   15.337781]  ? ktime_get_ts64+0x86/0x230
[   15.337806]  kunit_try_run_case+0x1a5/0x480
[   15.337832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.337857]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.337925]  ? __kthread_parkme+0x82/0x180
[   15.337969]  ? preempt_count_sub+0x50/0x80
[   15.337995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.338091]  kthread+0x337/0x6f0
[   15.338111]  ? trace_preempt_on+0x20/0xc0
[   15.338134]  ? __pfx_kthread+0x10/0x10
[   15.338166]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.338190]  ? calculate_sigpending+0x7b/0xa0
[   15.338215]  ? __pfx_kthread+0x10/0x10
[   15.338238]  ret_from_fork+0x116/0x1d0
[   15.338258]  ? __pfx_kthread+0x10/0x10
[   15.338279]  ret_from_fork_asm+0x1a/0x30
[   15.338320]  </TASK>
[   15.338330] 
[   15.346654] Allocated by task 282:
[   15.346824]  kasan_save_stack+0x45/0x70
[   15.347256]  kasan_save_track+0x18/0x40
[   15.347432]  kasan_save_alloc_info+0x3b/0x50
[   15.347651]  __kasan_kmalloc+0xb7/0xc0
[   15.347914]  __kmalloc_cache_noprof+0x189/0x420
[   15.348151]  kasan_atomics+0x95/0x310
[   15.348300]  kunit_try_run_case+0x1a5/0x480
[   15.348449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.348626]  kthread+0x337/0x6f0
[   15.348748]  ret_from_fork+0x116/0x1d0
[   15.348882]  ret_from_fork_asm+0x1a/0x30
[   15.349024] 
[   15.349118] The buggy address belongs to the object at ffff8881027b3900
[   15.349118]  which belongs to the cache kmalloc-64 of size 64
[   15.349473] The buggy address is located 0 bytes to the right of
[   15.349473]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.349839] 
[   15.349911] The buggy address belongs to the physical page:
[   15.350095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.350339] flags: 0x200000000000000(node=0|zone=2)
[   15.350504] page_type: f5(slab)
[   15.350623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.352507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.352811] page dumped because: kasan: bad access detected
[   15.352998] 
[   15.353349] Memory state around the buggy address:
[   15.354190]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.354597]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.355154] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.355629]                                      ^
[   15.355861]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.356508]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.356924] ==================================================================
[   16.325660] ==================================================================
[   16.326354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.326594] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.326976] 
[   16.327103] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.327146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.327159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.327179] Call Trace:
[   16.327194]  <TASK>
[   16.327209]  dump_stack_lvl+0x73/0xb0
[   16.327238]  print_report+0xd1/0x650
[   16.327261]  ? __virt_addr_valid+0x1db/0x2d0
[   16.327284]  ? kasan_atomics_helper+0x218a/0x5450
[   16.327306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.327331]  ? kasan_atomics_helper+0x218a/0x5450
[   16.327354]  kasan_report+0x141/0x180
[   16.327386]  ? kasan_atomics_helper+0x218a/0x5450
[   16.327414]  kasan_check_range+0x10c/0x1c0
[   16.327439]  __kasan_check_write+0x18/0x20
[   16.327460]  kasan_atomics_helper+0x218a/0x5450
[   16.327484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.327508]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.327535]  ? kasan_atomics+0x152/0x310
[   16.327562]  kasan_atomics+0x1dc/0x310
[   16.327586]  ? __pfx_kasan_atomics+0x10/0x10
[   16.327609]  ? trace_hardirqs_on+0x37/0xe0
[   16.327633]  ? __pfx_read_tsc+0x10/0x10
[   16.327655]  ? ktime_get_ts64+0x86/0x230
[   16.327679]  kunit_try_run_case+0x1a5/0x480
[   16.327703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.327729]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.327756]  ? __kthread_parkme+0x82/0x180
[   16.327777]  ? preempt_count_sub+0x50/0x80
[   16.327802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.327879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.327906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.327952]  kthread+0x337/0x6f0
[   16.327973]  ? trace_preempt_on+0x20/0xc0
[   16.327997]  ? __pfx_kthread+0x10/0x10
[   16.328021]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.328058]  ? calculate_sigpending+0x7b/0xa0
[   16.328084]  ? __pfx_kthread+0x10/0x10
[   16.328107]  ret_from_fork+0x116/0x1d0
[   16.328127]  ? __pfx_kthread+0x10/0x10
[   16.328148]  ret_from_fork_asm+0x1a/0x30
[   16.328179]  </TASK>
[   16.328191] 
[   16.336151] Allocated by task 282:
[   16.336334]  kasan_save_stack+0x45/0x70
[   16.336534]  kasan_save_track+0x18/0x40
[   16.336729]  kasan_save_alloc_info+0x3b/0x50
[   16.336963]  __kasan_kmalloc+0xb7/0xc0
[   16.337164]  __kmalloc_cache_noprof+0x189/0x420
[   16.337383]  kasan_atomics+0x95/0x310
[   16.337540]  kunit_try_run_case+0x1a5/0x480
[   16.337688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.338115]  kthread+0x337/0x6f0
[   16.338295]  ret_from_fork+0x116/0x1d0
[   16.338468]  ret_from_fork_asm+0x1a/0x30
[   16.338611] 
[   16.338683] The buggy address belongs to the object at ffff8881027b3900
[   16.338683]  which belongs to the cache kmalloc-64 of size 64
[   16.339272] The buggy address is located 0 bytes to the right of
[   16.339272]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.339710] 
[   16.339806] The buggy address belongs to the physical page:
[   16.340234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.340588] flags: 0x200000000000000(node=0|zone=2)
[   16.340776] page_type: f5(slab)
[   16.340953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.341270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.341505] page dumped because: kasan: bad access detected
[   16.341677] 
[   16.341748] Memory state around the buggy address:
[   16.341904]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.342235]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.342561] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.342872]                                      ^
[   16.343220]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.343566]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.344025] ==================================================================
[   16.381505] ==================================================================
[   16.381884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.382285] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.382583] 
[   16.382668] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.382709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.382721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.382741] Call Trace:
[   16.382755]  <TASK>
[   16.382771]  dump_stack_lvl+0x73/0xb0
[   16.382800]  print_report+0xd1/0x650
[   16.382872]  ? __virt_addr_valid+0x1db/0x2d0
[   16.382896]  ? kasan_atomics_helper+0x5115/0x5450
[   16.382919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.382943]  ? kasan_atomics_helper+0x5115/0x5450
[   16.382967]  kasan_report+0x141/0x180
[   16.382990]  ? kasan_atomics_helper+0x5115/0x5450
[   16.383019]  __asan_report_load8_noabort+0x18/0x20
[   16.383059]  kasan_atomics_helper+0x5115/0x5450
[   16.383083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.383108]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.383136]  ? kasan_atomics+0x152/0x310
[   16.383167]  kasan_atomics+0x1dc/0x310
[   16.383192]  ? __pfx_kasan_atomics+0x10/0x10
[   16.383216]  ? trace_hardirqs_on+0x37/0xe0
[   16.383240]  ? __pfx_read_tsc+0x10/0x10
[   16.383262]  ? ktime_get_ts64+0x86/0x230
[   16.383287]  kunit_try_run_case+0x1a5/0x480
[   16.383312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.383338]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.383364]  ? __kthread_parkme+0x82/0x180
[   16.383385]  ? preempt_count_sub+0x50/0x80
[   16.383411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.383436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.383462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.383489]  kthread+0x337/0x6f0
[   16.383509]  ? trace_preempt_on+0x20/0xc0
[   16.383532]  ? __pfx_kthread+0x10/0x10
[   16.383554]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.383576]  ? calculate_sigpending+0x7b/0xa0
[   16.383602]  ? __pfx_kthread+0x10/0x10
[   16.383624]  ret_from_fork+0x116/0x1d0
[   16.383643]  ? __pfx_kthread+0x10/0x10
[   16.383665]  ret_from_fork_asm+0x1a/0x30
[   16.383697]  </TASK>
[   16.383707] 
[   16.391469] Allocated by task 282:
[   16.391607]  kasan_save_stack+0x45/0x70
[   16.391753]  kasan_save_track+0x18/0x40
[   16.391889]  kasan_save_alloc_info+0x3b/0x50
[   16.392055]  __kasan_kmalloc+0xb7/0xc0
[   16.392191]  __kmalloc_cache_noprof+0x189/0x420
[   16.392540]  kasan_atomics+0x95/0x310
[   16.393040]  kunit_try_run_case+0x1a5/0x480
[   16.393272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.393541]  kthread+0x337/0x6f0
[   16.393713]  ret_from_fork+0x116/0x1d0
[   16.393902]  ret_from_fork_asm+0x1a/0x30
[   16.394114] 
[   16.394210] The buggy address belongs to the object at ffff8881027b3900
[   16.394210]  which belongs to the cache kmalloc-64 of size 64
[   16.394623] The buggy address is located 0 bytes to the right of
[   16.394623]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.395268] 
[   16.395346] The buggy address belongs to the physical page:
[   16.395521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.395763] flags: 0x200000000000000(node=0|zone=2)
[   16.395925] page_type: f5(slab)
[   16.396071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.396306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.396595] page dumped because: kasan: bad access detected
[   16.396770] 
[   16.397104] Memory state around the buggy address:
[   16.397283]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.397503]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.397718] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.397931]                                      ^
[   16.398154]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.398470]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.398778] ==================================================================
[   15.122265] ==================================================================
[   15.123098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.123751] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.124473] 
[   15.124649] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.124693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.124706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.124727] Call Trace:
[   15.124742]  <TASK>
[   15.124758]  dump_stack_lvl+0x73/0xb0
[   15.124786]  print_report+0xd1/0x650
[   15.124886]  ? __virt_addr_valid+0x1db/0x2d0
[   15.124912]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.124935]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.124976]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.124999]  kasan_report+0x141/0x180
[   15.125022]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.125060]  kasan_check_range+0x10c/0x1c0
[   15.125086]  __kasan_check_write+0x18/0x20
[   15.125107]  kasan_atomics_helper+0x5fe/0x5450
[   15.125131]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.125156]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.125182]  ? kasan_atomics+0x152/0x310
[   15.125209]  kasan_atomics+0x1dc/0x310
[   15.125233]  ? __pfx_kasan_atomics+0x10/0x10
[   15.125256]  ? trace_hardirqs_on+0x37/0xe0
[   15.125281]  ? __pfx_read_tsc+0x10/0x10
[   15.125303]  ? ktime_get_ts64+0x86/0x230
[   15.125328]  kunit_try_run_case+0x1a5/0x480
[   15.125352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125378]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.125404]  ? __kthread_parkme+0x82/0x180
[   15.125425]  ? preempt_count_sub+0x50/0x80
[   15.125450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.125502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.125529]  kthread+0x337/0x6f0
[   15.125549]  ? trace_preempt_on+0x20/0xc0
[   15.125572]  ? __pfx_kthread+0x10/0x10
[   15.125593]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.125616]  ? calculate_sigpending+0x7b/0xa0
[   15.125642]  ? __pfx_kthread+0x10/0x10
[   15.125664]  ret_from_fork+0x116/0x1d0
[   15.125683]  ? __pfx_kthread+0x10/0x10
[   15.125705]  ret_from_fork_asm+0x1a/0x30
[   15.125736]  </TASK>
[   15.125747] 
[   15.138290] Allocated by task 282:
[   15.138460]  kasan_save_stack+0x45/0x70
[   15.138607]  kasan_save_track+0x18/0x40
[   15.138746]  kasan_save_alloc_info+0x3b/0x50
[   15.139196]  __kasan_kmalloc+0xb7/0xc0
[   15.139566]  __kmalloc_cache_noprof+0x189/0x420
[   15.140062]  kasan_atomics+0x95/0x310
[   15.140412]  kunit_try_run_case+0x1a5/0x480
[   15.140809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.141352]  kthread+0x337/0x6f0
[   15.141487]  ret_from_fork+0x116/0x1d0
[   15.141627]  ret_from_fork_asm+0x1a/0x30
[   15.141769] 
[   15.142038] The buggy address belongs to the object at ffff8881027b3900
[   15.142038]  which belongs to the cache kmalloc-64 of size 64
[   15.143300] The buggy address is located 0 bytes to the right of
[   15.143300]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.144512] 
[   15.144660] The buggy address belongs to the physical page:
[   15.144980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.145651] flags: 0x200000000000000(node=0|zone=2)
[   15.146102] page_type: f5(slab)
[   15.146241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.146474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.146701] page dumped because: kasan: bad access detected
[   15.147139] 
[   15.147297] Memory state around the buggy address:
[   15.147704]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.148709]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.149464] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.150177]                                      ^
[   15.150624]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151001]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151714] ==================================================================
[   16.362419] ==================================================================
[   16.362687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.363218] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.363491] 
[   16.363575] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.363616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.363629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.363650] Call Trace:
[   16.363663]  <TASK>
[   16.363677]  dump_stack_lvl+0x73/0xb0
[   16.363705]  print_report+0xd1/0x650
[   16.363728]  ? __virt_addr_valid+0x1db/0x2d0
[   16.363751]  ? kasan_atomics_helper+0x224c/0x5450
[   16.363774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.363798]  ? kasan_atomics_helper+0x224c/0x5450
[   16.363821]  kasan_report+0x141/0x180
[   16.363845]  ? kasan_atomics_helper+0x224c/0x5450
[   16.363873]  kasan_check_range+0x10c/0x1c0
[   16.363898]  __kasan_check_write+0x18/0x20
[   16.363918]  kasan_atomics_helper+0x224c/0x5450
[   16.364004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.364043]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.364070]  ? kasan_atomics+0x152/0x310
[   16.364098]  kasan_atomics+0x1dc/0x310
[   16.364122]  ? __pfx_kasan_atomics+0x10/0x10
[   16.364146]  ? trace_hardirqs_on+0x37/0xe0
[   16.364170]  ? __pfx_read_tsc+0x10/0x10
[   16.364192]  ? ktime_get_ts64+0x86/0x230
[   16.364215]  kunit_try_run_case+0x1a5/0x480
[   16.364240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.364266]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.364292]  ? __kthread_parkme+0x82/0x180
[   16.364314]  ? preempt_count_sub+0x50/0x80
[   16.364338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.364364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.364390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.364416]  kthread+0x337/0x6f0
[   16.364436]  ? trace_preempt_on+0x20/0xc0
[   16.364459]  ? __pfx_kthread+0x10/0x10
[   16.364481]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.364504]  ? calculate_sigpending+0x7b/0xa0
[   16.364528]  ? __pfx_kthread+0x10/0x10
[   16.364551]  ret_from_fork+0x116/0x1d0
[   16.364570]  ? __pfx_kthread+0x10/0x10
[   16.364591]  ret_from_fork_asm+0x1a/0x30
[   16.364623]  </TASK>
[   16.364633] 
[   16.373069] Allocated by task 282:
[   16.373239]  kasan_save_stack+0x45/0x70
[   16.373418]  kasan_save_track+0x18/0x40
[   16.373589]  kasan_save_alloc_info+0x3b/0x50
[   16.373787]  __kasan_kmalloc+0xb7/0xc0
[   16.373998]  __kmalloc_cache_noprof+0x189/0x420
[   16.374181]  kasan_atomics+0x95/0x310
[   16.374317]  kunit_try_run_case+0x1a5/0x480
[   16.374465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.374643]  kthread+0x337/0x6f0
[   16.374764]  ret_from_fork+0x116/0x1d0
[   16.374897]  ret_from_fork_asm+0x1a/0x30
[   16.375045] 
[   16.375117] The buggy address belongs to the object at ffff8881027b3900
[   16.375117]  which belongs to the cache kmalloc-64 of size 64
[   16.375612] The buggy address is located 0 bytes to the right of
[   16.375612]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.376387] 
[   16.376486] The buggy address belongs to the physical page:
[   16.376735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.377089] flags: 0x200000000000000(node=0|zone=2)
[   16.377440] page_type: f5(slab)
[   16.377785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.378212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.378445] page dumped because: kasan: bad access detected
[   16.378616] 
[   16.378686] Memory state around the buggy address:
[   16.378996]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.379339]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.379658] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.380314]                                      ^
[   16.380523]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.380792]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.381174] ==================================================================
[   15.068775] ==================================================================
[   15.069209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.069591] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.070109] 
[   15.070226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.070270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.070282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.070303] Call Trace:
[   15.070318]  <TASK>
[   15.070334]  dump_stack_lvl+0x73/0xb0
[   15.070364]  print_report+0xd1/0x650
[   15.070387]  ? __virt_addr_valid+0x1db/0x2d0
[   15.070410]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.070475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.070501]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.070525]  kasan_report+0x141/0x180
[   15.070549]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.070610]  __asan_report_store4_noabort+0x1b/0x30
[   15.070638]  kasan_atomics_helper+0x4b3a/0x5450
[   15.070662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.070686]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.070712]  ? kasan_atomics+0x152/0x310
[   15.070740]  kasan_atomics+0x1dc/0x310
[   15.070765]  ? __pfx_kasan_atomics+0x10/0x10
[   15.070789]  ? trace_hardirqs_on+0x37/0xe0
[   15.070937]  ? __pfx_read_tsc+0x10/0x10
[   15.070961]  ? ktime_get_ts64+0x86/0x230
[   15.070985]  kunit_try_run_case+0x1a5/0x480
[   15.071036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071065]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.071092]  ? __kthread_parkme+0x82/0x180
[   15.071113]  ? preempt_count_sub+0x50/0x80
[   15.071138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.071190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.071217]  kthread+0x337/0x6f0
[   15.071236]  ? trace_preempt_on+0x20/0xc0
[   15.071259]  ? __pfx_kthread+0x10/0x10
[   15.071281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.071304]  ? calculate_sigpending+0x7b/0xa0
[   15.071329]  ? __pfx_kthread+0x10/0x10
[   15.071352]  ret_from_fork+0x116/0x1d0
[   15.071371]  ? __pfx_kthread+0x10/0x10
[   15.071393]  ret_from_fork_asm+0x1a/0x30
[   15.071424]  </TASK>
[   15.071436] 
[   15.080415] Allocated by task 282:
[   15.080587]  kasan_save_stack+0x45/0x70
[   15.080791]  kasan_save_track+0x18/0x40
[   15.080990]  kasan_save_alloc_info+0x3b/0x50
[   15.081201]  __kasan_kmalloc+0xb7/0xc0
[   15.081382]  __kmalloc_cache_noprof+0x189/0x420
[   15.081606]  kasan_atomics+0x95/0x310
[   15.081779]  kunit_try_run_case+0x1a5/0x480
[   15.081954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.082307]  kthread+0x337/0x6f0
[   15.082441]  ret_from_fork+0x116/0x1d0
[   15.082578]  ret_from_fork_asm+0x1a/0x30
[   15.082722] 
[   15.082848] The buggy address belongs to the object at ffff8881027b3900
[   15.082848]  which belongs to the cache kmalloc-64 of size 64
[   15.083376] The buggy address is located 0 bytes to the right of
[   15.083376]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.084228] 
[   15.084332] The buggy address belongs to the physical page:
[   15.084650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.085013] flags: 0x200000000000000(node=0|zone=2)
[   15.085208] page_type: f5(slab)
[   15.088192] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.088526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.088873] page dumped because: kasan: bad access detected
[   15.089095] 
[   15.089174] Memory state around the buggy address:
[   15.089368]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.089683]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.090432] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.090648]                                      ^
[   15.090803]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091010]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091338] ==================================================================
[   16.080498] ==================================================================
[   16.080842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.081367] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.081683] 
[   16.081774] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.082141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.082159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.082180] Call Trace:
[   16.082198]  <TASK>
[   16.082212]  dump_stack_lvl+0x73/0xb0
[   16.082344]  print_report+0xd1/0x650
[   16.082367]  ? __virt_addr_valid+0x1db/0x2d0
[   16.082391]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.082414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.082438]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.082462]  kasan_report+0x141/0x180
[   16.082485]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.082512]  __asan_report_load8_noabort+0x18/0x20
[   16.082538]  kasan_atomics_helper+0x4f30/0x5450
[   16.082562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.082586]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.082612]  ? kasan_atomics+0x152/0x310
[   16.082640]  kasan_atomics+0x1dc/0x310
[   16.082663]  ? __pfx_kasan_atomics+0x10/0x10
[   16.082687]  ? trace_hardirqs_on+0x37/0xe0
[   16.082711]  ? __pfx_read_tsc+0x10/0x10
[   16.082733]  ? ktime_get_ts64+0x86/0x230
[   16.082758]  kunit_try_run_case+0x1a5/0x480
[   16.082783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.082854]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.082885]  ? __kthread_parkme+0x82/0x180
[   16.082907]  ? preempt_count_sub+0x50/0x80
[   16.082932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.082959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.082985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.083013]  kthread+0x337/0x6f0
[   16.083045]  ? trace_preempt_on+0x20/0xc0
[   16.083068]  ? __pfx_kthread+0x10/0x10
[   16.083090]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.083112]  ? calculate_sigpending+0x7b/0xa0
[   16.083137]  ? __pfx_kthread+0x10/0x10
[   16.083160]  ret_from_fork+0x116/0x1d0
[   16.083178]  ? __pfx_kthread+0x10/0x10
[   16.083200]  ret_from_fork_asm+0x1a/0x30
[   16.083231]  </TASK>
[   16.083242] 
[   16.093539] Allocated by task 282:
[   16.093694]  kasan_save_stack+0x45/0x70
[   16.094417]  kasan_save_track+0x18/0x40
[   16.094610]  kasan_save_alloc_info+0x3b/0x50
[   16.094779]  __kasan_kmalloc+0xb7/0xc0
[   16.095027]  __kmalloc_cache_noprof+0x189/0x420
[   16.095457]  kasan_atomics+0x95/0x310
[   16.095728]  kunit_try_run_case+0x1a5/0x480
[   16.096253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.096504]  kthread+0x337/0x6f0
[   16.096653]  ret_from_fork+0x116/0x1d0
[   16.096848]  ret_from_fork_asm+0x1a/0x30
[   16.097380] 
[   16.097461] The buggy address belongs to the object at ffff8881027b3900
[   16.097461]  which belongs to the cache kmalloc-64 of size 64
[   16.098289] The buggy address is located 0 bytes to the right of
[   16.098289]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.098951] 
[   16.099119] The buggy address belongs to the physical page:
[   16.099455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.100012] flags: 0x200000000000000(node=0|zone=2)
[   16.100262] page_type: f5(slab)
[   16.100417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.100848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.101303] page dumped because: kasan: bad access detected
[   16.101547] 
[   16.101625] Memory state around the buggy address:
[   16.101838]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.102543]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.103047] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.103440]                                      ^
[   16.103606]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104243]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104614] ==================================================================
[   15.592194] ==================================================================
[   15.592490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.592871] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.593268] 
[   15.593357] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.593399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.593411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.593432] Call Trace:
[   15.593447]  <TASK>
[   15.593463]  dump_stack_lvl+0x73/0xb0
[   15.593492]  print_report+0xd1/0x650
[   15.593515]  ? __virt_addr_valid+0x1db/0x2d0
[   15.593538]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.593561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.593585]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.593609]  kasan_report+0x141/0x180
[   15.593632]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.593659]  __asan_report_load4_noabort+0x18/0x20
[   15.593686]  kasan_atomics_helper+0x4a02/0x5450
[   15.593710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.593734]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.593761]  ? kasan_atomics+0x152/0x310
[   15.593788]  kasan_atomics+0x1dc/0x310
[   15.593876]  ? __pfx_kasan_atomics+0x10/0x10
[   15.593901]  ? trace_hardirqs_on+0x37/0xe0
[   15.593944]  ? __pfx_read_tsc+0x10/0x10
[   15.593966]  ? ktime_get_ts64+0x86/0x230
[   15.593991]  kunit_try_run_case+0x1a5/0x480
[   15.594016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594051]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.594076]  ? __kthread_parkme+0x82/0x180
[   15.594098]  ? preempt_count_sub+0x50/0x80
[   15.594123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.594173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.594223]  kthread+0x337/0x6f0
[   15.594243]  ? trace_preempt_on+0x20/0xc0
[   15.594267]  ? __pfx_kthread+0x10/0x10
[   15.594288]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.594311]  ? calculate_sigpending+0x7b/0xa0
[   15.594335]  ? __pfx_kthread+0x10/0x10
[   15.594358]  ret_from_fork+0x116/0x1d0
[   15.594377]  ? __pfx_kthread+0x10/0x10
[   15.594399]  ret_from_fork_asm+0x1a/0x30
[   15.594431]  </TASK>
[   15.594441] 
[   15.605696] Allocated by task 282:
[   15.606121]  kasan_save_stack+0x45/0x70
[   15.606423]  kasan_save_track+0x18/0x40
[   15.606701]  kasan_save_alloc_info+0x3b/0x50
[   15.607043]  __kasan_kmalloc+0xb7/0xc0
[   15.607322]  __kmalloc_cache_noprof+0x189/0x420
[   15.607540]  kasan_atomics+0x95/0x310
[   15.607716]  kunit_try_run_case+0x1a5/0x480
[   15.608164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.608382]  kthread+0x337/0x6f0
[   15.608707]  ret_from_fork+0x116/0x1d0
[   15.609108]  ret_from_fork_asm+0x1a/0x30
[   15.609334] 
[   15.609426] The buggy address belongs to the object at ffff8881027b3900
[   15.609426]  which belongs to the cache kmalloc-64 of size 64
[   15.610178] The buggy address is located 0 bytes to the right of
[   15.610178]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.611112] 
[   15.611216] The buggy address belongs to the physical page:
[   15.611975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.613388] flags: 0x200000000000000(node=0|zone=2)
[   15.614076] page_type: f5(slab)
[   15.614209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.614445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.614674] page dumped because: kasan: bad access detected
[   15.615540] 
[   15.616012] Memory state around the buggy address:
[   15.616641]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.617733]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.618618] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.619789]                                      ^
[   15.620378]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.620605]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.621266] ==================================================================
[   16.221685] ==================================================================
[   16.222200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.222514] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.222737] 
[   16.222820] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.222885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.222898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.222935] Call Trace:
[   16.222949]  <TASK>
[   16.222965]  dump_stack_lvl+0x73/0xb0
[   16.222993]  print_report+0xd1/0x650
[   16.223016]  ? __virt_addr_valid+0x1db/0x2d0
[   16.223048]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.223071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.223095]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.223118]  kasan_report+0x141/0x180
[   16.223141]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.223169]  __asan_report_load8_noabort+0x18/0x20
[   16.223195]  kasan_atomics_helper+0x4f71/0x5450
[   16.223219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.223243]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.223270]  ? kasan_atomics+0x152/0x310
[   16.223297]  kasan_atomics+0x1dc/0x310
[   16.223320]  ? __pfx_kasan_atomics+0x10/0x10
[   16.223344]  ? trace_hardirqs_on+0x37/0xe0
[   16.223392]  ? __pfx_read_tsc+0x10/0x10
[   16.223438]  ? ktime_get_ts64+0x86/0x230
[   16.223463]  kunit_try_run_case+0x1a5/0x480
[   16.223488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.223514]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.223540]  ? __kthread_parkme+0x82/0x180
[   16.223561]  ? preempt_count_sub+0x50/0x80
[   16.223586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.223612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.223640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.223669]  kthread+0x337/0x6f0
[   16.223689]  ? trace_preempt_on+0x20/0xc0
[   16.223712]  ? __pfx_kthread+0x10/0x10
[   16.223734]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.223757]  ? calculate_sigpending+0x7b/0xa0
[   16.223783]  ? __pfx_kthread+0x10/0x10
[   16.223813]  ret_from_fork+0x116/0x1d0
[   16.223832]  ? __pfx_kthread+0x10/0x10
[   16.223885]  ret_from_fork_asm+0x1a/0x30
[   16.223932]  </TASK>
[   16.223947] 
[   16.231861] Allocated by task 282:
[   16.232084]  kasan_save_stack+0x45/0x70
[   16.232291]  kasan_save_track+0x18/0x40
[   16.232482]  kasan_save_alloc_info+0x3b/0x50
[   16.232819]  __kasan_kmalloc+0xb7/0xc0
[   16.233050]  __kmalloc_cache_noprof+0x189/0x420
[   16.233243]  kasan_atomics+0x95/0x310
[   16.233380]  kunit_try_run_case+0x1a5/0x480
[   16.233576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.233902]  kthread+0x337/0x6f0
[   16.234085]  ret_from_fork+0x116/0x1d0
[   16.234262]  ret_from_fork_asm+0x1a/0x30
[   16.234465] 
[   16.234559] The buggy address belongs to the object at ffff8881027b3900
[   16.234559]  which belongs to the cache kmalloc-64 of size 64
[   16.235115] The buggy address is located 0 bytes to the right of
[   16.235115]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.235482] 
[   16.235555] The buggy address belongs to the physical page:
[   16.235988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.236352] flags: 0x200000000000000(node=0|zone=2)
[   16.236585] page_type: f5(slab)
[   16.236815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.237134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.237465] page dumped because: kasan: bad access detected
[   16.237638] 
[   16.237707] Memory state around the buggy address:
[   16.237887]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.238347]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.238681] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.239215]                                      ^
[   16.239442]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.239744]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.240241] ==================================================================
[   16.240636] ==================================================================
[   16.241089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.241565] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.241855] 
[   16.241955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.241997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.242011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.242061] Call Trace:
[   16.242077]  <TASK>
[   16.242092]  dump_stack_lvl+0x73/0xb0
[   16.242121]  print_report+0xd1/0x650
[   16.242143]  ? __virt_addr_valid+0x1db/0x2d0
[   16.242166]  ? kasan_atomics_helper+0x2006/0x5450
[   16.242189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.242214]  ? kasan_atomics_helper+0x2006/0x5450
[   16.242237]  kasan_report+0x141/0x180
[   16.242285]  ? kasan_atomics_helper+0x2006/0x5450
[   16.242314]  kasan_check_range+0x10c/0x1c0
[   16.242338]  __kasan_check_write+0x18/0x20
[   16.242359]  kasan_atomics_helper+0x2006/0x5450
[   16.242383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.242407]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.242433]  ? kasan_atomics+0x152/0x310
[   16.242461]  kasan_atomics+0x1dc/0x310
[   16.242485]  ? __pfx_kasan_atomics+0x10/0x10
[   16.242509]  ? trace_hardirqs_on+0x37/0xe0
[   16.242532]  ? __pfx_read_tsc+0x10/0x10
[   16.242555]  ? ktime_get_ts64+0x86/0x230
[   16.242579]  kunit_try_run_case+0x1a5/0x480
[   16.242603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.242630]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.242657]  ? __kthread_parkme+0x82/0x180
[   16.242678]  ? preempt_count_sub+0x50/0x80
[   16.242703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.242729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.242754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.242819]  kthread+0x337/0x6f0
[   16.242840]  ? trace_preempt_on+0x20/0xc0
[   16.242863]  ? __pfx_kthread+0x10/0x10
[   16.242895]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.242933]  ? calculate_sigpending+0x7b/0xa0
[   16.242958]  ? __pfx_kthread+0x10/0x10
[   16.242981]  ret_from_fork+0x116/0x1d0
[   16.243001]  ? __pfx_kthread+0x10/0x10
[   16.243023]  ret_from_fork_asm+0x1a/0x30
[   16.243063]  </TASK>
[   16.243075] 
[   16.250870] Allocated by task 282:
[   16.251035]  kasan_save_stack+0x45/0x70
[   16.251245]  kasan_save_track+0x18/0x40
[   16.251448]  kasan_save_alloc_info+0x3b/0x50
[   16.251820]  __kasan_kmalloc+0xb7/0xc0
[   16.252063]  __kmalloc_cache_noprof+0x189/0x420
[   16.252357]  kasan_atomics+0x95/0x310
[   16.252504]  kunit_try_run_case+0x1a5/0x480
[   16.252655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.252834]  kthread+0x337/0x6f0
[   16.252981]  ret_from_fork+0x116/0x1d0
[   16.253180]  ret_from_fork_asm+0x1a/0x30
[   16.253533] 
[   16.253651] The buggy address belongs to the object at ffff8881027b3900
[   16.253651]  which belongs to the cache kmalloc-64 of size 64
[   16.254337] The buggy address is located 0 bytes to the right of
[   16.254337]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.254717] 
[   16.254787] The buggy address belongs to the physical page:
[   16.254960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.255593] flags: 0x200000000000000(node=0|zone=2)
[   16.256148] page_type: f5(slab)
[   16.256546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.257422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.258129] page dumped because: kasan: bad access detected
[   16.258747] 
[   16.258909] Memory state around the buggy address:
[   16.259415]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.260236]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.260558] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.260765]                                      ^
[   16.260924]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261197]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261503] ==================================================================
[   16.203199] ==================================================================
[   16.203608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.204017] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.204257] 
[   16.204344] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.204386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.204423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.204445] Call Trace:
[   16.204458]  <TASK>
[   16.204473]  dump_stack_lvl+0x73/0xb0
[   16.204504]  print_report+0xd1/0x650
[   16.204545]  ? __virt_addr_valid+0x1db/0x2d0
[   16.204569]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.204604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.204649]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.204673]  kasan_report+0x141/0x180
[   16.204696]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.204723]  kasan_check_range+0x10c/0x1c0
[   16.204748]  __kasan_check_write+0x18/0x20
[   16.204798]  kasan_atomics_helper+0x1f43/0x5450
[   16.204823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.204847]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.204891]  ? kasan_atomics+0x152/0x310
[   16.204926]  kasan_atomics+0x1dc/0x310
[   16.204950]  ? __pfx_kasan_atomics+0x10/0x10
[   16.204974]  ? trace_hardirqs_on+0x37/0xe0
[   16.204999]  ? __pfx_read_tsc+0x10/0x10
[   16.205020]  ? ktime_get_ts64+0x86/0x230
[   16.205054]  kunit_try_run_case+0x1a5/0x480
[   16.205079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.205105]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.205131]  ? __kthread_parkme+0x82/0x180
[   16.205153]  ? preempt_count_sub+0x50/0x80
[   16.205177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.205203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.205228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.205256]  kthread+0x337/0x6f0
[   16.205306]  ? trace_preempt_on+0x20/0xc0
[   16.205331]  ? __pfx_kthread+0x10/0x10
[   16.205352]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.205375]  ? calculate_sigpending+0x7b/0xa0
[   16.205401]  ? __pfx_kthread+0x10/0x10
[   16.205423]  ret_from_fork+0x116/0x1d0
[   16.205443]  ? __pfx_kthread+0x10/0x10
[   16.205464]  ret_from_fork_asm+0x1a/0x30
[   16.205496]  </TASK>
[   16.205507] 
[   16.213453] Allocated by task 282:
[   16.213579]  kasan_save_stack+0x45/0x70
[   16.213723]  kasan_save_track+0x18/0x40
[   16.214027]  kasan_save_alloc_info+0x3b/0x50
[   16.214252]  __kasan_kmalloc+0xb7/0xc0
[   16.214462]  __kmalloc_cache_noprof+0x189/0x420
[   16.214706]  kasan_atomics+0x95/0x310
[   16.214903]  kunit_try_run_case+0x1a5/0x480
[   16.215194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.215442]  kthread+0x337/0x6f0
[   16.215582]  ret_from_fork+0x116/0x1d0
[   16.215754]  ret_from_fork_asm+0x1a/0x30
[   16.215967] 
[   16.216075] The buggy address belongs to the object at ffff8881027b3900
[   16.216075]  which belongs to the cache kmalloc-64 of size 64
[   16.216625] The buggy address is located 0 bytes to the right of
[   16.216625]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.217105] 
[   16.217179] The buggy address belongs to the physical page:
[   16.217353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.217594] flags: 0x200000000000000(node=0|zone=2)
[   16.217868] page_type: f5(slab)
[   16.218068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.218555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.218961] page dumped because: kasan: bad access detected
[   16.219155] 
[   16.219225] Memory state around the buggy address:
[   16.219380]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.219597]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.219967] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.220300]                                      ^
[   16.220570]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.220964]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.221265] ==================================================================
[   14.911523] ==================================================================
[   14.912194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.912513] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   14.912803] 
[   14.912915] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.912959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.912969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.912990] Call Trace:
[   14.913015]  <TASK>
[   14.913041]  dump_stack_lvl+0x73/0xb0
[   14.913072]  print_report+0xd1/0x650
[   14.913094]  ? __virt_addr_valid+0x1db/0x2d0
[   14.913117]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.913140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.913164]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.913186]  kasan_report+0x141/0x180
[   14.913207]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.913234]  __asan_report_load4_noabort+0x18/0x20
[   14.913259]  kasan_atomics_helper+0x4bbc/0x5450
[   14.913283]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.913305]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.913330]  ? kasan_atomics+0x152/0x310
[   14.913356]  kasan_atomics+0x1dc/0x310
[   14.913378]  ? __pfx_kasan_atomics+0x10/0x10
[   14.913401]  ? trace_hardirqs_on+0x37/0xe0
[   14.913424]  ? __pfx_read_tsc+0x10/0x10
[   14.913445]  ? ktime_get_ts64+0x86/0x230
[   14.913469]  kunit_try_run_case+0x1a5/0x480
[   14.913494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.913519]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.913544]  ? __kthread_parkme+0x82/0x180
[   14.913564]  ? preempt_count_sub+0x50/0x80
[   14.913588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.913612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.913636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.913662]  kthread+0x337/0x6f0
[   14.913681]  ? trace_preempt_on+0x20/0xc0
[   14.913704]  ? __pfx_kthread+0x10/0x10
[   14.913723]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.913745]  ? calculate_sigpending+0x7b/0xa0
[   14.913769]  ? __pfx_kthread+0x10/0x10
[   14.913790]  ret_from_fork+0x116/0x1d0
[   14.913808]  ? __pfx_kthread+0x10/0x10
[   14.913829]  ret_from_fork_asm+0x1a/0x30
[   14.913860]  </TASK>
[   14.913870] 
[   14.925113] Allocated by task 282:
[   14.925292]  kasan_save_stack+0x45/0x70
[   14.925476]  kasan_save_track+0x18/0x40
[   14.925638]  kasan_save_alloc_info+0x3b/0x50
[   14.925832]  __kasan_kmalloc+0xb7/0xc0
[   14.925992]  __kmalloc_cache_noprof+0x189/0x420
[   14.927071]  kasan_atomics+0x95/0x310
[   14.927385]  kunit_try_run_case+0x1a5/0x480
[   14.927697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.928074]  kthread+0x337/0x6f0
[   14.928487]  ret_from_fork+0x116/0x1d0
[   14.928779]  ret_from_fork_asm+0x1a/0x30
[   14.929194] 
[   14.929291] The buggy address belongs to the object at ffff8881027b3900
[   14.929291]  which belongs to the cache kmalloc-64 of size 64
[   14.929761] The buggy address is located 0 bytes to the right of
[   14.929761]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   14.930788] 
[   14.931064] The buggy address belongs to the physical page:
[   14.931578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   14.932126] flags: 0x200000000000000(node=0|zone=2)
[   14.932464] page_type: f5(slab)
[   14.932740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.933315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.933702] page dumped because: kasan: bad access detected
[   14.934150] 
[   14.934382] Memory state around the buggy address:
[   14.934780]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.935247]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.935571] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.935873]                                      ^
[   14.936545]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937054]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937353] ==================================================================
[   15.666427] ==================================================================
[   15.666722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.667251] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.667710] 
[   15.667873] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.667960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.667974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.668007] Call Trace:
[   15.668024]  <TASK>
[   15.668082]  dump_stack_lvl+0x73/0xb0
[   15.668115]  print_report+0xd1/0x650
[   15.668137]  ? __virt_addr_valid+0x1db/0x2d0
[   15.668171]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.668194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.668219]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.668242]  kasan_report+0x141/0x180
[   15.668264]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.668292]  kasan_check_range+0x10c/0x1c0
[   15.668318]  __kasan_check_write+0x18/0x20
[   15.668339]  kasan_atomics_helper+0x12e6/0x5450
[   15.668363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.668387]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.668413]  ? kasan_atomics+0x152/0x310
[   15.668467]  kasan_atomics+0x1dc/0x310
[   15.668492]  ? __pfx_kasan_atomics+0x10/0x10
[   15.668516]  ? trace_hardirqs_on+0x37/0xe0
[   15.668552]  ? __pfx_read_tsc+0x10/0x10
[   15.668574]  ? ktime_get_ts64+0x86/0x230
[   15.668624]  kunit_try_run_case+0x1a5/0x480
[   15.668649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.668676]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.668713]  ? __kthread_parkme+0x82/0x180
[   15.668734]  ? preempt_count_sub+0x50/0x80
[   15.668758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.668794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.668868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.668896]  kthread+0x337/0x6f0
[   15.668917]  ? trace_preempt_on+0x20/0xc0
[   15.668940]  ? __pfx_kthread+0x10/0x10
[   15.668962]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.668985]  ? calculate_sigpending+0x7b/0xa0
[   15.669009]  ? __pfx_kthread+0x10/0x10
[   15.669043]  ret_from_fork+0x116/0x1d0
[   15.669062]  ? __pfx_kthread+0x10/0x10
[   15.669085]  ret_from_fork_asm+0x1a/0x30
[   15.669116]  </TASK>
[   15.669126] 
[   15.678200] Allocated by task 282:
[   15.678379]  kasan_save_stack+0x45/0x70
[   15.678579]  kasan_save_track+0x18/0x40
[   15.678757]  kasan_save_alloc_info+0x3b/0x50
[   15.678955]  __kasan_kmalloc+0xb7/0xc0
[   15.679335]  __kmalloc_cache_noprof+0x189/0x420
[   15.679504]  kasan_atomics+0x95/0x310
[   15.679637]  kunit_try_run_case+0x1a5/0x480
[   15.679779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.679958]  kthread+0x337/0x6f0
[   15.680090]  ret_from_fork+0x116/0x1d0
[   15.680224]  ret_from_fork_asm+0x1a/0x30
[   15.680515] 
[   15.680854] The buggy address belongs to the object at ffff8881027b3900
[   15.680854]  which belongs to the cache kmalloc-64 of size 64
[   15.682074] The buggy address is located 0 bytes to the right of
[   15.682074]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.682683] 
[   15.682783] The buggy address belongs to the physical page:
[   15.683189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.683590] flags: 0x200000000000000(node=0|zone=2)
[   15.683808] page_type: f5(slab)
[   15.684166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.684420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.684672] page dumped because: kasan: bad access detected
[   15.685288] 
[   15.685578] Memory state around the buggy address:
[   15.685808]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.686261]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.686554] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.686977]                                      ^
[   15.687248]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687539]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687994] ==================================================================
[   15.937174] ==================================================================
[   15.937512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.937822] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.938223] 
[   15.938355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.938397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.938410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.938430] Call Trace:
[   15.938445]  <TASK>
[   15.938460]  dump_stack_lvl+0x73/0xb0
[   15.938490]  print_report+0xd1/0x650
[   15.938513]  ? __virt_addr_valid+0x1db/0x2d0
[   15.938536]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.938559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.938594]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.938624]  kasan_report+0x141/0x180
[   15.938654]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.938682]  kasan_check_range+0x10c/0x1c0
[   15.938706]  __kasan_check_write+0x18/0x20
[   15.938728]  kasan_atomics_helper+0x18b1/0x5450
[   15.938762]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.938787]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.938819]  ? kasan_atomics+0x152/0x310
[   15.938857]  kasan_atomics+0x1dc/0x310
[   15.938882]  ? __pfx_kasan_atomics+0x10/0x10
[   15.938906]  ? trace_hardirqs_on+0x37/0xe0
[   15.938939]  ? __pfx_read_tsc+0x10/0x10
[   15.938961]  ? ktime_get_ts64+0x86/0x230
[   15.938986]  kunit_try_run_case+0x1a5/0x480
[   15.939011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939057]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.939084]  ? __kthread_parkme+0x82/0x180
[   15.939104]  ? preempt_count_sub+0x50/0x80
[   15.939139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.939226]  kthread+0x337/0x6f0
[   15.939246]  ? trace_preempt_on+0x20/0xc0
[   15.939269]  ? __pfx_kthread+0x10/0x10
[   15.939290]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.939323]  ? calculate_sigpending+0x7b/0xa0
[   15.939348]  ? __pfx_kthread+0x10/0x10
[   15.939370]  ret_from_fork+0x116/0x1d0
[   15.939398]  ? __pfx_kthread+0x10/0x10
[   15.939420]  ret_from_fork_asm+0x1a/0x30
[   15.939451]  </TASK>
[   15.939472] 
[   15.947607] Allocated by task 282:
[   15.947892]  kasan_save_stack+0x45/0x70
[   15.948325]  kasan_save_track+0x18/0x40
[   15.948499]  kasan_save_alloc_info+0x3b/0x50
[   15.948649]  __kasan_kmalloc+0xb7/0xc0
[   15.948782]  __kmalloc_cache_noprof+0x189/0x420
[   15.948939]  kasan_atomics+0x95/0x310
[   15.949083]  kunit_try_run_case+0x1a5/0x480
[   15.949457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.949714]  kthread+0x337/0x6f0
[   15.949907]  ret_from_fork+0x116/0x1d0
[   15.950119]  ret_from_fork_asm+0x1a/0x30
[   15.950344] 
[   15.950484] The buggy address belongs to the object at ffff8881027b3900
[   15.950484]  which belongs to the cache kmalloc-64 of size 64
[   15.950942] The buggy address is located 0 bytes to the right of
[   15.950942]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.951591] 
[   15.951684] The buggy address belongs to the physical page:
[   15.952094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.952412] flags: 0x200000000000000(node=0|zone=2)
[   15.952577] page_type: f5(slab)
[   15.952717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.953135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.953680] page dumped because: kasan: bad access detected
[   15.953950] 
[   15.954021] Memory state around the buggy address:
[   15.954340]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.954706]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.955014] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.955302]                                      ^
[   15.955457]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.955674]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.955888] ==================================================================
[   15.295039] ==================================================================
[   15.295629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.296139] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.296454] 
[   15.296572] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.296616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.296640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.296661] Call Trace:
[   15.296677]  <TASK>
[   15.296692]  dump_stack_lvl+0x73/0xb0
[   15.296721]  print_report+0xd1/0x650
[   15.296744]  ? __virt_addr_valid+0x1db/0x2d0
[   15.296776]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.296799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.296823]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.296857]  kasan_report+0x141/0x180
[   15.296880]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.296908]  kasan_check_range+0x10c/0x1c0
[   15.296933]  __kasan_check_write+0x18/0x20
[   15.296983]  kasan_atomics_helper+0xa2b/0x5450
[   15.297008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.297081]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.297111]  ? kasan_atomics+0x152/0x310
[   15.297139]  kasan_atomics+0x1dc/0x310
[   15.297163]  ? __pfx_kasan_atomics+0x10/0x10
[   15.297187]  ? trace_hardirqs_on+0x37/0xe0
[   15.297212]  ? __pfx_read_tsc+0x10/0x10
[   15.297234]  ? ktime_get_ts64+0x86/0x230
[   15.297271]  kunit_try_run_case+0x1a5/0x480
[   15.297297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.297336]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.297362]  ? __kthread_parkme+0x82/0x180
[   15.297383]  ? preempt_count_sub+0x50/0x80
[   15.297407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.297441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.297467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.297493]  kthread+0x337/0x6f0
[   15.297524]  ? trace_preempt_on+0x20/0xc0
[   15.297547]  ? __pfx_kthread+0x10/0x10
[   15.297568]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.297599]  ? calculate_sigpending+0x7b/0xa0
[   15.297625]  ? __pfx_kthread+0x10/0x10
[   15.297647]  ret_from_fork+0x116/0x1d0
[   15.297677]  ? __pfx_kthread+0x10/0x10
[   15.297698]  ret_from_fork_asm+0x1a/0x30
[   15.297729]  </TASK>
[   15.297748] 
[   15.306481] Allocated by task 282:
[   15.306673]  kasan_save_stack+0x45/0x70
[   15.306906]  kasan_save_track+0x18/0x40
[   15.307317]  kasan_save_alloc_info+0x3b/0x50
[   15.307519]  __kasan_kmalloc+0xb7/0xc0
[   15.307722]  __kmalloc_cache_noprof+0x189/0x420
[   15.308052]  kasan_atomics+0x95/0x310
[   15.308249]  kunit_try_run_case+0x1a5/0x480
[   15.308451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.308689]  kthread+0x337/0x6f0
[   15.308930]  ret_from_fork+0x116/0x1d0
[   15.309120]  ret_from_fork_asm+0x1a/0x30
[   15.309321] 
[   15.309435] The buggy address belongs to the object at ffff8881027b3900
[   15.309435]  which belongs to the cache kmalloc-64 of size 64
[   15.310080] The buggy address is located 0 bytes to the right of
[   15.310080]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.310485] 
[   15.310561] The buggy address belongs to the physical page:
[   15.310732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.311153] flags: 0x200000000000000(node=0|zone=2)
[   15.311448] page_type: f5(slab)
[   15.311617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.312237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.312569] page dumped because: kasan: bad access detected
[   15.312747] 
[   15.312864] Memory state around the buggy address:
[   15.313279]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.313766]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.313990] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.314650]                                      ^
[   15.314980]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.315299]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.315535] ==================================================================
[   15.152487] ==================================================================
[   15.153152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.153773] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.154473] 
[   15.154564] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.154608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.154621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.154641] Call Trace:
[   15.154657]  <TASK>
[   15.154673]  dump_stack_lvl+0x73/0xb0
[   15.154702]  print_report+0xd1/0x650
[   15.154725]  ? __virt_addr_valid+0x1db/0x2d0
[   15.154749]  ? kasan_atomics_helper+0x697/0x5450
[   15.154771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.154796]  ? kasan_atomics_helper+0x697/0x5450
[   15.154864]  kasan_report+0x141/0x180
[   15.154888]  ? kasan_atomics_helper+0x697/0x5450
[   15.154916]  kasan_check_range+0x10c/0x1c0
[   15.154941]  __kasan_check_write+0x18/0x20
[   15.154974]  kasan_atomics_helper+0x697/0x5450
[   15.154999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.155023]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.155060]  ? kasan_atomics+0x152/0x310
[   15.155088]  kasan_atomics+0x1dc/0x310
[   15.155111]  ? __pfx_kasan_atomics+0x10/0x10
[   15.155135]  ? trace_hardirqs_on+0x37/0xe0
[   15.155159]  ? __pfx_read_tsc+0x10/0x10
[   15.155181]  ? ktime_get_ts64+0x86/0x230
[   15.155205]  kunit_try_run_case+0x1a5/0x480
[   15.155230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.155257]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.155284]  ? __kthread_parkme+0x82/0x180
[   15.155305]  ? preempt_count_sub+0x50/0x80
[   15.155330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.155357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.155382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.155409]  kthread+0x337/0x6f0
[   15.155429]  ? trace_preempt_on+0x20/0xc0
[   15.155452]  ? __pfx_kthread+0x10/0x10
[   15.155474]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.155497]  ? calculate_sigpending+0x7b/0xa0
[   15.155521]  ? __pfx_kthread+0x10/0x10
[   15.155544]  ret_from_fork+0x116/0x1d0
[   15.155564]  ? __pfx_kthread+0x10/0x10
[   15.155586]  ret_from_fork_asm+0x1a/0x30
[   15.155617]  </TASK>
[   15.155628] 
[   15.169966] Allocated by task 282:
[   15.170115]  kasan_save_stack+0x45/0x70
[   15.170426]  kasan_save_track+0x18/0x40
[   15.170621]  kasan_save_alloc_info+0x3b/0x50
[   15.170827]  __kasan_kmalloc+0xb7/0xc0
[   15.171073]  __kmalloc_cache_noprof+0x189/0x420
[   15.171237]  kasan_atomics+0x95/0x310
[   15.171397]  kunit_try_run_case+0x1a5/0x480
[   15.171606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.171861]  kthread+0x337/0x6f0
[   15.172129]  ret_from_fork+0x116/0x1d0
[   15.172273]  ret_from_fork_asm+0x1a/0x30
[   15.172490] 
[   15.172585] The buggy address belongs to the object at ffff8881027b3900
[   15.172585]  which belongs to the cache kmalloc-64 of size 64
[   15.173166] The buggy address is located 0 bytes to the right of
[   15.173166]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.173591] 
[   15.173690] The buggy address belongs to the physical page:
[   15.173968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.174448] flags: 0x200000000000000(node=0|zone=2)
[   15.174658] page_type: f5(slab)
[   15.174823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.175497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.175819] page dumped because: kasan: bad access detected
[   15.176189] 
[   15.176266] Memory state around the buggy address:
[   15.176424]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.176738]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.177172] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.177513]                                      ^
[   15.177743]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.178157]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.178445] ==================================================================
[   15.453351] ==================================================================
[   15.453700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.454368] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.454710] 
[   15.454915] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.455003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.455017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.455050] Call Trace:
[   15.455065]  <TASK>
[   15.455080]  dump_stack_lvl+0x73/0xb0
[   15.455111]  print_report+0xd1/0x650
[   15.455133]  ? __virt_addr_valid+0x1db/0x2d0
[   15.455157]  ? kasan_atomics_helper+0xe78/0x5450
[   15.455180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.455204]  ? kasan_atomics_helper+0xe78/0x5450
[   15.455227]  kasan_report+0x141/0x180
[   15.455285]  ? kasan_atomics_helper+0xe78/0x5450
[   15.455314]  kasan_check_range+0x10c/0x1c0
[   15.455340]  __kasan_check_write+0x18/0x20
[   15.455362]  kasan_atomics_helper+0xe78/0x5450
[   15.455386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.455436]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.455487]  ? kasan_atomics+0x152/0x310
[   15.455515]  kasan_atomics+0x1dc/0x310
[   15.455539]  ? __pfx_kasan_atomics+0x10/0x10
[   15.455562]  ? trace_hardirqs_on+0x37/0xe0
[   15.455587]  ? __pfx_read_tsc+0x10/0x10
[   15.455608]  ? ktime_get_ts64+0x86/0x230
[   15.455633]  kunit_try_run_case+0x1a5/0x480
[   15.455658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.455684]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.455709]  ? __kthread_parkme+0x82/0x180
[   15.455731]  ? preempt_count_sub+0x50/0x80
[   15.455756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.455782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.455807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.455911]  kthread+0x337/0x6f0
[   15.455932]  ? trace_preempt_on+0x20/0xc0
[   15.455961]  ? __pfx_kthread+0x10/0x10
[   15.455983]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.456006]  ? calculate_sigpending+0x7b/0xa0
[   15.456042]  ? __pfx_kthread+0x10/0x10
[   15.456064]  ret_from_fork+0x116/0x1d0
[   15.456084]  ? __pfx_kthread+0x10/0x10
[   15.456106]  ret_from_fork_asm+0x1a/0x30
[   15.456139]  </TASK>
[   15.456150] 
[   15.465154] Allocated by task 282:
[   15.465292]  kasan_save_stack+0x45/0x70
[   15.465438]  kasan_save_track+0x18/0x40
[   15.465760]  kasan_save_alloc_info+0x3b/0x50
[   15.466493]  __kasan_kmalloc+0xb7/0xc0
[   15.466697]  __kmalloc_cache_noprof+0x189/0x420
[   15.467168]  kasan_atomics+0x95/0x310
[   15.467382]  kunit_try_run_case+0x1a5/0x480
[   15.467536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.467775]  kthread+0x337/0x6f0
[   15.468100]  ret_from_fork+0x116/0x1d0
[   15.468330]  ret_from_fork_asm+0x1a/0x30
[   15.468531] 
[   15.468660] The buggy address belongs to the object at ffff8881027b3900
[   15.468660]  which belongs to the cache kmalloc-64 of size 64
[   15.469270] The buggy address is located 0 bytes to the right of
[   15.469270]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.470252] 
[   15.470335] The buggy address belongs to the physical page:
[   15.470588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.471196] flags: 0x200000000000000(node=0|zone=2)
[   15.471458] page_type: f5(slab)
[   15.471614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.472106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.472443] page dumped because: kasan: bad access detected
[   15.472709] 
[   15.472848] Memory state around the buggy address:
[   15.473174]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.473514]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.473808] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.474121]                                      ^
[   15.474555]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.474871]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.475410] ==================================================================
[   15.709004] ==================================================================
[   15.709290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.709605] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.710174] 
[   15.710270] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.710362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.710377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.710410] Call Trace:
[   15.710437]  <TASK>
[   15.710453]  dump_stack_lvl+0x73/0xb0
[   15.710484]  print_report+0xd1/0x650
[   15.710507]  ? __virt_addr_valid+0x1db/0x2d0
[   15.710529]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.710552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.710577]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.710600]  kasan_report+0x141/0x180
[   15.710623]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.710650]  kasan_check_range+0x10c/0x1c0
[   15.710675]  __kasan_check_read+0x15/0x20
[   15.710696]  kasan_atomics_helper+0x13b5/0x5450
[   15.710720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.710744]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.710770]  ? kasan_atomics+0x152/0x310
[   15.710798]  kasan_atomics+0x1dc/0x310
[   15.710821]  ? __pfx_kasan_atomics+0x10/0x10
[   15.710846]  ? trace_hardirqs_on+0x37/0xe0
[   15.710870]  ? __pfx_read_tsc+0x10/0x10
[   15.710892]  ? ktime_get_ts64+0x86/0x230
[   15.710917]  kunit_try_run_case+0x1a5/0x480
[   15.710999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711025]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.711065]  ? __kthread_parkme+0x82/0x180
[   15.711086]  ? preempt_count_sub+0x50/0x80
[   15.711110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.711197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.711223]  kthread+0x337/0x6f0
[   15.711270]  ? trace_preempt_on+0x20/0xc0
[   15.711293]  ? __pfx_kthread+0x10/0x10
[   15.711315]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.711347]  ? calculate_sigpending+0x7b/0xa0
[   15.711372]  ? __pfx_kthread+0x10/0x10
[   15.711394]  ret_from_fork+0x116/0x1d0
[   15.711414]  ? __pfx_kthread+0x10/0x10
[   15.711435]  ret_from_fork_asm+0x1a/0x30
[   15.711466]  </TASK>
[   15.711476] 
[   15.720746] Allocated by task 282:
[   15.720929]  kasan_save_stack+0x45/0x70
[   15.721139]  kasan_save_track+0x18/0x40
[   15.721336]  kasan_save_alloc_info+0x3b/0x50
[   15.721753]  __kasan_kmalloc+0xb7/0xc0
[   15.721999]  __kmalloc_cache_noprof+0x189/0x420
[   15.722173]  kasan_atomics+0x95/0x310
[   15.722348]  kunit_try_run_case+0x1a5/0x480
[   15.722555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.722733]  kthread+0x337/0x6f0
[   15.722902]  ret_from_fork+0x116/0x1d0
[   15.723299]  ret_from_fork_asm+0x1a/0x30
[   15.723554] 
[   15.723682] The buggy address belongs to the object at ffff8881027b3900
[   15.723682]  which belongs to the cache kmalloc-64 of size 64
[   15.724310] The buggy address is located 0 bytes to the right of
[   15.724310]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.724699] 
[   15.724796] The buggy address belongs to the physical page:
[   15.725160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.725524] flags: 0x200000000000000(node=0|zone=2)
[   15.725734] page_type: f5(slab)
[   15.725932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.726248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.726516] page dumped because: kasan: bad access detected
[   15.726765] 
[   15.726863] Memory state around the buggy address:
[   15.727473]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.727697]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.728284] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.728613]                                      ^
[   15.728900]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.729294]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.729587] ==================================================================
[   15.916460] ==================================================================
[   15.916794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.917111] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.917534] 
[   15.917695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.917738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.917751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.917772] Call Trace:
[   15.917788]  <TASK>
[   15.917803]  dump_stack_lvl+0x73/0xb0
[   15.917832]  print_report+0xd1/0x650
[   15.917893]  ? __virt_addr_valid+0x1db/0x2d0
[   15.917918]  ? kasan_atomics_helper+0x1818/0x5450
[   15.917941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.917966]  ? kasan_atomics_helper+0x1818/0x5450
[   15.917990]  kasan_report+0x141/0x180
[   15.918013]  ? kasan_atomics_helper+0x1818/0x5450
[   15.918053]  kasan_check_range+0x10c/0x1c0
[   15.918088]  __kasan_check_write+0x18/0x20
[   15.918109]  kasan_atomics_helper+0x1818/0x5450
[   15.918133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.918157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.918183]  ? kasan_atomics+0x152/0x310
[   15.918211]  kasan_atomics+0x1dc/0x310
[   15.918235]  ? __pfx_kasan_atomics+0x10/0x10
[   15.918259]  ? trace_hardirqs_on+0x37/0xe0
[   15.918283]  ? __pfx_read_tsc+0x10/0x10
[   15.918305]  ? ktime_get_ts64+0x86/0x230
[   15.918330]  kunit_try_run_case+0x1a5/0x480
[   15.918355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918381]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.918406]  ? __kthread_parkme+0x82/0x180
[   15.918427]  ? preempt_count_sub+0x50/0x80
[   15.918451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.918530]  kthread+0x337/0x6f0
[   15.918550]  ? trace_preempt_on+0x20/0xc0
[   15.918573]  ? __pfx_kthread+0x10/0x10
[   15.918595]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.918617]  ? calculate_sigpending+0x7b/0xa0
[   15.918643]  ? __pfx_kthread+0x10/0x10
[   15.918665]  ret_from_fork+0x116/0x1d0
[   15.918685]  ? __pfx_kthread+0x10/0x10
[   15.918706]  ret_from_fork_asm+0x1a/0x30
[   15.918738]  </TASK>
[   15.918749] 
[   15.926853] Allocated by task 282:
[   15.927090]  kasan_save_stack+0x45/0x70
[   15.927240]  kasan_save_track+0x18/0x40
[   15.927378]  kasan_save_alloc_info+0x3b/0x50
[   15.927529]  __kasan_kmalloc+0xb7/0xc0
[   15.927667]  __kmalloc_cache_noprof+0x189/0x420
[   15.927910]  kasan_atomics+0x95/0x310
[   15.928097]  kunit_try_run_case+0x1a5/0x480
[   15.928246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.928424]  kthread+0x337/0x6f0
[   15.928544]  ret_from_fork+0x116/0x1d0
[   15.928680]  ret_from_fork_asm+0x1a/0x30
[   15.928821] 
[   15.928893] The buggy address belongs to the object at ffff8881027b3900
[   15.928893]  which belongs to the cache kmalloc-64 of size 64
[   15.929332] The buggy address is located 0 bytes to the right of
[   15.929332]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.929702] 
[   15.929775] The buggy address belongs to the physical page:
[   15.929947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.932571] flags: 0x200000000000000(node=0|zone=2)
[   15.932871] page_type: f5(slab)
[   15.933199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.933521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.933827] page dumped because: kasan: bad access detected
[   15.934250] 
[   15.934334] Memory state around the buggy address:
[   15.934491]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.934811]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935133] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.935394]                                      ^
[   15.935883]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936307]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936636] ==================================================================
[   15.240049] ==================================================================
[   15.240387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.240717] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.241266] 
[   15.241352] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.241393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.241405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.241426] Call Trace:
[   15.241441]  <TASK>
[   15.241455]  dump_stack_lvl+0x73/0xb0
[   15.241484]  print_report+0xd1/0x650
[   15.241507]  ? __virt_addr_valid+0x1db/0x2d0
[   15.241530]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.241553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.241577]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.241600]  kasan_report+0x141/0x180
[   15.241623]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.241650]  kasan_check_range+0x10c/0x1c0
[   15.241675]  __kasan_check_write+0x18/0x20
[   15.241696]  kasan_atomics_helper+0x8f9/0x5450
[   15.241720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.241744]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.241770]  ? kasan_atomics+0x152/0x310
[   15.241797]  kasan_atomics+0x1dc/0x310
[   15.241821]  ? __pfx_kasan_atomics+0x10/0x10
[   15.241844]  ? trace_hardirqs_on+0x37/0xe0
[   15.241868]  ? __pfx_read_tsc+0x10/0x10
[   15.241889]  ? ktime_get_ts64+0x86/0x230
[   15.241913]  kunit_try_run_case+0x1a5/0x480
[   15.241938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241964]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.241989]  ? __kthread_parkme+0x82/0x180
[   15.242011]  ? preempt_count_sub+0x50/0x80
[   15.242049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.242100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.242127]  kthread+0x337/0x6f0
[   15.242147]  ? trace_preempt_on+0x20/0xc0
[   15.242170]  ? __pfx_kthread+0x10/0x10
[   15.242192]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.242216]  ? calculate_sigpending+0x7b/0xa0
[   15.242241]  ? __pfx_kthread+0x10/0x10
[   15.242263]  ret_from_fork+0x116/0x1d0
[   15.242283]  ? __pfx_kthread+0x10/0x10
[   15.242304]  ret_from_fork_asm+0x1a/0x30
[   15.242335]  </TASK>
[   15.242346] 
[   15.250709] Allocated by task 282:
[   15.250844]  kasan_save_stack+0x45/0x70
[   15.251203]  kasan_save_track+0x18/0x40
[   15.251404]  kasan_save_alloc_info+0x3b/0x50
[   15.251621]  __kasan_kmalloc+0xb7/0xc0
[   15.251808]  __kmalloc_cache_noprof+0x189/0x420
[   15.252110]  kasan_atomics+0x95/0x310
[   15.252305]  kunit_try_run_case+0x1a5/0x480
[   15.252502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.252698]  kthread+0x337/0x6f0
[   15.252820]  ret_from_fork+0x116/0x1d0
[   15.252955]  ret_from_fork_asm+0x1a/0x30
[   15.253117] 
[   15.253189] The buggy address belongs to the object at ffff8881027b3900
[   15.253189]  which belongs to the cache kmalloc-64 of size 64
[   15.253541] The buggy address is located 0 bytes to the right of
[   15.253541]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.254744] 
[   15.255383] The buggy address belongs to the physical page:
[   15.256171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.257396] flags: 0x200000000000000(node=0|zone=2)
[   15.258375] page_type: f5(slab)
[   15.258897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.260079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.261252] page dumped because: kasan: bad access detected
[   15.261623] 
[   15.261701] Memory state around the buggy address:
[   15.261859]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.262197]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.262659] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.263350]                                      ^
[   15.263520]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263737]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264439] ==================================================================
[   15.515625] ==================================================================
[   15.516060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.516404] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.516684] 
[   15.516865] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.516908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.516928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.516949] Call Trace:
[   15.516964]  <TASK>
[   15.516979]  dump_stack_lvl+0x73/0xb0
[   15.517009]  print_report+0xd1/0x650
[   15.517077]  ? __virt_addr_valid+0x1db/0x2d0
[   15.517102]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.517125]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.517151]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.517174]  kasan_report+0x141/0x180
[   15.517196]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.517224]  __asan_report_load4_noabort+0x18/0x20
[   15.517251]  kasan_atomics_helper+0x4a36/0x5450
[   15.517275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.517298]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.517325]  ? kasan_atomics+0x152/0x310
[   15.517351]  kasan_atomics+0x1dc/0x310
[   15.517375]  ? __pfx_kasan_atomics+0x10/0x10
[   15.517399]  ? trace_hardirqs_on+0x37/0xe0
[   15.517422]  ? __pfx_read_tsc+0x10/0x10
[   15.517444]  ? ktime_get_ts64+0x86/0x230
[   15.517469]  kunit_try_run_case+0x1a5/0x480
[   15.517494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.517520]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.517545]  ? __kthread_parkme+0x82/0x180
[   15.517566]  ? preempt_count_sub+0x50/0x80
[   15.517591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.517637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.517664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.517690]  kthread+0x337/0x6f0
[   15.517711]  ? trace_preempt_on+0x20/0xc0
[   15.517734]  ? __pfx_kthread+0x10/0x10
[   15.517755]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.517778]  ? calculate_sigpending+0x7b/0xa0
[   15.517859]  ? __pfx_kthread+0x10/0x10
[   15.517883]  ret_from_fork+0x116/0x1d0
[   15.517904]  ? __pfx_kthread+0x10/0x10
[   15.517945]  ret_from_fork_asm+0x1a/0x30
[   15.517979]  </TASK>
[   15.517990] 
[   15.525723] Allocated by task 282:
[   15.526087]  kasan_save_stack+0x45/0x70
[   15.526326]  kasan_save_track+0x18/0x40
[   15.526507]  kasan_save_alloc_info+0x3b/0x50
[   15.526723]  __kasan_kmalloc+0xb7/0xc0
[   15.527037]  __kmalloc_cache_noprof+0x189/0x420
[   15.527214]  kasan_atomics+0x95/0x310
[   15.527350]  kunit_try_run_case+0x1a5/0x480
[   15.527577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.527901]  kthread+0x337/0x6f0
[   15.528133]  ret_from_fork+0x116/0x1d0
[   15.528297]  ret_from_fork_asm+0x1a/0x30
[   15.528439] 
[   15.528513] The buggy address belongs to the object at ffff8881027b3900
[   15.528513]  which belongs to the cache kmalloc-64 of size 64
[   15.529152] The buggy address is located 0 bytes to the right of
[   15.529152]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.529673] 
[   15.529746] The buggy address belongs to the physical page:
[   15.530110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.530487] flags: 0x200000000000000(node=0|zone=2)
[   15.530708] page_type: f5(slab)
[   15.531053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.531427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.531761] page dumped because: kasan: bad access detected
[   15.532117] 
[   15.532198] Memory state around the buggy address:
[   15.532357]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.532696]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.533134] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.533386]                                      ^
[   15.533605]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.533996]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.534298] ==================================================================
[   15.891180] ==================================================================
[   15.891471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.891837] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.892168] 
[   15.892257] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.892302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.892315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.892336] Call Trace:
[   15.892362]  <TASK>
[   15.892380]  dump_stack_lvl+0x73/0xb0
[   15.892409]  print_report+0xd1/0x650
[   15.892432]  ? __virt_addr_valid+0x1db/0x2d0
[   15.892457]  ? kasan_atomics_helper+0x177f/0x5450
[   15.892480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.892505]  ? kasan_atomics_helper+0x177f/0x5450
[   15.892529]  kasan_report+0x141/0x180
[   15.892553]  ? kasan_atomics_helper+0x177f/0x5450
[   15.892580]  kasan_check_range+0x10c/0x1c0
[   15.892606]  __kasan_check_write+0x18/0x20
[   15.892627]  kasan_atomics_helper+0x177f/0x5450
[   15.892651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.892674]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.892701]  ? kasan_atomics+0x152/0x310
[   15.892728]  kasan_atomics+0x1dc/0x310
[   15.892751]  ? __pfx_kasan_atomics+0x10/0x10
[   15.892776]  ? trace_hardirqs_on+0x37/0xe0
[   15.892800]  ? __pfx_read_tsc+0x10/0x10
[   15.892822]  ? ktime_get_ts64+0x86/0x230
[   15.892846]  kunit_try_run_case+0x1a5/0x480
[   15.892872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.892899]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.892925]  ? __kthread_parkme+0x82/0x180
[   15.892948]  ? preempt_count_sub+0x50/0x80
[   15.892972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.892997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.893024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.893061]  kthread+0x337/0x6f0
[   15.893106]  ? trace_preempt_on+0x20/0xc0
[   15.893130]  ? __pfx_kthread+0x10/0x10
[   15.893161]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.893184]  ? calculate_sigpending+0x7b/0xa0
[   15.893209]  ? __pfx_kthread+0x10/0x10
[   15.893231]  ret_from_fork+0x116/0x1d0
[   15.893251]  ? __pfx_kthread+0x10/0x10
[   15.893272]  ret_from_fork_asm+0x1a/0x30
[   15.893304]  </TASK>
[   15.893315] 
[   15.905324] Allocated by task 282:
[   15.905505]  kasan_save_stack+0x45/0x70
[   15.905807]  kasan_save_track+0x18/0x40
[   15.906241]  kasan_save_alloc_info+0x3b/0x50
[   15.906448]  __kasan_kmalloc+0xb7/0xc0
[   15.906623]  __kmalloc_cache_noprof+0x189/0x420
[   15.906833]  kasan_atomics+0x95/0x310
[   15.907370]  kunit_try_run_case+0x1a5/0x480
[   15.907659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908406]  kthread+0x337/0x6f0
[   15.908588]  ret_from_fork+0x116/0x1d0
[   15.908934]  ret_from_fork_asm+0x1a/0x30
[   15.909357] 
[   15.909568] The buggy address belongs to the object at ffff8881027b3900
[   15.909568]  which belongs to the cache kmalloc-64 of size 64
[   15.910344] The buggy address is located 0 bytes to the right of
[   15.910344]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.911191] 
[   15.911299] The buggy address belongs to the physical page:
[   15.911552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.911807] flags: 0x200000000000000(node=0|zone=2)
[   15.912127] page_type: f5(slab)
[   15.912388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.913104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.913692] page dumped because: kasan: bad access detected
[   15.914146] 
[   15.914226] Memory state around the buggy address:
[   15.914385]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.914606]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.914879] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.915191]                                      ^
[   15.915410]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915642]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915973] ==================================================================
[   14.939062] ==================================================================
[   14.939648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.940710] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   14.941448] 
[   14.941561] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.941606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941638] Call Trace:
[   14.941652]  <TASK>
[   14.941666]  dump_stack_lvl+0x73/0xb0
[   14.941697]  print_report+0xd1/0x650
[   14.941719]  ? __virt_addr_valid+0x1db/0x2d0
[   14.941744]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.941765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.941788]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.941977]  kasan_report+0x141/0x180
[   14.942001]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.942041]  __asan_report_store4_noabort+0x1b/0x30
[   14.942067]  kasan_atomics_helper+0x4ba2/0x5450
[   14.942090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.942113]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.942138]  ? kasan_atomics+0x152/0x310
[   14.942164]  kasan_atomics+0x1dc/0x310
[   14.942187]  ? __pfx_kasan_atomics+0x10/0x10
[   14.942209]  ? trace_hardirqs_on+0x37/0xe0
[   14.942233]  ? __pfx_read_tsc+0x10/0x10
[   14.942253]  ? ktime_get_ts64+0x86/0x230
[   14.942277]  kunit_try_run_case+0x1a5/0x480
[   14.942301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942326]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.942351]  ? __kthread_parkme+0x82/0x180
[   14.942371]  ? preempt_count_sub+0x50/0x80
[   14.942395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.942468]  kthread+0x337/0x6f0
[   14.942487]  ? trace_preempt_on+0x20/0xc0
[   14.942509]  ? __pfx_kthread+0x10/0x10
[   14.942529]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.942551]  ? calculate_sigpending+0x7b/0xa0
[   14.942575]  ? __pfx_kthread+0x10/0x10
[   14.942596]  ret_from_fork+0x116/0x1d0
[   14.942614]  ? __pfx_kthread+0x10/0x10
[   14.942635]  ret_from_fork_asm+0x1a/0x30
[   14.942666]  </TASK>
[   14.942675] 
[   14.954002] Allocated by task 282:
[   14.954416]  kasan_save_stack+0x45/0x70
[   14.954718]  kasan_save_track+0x18/0x40
[   14.955082]  kasan_save_alloc_info+0x3b/0x50
[   14.955474]  __kasan_kmalloc+0xb7/0xc0
[   14.955671]  __kmalloc_cache_noprof+0x189/0x420
[   14.956114]  kasan_atomics+0x95/0x310
[   14.956365]  kunit_try_run_case+0x1a5/0x480
[   14.956612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.957118]  kthread+0x337/0x6f0
[   14.957385]  ret_from_fork+0x116/0x1d0
[   14.957532]  ret_from_fork_asm+0x1a/0x30
[   14.957888] 
[   14.957982] The buggy address belongs to the object at ffff8881027b3900
[   14.957982]  which belongs to the cache kmalloc-64 of size 64
[   14.958456] The buggy address is located 0 bytes to the right of
[   14.958456]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   14.959377] 
[   14.959483] The buggy address belongs to the physical page:
[   14.959691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   14.960291] flags: 0x200000000000000(node=0|zone=2)
[   14.960731] page_type: f5(slab)
[   14.960987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.961429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.961802] page dumped because: kasan: bad access detected
[   14.962169] 
[   14.962384] Memory state around the buggy address:
[   14.962607]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.963077]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.963456] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.963724]                                      ^
[   14.964195]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964501]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964796] ==================================================================
[   16.055705] ==================================================================
[   16.055958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.056277] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.056762] 
[   16.056850] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.056893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.056906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.056927] Call Trace:
[   16.057002]  <TASK>
[   16.057018]  dump_stack_lvl+0x73/0xb0
[   16.057074]  print_report+0xd1/0x650
[   16.057097]  ? __virt_addr_valid+0x1db/0x2d0
[   16.057132]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.057155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.057179]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.057203]  kasan_report+0x141/0x180
[   16.057234]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.057262]  kasan_check_range+0x10c/0x1c0
[   16.057287]  __kasan_check_write+0x18/0x20
[   16.057318]  kasan_atomics_helper+0x1c18/0x5450
[   16.057342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.057366]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.057393]  ? kasan_atomics+0x152/0x310
[   16.057420]  kasan_atomics+0x1dc/0x310
[   16.057443]  ? __pfx_kasan_atomics+0x10/0x10
[   16.057467]  ? trace_hardirqs_on+0x37/0xe0
[   16.057491]  ? __pfx_read_tsc+0x10/0x10
[   16.057522]  ? ktime_get_ts64+0x86/0x230
[   16.057547]  kunit_try_run_case+0x1a5/0x480
[   16.057572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.057608]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.057635]  ? __kthread_parkme+0x82/0x180
[   16.057657]  ? preempt_count_sub+0x50/0x80
[   16.057683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.057709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.057735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.057762]  kthread+0x337/0x6f0
[   16.057781]  ? trace_preempt_on+0x20/0xc0
[   16.057851]  ? __pfx_kthread+0x10/0x10
[   16.057888]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.057911]  ? calculate_sigpending+0x7b/0xa0
[   16.057935]  ? __pfx_kthread+0x10/0x10
[   16.057959]  ret_from_fork+0x116/0x1d0
[   16.057978]  ? __pfx_kthread+0x10/0x10
[   16.058000]  ret_from_fork_asm+0x1a/0x30
[   16.058046]  </TASK>
[   16.058058] 
[   16.068974] Allocated by task 282:
[   16.069444]  kasan_save_stack+0x45/0x70
[   16.069633]  kasan_save_track+0x18/0x40
[   16.069854]  kasan_save_alloc_info+0x3b/0x50
[   16.070114]  __kasan_kmalloc+0xb7/0xc0
[   16.070305]  __kmalloc_cache_noprof+0x189/0x420
[   16.070516]  kasan_atomics+0x95/0x310
[   16.070692]  kunit_try_run_case+0x1a5/0x480
[   16.070913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.071727]  kthread+0x337/0x6f0
[   16.072052]  ret_from_fork+0x116/0x1d0
[   16.072315]  ret_from_fork_asm+0x1a/0x30
[   16.072603] 
[   16.072683] The buggy address belongs to the object at ffff8881027b3900
[   16.072683]  which belongs to the cache kmalloc-64 of size 64
[   16.073390] The buggy address is located 0 bytes to the right of
[   16.073390]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.074184] 
[   16.074459] The buggy address belongs to the physical page:
[   16.074688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.075118] flags: 0x200000000000000(node=0|zone=2)
[   16.075330] page_type: f5(slab)
[   16.075488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.075800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.076437] page dumped because: kasan: bad access detected
[   16.076693] 
[   16.076766] Memory state around the buggy address:
[   16.077011]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077791]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.078285] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.078633]                                      ^
[   16.078979]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079449]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079775] ==================================================================
[   15.573041] ==================================================================
[   15.573327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.573592] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.574201] 
[   15.574318] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.574381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.574395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.574416] Call Trace:
[   15.574432]  <TASK>
[   15.574447]  dump_stack_lvl+0x73/0xb0
[   15.574477]  print_report+0xd1/0x650
[   15.574500]  ? __virt_addr_valid+0x1db/0x2d0
[   15.574523]  ? kasan_atomics_helper+0x1148/0x5450
[   15.574545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.574586]  ? kasan_atomics_helper+0x1148/0x5450
[   15.574609]  kasan_report+0x141/0x180
[   15.574632]  ? kasan_atomics_helper+0x1148/0x5450
[   15.574660]  kasan_check_range+0x10c/0x1c0
[   15.574685]  __kasan_check_write+0x18/0x20
[   15.574707]  kasan_atomics_helper+0x1148/0x5450
[   15.574747]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.574771]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.574864]  ? kasan_atomics+0x152/0x310
[   15.574897]  kasan_atomics+0x1dc/0x310
[   15.574938]  ? __pfx_kasan_atomics+0x10/0x10
[   15.574963]  ? trace_hardirqs_on+0x37/0xe0
[   15.574987]  ? __pfx_read_tsc+0x10/0x10
[   15.575009]  ? ktime_get_ts64+0x86/0x230
[   15.575042]  kunit_try_run_case+0x1a5/0x480
[   15.575068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.575094]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.575141]  ? __kthread_parkme+0x82/0x180
[   15.575162]  ? preempt_count_sub+0x50/0x80
[   15.575186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.575212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.575237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.575264]  kthread+0x337/0x6f0
[   15.575284]  ? trace_preempt_on+0x20/0xc0
[   15.575307]  ? __pfx_kthread+0x10/0x10
[   15.575329]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.575352]  ? calculate_sigpending+0x7b/0xa0
[   15.575377]  ? __pfx_kthread+0x10/0x10
[   15.575399]  ret_from_fork+0x116/0x1d0
[   15.575419]  ? __pfx_kthread+0x10/0x10
[   15.575440]  ret_from_fork_asm+0x1a/0x30
[   15.575472]  </TASK>
[   15.575482] 
[   15.583567] Allocated by task 282:
[   15.583743]  kasan_save_stack+0x45/0x70
[   15.584069]  kasan_save_track+0x18/0x40
[   15.584216]  kasan_save_alloc_info+0x3b/0x50
[   15.584404]  __kasan_kmalloc+0xb7/0xc0
[   15.584587]  __kmalloc_cache_noprof+0x189/0x420
[   15.584813]  kasan_atomics+0x95/0x310
[   15.584977]  kunit_try_run_case+0x1a5/0x480
[   15.585184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.585364]  kthread+0x337/0x6f0
[   15.585526]  ret_from_fork+0x116/0x1d0
[   15.585721]  ret_from_fork_asm+0x1a/0x30
[   15.585914] 
[   15.586001] The buggy address belongs to the object at ffff8881027b3900
[   15.586001]  which belongs to the cache kmalloc-64 of size 64
[   15.586616] The buggy address is located 0 bytes to the right of
[   15.586616]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.587081] 
[   15.587158] The buggy address belongs to the physical page:
[   15.587386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.587765] flags: 0x200000000000000(node=0|zone=2)
[   15.588099] page_type: f5(slab)
[   15.588274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.588621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.589067] page dumped because: kasan: bad access detected
[   15.589344] 
[   15.589432] Memory state around the buggy address:
[   15.589656]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.590182]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.590481] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.590768]                                      ^
[   15.591088]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591416]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591714] ==================================================================
[   16.306533] ==================================================================
[   16.306791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.307156] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.307463] 
[   16.307653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.307702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.307715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.307736] Call Trace:
[   16.307749]  <TASK>
[   16.307763]  dump_stack_lvl+0x73/0xb0
[   16.307793]  print_report+0xd1/0x650
[   16.307864]  ? __virt_addr_valid+0x1db/0x2d0
[   16.307888]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.307912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.307936]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.307972]  kasan_report+0x141/0x180
[   16.307995]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.308023]  __asan_report_load8_noabort+0x18/0x20
[   16.308062]  kasan_atomics_helper+0x4fb2/0x5450
[   16.308085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.308110]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.308135]  ? kasan_atomics+0x152/0x310
[   16.308163]  kasan_atomics+0x1dc/0x310
[   16.308187]  ? __pfx_kasan_atomics+0x10/0x10
[   16.308211]  ? trace_hardirqs_on+0x37/0xe0
[   16.308235]  ? __pfx_read_tsc+0x10/0x10
[   16.308256]  ? ktime_get_ts64+0x86/0x230
[   16.308281]  kunit_try_run_case+0x1a5/0x480
[   16.308307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.308333]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.308359]  ? __kthread_parkme+0x82/0x180
[   16.308380]  ? preempt_count_sub+0x50/0x80
[   16.308405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.308431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.308457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.308484]  kthread+0x337/0x6f0
[   16.308503]  ? trace_preempt_on+0x20/0xc0
[   16.308526]  ? __pfx_kthread+0x10/0x10
[   16.308548]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.308571]  ? calculate_sigpending+0x7b/0xa0
[   16.308597]  ? __pfx_kthread+0x10/0x10
[   16.308620]  ret_from_fork+0x116/0x1d0
[   16.308640]  ? __pfx_kthread+0x10/0x10
[   16.308662]  ret_from_fork_asm+0x1a/0x30
[   16.308694]  </TASK>
[   16.308706] 
[   16.316632] Allocated by task 282:
[   16.316781]  kasan_save_stack+0x45/0x70
[   16.317092]  kasan_save_track+0x18/0x40
[   16.317278]  kasan_save_alloc_info+0x3b/0x50
[   16.317493]  __kasan_kmalloc+0xb7/0xc0
[   16.317662]  __kmalloc_cache_noprof+0x189/0x420
[   16.317930]  kasan_atomics+0x95/0x310
[   16.318446]  kunit_try_run_case+0x1a5/0x480
[   16.318648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.318918]  kthread+0x337/0x6f0
[   16.319110]  ret_from_fork+0x116/0x1d0
[   16.319316]  ret_from_fork_asm+0x1a/0x30
[   16.319492] 
[   16.319573] The buggy address belongs to the object at ffff8881027b3900
[   16.319573]  which belongs to the cache kmalloc-64 of size 64
[   16.320003] The buggy address is located 0 bytes to the right of
[   16.320003]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.320579] 
[   16.320654] The buggy address belongs to the physical page:
[   16.321159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.321524] flags: 0x200000000000000(node=0|zone=2)
[   16.321746] page_type: f5(slab)
[   16.321867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.322113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.322616] page dumped because: kasan: bad access detected
[   16.322940] 
[   16.323010] Memory state around the buggy address:
[   16.323176]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.323392]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.323604] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.324287]                                      ^
[   16.324518]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.324841]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.325181] ==================================================================
[   16.344408] ==================================================================
[   16.344698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.345106] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.345333] 
[   16.345417] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.345458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.345470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.345490] Call Trace:
[   16.345505]  <TASK>
[   16.345520]  dump_stack_lvl+0x73/0xb0
[   16.345550]  print_report+0xd1/0x650
[   16.345573]  ? __virt_addr_valid+0x1db/0x2d0
[   16.345596]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.345619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.345643]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.345666]  kasan_report+0x141/0x180
[   16.345690]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.345718]  __asan_report_load8_noabort+0x18/0x20
[   16.345745]  kasan_atomics_helper+0x4fa5/0x5450
[   16.345769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.345793]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.345862]  ? kasan_atomics+0x152/0x310
[   16.345891]  kasan_atomics+0x1dc/0x310
[   16.345916]  ? __pfx_kasan_atomics+0x10/0x10
[   16.345940]  ? trace_hardirqs_on+0x37/0xe0
[   16.345964]  ? __pfx_read_tsc+0x10/0x10
[   16.345987]  ? ktime_get_ts64+0x86/0x230
[   16.346011]  kunit_try_run_case+0x1a5/0x480
[   16.346051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.346077]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.346104]  ? __kthread_parkme+0x82/0x180
[   16.346125]  ? preempt_count_sub+0x50/0x80
[   16.346150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.346176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.346202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.346228]  kthread+0x337/0x6f0
[   16.346248]  ? trace_preempt_on+0x20/0xc0
[   16.346271]  ? __pfx_kthread+0x10/0x10
[   16.346293]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.346315]  ? calculate_sigpending+0x7b/0xa0
[   16.346341]  ? __pfx_kthread+0x10/0x10
[   16.346363]  ret_from_fork+0x116/0x1d0
[   16.346383]  ? __pfx_kthread+0x10/0x10
[   16.346404]  ret_from_fork_asm+0x1a/0x30
[   16.346435]  </TASK>
[   16.346447] 
[   16.354391] Allocated by task 282:
[   16.354560]  kasan_save_stack+0x45/0x70
[   16.354745]  kasan_save_track+0x18/0x40
[   16.354911]  kasan_save_alloc_info+0x3b/0x50
[   16.355139]  __kasan_kmalloc+0xb7/0xc0
[   16.355279]  __kmalloc_cache_noprof+0x189/0x420
[   16.355503]  kasan_atomics+0x95/0x310
[   16.355691]  kunit_try_run_case+0x1a5/0x480
[   16.355976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.356176]  kthread+0x337/0x6f0
[   16.356346]  ret_from_fork+0x116/0x1d0
[   16.356535]  ret_from_fork_asm+0x1a/0x30
[   16.356735] 
[   16.356813] The buggy address belongs to the object at ffff8881027b3900
[   16.356813]  which belongs to the cache kmalloc-64 of size 64
[   16.357258] The buggy address is located 0 bytes to the right of
[   16.357258]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.357625] 
[   16.357697] The buggy address belongs to the physical page:
[   16.357869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.358289] flags: 0x200000000000000(node=0|zone=2)
[   16.358518] page_type: f5(slab)
[   16.358682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.359009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.359409] page dumped because: kasan: bad access detected
[   16.359579] 
[   16.359648] Memory state around the buggy address:
[   16.359802]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.360022]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.360534] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.360956]                                      ^
[   16.361206]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.361537]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.361947] ==================================================================
[   15.432109] ==================================================================
[   15.432625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.433047] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.433342] 
[   15.433452] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.433493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.433505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.433526] Call Trace:
[   15.433541]  <TASK>
[   15.433556]  dump_stack_lvl+0x73/0xb0
[   15.433585]  print_report+0xd1/0x650
[   15.433608]  ? __virt_addr_valid+0x1db/0x2d0
[   15.433631]  ? kasan_atomics_helper+0xde0/0x5450
[   15.433654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.433701]  ? kasan_atomics_helper+0xde0/0x5450
[   15.433726]  kasan_report+0x141/0x180
[   15.433749]  ? kasan_atomics_helper+0xde0/0x5450
[   15.433776]  kasan_check_range+0x10c/0x1c0
[   15.433801]  __kasan_check_write+0x18/0x20
[   15.433822]  kasan_atomics_helper+0xde0/0x5450
[   15.433846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.433870]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.433896]  ? kasan_atomics+0x152/0x310
[   15.433923]  kasan_atomics+0x1dc/0x310
[   15.434005]  ? __pfx_kasan_atomics+0x10/0x10
[   15.434041]  ? trace_hardirqs_on+0x37/0xe0
[   15.434067]  ? __pfx_read_tsc+0x10/0x10
[   15.434090]  ? ktime_get_ts64+0x86/0x230
[   15.434115]  kunit_try_run_case+0x1a5/0x480
[   15.434140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.434166]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.434192]  ? __kthread_parkme+0x82/0x180
[   15.434214]  ? preempt_count_sub+0x50/0x80
[   15.434238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.434264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.434291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.434318]  kthread+0x337/0x6f0
[   15.434338]  ? trace_preempt_on+0x20/0xc0
[   15.434362]  ? __pfx_kthread+0x10/0x10
[   15.434401]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.434424]  ? calculate_sigpending+0x7b/0xa0
[   15.434449]  ? __pfx_kthread+0x10/0x10
[   15.434472]  ret_from_fork+0x116/0x1d0
[   15.434492]  ? __pfx_kthread+0x10/0x10
[   15.434514]  ret_from_fork_asm+0x1a/0x30
[   15.434545]  </TASK>
[   15.434556] 
[   15.442714] Allocated by task 282:
[   15.443184]  kasan_save_stack+0x45/0x70
[   15.443380]  kasan_save_track+0x18/0x40
[   15.443600]  kasan_save_alloc_info+0x3b/0x50
[   15.443804]  __kasan_kmalloc+0xb7/0xc0
[   15.444287]  __kmalloc_cache_noprof+0x189/0x420
[   15.444493]  kasan_atomics+0x95/0x310
[   15.444690]  kunit_try_run_case+0x1a5/0x480
[   15.445074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445393]  kthread+0x337/0x6f0
[   15.445564]  ret_from_fork+0x116/0x1d0
[   15.445771]  ret_from_fork_asm+0x1a/0x30
[   15.446068] 
[   15.446210] The buggy address belongs to the object at ffff8881027b3900
[   15.446210]  which belongs to the cache kmalloc-64 of size 64
[   15.446744] The buggy address is located 0 bytes to the right of
[   15.446744]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.447413] 
[   15.447516] The buggy address belongs to the physical page:
[   15.447707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.448294] flags: 0x200000000000000(node=0|zone=2)
[   15.448464] page_type: f5(slab)
[   15.448642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.449229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.449705] page dumped because: kasan: bad access detected
[   15.449914] 
[   15.450059] Memory state around the buggy address:
[   15.450536]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.450813]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.451235] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.451628]                                      ^
[   15.451878]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.452286]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.452732] ==================================================================
[   15.534779] ==================================================================
[   15.535161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.535540] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.535855] 
[   15.536020] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.536074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.536086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.536107] Call Trace:
[   15.536123]  <TASK>
[   15.536138]  dump_stack_lvl+0x73/0xb0
[   15.536167]  print_report+0xd1/0x650
[   15.536190]  ? __virt_addr_valid+0x1db/0x2d0
[   15.536214]  ? kasan_atomics_helper+0x1079/0x5450
[   15.536237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.536262]  ? kasan_atomics_helper+0x1079/0x5450
[   15.536285]  kasan_report+0x141/0x180
[   15.536308]  ? kasan_atomics_helper+0x1079/0x5450
[   15.536336]  kasan_check_range+0x10c/0x1c0
[   15.536361]  __kasan_check_write+0x18/0x20
[   15.536382]  kasan_atomics_helper+0x1079/0x5450
[   15.536406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.536430]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.536456]  ? kasan_atomics+0x152/0x310
[   15.536484]  kasan_atomics+0x1dc/0x310
[   15.536507]  ? __pfx_kasan_atomics+0x10/0x10
[   15.536530]  ? trace_hardirqs_on+0x37/0xe0
[   15.536576]  ? __pfx_read_tsc+0x10/0x10
[   15.536597]  ? ktime_get_ts64+0x86/0x230
[   15.536622]  kunit_try_run_case+0x1a5/0x480
[   15.536647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536673]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.536700]  ? __kthread_parkme+0x82/0x180
[   15.536720]  ? preempt_count_sub+0x50/0x80
[   15.536745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.536860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.536891]  kthread+0x337/0x6f0
[   15.536912]  ? trace_preempt_on+0x20/0xc0
[   15.536934]  ? __pfx_kthread+0x10/0x10
[   15.536963]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.536985]  ? calculate_sigpending+0x7b/0xa0
[   15.537010]  ? __pfx_kthread+0x10/0x10
[   15.537041]  ret_from_fork+0x116/0x1d0
[   15.537060]  ? __pfx_kthread+0x10/0x10
[   15.537082]  ret_from_fork_asm+0x1a/0x30
[   15.537114]  </TASK>
[   15.537124] 
[   15.545370] Allocated by task 282:
[   15.545573]  kasan_save_stack+0x45/0x70
[   15.545790]  kasan_save_track+0x18/0x40
[   15.546099]  kasan_save_alloc_info+0x3b/0x50
[   15.546289]  __kasan_kmalloc+0xb7/0xc0
[   15.546442]  __kmalloc_cache_noprof+0x189/0x420
[   15.546691]  kasan_atomics+0x95/0x310
[   15.546921]  kunit_try_run_case+0x1a5/0x480
[   15.547190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.547442]  kthread+0x337/0x6f0
[   15.547575]  ret_from_fork+0x116/0x1d0
[   15.547707]  ret_from_fork_asm+0x1a/0x30
[   15.547855] 
[   15.548041] The buggy address belongs to the object at ffff8881027b3900
[   15.548041]  which belongs to the cache kmalloc-64 of size 64
[   15.548576] The buggy address is located 0 bytes to the right of
[   15.548576]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.549223] 
[   15.549317] The buggy address belongs to the physical page:
[   15.549490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.549967] flags: 0x200000000000000(node=0|zone=2)
[   15.550232] page_type: f5(slab)
[   15.550400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.550739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.551053] page dumped because: kasan: bad access detected
[   15.551291] 
[   15.551382] Memory state around the buggy address:
[   15.551576]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.551871]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.552297] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.552520]                                      ^
[   15.552679]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553008]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553331] ==================================================================
[   15.222073] ==================================================================
[   15.222419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.222705] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.223171] 
[   15.223283] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.223328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.223340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.223361] Call Trace:
[   15.223375]  <TASK>
[   15.223392]  dump_stack_lvl+0x73/0xb0
[   15.223421]  print_report+0xd1/0x650
[   15.223444]  ? __virt_addr_valid+0x1db/0x2d0
[   15.223467]  ? kasan_atomics_helper+0x860/0x5450
[   15.223490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.223515]  ? kasan_atomics_helper+0x860/0x5450
[   15.223538]  kasan_report+0x141/0x180
[   15.223561]  ? kasan_atomics_helper+0x860/0x5450
[   15.223589]  kasan_check_range+0x10c/0x1c0
[   15.223614]  __kasan_check_write+0x18/0x20
[   15.223634]  kasan_atomics_helper+0x860/0x5450
[   15.223658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.223682]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.223709]  ? kasan_atomics+0x152/0x310
[   15.223736]  kasan_atomics+0x1dc/0x310
[   15.223760]  ? __pfx_kasan_atomics+0x10/0x10
[   15.223784]  ? trace_hardirqs_on+0x37/0xe0
[   15.223848]  ? __pfx_read_tsc+0x10/0x10
[   15.223873]  ? ktime_get_ts64+0x86/0x230
[   15.223897]  kunit_try_run_case+0x1a5/0x480
[   15.223923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.223965]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.223993]  ? __kthread_parkme+0x82/0x180
[   15.224015]  ? preempt_count_sub+0x50/0x80
[   15.224050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.224129]  kthread+0x337/0x6f0
[   15.224149]  ? trace_preempt_on+0x20/0xc0
[   15.224172]  ? __pfx_kthread+0x10/0x10
[   15.224194]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.224217]  ? calculate_sigpending+0x7b/0xa0
[   15.224242]  ? __pfx_kthread+0x10/0x10
[   15.224264]  ret_from_fork+0x116/0x1d0
[   15.224283]  ? __pfx_kthread+0x10/0x10
[   15.224305]  ret_from_fork_asm+0x1a/0x30
[   15.224337]  </TASK>
[   15.224348] 
[   15.231753] Allocated by task 282:
[   15.231932]  kasan_save_stack+0x45/0x70
[   15.232151]  kasan_save_track+0x18/0x40
[   15.232336]  kasan_save_alloc_info+0x3b/0x50
[   15.232524]  __kasan_kmalloc+0xb7/0xc0
[   15.232693]  __kmalloc_cache_noprof+0x189/0x420
[   15.232948]  kasan_atomics+0x95/0x310
[   15.233130]  kunit_try_run_case+0x1a5/0x480
[   15.233324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.233527]  kthread+0x337/0x6f0
[   15.233649]  ret_from_fork+0x116/0x1d0
[   15.233782]  ret_from_fork_asm+0x1a/0x30
[   15.233923] 
[   15.234020] The buggy address belongs to the object at ffff8881027b3900
[   15.234020]  which belongs to the cache kmalloc-64 of size 64
[   15.234850] The buggy address is located 0 bytes to the right of
[   15.234850]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.235595] 
[   15.235675] The buggy address belongs to the physical page:
[   15.236081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.236464] flags: 0x200000000000000(node=0|zone=2)
[   15.236668] page_type: f5(slab)
[   15.236834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.237155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.237471] page dumped because: kasan: bad access detected
[   15.237684] 
[   15.237785] Memory state around the buggy address:
[   15.237981]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.238270]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.238485] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.238696]                                      ^
[   15.238849]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.239133]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.239449] ==================================================================
[   15.838014] ==================================================================
[   15.838323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.838658] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.839301] 
[   15.839512] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.839553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.839566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.839587] Call Trace:
[   15.839602]  <TASK>
[   15.839616]  dump_stack_lvl+0x73/0xb0
[   15.839646]  print_report+0xd1/0x650
[   15.839668]  ? __virt_addr_valid+0x1db/0x2d0
[   15.839692]  ? kasan_atomics_helper+0x164f/0x5450
[   15.839714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.839738]  ? kasan_atomics_helper+0x164f/0x5450
[   15.839761]  kasan_report+0x141/0x180
[   15.839784]  ? kasan_atomics_helper+0x164f/0x5450
[   15.839811]  kasan_check_range+0x10c/0x1c0
[   15.839836]  __kasan_check_write+0x18/0x20
[   15.839857]  kasan_atomics_helper+0x164f/0x5450
[   15.839880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.839904]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.839930]  ? kasan_atomics+0x152/0x310
[   15.839962]  kasan_atomics+0x1dc/0x310
[   15.839986]  ? __pfx_kasan_atomics+0x10/0x10
[   15.840009]  ? trace_hardirqs_on+0x37/0xe0
[   15.840044]  ? __pfx_read_tsc+0x10/0x10
[   15.840066]  ? ktime_get_ts64+0x86/0x230
[   15.840090]  kunit_try_run_case+0x1a5/0x480
[   15.840115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840141]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.840166]  ? __kthread_parkme+0x82/0x180
[   15.840187]  ? preempt_count_sub+0x50/0x80
[   15.840211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.840262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.840289]  kthread+0x337/0x6f0
[   15.840309]  ? trace_preempt_on+0x20/0xc0
[   15.840331]  ? __pfx_kthread+0x10/0x10
[   15.840353]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.840376]  ? calculate_sigpending+0x7b/0xa0
[   15.840401]  ? __pfx_kthread+0x10/0x10
[   15.840424]  ret_from_fork+0x116/0x1d0
[   15.840444]  ? __pfx_kthread+0x10/0x10
[   15.840465]  ret_from_fork_asm+0x1a/0x30
[   15.840496]  </TASK>
[   15.840507] 
[   15.849230] Allocated by task 282:
[   15.849357]  kasan_save_stack+0x45/0x70
[   15.849500]  kasan_save_track+0x18/0x40
[   15.849689]  kasan_save_alloc_info+0x3b/0x50
[   15.849897]  __kasan_kmalloc+0xb7/0xc0
[   15.850091]  __kmalloc_cache_noprof+0x189/0x420
[   15.850402]  kasan_atomics+0x95/0x310
[   15.850604]  kunit_try_run_case+0x1a5/0x480
[   15.850908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851179]  kthread+0x337/0x6f0
[   15.851391]  ret_from_fork+0x116/0x1d0
[   15.851576]  ret_from_fork_asm+0x1a/0x30
[   15.851718] 
[   15.851789] The buggy address belongs to the object at ffff8881027b3900
[   15.851789]  which belongs to the cache kmalloc-64 of size 64
[   15.852496] The buggy address is located 0 bytes to the right of
[   15.852496]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.853134] 
[   15.853245] The buggy address belongs to the physical page:
[   15.853507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.853754] flags: 0x200000000000000(node=0|zone=2)
[   15.853915] page_type: f5(slab)
[   15.854092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.854465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.854940] page dumped because: kasan: bad access detected
[   15.855218] 
[   15.855287] Memory state around the buggy address:
[   15.855440]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.855659]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.856082] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.857488]                                      ^
[   15.858007]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.858520]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.858747] ==================================================================
[   15.026399] ==================================================================
[   15.026711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.027222] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.027545] 
[   15.027652] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.027695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.027708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.027730] Call Trace:
[   15.027782]  <TASK>
[   15.027865]  dump_stack_lvl+0x73/0xb0
[   15.027937]  print_report+0xd1/0x650
[   15.027982]  ? __virt_addr_valid+0x1db/0x2d0
[   15.028006]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.028038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.028096]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.028119]  kasan_report+0x141/0x180
[   15.028143]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.028170]  __asan_report_load4_noabort+0x18/0x20
[   15.028222]  kasan_atomics_helper+0x4b54/0x5450
[   15.028247]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.028271]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.028297]  ? kasan_atomics+0x152/0x310
[   15.028325]  kasan_atomics+0x1dc/0x310
[   15.028348]  ? __pfx_kasan_atomics+0x10/0x10
[   15.028372]  ? trace_hardirqs_on+0x37/0xe0
[   15.028397]  ? __pfx_read_tsc+0x10/0x10
[   15.028418]  ? ktime_get_ts64+0x86/0x230
[   15.028470]  kunit_try_run_case+0x1a5/0x480
[   15.028519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.028545]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.028571]  ? __kthread_parkme+0x82/0x180
[   15.028593]  ? preempt_count_sub+0x50/0x80
[   15.028617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.028643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.028669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.028695]  kthread+0x337/0x6f0
[   15.028715]  ? trace_preempt_on+0x20/0xc0
[   15.028738]  ? __pfx_kthread+0x10/0x10
[   15.028759]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.028782]  ? calculate_sigpending+0x7b/0xa0
[   15.028872]  ? __pfx_kthread+0x10/0x10
[   15.028896]  ret_from_fork+0x116/0x1d0
[   15.028917]  ? __pfx_kthread+0x10/0x10
[   15.028939]  ret_from_fork_asm+0x1a/0x30
[   15.028987]  </TASK>
[   15.028998] 
[   15.038149] Allocated by task 282:
[   15.038336]  kasan_save_stack+0x45/0x70
[   15.038567]  kasan_save_track+0x18/0x40
[   15.038776]  kasan_save_alloc_info+0x3b/0x50
[   15.039143]  __kasan_kmalloc+0xb7/0xc0
[   15.039338]  __kmalloc_cache_noprof+0x189/0x420
[   15.039515]  kasan_atomics+0x95/0x310
[   15.039695]  kunit_try_run_case+0x1a5/0x480
[   15.040038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.040335]  kthread+0x337/0x6f0
[   15.040518]  ret_from_fork+0x116/0x1d0
[   15.040722]  ret_from_fork_asm+0x1a/0x30
[   15.041052] 
[   15.041182] The buggy address belongs to the object at ffff8881027b3900
[   15.041182]  which belongs to the cache kmalloc-64 of size 64
[   15.041684] The buggy address is located 0 bytes to the right of
[   15.041684]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.042468] 
[   15.042604] The buggy address belongs to the physical page:
[   15.042986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.043377] flags: 0x200000000000000(node=0|zone=2)
[   15.043606] page_type: f5(slab)
[   15.043861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.044276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.044609] page dumped because: kasan: bad access detected
[   15.044886] 
[   15.044975] Memory state around the buggy address:
[   15.045174]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.045506]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.045779] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.046214]                                      ^
[   15.046376]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.046691]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.047185] ==================================================================
[   15.265333] ==================================================================
[   15.266065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.266729] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.267196] 
[   15.267287] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.267330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.267342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.267363] Call Trace:
[   15.267378]  <TASK>
[   15.267393]  dump_stack_lvl+0x73/0xb0
[   15.267423]  print_report+0xd1/0x650
[   15.267447]  ? __virt_addr_valid+0x1db/0x2d0
[   15.267470]  ? kasan_atomics_helper+0x992/0x5450
[   15.267492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.267517]  ? kasan_atomics_helper+0x992/0x5450
[   15.267540]  kasan_report+0x141/0x180
[   15.267563]  ? kasan_atomics_helper+0x992/0x5450
[   15.267591]  kasan_check_range+0x10c/0x1c0
[   15.267615]  __kasan_check_write+0x18/0x20
[   15.267636]  kasan_atomics_helper+0x992/0x5450
[   15.267660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.267684]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.267710]  ? kasan_atomics+0x152/0x310
[   15.267737]  kasan_atomics+0x1dc/0x310
[   15.267761]  ? __pfx_kasan_atomics+0x10/0x10
[   15.267785]  ? trace_hardirqs_on+0x37/0xe0
[   15.267878]  ? __pfx_read_tsc+0x10/0x10
[   15.267902]  ? ktime_get_ts64+0x86/0x230
[   15.267952]  kunit_try_run_case+0x1a5/0x480
[   15.267986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.268012]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.268054]  ? __kthread_parkme+0x82/0x180
[   15.268077]  ? preempt_count_sub+0x50/0x80
[   15.268101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.268128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.268154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.268180]  kthread+0x337/0x6f0
[   15.268200]  ? trace_preempt_on+0x20/0xc0
[   15.268222]  ? __pfx_kthread+0x10/0x10
[   15.268244]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.268266]  ? calculate_sigpending+0x7b/0xa0
[   15.268291]  ? __pfx_kthread+0x10/0x10
[   15.268314]  ret_from_fork+0x116/0x1d0
[   15.268333]  ? __pfx_kthread+0x10/0x10
[   15.268355]  ret_from_fork_asm+0x1a/0x30
[   15.268386]  </TASK>
[   15.268397] 
[   15.283374] Allocated by task 282:
[   15.283710]  kasan_save_stack+0x45/0x70
[   15.284214]  kasan_save_track+0x18/0x40
[   15.284623]  kasan_save_alloc_info+0x3b/0x50
[   15.285075]  __kasan_kmalloc+0xb7/0xc0
[   15.285511]  __kmalloc_cache_noprof+0x189/0x420
[   15.286126]  kasan_atomics+0x95/0x310
[   15.286419]  kunit_try_run_case+0x1a5/0x480
[   15.286666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286856]  kthread+0x337/0x6f0
[   15.287255]  ret_from_fork+0x116/0x1d0
[   15.287640]  ret_from_fork_asm+0x1a/0x30
[   15.288115] 
[   15.288300] The buggy address belongs to the object at ffff8881027b3900
[   15.288300]  which belongs to the cache kmalloc-64 of size 64
[   15.289322] The buggy address is located 0 bytes to the right of
[   15.289322]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.289696] 
[   15.289770] The buggy address belongs to the physical page:
[   15.289981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.290586] flags: 0x200000000000000(node=0|zone=2)
[   15.291218] page_type: f5(slab)
[   15.291449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.291686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.291984] page dumped because: kasan: bad access detected
[   15.292251] 
[   15.292348] Memory state around the buggy address:
[   15.292579]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292914]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.293261] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.293618]                                      ^
[   15.293808]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294217]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294513] ==================================================================
[   14.965609] ==================================================================
[   14.966113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.966690] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   14.967224] 
[   14.967324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.967367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.967378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.967399] Call Trace:
[   14.967413]  <TASK>
[   14.967427]  dump_stack_lvl+0x73/0xb0
[   14.967456]  print_report+0xd1/0x650
[   14.967477]  ? __virt_addr_valid+0x1db/0x2d0
[   14.967499]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.967521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.967544]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.967565]  kasan_report+0x141/0x180
[   14.967587]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.967614]  __asan_report_load4_noabort+0x18/0x20
[   14.967639]  kasan_atomics_helper+0x4b88/0x5450
[   14.967661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.967684]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.967709]  ? kasan_atomics+0x152/0x310
[   14.967906]  kasan_atomics+0x1dc/0x310
[   14.967953]  ? __pfx_kasan_atomics+0x10/0x10
[   14.967999]  ? trace_hardirqs_on+0x37/0xe0
[   14.968024]  ? __pfx_read_tsc+0x10/0x10
[   14.968058]  ? ktime_get_ts64+0x86/0x230
[   14.968083]  kunit_try_run_case+0x1a5/0x480
[   14.968109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.968135]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.968162]  ? __kthread_parkme+0x82/0x180
[   14.968183]  ? preempt_count_sub+0x50/0x80
[   14.968207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.968233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.968258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.968285]  kthread+0x337/0x6f0
[   14.968305]  ? trace_preempt_on+0x20/0xc0
[   14.968330]  ? __pfx_kthread+0x10/0x10
[   14.968352]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.968375]  ? calculate_sigpending+0x7b/0xa0
[   14.968400]  ? __pfx_kthread+0x10/0x10
[   14.968424]  ret_from_fork+0x116/0x1d0
[   14.968443]  ? __pfx_kthread+0x10/0x10
[   14.968465]  ret_from_fork_asm+0x1a/0x30
[   14.968498]  </TASK>
[   14.968509] 
[   14.976661] Allocated by task 282:
[   14.976798]  kasan_save_stack+0x45/0x70
[   14.976945]  kasan_save_track+0x18/0x40
[   14.977091]  kasan_save_alloc_info+0x3b/0x50
[   14.977344]  __kasan_kmalloc+0xb7/0xc0
[   14.977527]  __kmalloc_cache_noprof+0x189/0x420
[   14.977957]  kasan_atomics+0x95/0x310
[   14.978183]  kunit_try_run_case+0x1a5/0x480
[   14.978378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.978649]  kthread+0x337/0x6f0
[   14.978786]  ret_from_fork+0x116/0x1d0
[   14.979117]  ret_from_fork_asm+0x1a/0x30
[   14.979311] 
[   14.979385] The buggy address belongs to the object at ffff8881027b3900
[   14.979385]  which belongs to the cache kmalloc-64 of size 64
[   14.979980] The buggy address is located 0 bytes to the right of
[   14.979980]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   14.980467] 
[   14.980542] The buggy address belongs to the physical page:
[   14.980715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   14.981116] flags: 0x200000000000000(node=0|zone=2)
[   14.981357] page_type: f5(slab)
[   14.981585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.982223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.982556] page dumped because: kasan: bad access detected
[   14.982791] 
[   14.982867] Memory state around the buggy address:
[   14.983041]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.983576]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.983900] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.984131]                                      ^
[   14.984337]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.984648]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.985170] ==================================================================
[   14.985533] ==================================================================
[   14.986044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.986493] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   14.986762] 
[   14.986867] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.986909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.986922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.987006] Call Trace:
[   14.987022]  <TASK>
[   14.987049]  dump_stack_lvl+0x73/0xb0
[   14.987079]  print_report+0xd1/0x650
[   14.987103]  ? __virt_addr_valid+0x1db/0x2d0
[   14.987126]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.987149]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.987173]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.987196]  kasan_report+0x141/0x180
[   14.987219]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.987247]  __asan_report_store4_noabort+0x1b/0x30
[   14.987273]  kasan_atomics_helper+0x4b6e/0x5450
[   14.987298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.987321]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.987347]  ? kasan_atomics+0x152/0x310
[   14.987375]  kasan_atomics+0x1dc/0x310
[   14.987422]  ? __pfx_kasan_atomics+0x10/0x10
[   14.987446]  ? trace_hardirqs_on+0x37/0xe0
[   14.987470]  ? __pfx_read_tsc+0x10/0x10
[   14.987491]  ? ktime_get_ts64+0x86/0x230
[   14.987516]  kunit_try_run_case+0x1a5/0x480
[   14.987540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.987566]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.987592]  ? __kthread_parkme+0x82/0x180
[   14.987613]  ? preempt_count_sub+0x50/0x80
[   14.987637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.987663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.987689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.987715]  kthread+0x337/0x6f0
[   14.987734]  ? trace_preempt_on+0x20/0xc0
[   14.987757]  ? __pfx_kthread+0x10/0x10
[   14.987779]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.987801]  ? calculate_sigpending+0x7b/0xa0
[   14.987826]  ? __pfx_kthread+0x10/0x10
[   14.987850]  ret_from_fork+0x116/0x1d0
[   14.987869]  ? __pfx_kthread+0x10/0x10
[   14.987910]  ret_from_fork_asm+0x1a/0x30
[   14.987942]  </TASK>
[   14.987958] 
[   14.996213] Allocated by task 282:
[   14.996347]  kasan_save_stack+0x45/0x70
[   14.996500]  kasan_save_track+0x18/0x40
[   14.996695]  kasan_save_alloc_info+0x3b/0x50
[   14.997020]  __kasan_kmalloc+0xb7/0xc0
[   14.997244]  __kmalloc_cache_noprof+0x189/0x420
[   14.997472]  kasan_atomics+0x95/0x310
[   14.997680]  kunit_try_run_case+0x1a5/0x480
[   14.998126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.998357]  kthread+0x337/0x6f0
[   14.998530]  ret_from_fork+0x116/0x1d0
[   14.998736]  ret_from_fork_asm+0x1a/0x30
[   14.999062] 
[   14.999136] The buggy address belongs to the object at ffff8881027b3900
[   14.999136]  which belongs to the cache kmalloc-64 of size 64
[   14.999625] The buggy address is located 0 bytes to the right of
[   14.999625]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.000368] 
[   15.000465] The buggy address belongs to the physical page:
[   15.000649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.000971] flags: 0x200000000000000(node=0|zone=2)
[   15.001320] page_type: f5(slab)
[   15.001489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.001773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.001995] page dumped because: kasan: bad access detected
[   15.002398] 
[   15.002497] Memory state around the buggy address:
[   15.002723]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.003259]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.003480] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.003994]                                      ^
[   15.004249]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.004609]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.005060] ==================================================================
[   15.178894] ==================================================================
[   15.179437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.179866] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.180342] 
[   15.180503] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.180546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.180607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.180633] Call Trace:
[   15.180649]  <TASK>
[   15.180665]  dump_stack_lvl+0x73/0xb0
[   15.180696]  print_report+0xd1/0x650
[   15.180719]  ? __virt_addr_valid+0x1db/0x2d0
[   15.180744]  ? kasan_atomics_helper+0x72f/0x5450
[   15.180767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.180814]  ? kasan_atomics_helper+0x72f/0x5450
[   15.180873]  kasan_report+0x141/0x180
[   15.180896]  ? kasan_atomics_helper+0x72f/0x5450
[   15.180924]  kasan_check_range+0x10c/0x1c0
[   15.180949]  __kasan_check_write+0x18/0x20
[   15.180978]  kasan_atomics_helper+0x72f/0x5450
[   15.181003]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.181027]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.181067]  ? kasan_atomics+0x152/0x310
[   15.181094]  kasan_atomics+0x1dc/0x310
[   15.181141]  ? __pfx_kasan_atomics+0x10/0x10
[   15.181165]  ? trace_hardirqs_on+0x37/0xe0
[   15.181190]  ? __pfx_read_tsc+0x10/0x10
[   15.181212]  ? ktime_get_ts64+0x86/0x230
[   15.181237]  kunit_try_run_case+0x1a5/0x480
[   15.181262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181288]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.181315]  ? __kthread_parkme+0x82/0x180
[   15.181355]  ? preempt_count_sub+0x50/0x80
[   15.181381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.181462]  kthread+0x337/0x6f0
[   15.181481]  ? trace_preempt_on+0x20/0xc0
[   15.181504]  ? __pfx_kthread+0x10/0x10
[   15.181526]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.181549]  ? calculate_sigpending+0x7b/0xa0
[   15.181574]  ? __pfx_kthread+0x10/0x10
[   15.181597]  ret_from_fork+0x116/0x1d0
[   15.181616]  ? __pfx_kthread+0x10/0x10
[   15.181638]  ret_from_fork_asm+0x1a/0x30
[   15.181669]  </TASK>
[   15.181681] 
[   15.193147] Allocated by task 282:
[   15.193472]  kasan_save_stack+0x45/0x70
[   15.193774]  kasan_save_track+0x18/0x40
[   15.194179]  kasan_save_alloc_info+0x3b/0x50
[   15.194486]  __kasan_kmalloc+0xb7/0xc0
[   15.194637]  __kmalloc_cache_noprof+0x189/0x420
[   15.194863]  kasan_atomics+0x95/0x310
[   15.195303]  kunit_try_run_case+0x1a5/0x480
[   15.195594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196043]  kthread+0x337/0x6f0
[   15.196302]  ret_from_fork+0x116/0x1d0
[   15.196451]  ret_from_fork_asm+0x1a/0x30
[   15.196777] 
[   15.196895] The buggy address belongs to the object at ffff8881027b3900
[   15.196895]  which belongs to the cache kmalloc-64 of size 64
[   15.197421] The buggy address is located 0 bytes to the right of
[   15.197421]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.197946] 
[   15.198303] The buggy address belongs to the physical page:
[   15.198560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.198855] flags: 0x200000000000000(node=0|zone=2)
[   15.199137] page_type: f5(slab)
[   15.199308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.199601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.200045] page dumped because: kasan: bad access detected
[   15.200286] 
[   15.200386] Memory state around the buggy address:
[   15.200589]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.200867]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.201265] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.201538]                                      ^
[   15.201694]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.202089]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.202421] ==================================================================
[   15.357733] ==================================================================
[   15.358687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.359217] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.359672] 
[   15.359779] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.359822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.359834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.359855] Call Trace:
[   15.359870]  <TASK>
[   15.359885]  dump_stack_lvl+0x73/0xb0
[   15.359914]  print_report+0xd1/0x650
[   15.359937]  ? __virt_addr_valid+0x1db/0x2d0
[   15.359967]  ? kasan_atomics_helper+0xc70/0x5450
[   15.359989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.360014]  ? kasan_atomics_helper+0xc70/0x5450
[   15.360047]  kasan_report+0x141/0x180
[   15.360071]  ? kasan_atomics_helper+0xc70/0x5450
[   15.360098]  kasan_check_range+0x10c/0x1c0
[   15.360124]  __kasan_check_write+0x18/0x20
[   15.360145]  kasan_atomics_helper+0xc70/0x5450
[   15.360169]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.360193]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.360220]  ? kasan_atomics+0x152/0x310
[   15.360247]  kasan_atomics+0x1dc/0x310
[   15.360271]  ? __pfx_kasan_atomics+0x10/0x10
[   15.360295]  ? trace_hardirqs_on+0x37/0xe0
[   15.360319]  ? __pfx_read_tsc+0x10/0x10
[   15.360341]  ? ktime_get_ts64+0x86/0x230
[   15.360630]  kunit_try_run_case+0x1a5/0x480
[   15.360832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.360872]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.360900]  ? __kthread_parkme+0x82/0x180
[   15.360922]  ? preempt_count_sub+0x50/0x80
[   15.360948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.360976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.361003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.361051]  kthread+0x337/0x6f0
[   15.361072]  ? trace_preempt_on+0x20/0xc0
[   15.361096]  ? __pfx_kthread+0x10/0x10
[   15.361119]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.361142]  ? calculate_sigpending+0x7b/0xa0
[   15.361167]  ? __pfx_kthread+0x10/0x10
[   15.361190]  ret_from_fork+0x116/0x1d0
[   15.361291]  ? __pfx_kthread+0x10/0x10
[   15.361319]  ret_from_fork_asm+0x1a/0x30
[   15.361352]  </TASK>
[   15.361365] 
[   15.372324] Allocated by task 282:
[   15.372460]  kasan_save_stack+0x45/0x70
[   15.372608]  kasan_save_track+0x18/0x40
[   15.372744]  kasan_save_alloc_info+0x3b/0x50
[   15.372893]  __kasan_kmalloc+0xb7/0xc0
[   15.373026]  __kmalloc_cache_noprof+0x189/0x420
[   15.373363]  kasan_atomics+0x95/0x310
[   15.373596]  kunit_try_run_case+0x1a5/0x480
[   15.373812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.374245]  kthread+0x337/0x6f0
[   15.374441]  ret_from_fork+0x116/0x1d0
[   15.374643]  ret_from_fork_asm+0x1a/0x30
[   15.374907] 
[   15.375063] The buggy address belongs to the object at ffff8881027b3900
[   15.375063]  which belongs to the cache kmalloc-64 of size 64
[   15.375624] The buggy address is located 0 bytes to the right of
[   15.375624]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.376422] 
[   15.376560] The buggy address belongs to the physical page:
[   15.377112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.377541] flags: 0x200000000000000(node=0|zone=2)
[   15.377781] page_type: f5(slab)
[   15.377991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.378456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.378832] page dumped because: kasan: bad access detected
[   15.379169] 
[   15.379297] Memory state around the buggy address:
[   15.379621]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.380054]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.380399] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.380841]                                      ^
[   15.381137]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381467]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381780] ==================================================================
[   15.408701] ==================================================================
[   15.409241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.409689] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.410418] 
[   15.410540] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.410584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.410598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.410619] Call Trace:
[   15.410636]  <TASK>
[   15.410652]  dump_stack_lvl+0x73/0xb0
[   15.410682]  print_report+0xd1/0x650
[   15.410705]  ? __virt_addr_valid+0x1db/0x2d0
[   15.410728]  ? kasan_atomics_helper+0xd47/0x5450
[   15.410751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.410775]  ? kasan_atomics_helper+0xd47/0x5450
[   15.410798]  kasan_report+0x141/0x180
[   15.410867]  ? kasan_atomics_helper+0xd47/0x5450
[   15.410895]  kasan_check_range+0x10c/0x1c0
[   15.410920]  __kasan_check_write+0x18/0x20
[   15.410939]  kasan_atomics_helper+0xd47/0x5450
[   15.410964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.410988]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.411064]  ? kasan_atomics+0x152/0x310
[   15.411093]  kasan_atomics+0x1dc/0x310
[   15.411117]  ? __pfx_kasan_atomics+0x10/0x10
[   15.411141]  ? trace_hardirqs_on+0x37/0xe0
[   15.411164]  ? __pfx_read_tsc+0x10/0x10
[   15.411186]  ? ktime_get_ts64+0x86/0x230
[   15.411211]  kunit_try_run_case+0x1a5/0x480
[   15.411236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.411263]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.411290]  ? __kthread_parkme+0x82/0x180
[   15.411311]  ? preempt_count_sub+0x50/0x80
[   15.411335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.411361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.411387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.411413]  kthread+0x337/0x6f0
[   15.411434]  ? trace_preempt_on+0x20/0xc0
[   15.411457]  ? __pfx_kthread+0x10/0x10
[   15.411479]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.411502]  ? calculate_sigpending+0x7b/0xa0
[   15.411527]  ? __pfx_kthread+0x10/0x10
[   15.411549]  ret_from_fork+0x116/0x1d0
[   15.411569]  ? __pfx_kthread+0x10/0x10
[   15.411590]  ret_from_fork_asm+0x1a/0x30
[   15.411621]  </TASK>
[   15.411632] 
[   15.422931] Allocated by task 282:
[   15.423130]  kasan_save_stack+0x45/0x70
[   15.423281]  kasan_save_track+0x18/0x40
[   15.423429]  kasan_save_alloc_info+0x3b/0x50
[   15.423663]  __kasan_kmalloc+0xb7/0xc0
[   15.423867]  __kmalloc_cache_noprof+0x189/0x420
[   15.424205]  kasan_atomics+0x95/0x310
[   15.424441]  kunit_try_run_case+0x1a5/0x480
[   15.424635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.424846]  kthread+0x337/0x6f0
[   15.425233]  ret_from_fork+0x116/0x1d0
[   15.425472]  ret_from_fork_asm+0x1a/0x30
[   15.425667] 
[   15.425742] The buggy address belongs to the object at ffff8881027b3900
[   15.425742]  which belongs to the cache kmalloc-64 of size 64
[   15.426190] The buggy address is located 0 bytes to the right of
[   15.426190]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.426728] 
[   15.426800] The buggy address belongs to the physical page:
[   15.426970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.427659] flags: 0x200000000000000(node=0|zone=2)
[   15.428072] page_type: f5(slab)
[   15.428218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.428566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.428803] page dumped because: kasan: bad access detected
[   15.429273] 
[   15.429405] Memory state around the buggy address:
[   15.429594]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.430051]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.430294] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.430641]                                      ^
[   15.430879]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.431411]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.431643] ==================================================================
[   16.001806] ==================================================================
[   16.002207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.002997] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.003313] 
[   16.003422] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.003465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.003478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.003498] Call Trace:
[   16.003514]  <TASK>
[   16.003530]  dump_stack_lvl+0x73/0xb0
[   16.003559]  print_report+0xd1/0x650
[   16.003582]  ? __virt_addr_valid+0x1db/0x2d0
[   16.003606]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.003629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.003653]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.003676]  kasan_report+0x141/0x180
[   16.003699]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.003726]  kasan_check_range+0x10c/0x1c0
[   16.003751]  __kasan_check_write+0x18/0x20
[   16.003771]  kasan_atomics_helper+0x1a7f/0x5450
[   16.003796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.003820]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.003846]  ? kasan_atomics+0x152/0x310
[   16.003873]  kasan_atomics+0x1dc/0x310
[   16.003897]  ? __pfx_kasan_atomics+0x10/0x10
[   16.003921]  ? trace_hardirqs_on+0x37/0xe0
[   16.003951]  ? __pfx_read_tsc+0x10/0x10
[   16.003973]  ? ktime_get_ts64+0x86/0x230
[   16.003997]  kunit_try_run_case+0x1a5/0x480
[   16.004022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.004144]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.004184]  ? __kthread_parkme+0x82/0x180
[   16.004205]  ? preempt_count_sub+0x50/0x80
[   16.004230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.004256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.004283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.004308]  kthread+0x337/0x6f0
[   16.004328]  ? trace_preempt_on+0x20/0xc0
[   16.004351]  ? __pfx_kthread+0x10/0x10
[   16.004372]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.004396]  ? calculate_sigpending+0x7b/0xa0
[   16.004421]  ? __pfx_kthread+0x10/0x10
[   16.004443]  ret_from_fork+0x116/0x1d0
[   16.004463]  ? __pfx_kthread+0x10/0x10
[   16.004484]  ret_from_fork_asm+0x1a/0x30
[   16.004517]  </TASK>
[   16.004528] 
[   16.015672] Allocated by task 282:
[   16.015894]  kasan_save_stack+0x45/0x70
[   16.016307]  kasan_save_track+0x18/0x40
[   16.016615]  kasan_save_alloc_info+0x3b/0x50
[   16.016917]  __kasan_kmalloc+0xb7/0xc0
[   16.017110]  __kmalloc_cache_noprof+0x189/0x420
[   16.017327]  kasan_atomics+0x95/0x310
[   16.017504]  kunit_try_run_case+0x1a5/0x480
[   16.017706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.017950]  kthread+0x337/0x6f0
[   16.018547]  ret_from_fork+0x116/0x1d0
[   16.018722]  ret_from_fork_asm+0x1a/0x30
[   16.019350] 
[   16.019434] The buggy address belongs to the object at ffff8881027b3900
[   16.019434]  which belongs to the cache kmalloc-64 of size 64
[   16.020324] The buggy address is located 0 bytes to the right of
[   16.020324]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.021107] 
[   16.021217] The buggy address belongs to the physical page:
[   16.021612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.022186] flags: 0x200000000000000(node=0|zone=2)
[   16.022381] page_type: f5(slab)
[   16.022681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.023205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.023531] page dumped because: kasan: bad access detected
[   16.023770] 
[   16.023855] Memory state around the buggy address:
[   16.024365]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.024729]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.025471] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.025771]                                      ^
[   16.026260]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.026671]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.027239] ==================================================================
[   15.772316] ==================================================================
[   15.772729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.773155] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.773571] 
[   15.773690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.773734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.773747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.773768] Call Trace:
[   15.773784]  <TASK>
[   15.773798]  dump_stack_lvl+0x73/0xb0
[   15.773827]  print_report+0xd1/0x650
[   15.773850]  ? __virt_addr_valid+0x1db/0x2d0
[   15.773873]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.773930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.773954]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.773988]  kasan_report+0x141/0x180
[   15.774011]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.774046]  __asan_report_store8_noabort+0x1b/0x30
[   15.774073]  kasan_atomics_helper+0x50d4/0x5450
[   15.774097]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.774121]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.774146]  ? kasan_atomics+0x152/0x310
[   15.774174]  kasan_atomics+0x1dc/0x310
[   15.774253]  ? __pfx_kasan_atomics+0x10/0x10
[   15.774279]  ? trace_hardirqs_on+0x37/0xe0
[   15.774303]  ? __pfx_read_tsc+0x10/0x10
[   15.774325]  ? ktime_get_ts64+0x86/0x230
[   15.774350]  kunit_try_run_case+0x1a5/0x480
[   15.774375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.774401]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.774427]  ? __kthread_parkme+0x82/0x180
[   15.774448]  ? preempt_count_sub+0x50/0x80
[   15.774473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.774499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.774525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.774551]  kthread+0x337/0x6f0
[   15.774571]  ? trace_preempt_on+0x20/0xc0
[   15.774595]  ? __pfx_kthread+0x10/0x10
[   15.774617]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.774639]  ? calculate_sigpending+0x7b/0xa0
[   15.774664]  ? __pfx_kthread+0x10/0x10
[   15.774702]  ret_from_fork+0x116/0x1d0
[   15.774722]  ? __pfx_kthread+0x10/0x10
[   15.774744]  ret_from_fork_asm+0x1a/0x30
[   15.774785]  </TASK>
[   15.774797] 
[   15.784554] Allocated by task 282:
[   15.784731]  kasan_save_stack+0x45/0x70
[   15.785187]  kasan_save_track+0x18/0x40
[   15.785368]  kasan_save_alloc_info+0x3b/0x50
[   15.785559]  __kasan_kmalloc+0xb7/0xc0
[   15.785737]  __kmalloc_cache_noprof+0x189/0x420
[   15.786078]  kasan_atomics+0x95/0x310
[   15.786600]  kunit_try_run_case+0x1a5/0x480
[   15.787162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.787592]  kthread+0x337/0x6f0
[   15.788075]  ret_from_fork+0x116/0x1d0
[   15.788352]  ret_from_fork_asm+0x1a/0x30
[   15.788756] 
[   15.788995] The buggy address belongs to the object at ffff8881027b3900
[   15.788995]  which belongs to the cache kmalloc-64 of size 64
[   15.789725] The buggy address is located 0 bytes to the right of
[   15.789725]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.790458] 
[   15.790558] The buggy address belongs to the physical page:
[   15.790790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.791479] flags: 0x200000000000000(node=0|zone=2)
[   15.792067] page_type: f5(slab)
[   15.792378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.792706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.793306] page dumped because: kasan: bad access detected
[   15.793749] 
[   15.793986] Memory state around the buggy address:
[   15.794397]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.794701]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.795479] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.795963]                                      ^
[   15.796420]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.797092]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.797608] ==================================================================
[   15.005582] ==================================================================
[   15.006070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.006426] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.006769] 
[   15.007004] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.007060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.007073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.007094] Call Trace:
[   15.007110]  <TASK>
[   15.007125]  dump_stack_lvl+0x73/0xb0
[   15.007154]  print_report+0xd1/0x650
[   15.007178]  ? __virt_addr_valid+0x1db/0x2d0
[   15.007201]  ? kasan_atomics_helper+0x3df/0x5450
[   15.007223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.007248]  ? kasan_atomics_helper+0x3df/0x5450
[   15.007271]  kasan_report+0x141/0x180
[   15.007293]  ? kasan_atomics_helper+0x3df/0x5450
[   15.007321]  kasan_check_range+0x10c/0x1c0
[   15.007346]  __kasan_check_read+0x15/0x20
[   15.007366]  kasan_atomics_helper+0x3df/0x5450
[   15.007390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.007413]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.007440]  ? kasan_atomics+0x152/0x310
[   15.007467]  kasan_atomics+0x1dc/0x310
[   15.007491]  ? __pfx_kasan_atomics+0x10/0x10
[   15.007514]  ? trace_hardirqs_on+0x37/0xe0
[   15.007538]  ? __pfx_read_tsc+0x10/0x10
[   15.007560]  ? ktime_get_ts64+0x86/0x230
[   15.007584]  kunit_try_run_case+0x1a5/0x480
[   15.007609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.007635]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.007661]  ? __kthread_parkme+0x82/0x180
[   15.007682]  ? preempt_count_sub+0x50/0x80
[   15.007706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.007732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.007757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.007784]  kthread+0x337/0x6f0
[   15.007899]  ? trace_preempt_on+0x20/0xc0
[   15.007943]  ? __pfx_kthread+0x10/0x10
[   15.007969]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.007993]  ? calculate_sigpending+0x7b/0xa0
[   15.008017]  ? __pfx_kthread+0x10/0x10
[   15.008049]  ret_from_fork+0x116/0x1d0
[   15.008068]  ? __pfx_kthread+0x10/0x10
[   15.008089]  ret_from_fork_asm+0x1a/0x30
[   15.008121]  </TASK>
[   15.008131] 
[   15.016388] Allocated by task 282:
[   15.016595]  kasan_save_stack+0x45/0x70
[   15.016786]  kasan_save_track+0x18/0x40
[   15.017141]  kasan_save_alloc_info+0x3b/0x50
[   15.017359]  __kasan_kmalloc+0xb7/0xc0
[   15.017493]  __kmalloc_cache_noprof+0x189/0x420
[   15.017698]  kasan_atomics+0x95/0x310
[   15.018183]  kunit_try_run_case+0x1a5/0x480
[   15.018405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.018703]  kthread+0x337/0x6f0
[   15.018979]  ret_from_fork+0x116/0x1d0
[   15.019210]  ret_from_fork_asm+0x1a/0x30
[   15.019408] 
[   15.019540] The buggy address belongs to the object at ffff8881027b3900
[   15.019540]  which belongs to the cache kmalloc-64 of size 64
[   15.020178] The buggy address is located 0 bytes to the right of
[   15.020178]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.020697] 
[   15.020891] The buggy address belongs to the physical page:
[   15.021188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.021569] flags: 0x200000000000000(node=0|zone=2)
[   15.021881] page_type: f5(slab)
[   15.022113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.022448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.023011] page dumped because: kasan: bad access detected
[   15.023346] 
[   15.023430] Memory state around the buggy address:
[   15.023652]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.024127]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.024460] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.024766]                                      ^
[   15.025112]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.025443]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.025780] ==================================================================
[   16.105347] ==================================================================
[   16.105622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.106425] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.106744] 
[   16.106840] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.107083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.107097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.107117] Call Trace:
[   16.107133]  <TASK>
[   16.107149]  dump_stack_lvl+0x73/0xb0
[   16.107181]  print_report+0xd1/0x650
[   16.107204]  ? __virt_addr_valid+0x1db/0x2d0
[   16.107228]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.107251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.107275]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.107298]  kasan_report+0x141/0x180
[   16.107322]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.107349]  kasan_check_range+0x10c/0x1c0
[   16.107374]  __kasan_check_write+0x18/0x20
[   16.107395]  kasan_atomics_helper+0x1ce1/0x5450
[   16.107419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.107443]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.107469]  ? kasan_atomics+0x152/0x310
[   16.107496]  kasan_atomics+0x1dc/0x310
[   16.107520]  ? __pfx_kasan_atomics+0x10/0x10
[   16.107544]  ? trace_hardirqs_on+0x37/0xe0
[   16.107569]  ? __pfx_read_tsc+0x10/0x10
[   16.107592]  ? ktime_get_ts64+0x86/0x230
[   16.107616]  kunit_try_run_case+0x1a5/0x480
[   16.107642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.107669]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.107695]  ? __kthread_parkme+0x82/0x180
[   16.107716]  ? preempt_count_sub+0x50/0x80
[   16.107741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.107767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.107792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.107979]  kthread+0x337/0x6f0
[   16.108001]  ? trace_preempt_on+0x20/0xc0
[   16.108024]  ? __pfx_kthread+0x10/0x10
[   16.108057]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.108081]  ? calculate_sigpending+0x7b/0xa0
[   16.108106]  ? __pfx_kthread+0x10/0x10
[   16.108128]  ret_from_fork+0x116/0x1d0
[   16.108148]  ? __pfx_kthread+0x10/0x10
[   16.108169]  ret_from_fork_asm+0x1a/0x30
[   16.108199]  </TASK>
[   16.108211] 
[   16.118978] Allocated by task 282:
[   16.119418]  kasan_save_stack+0x45/0x70
[   16.119599]  kasan_save_track+0x18/0x40
[   16.119964]  kasan_save_alloc_info+0x3b/0x50
[   16.120342]  __kasan_kmalloc+0xb7/0xc0
[   16.120517]  __kmalloc_cache_noprof+0x189/0x420
[   16.120723]  kasan_atomics+0x95/0x310
[   16.121291]  kunit_try_run_case+0x1a5/0x480
[   16.121476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.121736]  kthread+0x337/0x6f0
[   16.121911]  ret_from_fork+0x116/0x1d0
[   16.122396]  ret_from_fork_asm+0x1a/0x30
[   16.122592] 
[   16.122882] The buggy address belongs to the object at ffff8881027b3900
[   16.122882]  which belongs to the cache kmalloc-64 of size 64
[   16.123481] The buggy address is located 0 bytes to the right of
[   16.123481]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.124363] 
[   16.124468] The buggy address belongs to the physical page:
[   16.124670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.125356] flags: 0x200000000000000(node=0|zone=2)
[   16.125675] page_type: f5(slab)
[   16.125847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.126413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.126731] page dumped because: kasan: bad access detected
[   16.127282] 
[   16.127379] Memory state around the buggy address:
[   16.127554]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.128133]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.128359] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.128664]                                      ^
[   16.129586]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.130439]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.130658] ==================================================================
[   16.181703] ==================================================================
[   16.182450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.182693] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   16.183281] 
[   16.183455] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.183498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.183511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.183531] Call Trace:
[   16.183548]  <TASK>
[   16.183563]  dump_stack_lvl+0x73/0xb0
[   16.183592]  print_report+0xd1/0x650
[   16.183616]  ? __virt_addr_valid+0x1db/0x2d0
[   16.183640]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.183663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.183687]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.183710]  kasan_report+0x141/0x180
[   16.183733]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.183761]  kasan_check_range+0x10c/0x1c0
[   16.183786]  __kasan_check_write+0x18/0x20
[   16.183866]  kasan_atomics_helper+0x1eaa/0x5450
[   16.183891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.183932]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.183967]  ? kasan_atomics+0x152/0x310
[   16.183998]  kasan_atomics+0x1dc/0x310
[   16.184022]  ? __pfx_kasan_atomics+0x10/0x10
[   16.184056]  ? trace_hardirqs_on+0x37/0xe0
[   16.184080]  ? __pfx_read_tsc+0x10/0x10
[   16.184103]  ? ktime_get_ts64+0x86/0x230
[   16.184128]  kunit_try_run_case+0x1a5/0x480
[   16.184153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.184180]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.184206]  ? __kthread_parkme+0x82/0x180
[   16.184228]  ? preempt_count_sub+0x50/0x80
[   16.184252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.184279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.184305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.184331]  kthread+0x337/0x6f0
[   16.184351]  ? trace_preempt_on+0x20/0xc0
[   16.184374]  ? __pfx_kthread+0x10/0x10
[   16.184396]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.184420]  ? calculate_sigpending+0x7b/0xa0
[   16.184445]  ? __pfx_kthread+0x10/0x10
[   16.184467]  ret_from_fork+0x116/0x1d0
[   16.184487]  ? __pfx_kthread+0x10/0x10
[   16.184508]  ret_from_fork_asm+0x1a/0x30
[   16.184539]  </TASK>
[   16.184551] 
[   16.194724] Allocated by task 282:
[   16.194916]  kasan_save_stack+0x45/0x70
[   16.195131]  kasan_save_track+0x18/0x40
[   16.195328]  kasan_save_alloc_info+0x3b/0x50
[   16.195534]  __kasan_kmalloc+0xb7/0xc0
[   16.195701]  __kmalloc_cache_noprof+0x189/0x420
[   16.195913]  kasan_atomics+0x95/0x310
[   16.196213]  kunit_try_run_case+0x1a5/0x480
[   16.196437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.196681]  kthread+0x337/0x6f0
[   16.196892]  ret_from_fork+0x116/0x1d0
[   16.197060]  ret_from_fork_asm+0x1a/0x30
[   16.197245] 
[   16.197346] The buggy address belongs to the object at ffff8881027b3900
[   16.197346]  which belongs to the cache kmalloc-64 of size 64
[   16.197800] The buggy address is located 0 bytes to the right of
[   16.197800]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   16.198195] 
[   16.198316] The buggy address belongs to the physical page:
[   16.198572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   16.199091] flags: 0x200000000000000(node=0|zone=2)
[   16.199438] page_type: f5(slab)
[   16.199659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.199907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.200154] page dumped because: kasan: bad access detected
[   16.200377] 
[   16.200469] Memory state around the buggy address:
[   16.200753]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201262]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201480] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.201692]                                      ^
[   16.201845]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.202331]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.202698] ==================================================================
[   15.979251] ==================================================================
[   15.979562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.980126] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.980457] 
[   15.980548] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.980592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.980605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.981311] Call Trace:
[   15.981396]  <TASK>
[   15.981417]  dump_stack_lvl+0x73/0xb0
[   15.981466]  print_report+0xd1/0x650
[   15.981489]  ? __virt_addr_valid+0x1db/0x2d0
[   15.981513]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.981536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.981561]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.981584]  kasan_report+0x141/0x180
[   15.981606]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.981634]  kasan_check_range+0x10c/0x1c0
[   15.981659]  __kasan_check_write+0x18/0x20
[   15.981680]  kasan_atomics_helper+0x19e3/0x5450
[   15.981704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.981728]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.981755]  ? kasan_atomics+0x152/0x310
[   15.981782]  kasan_atomics+0x1dc/0x310
[   15.981806]  ? __pfx_kasan_atomics+0x10/0x10
[   15.981887]  ? trace_hardirqs_on+0x37/0xe0
[   15.981912]  ? __pfx_read_tsc+0x10/0x10
[   15.981949]  ? ktime_get_ts64+0x86/0x230
[   15.981973]  kunit_try_run_case+0x1a5/0x480
[   15.982000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982026]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.982064]  ? __kthread_parkme+0x82/0x180
[   15.982086]  ? preempt_count_sub+0x50/0x80
[   15.982111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.982188]  kthread+0x337/0x6f0
[   15.982208]  ? trace_preempt_on+0x20/0xc0
[   15.982231]  ? __pfx_kthread+0x10/0x10
[   15.982253]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.982276]  ? calculate_sigpending+0x7b/0xa0
[   15.982301]  ? __pfx_kthread+0x10/0x10
[   15.982323]  ret_from_fork+0x116/0x1d0
[   15.982343]  ? __pfx_kthread+0x10/0x10
[   15.982364]  ret_from_fork_asm+0x1a/0x30
[   15.982395]  </TASK>
[   15.982406] 
[   15.991479] Allocated by task 282:
[   15.991719]  kasan_save_stack+0x45/0x70
[   15.992062]  kasan_save_track+0x18/0x40
[   15.992296]  kasan_save_alloc_info+0x3b/0x50
[   15.992455]  __kasan_kmalloc+0xb7/0xc0
[   15.992597]  __kmalloc_cache_noprof+0x189/0x420
[   15.992768]  kasan_atomics+0x95/0x310
[   15.993203]  kunit_try_run_case+0x1a5/0x480
[   15.993441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993703]  kthread+0x337/0x6f0
[   15.993910]  ret_from_fork+0x116/0x1d0
[   15.994514]  ret_from_fork_asm+0x1a/0x30
[   15.994678] 
[   15.994753] The buggy address belongs to the object at ffff8881027b3900
[   15.994753]  which belongs to the cache kmalloc-64 of size 64
[   15.995191] The buggy address is located 0 bytes to the right of
[   15.995191]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.996025] 
[   15.996173] The buggy address belongs to the physical page:
[   15.996445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.996714] flags: 0x200000000000000(node=0|zone=2)
[   15.997176] page_type: f5(slab)
[   15.997369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.997678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.998111] page dumped because: kasan: bad access detected
[   15.998332] 
[   15.998427] Memory state around the buggy address:
[   15.998686]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.999552]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.000084] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.000405]                                      ^
[   16.000621]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.001038]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.001375] ==================================================================
[   15.475904] ==================================================================
[   15.476291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.476663] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282
[   15.477064] 
[   15.477217] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.477262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.477274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.477295] Call Trace:
[   15.477309]  <TASK>
[   15.477325]  dump_stack_lvl+0x73/0xb0
[   15.477355]  print_report+0xd1/0x650
[   15.477378]  ? __virt_addr_valid+0x1db/0x2d0
[   15.477401]  ? kasan_atomics_helper+0xf10/0x5450
[   15.477423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.477447]  ? kasan_atomics_helper+0xf10/0x5450
[   15.477471]  kasan_report+0x141/0x180
[   15.477493]  ? kasan_atomics_helper+0xf10/0x5450
[   15.477520]  kasan_check_range+0x10c/0x1c0
[   15.477545]  __kasan_check_write+0x18/0x20
[   15.477565]  kasan_atomics_helper+0xf10/0x5450
[   15.477589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.477613]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.477640]  ? kasan_atomics+0x152/0x310
[   15.477668]  kasan_atomics+0x1dc/0x310
[   15.477691]  ? __pfx_kasan_atomics+0x10/0x10
[   15.477715]  ? trace_hardirqs_on+0x37/0xe0
[   15.477740]  ? __pfx_read_tsc+0x10/0x10
[   15.477762]  ? ktime_get_ts64+0x86/0x230
[   15.477805]  kunit_try_run_case+0x1a5/0x480
[   15.477882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477910]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.477938]  ? __kthread_parkme+0x82/0x180
[   15.477960]  ? preempt_count_sub+0x50/0x80
[   15.477985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.478011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.478050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.478079]  kthread+0x337/0x6f0
[   15.478099]  ? trace_preempt_on+0x20/0xc0
[   15.478122]  ? __pfx_kthread+0x10/0x10
[   15.478143]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.478166]  ? calculate_sigpending+0x7b/0xa0
[   15.478200]  ? __pfx_kthread+0x10/0x10
[   15.478223]  ret_from_fork+0x116/0x1d0
[   15.478243]  ? __pfx_kthread+0x10/0x10
[   15.478265]  ret_from_fork_asm+0x1a/0x30
[   15.478296]  </TASK>
[   15.478307] 
[   15.486283] Allocated by task 282:
[   15.486447]  kasan_save_stack+0x45/0x70
[   15.486636]  kasan_save_track+0x18/0x40
[   15.486898]  kasan_save_alloc_info+0x3b/0x50
[   15.487078]  __kasan_kmalloc+0xb7/0xc0
[   15.487210]  __kmalloc_cache_noprof+0x189/0x420
[   15.487362]  kasan_atomics+0x95/0x310
[   15.487547]  kunit_try_run_case+0x1a5/0x480
[   15.487780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.488444]  kthread+0x337/0x6f0
[   15.488619]  ret_from_fork+0x116/0x1d0
[   15.488764]  ret_from_fork_asm+0x1a/0x30
[   15.489156] 
[   15.489280] The buggy address belongs to the object at ffff8881027b3900
[   15.489280]  which belongs to the cache kmalloc-64 of size 64
[   15.489661] The buggy address is located 0 bytes to the right of
[   15.489661]  allocated 48-byte region [ffff8881027b3900, ffff8881027b3930)
[   15.490169] 
[   15.490265] The buggy address belongs to the physical page:
[   15.490706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3
[   15.491155] flags: 0x200000000000000(node=0|zone=2)
[   15.491407] page_type: f5(slab)
[   15.491538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.491763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.492073] page dumped because: kasan: bad access detected
[   15.492317] 
[   15.492391] Memory state around the buggy address:
[   15.492607]  ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.493233]  ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.493497] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.493704]                                      ^
[   15.494069]  ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494436]  ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494755] ==================================================================